+7
-6
.envrc
···-source_url "https://raw.githubusercontent.com/nix-community/nix-direnv/3.0.6/direnvrc" "sha256-RYcUJaRMf8oF5LznDrlCXbkOQrywm0HDv1VjYGaJGdM="+source_url "https://raw.githubusercontent.com/nix-community/nix-direnv/3.1.0/direnvrc" "sha256-yMJ2OVMzrFaDPn7q8nCBZFRYpL/f0RcHzhmw/i6btJM="
+31
.nvim.lua
···+expr = "(builtins.getFlake (builtins.toString ./.)).nixosConfigurations.zaphod.options.home-manager.users.type.getSubOptions []",+exper = "(pkgs.lib.evalModules { modules = (builtins.getFlake (builtins.toString ./.)).nixosModules; }).options",
+1
.shellcheckrc
···
+23
.zed/settings.json
···+// For a full list of overridable settings, and general information on folder-specific settings,+"expr": "(builtins.getFlake (builtins.toString ./.)).nixosConfigurations.zaphod.options.home-manager.users.type.getSubOptions []"
+4
-2
Justfile
···
+30
-18
README.md
···-This is PyroNet's (relatively) production-grade NixOS config repo. It contains configurations for 3 different machines, as well as `home-manager` configurations.-I try to keep the configuration organized. All home-manager related items go in `/home`, host configurations go in `/hosts`, and custom packages are in `/pkgs`, among other folders.+This is PyroNet's (relatively) production-grade NixOS config repo. It contains configurations for 3 different machines,-* [My blog](https://blog.pyrox.dev), and the [root domain](https://pyrox.dev) which are served by [OMG.LOL](https://omg.lol).-I highly recommend their services, as you get a great domain name at a company that cares about you. If you do sign up, consider using [my referral link](https://omg.lol?refer=py), as I get 3 months of service credit if you sign up through it.+I try to keep the configuration organized. All home-manager related items go in `/home`, host configurations go in+- [My blog](https://blog.pyrox.dev), and the [root domain](https://pyrox.dev) which are served by+[OMG.LOL](https://omg.lol). I highly recommend their services, as you get a great domain name at a company that cares+about you. If you do sign up, consider using [my referral link](https://omg.lol?refer=py), as I get 3 months of-* A Tailscale tunnel from `marvin` to `prefect` which allows me to run services on `marvin` while having them be externally accessible.-* Email services for my domains, also run on `prefect`, with all email data backed up hourly to `marvin`, ensuring data reliability.+- A Tailscale tunnel from `marvin` to `prefect` which allows me to run services on `marvin` while having them be+- Email services for my domains, also run on `prefect`, with all email data backed up hourly to `marvin`, ensuring data-If you have any questions about any of the services I run, or would like to reach out, my contact info is on my profile [here](https://pyrox.dev)+If you have any questions about any of the services I run, or would like to reach out, my contact info is on my profile+Copyright (c) 2023 Pyrox and PyroNet. All rights reserved. This Source Code Form is subject to the terms of the Mozilla+Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at
-4
TODO.md
···- https://github.com/felschr/nixos-config/blob/main/services/immich.nix for an example of how to do it
-2
checks/deploy/default.nix
+22
devShells/default/default.nix
···
+9
devShells/default.nix
+398
-522
flake.lock
·····················+"url": "https://git.lix.systems/api/v1/repos/lix-project/flake-compat/archive/549f2762aebeff29a2e5ece7a7dc0f955281a1d1.tar.gz?rev=549f2762aebeff29a2e5ece7a7dc0f955281a1d1"··················+"url": "https://github.com/lucide-icons/lucide/releases/download/0.536.0/lucide-icons-0.536.0.zip"+"url": "https://github.com/lucide-icons/lucide/releases/download/0.536.0/lucide-icons-0.536.0.zip"············+"url": "https://releases.nixos.org/nixpkgs/nixpkgs-26.05pre904683.23258e03aaa4/nixexprs.tar.xz"···
+103
-170
flake.nix
············
+17
homeModules/all-modules.nix
···
+17
homeModules/default.nix
···
+24
homeModules/profiles/base/default.nix
···
+68
homeModules/profiles/cli/default.nix
···
+7
homeModules/profiles/cli/rbw-config.json
+10
homeModules/profiles/default.nix
+76
homeModules/profiles/desktop/default.nix
···
+25
homeModules/profiles/development/default.nix
···
+47
homeModules/profiles/gui/default.nix
···
+15
homeModules/profiles/server/default.nix
···
+50
homeModules/programs/caelestia/caelestia-cli.json
···
+364
homeModules/programs/caelestia/caelestia-shell.json
···
+23
homeModules/programs/caelestia/default.nix
···
+18
homeModules/programs/chromium/default.nix
···
+23
homeModules/programs/default.nix
···
+20
homeModules/programs/dms/default.nix
···
+27
homeModules/programs/firefox/default.nix
···
+44
homeModules/programs/fish/default.nix
···
+20
homeModules/programs/ghostty/default.nix
···
+19
homeModules/programs/ghostty/settings.nix
···
+106
homeModules/programs/git/default.nix
···
+49
homeModules/programs/gpg/default.nix
···+default-preference-list = "SHA512 SHA384 SHA256 AES256 AES192 AES ZLIB BZIP2 ZIP Uncompressed";
+15
homeModules/programs/helix/default.nix
···
+25
homeModules/programs/helix/settings.nix
···
+14
homeModules/programs/kitty/default.nix
···
+41
homeModules/programs/kitty/settings.nix
···
+78
homeModules/programs/misc-programs/default.nix
···
+26
homeModules/programs/misc-programs/direnv-stdlib.sh
···+log_status "No pyproject.toml found. Executing \`poetry init\` to create a \`$PYPROJECT_TOML\` first."
+35
homeModules/programs/neovim/default.nix
···
+369
homeModules/programs/nushell/config.nu
···+let-env config = ($env.config | update hooks.pre_prompt ($env.config.hooks.pre_prompt | append {+mode: rounded # basic, compact, compact_double, light, thin, with_love, rounded, reinforced, heavy, none, other+index_mode: always # "always" show indexes, "never" show indexes, "auto" = show indexes when a table has "index" column+sync_on_enter: true # Enable to share history between multiple sessions, else you have to close the session to write history to file+enable: true # set to false to prevent nushell looking into $env.PATH to find more suggestions, `false` recommended for WSL users as this look up my be very slow+max_results: 100 # setting it lower can improve completion performance at the cost of omitting some options+color_config: $dark_theme # if you want a light theme, replace `$dark_theme` to `$light_theme`+# buffer_editor: "emacs" # command that will be used to edit the current line buffer with ctrl+o, if unset fallback to $env.EDITOR and $env.VISUAL+shell_integration: true # enables terminal markers and a workaround to arrow keys stop working issue+render_right_prompt_on_last_line: false # true or false to enable or disable right prompt to be rendered on last line of the prompt.+null # replace with source code to run if the PWD environment is different since the last repl input+col_width: 20 # Optional value. If missing all the screen width is used to calculate column width+col_width: 20 # Optional value. If missing all the screen width is used to calculate column width+mode: [emacs, vi_normal, vi_insert] # Note: You can add the same keybinding to all modes by using a list
+12
homeModules/programs/nushell/default.nix
···
+9
homeModules/programs/nushell/env.nu
···+/etc/profiles/per-user/thehedgehog/bin/starship init nu | save --force /home/thehedgehog/.cache/starship/init.nu
+1
homeModules/programs/ssh/backup.pub
···+ssh-rsa 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 993390@993390-student-FVFD26HVJ1WK
+57
homeModules/programs/ssh/default.nix
···
+7
homeModules/programs/ssh/ssh-auth-signers.nix
···+hedgehog@mrhedgehog.xyz ssh-rsa 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+hedgehog@mrhedgehog.xyz ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCyTiGctsHaTUlRJn2XQ/745dD0UWGWO8W0en8J5rf7BLI8lL/hPUmbNt45vC5754LXcBjnp1t/1FNgiGhvNZIWJpC+elBmhyMhg8z1exRZPD+as7XaH7scnij2vSbSphQFUqH433ggAGe77x5bc7wKFp9n7vj8G1u0JJxMEe1M7kNFY0+ShNtaHna3LxiQOVcW7qVlNKZP8Ol1V7kZLblRADCJMTYOXDIbktA8bbGRfGhbNjJGkL665qz36haYwb2i6A4sC7Y583N8ro8hIDG/ByJqwbl/Sz4rSxkT6G4+OdBvS6sa7TovNXHjmQCculMIltdog7UhgyBsim1sTzxAen3YyFRi1Cz/kLM0oH39m/W4IoMvJcNZCJ3ItLgy+lEVMd87jVOqfuq/hyjHVI0wJtU2Si2HTxv7aKL8gPzqXwbNH+nhkhlQ0ZH8zKVBunOgLDgsmGIky5X/T3bpWZpIoFkOR7AYrId/5dOeGM3pHhHb6woZ3SRubZ43Ah/VdJM=+me@thehedgehog.me ssh-rsa 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+me@thehedgehog.me ssh-rsa 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+me@thehedgehog.me ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK97n2SgV/U1mLzxcaEDl85iF5D3jm7xboZ+S01+CbM/8zxVoWyjVHCqTwDcrLwP0c5Z51BNj7U0UkGIgR4zTSM=
+1
homeModules/programs/ssh/yubikey-back.pub
···+ssh-rsa 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 cardno:15 567 372
+1
homeModules/programs/ssh/yubikey-main.pub
···
+1
homeModules/programs/ssh/yubikey-new.pub
···+ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK97n2SgV/U1mLzxcaEDl85iF5D3jm7xboZ+S01+CbM/8zxVoWyjVHCqTwDcrLwP0c5Z51BNj7U0UkGIgR4zTSM=
+15
homeModules/programs/starship/default.nix
···
+104
homeModules/programs/starship/settings.nix
···
+54
homeModules/programs/vscodium/default.nix
···
+36
homeModules/programs/zed-editor/default.nix
···
+100
homeModules/programs/zed-editor/settings.nix
···
+1
homeModules/scripts/default.nix
···
+7
homeModules/services/default.nix
+24
homeModules/services/gpg-agent/default.nix
···
+11
homeModules/services/kdeconnect/default.nix
+11
homeModules/services/syncthing/default.nix
+46
homeModules/theming/default.nix
···
+32
homeModules/wayland/default.nix
···+# Per https://nix-community.github.io/home-manager/options.xhtml#opt-wayland.windowManager.hyprland.package
+11
homeModules/wayland/env.nix
+36
homeModules/wayland/hypridle.nix
···
+110
homeModules/wayland/keybindings.nix
···
+8
homeModules/wayland/monitors.nix
+7
homeModules/wayland/plugins.nix
+10
homeModules/wayland/services.nix
+25
homeModules/wayland/settings.nix
···
+35
homeModules/wayland/variables.nix
···
+7
homeModules/wayland/windowrules.nix
+128
homeModules/xdg/default.nix
···
-8
homes/x86_64-linux/pyrox@marvin/default.nix
-8
homes/x86_64-linux/pyrox@prefect/default.nix
-8
homes/x86_64-linux/pyrox@thought/default.nix
-55
homes/x86_64-linux/pyrox@zaphod/default.nix
···
-7
homes/x86_64-linux/pyrox@zaphod/files/distrobox-config.nix
-5
homes/x86_64-linux/pyrox@zaphod/files/pamKeys.nix
···-thehedgehog:iC1dk7d+DYFX60wpkDlWdwNpkRLXmML7iDjxh4TRXe8OhsAb2pgKiY6tVLHeZIK3WOVA1DuWU8rWlHdma3eqJg==,NdBJTVCvOamU35ad3fJRv6A6YZQIYrojcVk9a8WYMVvTtKO+xyIeBvunlidHv4Zb0rYrOvK6u7Gb4N5x6T6FIQ==,es256,+presence:juWx2IphhNuHZHiv8nG3i2WWTyR5A+CWp5iHz2AmE7aj3b3rgj85Gl1PMpmZlvlwDgbCP+dlcP5PPzTFloB3Ow==,FEXBkP0PzZSURoIbLuGiRRHFIcSiqEz/ieNPRqRY/hqLJ4AsvGwJ1xdIX7F8qAQuMSp8m7usuBLS4u+4FGg3Ng==,es256,+presence
-8
homes/x86_64-linux/thehedgehog@marvin/default.nix
-8
homes/x86_64-linux/thehedgehog@prefect/default.nix
-8
homes/x86_64-linux/thehedgehog@thought/default.nix
-53
homes/x86_64-linux/thehedgehog@zaphod/default.nix
···
+69
hosts/default.nix
···
+58
hosts/marvin/bootloader.nix
···+ACTION=="add|change", KERNEL=="sd[a-z]*[0-9]*|mmcblk[0-9]*p[0-9]*|nvme[0-9]*n[0-9]*p[0-9]*", ENV{ID_FS_TYPE}=="zfs_member", ATTR{../queue/scheduler}="none"
+82
hosts/marvin/default.nix
···
+18
hosts/marvin/firewall.nix
+12
hosts/marvin/hardware.nix
···
+35
hosts/marvin/networking.nix
···
+28
hosts/marvin/services/anubis.nix
···
+10
hosts/marvin/services/avahi.nix
+46
hosts/marvin/services/bots.nix
···
+53
hosts/marvin/services/buildbot.nix
···
+21
hosts/marvin/services/deemix.nix
···
+38
hosts/marvin/services/gdq-cals.nix
···+ExecStart = "${lib.getExe pyWithLibs} gdq_cal_ics_exporter.py --fatales --gcal --disable_general";
+166
hosts/marvin/services/git.nix
···
+5
hosts/marvin/services/golink.nix
+69
hosts/marvin/services/grafana.nix
···+client_secret = "89eccaa8a31104c218df5cfe37c87f0ea0bbddcd1571bddb7f7fbf5a09045efd59c61f1caaa79483ad59aac2c19488b254acdaced47e66a6505865a14a63ac4a";
+223
hosts/marvin/services/immich-config.json
···
+51
hosts/marvin/services/immich.nix
···
+71
hosts/marvin/services/jellyfin.nix
···+ExecStart = "${lib.getExe self'.packages.jellyfin-exporter} @${config.age.secrets.jellyfin-exporter-config.path}";
+53
hosts/marvin/services/matrix.nix
···
+38
hosts/marvin/services/miniflux.nix
···
+112
hosts/marvin/services/nextcloud/default.nix
···
+13
hosts/marvin/services/nextcloud/imaginary.nix
+21
hosts/marvin/services/nextcloud/nextcloud-admin-pw.age
···
+29
hosts/marvin/services/nextcloud/office.nix
···
+18
hosts/marvin/services/nginx.nix
+48
hosts/marvin/services/pinchflat.nix
···
+122
hosts/marvin/services/planka.nix
···
+49
hosts/marvin/services/pocket-id.nix
···
+16
hosts/marvin/services/podman.nix
···
+50
hosts/marvin/services/postgres.nix
···+# ExecStart = "${cfg.package}/bin/vacuumdb --all --echo --jobs=6 --parallel=5 --analyze --verbose";
+26
hosts/marvin/services/prometheus.nix
···
+32
hosts/marvin/services/scrutiny.nix
···
+20
hosts/marvin/services/secrets/anubis-key.age
···
+23
hosts/marvin/services/secrets/authentik-env.age
···+�as����Dp��c�´���i�x�AQ>�w��o�bI 0�X����Za�AH#���0�|����HR5�������S��G���9Y��{��ּ_"������r4?x՚5�tG�F|�&�gXC�\9�P
+20
hosts/marvin/services/secrets/buildbot/gitea-token.age
···
hosts/marvin/services/secrets/buildbot/oauth-secret.age
This is a binary file and will not be displayed.
+19
hosts/marvin/services/secrets/buildbot/worker-password.age
···
+21
hosts/marvin/services/secrets/buildbot/workers.age
···+.I�s��q^hA���Ch�D��s��������|����8[�%xX�n+�Qb�#f�gUL�C�c9p������RgBd9e%'Y8�F��gկ~�15�D���d�K��C�c>���w
hosts/marvin/services/secrets/forgejo/aux-docs-runner-token.age
This is a binary file and will not be displayed.
+21
hosts/marvin/services/secrets/forgejo/db-pw.age
···
+20
hosts/marvin/services/secrets/forgejo/default-runner-token.age
···
+19
hosts/marvin/services/secrets/forgejo/gitgay-runner-token.age
···
hosts/marvin/services/secrets/forgejo/internal-token.age
This is a binary file and will not be displayed.
hosts/marvin/services/secrets/forgejo/lfs-jwt-secret.age
This is a binary file and will not be displayed.
+22
hosts/marvin/services/secrets/forgejo/mail-pw.age
···
+19
hosts/marvin/services/secrets/forgejo/oauth2-jwt-secret.age
···
+19
hosts/marvin/services/secrets/forgejo/secret-key.age
···
hosts/marvin/services/secrets/golink-authkey.age
This is a binary file and will not be displayed.
+23
hosts/marvin/services/secrets/grafana-admin-password.age
···
hosts/marvin/services/secrets/grafana-smtp-password.age
This is a binary file and will not be displayed.
+19
hosts/marvin/services/secrets/immich/mail-pw.age
···
+19
hosts/marvin/services/secrets/immich/oauth-secret.age
···
+19
hosts/marvin/services/secrets/jellyfin-exporter-config.age
···+�;�2����}�O3h�u5����缻�N��s}oVU���@��嬝��L�at��8�x��P�R��d�Rx{3�b��?o����x8`��V ܬ�"*����e�� #NV��?���aP��N��Iɥ�j��S��y3�i����hgп\�D�b��1;��\A<d��f9����A�g�J4؞��R����'תs�COCs� ���N�v�"��vk>8,�DR���
hosts/marvin/services/secrets/miniflux-admin.age
This is a binary file and will not be displayed.
+24
hosts/marvin/services/secrets/minio-root.age
···++�P��������q�f=Yc��,)��F�P�9�.�����Z<��ɟF�c,�q���o��Y �>������\�l��z��2ϯ���_s���z��&_�B��q<�J����+0h�_��W
hosts/marvin/services/secrets/nix-serve-priv.age
This is a binary file and will not be displayed.
hosts/marvin/services/secrets/pinchflat-secrets.age
This is a binary file and will not be displayed.
hosts/marvin/services/secrets/planka-env.age
This is a binary file and will not be displayed.
hosts/marvin/services/secrets/pocket-id-secrets.age
This is a binary file and will not be displayed.
+43
hosts/marvin/services/secrets/secrets.nix
···+yubi-back = "ssh-rsa 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";
hosts/marvin/services/secrets/thehedgehog-key.age
This is a binary file and will not be displayed.
hosts/marvin/services/secrets/thehedgehog-pem.age
This is a binary file and will not be displayed.
+20
hosts/marvin/services/secrets/vaultwarden-pgpass.age
···
hosts/marvin/services/secrets/vaultwarden-vars.age
This is a binary file and will not be displayed.
hosts/marvin/services/secrets/webmentiond-env.age
This is a binary file and will not be displayed.
+15
hosts/marvin/services/syncthing.nix
+12
hosts/marvin/services/tailscale.nix
+44
hosts/marvin/services/tangled.nix
···
+101
hosts/marvin/services/vaultwarden.nix
···+systemd.services.vaultwarden.environment.PGPASSFILE = config.age.secrets.vaultwarden-pgpass.path;
+8
hosts/marvin/services/zfs.nix
+44
hosts/prefect/bootloader.nix
···+ACTION=="add|change", KERNEL=="sd[a-z]*[0-9]*|mmcblk[0-9]*p[0-9]*|nvme[0-9]*n[0-9]*p[0-9]*", ENV{ID_FS_TYPE}=="zfs_member", ATTR{../queue/scheduler}="none"
+56
hosts/prefect/default.nix
···
+67
hosts/prefect/dn42/default.nix
···
+25
hosts/prefect/dn42/peers/bandura.nix
···
+26
hosts/prefect/dn42/peers/catgirls.nix
···
+26
hosts/prefect/dn42/peers/chrismoos.nix
···
+29
hosts/prefect/dn42/peers/darkpoint.nix
···
+23
hosts/prefect/dn42/peers/default.nix
···
+26
hosts/prefect/dn42/peers/iedon.nix
···
+27
hosts/prefect/dn42/peers/kioubit.nix
···
+25
hosts/prefect/dn42/peers/lare.nix
···
+26
hosts/prefect/dn42/peers/potato.nix
···
+26
hosts/prefect/dn42/peers/prefixlabs.nix
···
+26
hosts/prefect/dn42/peers/routedbits.nix
···
+26
hosts/prefect/dn42/peers/sunnet.nix
···
+26
hosts/prefect/dn42/peers/uffsalot.nix
···
+63
hosts/prefect/dn42/types.nix
···
+44
hosts/prefect/firewall.nix
···
+1
hosts/prefect/hardware.nix
···
+35
hosts/prefect/networking.nix
···+name_servers="172.20.0.53 172.23.0.53 fd42:d42:d42:53::1 fd42:d42:d42:54::1 2a01:4ff:ff00::add:2 2a01:4ff:ff00::add:1 185.12.64.1 185.12.64.2 100.64.0.3 45.11.45.11"
+4
hosts/prefect/packages.nix
+19
hosts/prefect/secrets/acme-creds.age
···
+19
hosts/prefect/secrets/dn42-peerfinder-uuid.age
···
+19
hosts/prefect/secrets/dn42-privkey.age
···
+19
hosts/prefect/secrets/headscale-oidc-secret.age
···+���)���NWv�ӘԐ|κ$(`1�ӟ%t�' ��ް�M�lԧ�Pr�ͬ Ԓ����I� ��h�W!������)N�Xz +r,���;�1SuJ_��@k_C�ߝvvyǵ����r{�z�pK���ڝ���t9h\t^�i0c7����ax�����q1
+21
hosts/prefect/secrets/secrets.nix
···+yubi-back = "ssh-rsa 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";
+20
hosts/prefect/secrets/stalwart-desec-token.age
···
+20
hosts/prefect/secrets/stalwart-fallback-admin-pw.age
···
hosts/prefect/secrets/stalwart-secret-ed25519.age
This is a binary file and will not be displayed.
hosts/prefect/secrets/stalwart-secret-rsa.age
This is a binary file and will not be displayed.
+19
hosts/prefect/secrets/wireguard-priv-key.age
···
+33
hosts/prefect/services/acme.nix
···
+374
hosts/prefect/services/caddy.nix
···+Permissions-Policy accelerometer=(), autoplay=(), camera=(), cross-origin-isolated=(), unload=(),++Permissions-Policy payment=(), picture-in-picture=(), publickey-credentials-get=(), screen-wake-lock=(),++Permissions-Policy sync-xhr=(self), usb=(), web-share=(), xr-spatial-tracking=(), clipboard-read=(),++Permissions-Policy clipboard-write=(), gamepad=(), hid=(), idle-detection=(), interest-cohort=(), serial=()+header /.well-known/openpgpkey/{labels.1}.{labels.0}/hu/* Content-Type application/octet-stream+@maildomains http host mail.pyrox.dev mta-sts.pyrox.dev autoconfig.pyrox.dev autodiscover.pyrox.dev dav.pyrox.dev+@maildomains tls sni mail.pyrox.dev mta-sts.pyrox.dev autoconfig.pyrox.dev autodiscover.pyrox.dev dav.pyrox.dev
+38
hosts/prefect/services/fail2ban.nix
···
+73
hosts/prefect/services/headscale.nix
···
+21
hosts/prefect/services/mailserver/acme.nix
···
+21
hosts/prefect/services/mailserver/auth.nix
···
+25
hosts/prefect/services/mailserver/auto-ban.nix
···
+25
hosts/prefect/services/mailserver/calendar.nix
···
+216
hosts/prefect/services/mailserver/default.nix
···
+42
hosts/prefect/services/mailserver/imap.nix
···
+97
hosts/prefect/services/mailserver/queue.nix
···
+64
hosts/prefect/services/mailserver/report.nix
···
+69
hosts/prefect/services/mailserver/server.nix
···
+63
hosts/prefect/services/mailserver/session.nix
···
+42
hosts/prefect/services/mailserver/signature.nix
···
+158
hosts/prefect/services/named.conf
···
+37
hosts/prefect/services/prometheus.nix
···
+22
hosts/prefect/services/secrets.nix
···
+10
hosts/prefect/services/tailscale.nix
+39
hosts/thought/bootloader.nix
···
+35
hosts/thought/default.nix
···
+25
hosts/thought/disks.nix
···
+46
hosts/thought/firewall.nix
···+proto tcp dport (22 25 53 80 143 389 443 465 587 636 993 4190 6900 8000 http https 34197) ACCEPT;+proto (ipv6-icmp icmp) ACCEPT; # Allow SSH Access from dn42 to devices behind tailscale0 Interfaces
+1
hosts/thought/hardware.nix
···
+22
hosts/thought/networking.nix
···
+4
hosts/thought/packages.nix
+4
hosts/thought/secrets/secrets.nix
+37
hosts/thought/services/prometheus.nix
···
+11
hosts/thought/services/tailscale.nix
+52
hosts/zaphod/bootloader.nix
···
+22
hosts/zaphod/console.nix
+57
hosts/zaphod/default.nix
···
+24
hosts/zaphod/fonts.nix
···
+40
hosts/zaphod/hardware.nix
···
+20
hosts/zaphod/kde.nix
···
+59
hosts/zaphod/misc.nix
···
+51
hosts/zaphod/networking.nix
···
+23
hosts/zaphod/packages.nix
···
+1
hosts/zaphod/power.nix
···
+10
hosts/zaphod/programs/gnupg.nix
+6
hosts/zaphod/programs/ssh.nix
+13
hosts/zaphod/programs/zsh.nix
···
+8
hosts/zaphod/secret-files.nix
+12
hosts/zaphod/secrets/secrets.nix
···+yubi-back = "ssh-rsa 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";+backup = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCyTiGctsHaTUlRJn2XQ/745dD0UWGWO8W0en8J5rf7BLI8lL/hPUmbNt45vC5754LXcBjnp1t/1FNgiGhvNZIWJpC+elBmhyMhg8z1exRZPD+as7XaH7scnij2vSbSphQFUqH433ggAGe77x5bc7wKFp9n7vj8G1u0JJxMEe1M7kNFY0+ShNtaHna3LxiQOVcW7qVlNKZP8Ol1V7kZLblRADCJMTYOXDIbktA8bbGRfGhbNjJGkL665qz36haYwb2i6A4sC7Y583N8ro8hIDG/ByJqwbl/Sz4rSxkT6G4+OdBvS6sa7TovNXHjmQCculMIltdog7UhgyBsim1sTzxAen3YyFRi1Cz/kLM0oH39m/W4IoMvJcNZCJ3ItLgy+lEVMd87jVOqfuq/hyjHVI0wJtU2Si2HTxv7aKL8gPzqXwbNH+nhkhlQ0ZH8zKVBunOgLDgsmGIky5X/T3bpWZpIoFkOR7AYrId/5dOeGM3pHhHb6woZ3SRubZ43Ah/VdJM=";
hosts/zaphod/secrets/wg-privkey.age
This is a binary file and will not be displayed.
+6
hosts/zaphod/security/modules.nix
+9
hosts/zaphod/security/pam.nix
+6
hosts/zaphod/services/avahi.nix
+20
hosts/zaphod/services/docker.nix
···
+4
hosts/zaphod/services/flatpak.nix
+8
hosts/zaphod/services/fprintd.nix
+9
hosts/zaphod/services/fwupd.nix
+10
hosts/zaphod/services/greeter.nix
+13
hosts/zaphod/services/kmscon.nix
+18
hosts/zaphod/services/misc.nix
···+(lib.versionOlder (lib.versions.majorMinor lib.version) "21.05") || !config.services.power-profiles-daemon.enable
+17
hosts/zaphod/services/modules.nix
+5
hosts/zaphod/services/packagekit.nix
+12
hosts/zaphod/services/pipewire.nix
+6
hosts/zaphod/services/ssh.nix
+5
hosts/zaphod/services/tailscale.nix
+4
-2
lib/data/default.nix
···
+10
lib/data/mail.toml
+59
-2
lib/data/services.toml
···+# tsHost: (optional) What Tailscale host this service will run on, for services only available via Tailscale.+# # Should only be set if this is available externally, if at all, since TS-only services aren't able to be scraped.·········
+1
-1
lib/deploy/default.nix
-24
modules/home/profiles/base/default.nix
···
-69
modules/home/profiles/cli/default.nix
···
-1
modules/home/profiles/cli/rbw-config.json
···-{"email":"pyrox@pyrox.dev","base_url":"https://bw.pyrox.dev","identity_url":null,"lock_timeout":3600,"pinentry":"pinentry"}
-38
modules/home/profiles/desktop/default.nix
···
-25
modules/home/profiles/development/default.nix
···
-55
modules/home/profiles/gui/default.nix
···
-13
modules/home/profiles/server/default.nix
···
-18
modules/home/programs/chromium/default.nix
···
-22
modules/home/programs/firefox/default.nix
···
-44
modules/home/programs/fish/default.nix
···
-16
modules/home/programs/ghostty/default.nix
···
-17
modules/home/programs/ghostty/settings.nix
···
-111
modules/home/programs/git/default.nix
···-lg = "log --color --graph --pretty=format:'%Cred%h%Creset -%C(yellow)%d%Creset %s %Cgreen(%cr) %C(bold blue)<%an>%Creset' --abbrev-commit";-plog = "log --graph --pretty='format:%C(red)%d%C(reset) %C(yellow)%h%C(reset) %ar %C(green)%aN%C(reset) %s'";-tlog = "log --stat --since='1 Day Ago' --graph --pretty=oneline --abbrev-commit --date=relative";
-49
modules/home/programs/gpg/default.nix
···-default-preference-list = "SHA512 SHA384 SHA256 AES256 AES192 AES ZLIB BZIP2 ZIP Uncompressed";
-15
modules/home/programs/helix/default.nix
···
-25
modules/home/programs/helix/settings.nix
···
-14
modules/home/programs/kitty/default.nix
···
-41
modules/home/programs/kitty/settings.nix
···
-78
modules/home/programs/misc-programs/default.nix
···
-26
modules/home/programs/misc-programs/direnv-stdlib.sh
···-log_status "No pyproject.toml found. Executing \`poetry init\` to create a \`$PYPROJECT_TOML\` first."
-37
modules/home/programs/neovim/default.nix
···
-369
modules/home/programs/nushell/config.nu
···-let-env config = ($env.config | update hooks.pre_prompt ($env.config.hooks.pre_prompt | append {-mode: rounded # basic, compact, compact_double, light, thin, with_love, rounded, reinforced, heavy, none, other-index_mode: always # "always" show indexes, "never" show indexes, "auto" = show indexes when a table has "index" column-sync_on_enter: true # Enable to share history between multiple sessions, else you have to close the session to write history to file-enable: true # set to false to prevent nushell looking into $env.PATH to find more suggestions, `false` recommended for WSL users as this look up my be very slow-max_results: 100 # setting it lower can improve completion performance at the cost of omitting some options-color_config: $dark_theme # if you want a light theme, replace `$dark_theme` to `$light_theme`-# buffer_editor: "emacs" # command that will be used to edit the current line buffer with ctrl+o, if unset fallback to $env.EDITOR and $env.VISUAL-shell_integration: true # enables terminal markers and a workaround to arrow keys stop working issue-render_right_prompt_on_last_line: false # true or false to enable or disable right prompt to be rendered on last line of the prompt.-null # replace with source code to run if the PWD environment is different since the last repl input-col_width: 20 # Optional value. If missing all the screen width is used to calculate column width-col_width: 20 # Optional value. If missing all the screen width is used to calculate column width-mode: [emacs, vi_normal, vi_insert] # Note: You can add the same keybinding to all modes by using a list
-12
modules/home/programs/nushell/default.nix
···
-9
modules/home/programs/nushell/env.nu
···-/etc/profiles/per-user/thehedgehog/bin/starship init nu | save --force /home/thehedgehog/.cache/starship/init.nu
-1
modules/home/programs/ssh/backup.pub
···-ssh-rsa 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 993390@993390-student-FVFD26HVJ1WK
-45
modules/home/programs/ssh/default.nix
···
-7
modules/home/programs/ssh/ssh-auth-signers.nix
···-hedgehog@mrhedgehog.xyz ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDTVGi3PItsbUhFgnFZlqo1iUggL4npMg94+9FsyhEPfShcQwJK2/jJzjv5S9KPuk3cY7aoqyVFLbnasSBZPXmscJmOiVNvtWvHoC3QPXvf3IAcVZ5KOLpY2NJlPx/pAb31C6ewtg8v3VlyhL4zEp6M+AGwXX51tFDh2GnYD+7SNF+aMhKCrX63syAhgPy3F8mZ2RIDLAu+lsYlwdpWRkSEv9kcjX/6+3QgUWjfPBaKEeYID22ihSuj7+AiuAt0gM4q0TY/Hpcx+qDLonrIuBnm1hMZDgbv//D0sHIUxJQkGTKTEbkZxoh0Qri7UV/V6l3mETaG40deuemMU7RFY7Khl8RajNZ+9z0FdquS/HCt8+fYQk6eLneJrMIQ1bI4awrtblG3P2Yf2QUu+H3kfCQe44R3WjUugTbNtumVgyQBzl2dzlIVn1pZBeyZy70XCgbaFKkDR8Y/qZiUoZ0afP3vTOXhkn5UBfutTKwUiSGh3S8Ge5YhNgKHWE2eQp1ckEm0IMJV/q5Nsw/yBBXj/kfD8ekz96LQ+gP5JFLq4EaipXI7FM4aZNOBUZU1l/sCEuq7m997nrBucTKqGm7Ho3rq7bgdj4f6GyUJXSMOM1cN61LLrRumZGGTH8WghVL7ligxZyNFcQoudR8jfpf4mrgRxipQOe1A2umvuufMr+l/bw==-hedgehog@mrhedgehog.xyz ssh-rsa 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-me@thehedgehog.me ssh-rsa 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-me@thehedgehog.me ssh-rsa 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-me@thehedgehog.me ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK97n2SgV/U1mLzxcaEDl85iF5D3jm7xboZ+S01+CbM/8zxVoWyjVHCqTwDcrLwP0c5Z51BNj7U0UkGIgR4zTSM=
-1
modules/home/programs/ssh/yubikey-back.pub
···-ssh-rsa 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 cardno:15 567 372
-1
modules/home/programs/ssh/yubikey-main.pub
···
-1
modules/home/programs/ssh/yubikey-new.pub
···-ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK97n2SgV/U1mLzxcaEDl85iF5D3jm7xboZ+S01+CbM/8zxVoWyjVHCqTwDcrLwP0c5Z51BNj7U0UkGIgR4zTSM=
-15
modules/home/programs/starship/default.nix
···
-100
modules/home/programs/starship/settings.nix
···
-54
modules/home/programs/vscodium/default.nix
···
-55
modules/home/programs/wlogout/default.nix
···
-52
modules/home/programs/wlogout/style.nix
···-background-image: image(url("/home/thehedgehog/bgs/ctp-waves.png"), url("/home/thehedgehog/bgs/ctp-waves.png"));
-1
modules/home/scripts/default.nix
···
-24
modules/home/services/gpg-agent/default.nix
···
-18
modules/home/services/kanshi/default.nix
···
-11
modules/home/services/kdeconnect/default.nix
-27
modules/home/services/mako/default.nix
···
-31
modules/home/services/swayidle/default.nix
···
-11
modules/home/services/syncthing/default.nix
-44
modules/home/theming/default.nix
···
-8
modules/home/wayland/default.nix
-46
modules/home/wayland/keybindings.nix
···
-162
modules/home/wayland/sway.nix
···-menu = "exec ${term} --class=py.floating --window-height=15 --window-width=10 --font-size=16 -e ${pkgs.sway-launcher-desktop}/bin/sway-launcher-desktop";
-61
modules/home/wayland/swaylock.nix
···
-37
modules/home/wayland/waybar-mocha.css
···
-119
modules/home/wayland/waybar-style.css
···-/* Repeat style here to ensure properties are overwritten as there's no !important and button:hover above resets the colour */
-156
modules/home/wayland/waybar.nix
···-exec = ''${lib.getExe pkgs.playerctl} -a metadata --format '{"text": "{{playerName}}: {{artist}} - {{markup_escape(title)}}", "tooltip": "{{playerName}} : {{markup_escape(title)}}", "alt": "{{status}}", "class": "{{status}}"}' -F'';
-127
modules/home/xdg/default.nix
···
-73
modules/nixos/default-config/bootloader.nix
···
-24
modules/nixos/default-config/default.nix
···
-38
modules/nixos/default-config/networking.nix
···
-102
modules/nixos/default-config/nixConfig.nix
···-# Can allow saving space in the store by content-addressing instead of input-addressing derivations
-7
modules/nixos/default-config/nixpkgsConfig.nix
-20
modules/nixos/default-config/packages.nix
-7
modules/nixos/default-config/programs/default.nix
-9
modules/nixos/default-config/programs/nh.nix
-35
modules/nixos/default-config/programs/ssh.nix
···
-8
modules/nixos/default-config/root.nix
···-"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDTVGi3PItsbUhFgnFZlqo1iUggL4npMg94+9FsyhEPfShcQwJK2/jJzjv5S9KPuk3cY7aoqyVFLbnasSBZPXmscJmOiVNvtWvHoC3QPXvf3IAcVZ5KOLpY2NJlPx/pAb31C6ewtg8v3VlyhL4zEp6M+AGwXX51tFDh2GnYD+7SNF+aMhKCrX63syAhgPy3F8mZ2RIDLAu+lsYlwdpWRkSEv9kcjX/6+3QgUWjfPBaKEeYID22ihSuj7+AiuAt0gM4q0TY/Hpcx+qDLonrIuBnm1hMZDgbv//D0sHIUxJQkGTKTEbkZxoh0Qri7UV/V6l3mETaG40deuemMU7RFY7Khl8RajNZ+9z0FdquS/HCt8+fYQk6eLneJrMIQ1bI4awrtblG3P2Yf2QUu+H3kfCQe44R3WjUugTbNtumVgyQBzl2dzlIVn1pZBeyZy70XCgbaFKkDR8Y/qZiUoZ0afP3vTOXhkn5UBfutTKwUiSGh3S8Ge5YhNgKHWE2eQp1ckEm0IMJV/q5Nsw/yBBXj/kfD8ekz96LQ+gP5JFLq4EaipXI7FM4aZNOBUZU1l/sCEuq7m997nrBucTKqGm7Ho3rq7bgdj4f6GyUJXSMOM1cN61LLrRumZGGTH8WghVL7ligxZyNFcQoudR8jfpf4mrgRxipQOe1A2umvuufMr+l/bw=="-"ssh-rsa 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"
modules/nixos/default-config/secrets/powerdns-secrets.age
This is a binary file and will not be displayed.
-22
modules/nixos/default-config/secrets/secrets.nix
···-yubi-back = "ssh-rsa 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";-backup = "ssh-rsa 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";
-35
modules/nixos/default-config/security.nix
···-url = "https://aur.archlinux.org/cgit/aur.git/plain/dn42.crt?h=ca-certificates-dn42&id=646f7effb290adf25c7e9fea3b41bf055522ba29";
-6
modules/nixos/default-config/services/default.nix
-5
modules/nixos/default-config/services/ntp.nix
-5
modules/nixos/default-config/services/tailscale.nix
-34
modules/nixos/default-config/ssh.nix
···
-15
modules/nixos/default-config/users.nix
-1
modules/nixos/default-users/backup.pub
···-ssh-rsa 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 993390@993390-student-FVFD26HVJ1WK
-72
modules/nixos/default-users/default.nix
···-hashedPassword = "$6$6EtuZhVOJdfI9DYP$1Qnd7R8qdN.E5yE2kDQCNg2zgJ5cIjNBKsIW/qJgb8wcKlUpIoVg/fEKvBkAgCiLyojVG2kzfu4J9LR8rA8a2/";-hashedPassword = "$6$6EtuZhVOJdfI9DYP$1Qnd7R8qdN.E5yE2kDQCNg2zgJ5cIjNBKsIW/qJgb8wcKlUpIoVg/fEKvBkAgCiLyojVG2kzfu4J9LR8rA8a2/";
-1
modules/nixos/default-users/yubikey-back.pub
···-ssh-rsa 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 cardno:15 567 372
-1
modules/nixos/default-users/yubikey-main.pub
···
-1
modules/nixos/default-users/yubikey-new.pub
···-ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK97n2SgV/U1mLzxcaEDl85iF5D3jm7xboZ+S01+CbM/8zxVoWyjVHCqTwDcrLwP0c5Z51BNj7U0UkGIgR4zTSM=
-20
modules/nixos/profiles/default.nix
···
-16
modules/nixos/programs/chromium/default.nix
···
-82
modules/nixos/programs/chromium/extraOpts.nix
···
-28
modules/nixos/programs/firefox/default.nix
···
-69
modules/nixos/programs/firefox/extensions.nix
···-install_url = "https://github.com/bpc-clone/bpc_updates/releases/download/latest/bypass_paywalls_clean-latest.xpi";
-169
modules/nixos/programs/firefox/extraPrefs.nix
···
-66
modules/nixos/programs/firefox/policies.nix
···
-28
modules/nixos/programs/misc/default.nix
···
-23
modules/nixos/programs/neovim/default.nix
···
-20
modules/nixos/services/buildbot/default.nix
···
-61
modules/nixos/services/forgejo-runner/default.nix
···
+74
nixosModules/default-config/bootloader.nix
···
+37
nixosModules/default-config/default.nix
···
+38
nixosModules/default-config/networking.nix
···
+91
nixosModules/default-config/nixConfig.nix
···+# Can allow saving space in the store by content-addressing instead of input-addressing derivations
+17
nixosModules/default-config/nixpkgsConfig.nix
···
+19
nixosModules/default-config/packages.nix
+6
nixosModules/default-config/programs/default.nix
+35
nixosModules/default-config/programs/ssh.nix
···
+8
nixosModules/default-config/root.nix
···+"ssh-rsa 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"+"ssh-rsa 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"
nixosModules/default-config/secrets/powerdns-secrets.age
This is a binary file and will not be displayed.
+22
nixosModules/default-config/secrets/secrets.nix
···+yubi-back = "ssh-rsa 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";+backup = "ssh-rsa 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";
+38
nixosModules/default-config/security.nix
···+url = "https://aur.archlinux.org/cgit/aur.git/plain/dn42.crt?h=ca-certificates-dn42&id=646f7effb290adf25c7e9fea3b41bf055522ba29";
+12
nixosModules/default-config/services/default.nix
+5
nixosModules/default-config/services/ntp.nix
+5
nixosModules/default-config/services/tailscale.nix
+34
nixosModules/default-config/ssh.nix
···
+15
nixosModules/default-config/users.nix
+1
nixosModules/default-users/backup.pub
···+ssh-rsa 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 993390@993390-student-FVFD26HVJ1WK
+72
nixosModules/default-users/default.nix
···
+1
nixosModules/default-users/yubikey-back.pub
···+ssh-rsa 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 cardno:15 567 372
+1
nixosModules/default-users/yubikey-main.pub
···
+1
nixosModules/default-users/yubikey-new.pub
···+ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK97n2SgV/U1mLzxcaEDl85iF5D3jm7xboZ+S01+CbM/8zxVoWyjVHCqTwDcrLwP0c5Z51BNj7U0UkGIgR4zTSM=
+27
nixosModules/default.nix
···
+125
nixosModules/dn42Wireguard/default.nix
···+) "${pkgs.iproute2}/bin/ip addr add ${fc.localAddrs.v4} peer ${fc.peerAddrs.v4} dev wg42_${name}"}+) "${pkgs.iproute2}/bin/ip addr add ${fc.localAddrs.v6} peer ${fc.peerAddrs.v6} dev wg42_${name}"}+trustedInterfaces = lib.mapAttrsToList (name: _: "wg42_" + name) (lib.filterAttrs (_: v: v.enable) cfg.tunnels);
+18
nixosModules/homes/pyrox/default.nix
···
+16
nixosModules/homes/pyrox-zaphod/default.nix
+7
nixosModules/homes/pyrox-zaphod/files/distrobox-config.nix
+5
nixosModules/homes/pyrox-zaphod/files/pamKeys.nix
···+thehedgehog:iC1dk7d+DYFX60wpkDlWdwNpkRLXmML7iDjxh4TRXe8OhsAb2pgKiY6tVLHeZIK3WOVA1DuWU8rWlHdma3eqJg==,NdBJTVCvOamU35ad3fJRv6A6YZQIYrojcVk9a8WYMVvTtKO+xyIeBvunlidHv4Zb0rYrOvK6u7Gb4N5x6T6FIQ==,es256,+presence:juWx2IphhNuHZHiv8nG3i2WWTyR5A+CWp5iHz2AmE7aj3b3rgj85Gl1PMpmZlvlwDgbCP+dlcP5PPzTFloB3Ow==,FEXBkP0PzZSURoIbLuGiRRHFIcSiqEz/ieNPRqRY/hqLJ4AsvGwJ1xdIX7F8qAQuMSp8m7usuBLS4u+4FGg3Ng==,es256,+presence
+18
nixosModules/homes/thehedgehog/default.nix
···
+34
nixosModules/homes/thehedgehog-zaphod/default.nix
···
+20
nixosModules/profiles/default.nix
···
+16
nixosModules/programs/chromium/default.nix
···
+82
nixosModules/programs/chromium/extraOpts.nix
···
+28
nixosModules/programs/firefox/default.nix
···
+68
nixosModules/programs/firefox/extensions.nix
···+install_url = "https://github.com/bpc-clone/bpc_updates/releases/download/latest/bypass_paywalls_clean-latest.xpi";
+172
nixosModules/programs/firefox/extraPrefs.nix
···
+66
nixosModules/programs/firefox/policies.nix
···
+19
nixosModules/programs/hyprland/default.nix
···
+46
nixosModules/programs/misc/default.nix
···
+21
nixosModules/programs/neovim/default.nix
···
+20
nixosModules/services/buildbot/default.nix
···
+59
nixosModules/services/forgejo-runner/default.nix
···
+30
nixosModules/services/scrutiny/default.nix
···+apiUrl = "https://marvin.${self.lib.data.tsNet}:${toString self.lib.data.services.scrutiny.port}";
+4
optnix.toml
-12
overlays/bluez-wiimote/default.nix
+5
overlays/cinny/default.nix
+47
overlays/cinny/nix-commands.patch
···+@@ -67,6 +69,16 @@ export const useCommands = (mx: MatrixClient, room: Room): CommandRecord => {
+7
overlays/default.nix
+12
overlays/hy3-fixes/default.nix
···+url = "https://github.com/outfoxxed/hy3/commit/8a3f46a40984e74094f71b5bd38df3dbe5daa97f.patch?full_index=1";
-2
overlays/nix-index/default.nix
-3
overlays/nixos-option/default.nix
+6
overlays/openssh-fixperms/default.nix
+13
overlays/openssh-fixperms/permfix.patch
···
-15
overlays/sway-unwrapped/default.nix
···
+20
packages/anubis-files/package.nix
···
+56
packages/anubis-files/src/policies/default.yaml
···
+64
packages/anubis-files/src/policies/forgejo.yaml
···
+54
packages/anubis-files/src/policies/meta/base.yaml
···+- '( userAgent.contains("Firefox") ) || ( userAgent.contains("Chrome") ) || ( userAgent.contains("Safari") )'+- '( headers["Accept-Encoding"].contains("zstd") || headers["Accept-Encoding"].contains("br") )'
packages/anubis-files/src/policies/meta/openGraph.yaml
This is a binary file and will not be displayed.
+56
packages/anubis-files/src/policies/nextcloud-office.yaml
···
+88
packages/anubis-files/src/policies/nextcloud.yaml
···
+63
packages/anubis-files/src/policies/vaultwarden.yaml
···
+26
packages/bgutil-pot-server/librusty_v8.nix
···+url = "https://github.com/denoland/rusty_v8/releases/download/v${args.version}/librusty_v8_release_${stdenv.hostPlatform.rust.rustcTarget}.a";
+49
packages/bgutil-pot-server/package.nix
···+changelog = "https://github.com/jim60105/bgutil-ytdlp-pot-provider-rs/releases/tag/v${finalAttrs.version}";
+45
packages/bgutil-pot-server/update-librusty.sh
···+BGUTIL_LATEST_VERSION=$(curl ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} --silent --fail --location "https://api.github.com/repos/jim60105/bgutil-ytdlp-pot-provider-rs/releases/latest" | jq --raw-output .tag_name)+CARGO_LOCK=$(curl ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} --silent --fail --location "https://github.com/jim60105/bgutil-ytdlp-pot-provider-rs/raw/$BGUTIL_LATEST_VERSION/Cargo.lock")+NEW_VERSION=$(echo "$CARGO_LOCK" | grep --after-context 5 'name = "v8"' | grep 'version =' | sed -E 's/version = "//;s/"//')+x86Hash="$(nix-prefetch-url --type sha256 https://github.com/denoland/rusty_v8/releases/download/v"$NEW_V")"
-24
packages/doc2dash/default.nix
···
+34
packages/doc2dash/package.nix
···
+147
packages/glide-browser-bin/package.nix
···+url = "https://github.com/glide-browser/glide/releases/download/${finalAttrs.version}/glide.linux-x86_64.tar.xz";+description = "Extensible and keyboard-focused web browser, based on Firefox (binary package)";
+34
packages/jellyfin-exporter/package.nix
···+# We need to patch the tests since we don't move the binary to `$GOPATH/bin`, but to `$out/bin` instead.+changelog = "https://github.com/rebelcore/jellyfin_exporter/blob/v${finalAttrs.version}/CHANGELOG.md";
-45
packages/olympus/default.nix
···-url = "https://dev.azure.com/EverestAPI/Olympus/_apis/build/builds/${version}/artifacts?artifactName=linux.main&$format=zip#linux.main.zip";
+138
packages/planka/package.nix
···+--replace-fail 'compilerCommand = (() => {' 'compilerCommand = (() => { return ["${lib.getExe dart-sass}"];'
+26
packages.nix
···
-18
shells/default/default.nix
-58
systems/x86_64-linux/marvin/bootloader.nix
···-ACTION=="add|change", KERNEL=="sd[a-z]*[0-9]*|mmcblk[0-9]*p[0-9]*|nvme[0-9]*n[0-9]*p[0-9]*", ENV{ID_FS_TYPE}=="zfs_member", ATTR{../queue/scheduler}="none"
-74
systems/x86_64-linux/marvin/default.nix
···
-18
systems/x86_64-linux/marvin/firewall.nix
-13
systems/x86_64-linux/marvin/hardware.nix
···
-35
systems/x86_64-linux/marvin/networking.nix
···
-88
systems/x86_64-linux/marvin/services/authentik.nix
···
-10
systems/x86_64-linux/marvin/services/avahi.nix
-5
systems/x86_64-linux/marvin/services/bookstack.nix
-46
systems/x86_64-linux/marvin/services/bots.nix
···
-53
systems/x86_64-linux/marvin/services/buildbot.nix
···
-21
systems/x86_64-linux/marvin/services/deemix.nix
···
-149
systems/x86_64-linux/marvin/services/git.nix
···
-12
systems/x86_64-linux/marvin/services/golink.nix
-57
systems/x86_64-linux/marvin/services/grafana.nix
···-client_secret = "89eccaa8a31104c218df5cfe37c87f0ea0bbddcd1571bddb7f7fbf5a09045efd59c61f1caaa79483ad59aac2c19488b254acdaced47e66a6505865a14a63ac4a";
-96
systems/x86_64-linux/marvin/services/iceshrimp.nix
···
-9
systems/x86_64-linux/marvin/services/jellyfin.nix
-29
systems/x86_64-linux/marvin/services/matrix.nix
···
-26
systems/x86_64-linux/marvin/services/miniflux.nix
···
-11
systems/x86_64-linux/marvin/services/minio.nix
-104
systems/x86_64-linux/marvin/services/nextcloud/default.nix
···
-13
systems/x86_64-linux/marvin/services/nextcloud/imaginary.nix
-21
systems/x86_64-linux/marvin/services/nextcloud/nextcloud-admin-pw.age
···
-22
systems/x86_64-linux/marvin/services/nextcloud/office.nix
···
-18
systems/x86_64-linux/marvin/services/nginx.nix
-42
systems/x86_64-linux/marvin/services/planka.nix
···
-16
systems/x86_64-linux/marvin/services/podman.nix
···
-50
systems/x86_64-linux/marvin/services/postgres.nix
···-ExecStart = "${cfg.package}/bin/vacuumdb --all --echo --jobs=6 --parallel=5 --analyze --verbose";
-40
systems/x86_64-linux/marvin/services/prometheus.nix
···
-14
systems/x86_64-linux/marvin/services/prosody.nix
-12
systems/x86_64-linux/marvin/services/redlib.nix
-23
systems/x86_64-linux/marvin/services/secrets/authentik-env.age
···-�as����Dp��c�´���i�x�AQ>�w��o�bI 0�X����Za�AH#���0�|����HR5�������S��G���9Y��{��ּ_"������r4?x՚5�tG�F|�&�gXC�\9�P
-20
systems/x86_64-linux/marvin/services/secrets/buildbot-gitea-token.age
···
systems/x86_64-linux/marvin/services/secrets/buildbot-oauth-secret.age
This is a binary file and will not be displayed.
-19
systems/x86_64-linux/marvin/services/secrets/buildbot-worker-password.age
···
-21
systems/x86_64-linux/marvin/services/secrets/buildbot-workers.age
···-.I�s��q^hA���Ch�D��s��������|����8[�%xX�n+�Qb�#f�gUL�C�c9p������RgBd9e%'Y8�F��gկ~�15�D���d�K��C�c>���w
systems/x86_64-linux/marvin/services/secrets/forgejo-aux-docs-runner-token.age
This is a binary file and will not be displayed.
-21
systems/x86_64-linux/marvin/services/secrets/forgejo-db-pw.age
···
-20
systems/x86_64-linux/marvin/services/secrets/forgejo-default-runner-token.age
···
-19
systems/x86_64-linux/marvin/services/secrets/forgejo-gitgay-runner-token.age
···
systems/x86_64-linux/marvin/services/secrets/forgejo-internal-token.age
This is a binary file and will not be displayed.
systems/x86_64-linux/marvin/services/secrets/forgejo-lfs-jwt-secret.age
This is a binary file and will not be displayed.
-22
systems/x86_64-linux/marvin/services/secrets/forgejo-mail-pw.age
···
-19
systems/x86_64-linux/marvin/services/secrets/forgejo-oauth2-jwt-secret.age
···
-19
systems/x86_64-linux/marvin/services/secrets/forgejo-secret-key.age
···
systems/x86_64-linux/marvin/services/secrets/golink-authkey.age
This is a binary file and will not be displayed.
-23
systems/x86_64-linux/marvin/services/secrets/grafana-admin-password.age
···
systems/x86_64-linux/marvin/services/secrets/grafana-smtp-password.age
This is a binary file and will not be displayed.
-23
systems/x86_64-linux/marvin/services/secrets/iceshrimp-db-password.age
···
systems/x86_64-linux/marvin/services/secrets/iceshrimp-secret-config.age
This is a binary file and will not be displayed.
systems/x86_64-linux/marvin/services/secrets/miniflux-admin.age
This is a binary file and will not be displayed.
-24
systems/x86_64-linux/marvin/services/secrets/minio-root.age
···-+�P��������q�f=Yc��,)��F�P�9�.�����Z<��ɟF�c,�q���o��Y �>������\�l��z��2ϯ���_s���z��&_�B��q<�J����+0h�_��W
systems/x86_64-linux/marvin/services/secrets/nix-serve-priv.age
This is a binary file and will not be displayed.
systems/x86_64-linux/marvin/services/secrets/planka-env.age
This is a binary file and will not be displayed.
-39
systems/x86_64-linux/marvin/services/secrets/secrets.nix
···-yubi-back = "ssh-rsa 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";
systems/x86_64-linux/marvin/services/secrets/thehedgehog-key.age
This is a binary file and will not be displayed.
systems/x86_64-linux/marvin/services/secrets/thehedgehog-pem.age
This is a binary file and will not be displayed.
-20
systems/x86_64-linux/marvin/services/secrets/vaultwarden-pgpass.age
···
systems/x86_64-linux/marvin/services/secrets/vaultwarden-vars.age
This is a binary file and will not be displayed.
systems/x86_64-linux/marvin/services/secrets/webmentiond-env.age
This is a binary file and will not be displayed.
-15
systems/x86_64-linux/marvin/services/syncthing.nix
-12
systems/x86_64-linux/marvin/services/tailscale.nix
-118
systems/x86_64-linux/marvin/services/vaultwarden.nix
···-systemd.services.vaultwarden.environment.PGPASSFILE = config.age.secrets.vaultwarden-pgpass.path;
-23
systems/x86_64-linux/marvin/services/webmentiond.nix
···
-8
systems/x86_64-linux/marvin/services/zfs.nix
-44
systems/x86_64-linux/prefect/bootloader.nix
···-ACTION=="add|change", KERNEL=="sd[a-z]*[0-9]*|mmcblk[0-9]*p[0-9]*|nvme[0-9]*n[0-9]*p[0-9]*", ENV{ID_FS_TYPE}=="zfs_member", ATTR{../queue/scheduler}="none"
-48
systems/x86_64-linux/prefect/default.nix
···
-109
systems/x86_64-linux/prefect/dn42/bgp.nix
···
-315
systems/x86_64-linux/prefect/dn42/bird.conf
···-else if (64511, 22) ~ bgp_community then { bgp_community.delete([(64511, 23..29)]); return 22; }-else if (64511, 23) ~ bgp_community then { bgp_community.delete([(64511, 24..29)]); return 23; }-else if (64511, 24) ~ bgp_community then { bgp_community.delete([(64511, 25..29)]); return 24; }-else if (64511, 25) ~ bgp_community then { bgp_community.delete([(64511, 26..29)]); return 25; }-else if (64511, 26) ~ bgp_community then { bgp_community.delete([(64511, 27..29)]); return 26; }-else if (64511, 27) ~ bgp_community then { bgp_community.delete([(64511, 28..29)]); return 27; }-else if (64511, 28) ~ bgp_community then { bgp_community.delete([(64511, 29..29)]); return 28; }-else if (64511, 32) ~ bgp_community then { bgp_community.delete([(64511, 33..34)]); return 32; }-else if (64511, 33) ~ bgp_community then { bgp_community.delete([(64511, 34..34)]); return 33; }-if (is_valid_network() && !is_self_net()) || (is_valid_network_v6() && !is_self_net_v6()) then {-if roa_check(dn42_roa, net, bgp_path.last) != ROA_VALID && roa_check(dn42_roa_v6, net, bgp_path.last) != ROA_VALID then {-# if roa_check(dn42_roa, net, bgp_path.last) != ROA_VALID && roa_check(dn42_roa_v6, net, bgp_path.last) != ROA_VALID then {
-31
systems/x86_64-linux/prefect/dn42/default.nix
···
-95
systems/x86_64-linux/prefect/dn42/services.nix
···-${pkgs.curl}/bin/curl -sfSLR {-o,-z}/etc/bird/roa_dn42_v6.conf https://dn42.burble.com/roa/dn42_roa_bird2_6.conf-${pkgs.curl}/bin/curl -sfSLR {-o,-z}/etc/bird/roa_dn42.conf https://dn42.burble.com/roa/dn42_roa_bird2_4.conf-"\n ipv4 {\n extended next hop on;\n import where dn42_import_filter(${x.link},25,34);\n export where dn42_export_filter(${x.link},25,34);\n import keep filtered;\n };\n "-"\n ipv6 {\n extended next hop on;\n import where dn42_import_filter(${x.link},25,34);\n export where dn42_export_filter(${x.link},25,34);\n import keep filtered;\n };\n "
-86
systems/x86_64-linux/prefect/dn42/tunnels.nix
···
-59
systems/x86_64-linux/prefect/dn42/wireguard.nix
···-listenPort: privKeyFile: peerPubKey: endpoint: name: peerIPv4: peerIPv6: localIPv4: localIPv6: isOspf: {-+ lib.optionalString isOspf "${pkgs.iproute2}/bin/ip -6 addr add ${defaultLocalIPv6} dev ${name}";-customTunnel listenPort privKeyFile peerPubKey endpoint name peerIPv4 peerIPv6 localIPv4 localIPv6-customTunnel listenPort privKeyFile peerPubKey endpoint name peerIPv4 peerIPv6 defaultLocalIPv4
-56
systems/x86_64-linux/prefect/firewall.nix
···
-1
systems/x86_64-linux/prefect/hardware.nix
···
-35
systems/x86_64-linux/prefect/networking.nix
···-name_servers="172.20.0.53 172.23.0.53 fd42:d42:d42:53::1 fd42:d42:d42:54::1 2a01:4ff:ff00::add:2 2a01:4ff:ff00::add:1 185.12.64.1 185.12.64.2 100.64.0.3 45.11.45.11"
-4
systems/x86_64-linux/prefect/packages.nix
systems/x86_64-linux/prefect/secrets/acme-creds.age
This is a binary file and will not be displayed.
-22
systems/x86_64-linux/prefect/secrets/dn42-peerfinder-uuid.age
···
-21
systems/x86_64-linux/prefect/secrets/dn42-privkey.age
···
-23
systems/x86_64-linux/prefect/secrets/headscale-oidc-secret.age
···-���;��$Q��!I@�Α��,[�@���c����Ű �߅�lܲB�NeˎY���O�����q�,�=h�n7"��>�y�[�=O�~^{�fʷa���}sV�o<�at��|]�T$�ϱ� , �w�Q
-35
systems/x86_64-linux/prefect/secrets/secrets.nix
···-yubi-back = "ssh-rsa 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";-backup = "ssh-rsa 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";
-22
systems/x86_64-linux/prefect/secrets/wireguard-priv-key.age
···
-166
systems/x86_64-linux/prefect/services/Caddyfile
···-header /.well-known/openpgpkey/{labels.1}.{labels.0}/hu/* Content-Type application/octet-stream
-23
systems/x86_64-linux/prefect/services/acme.nix
···-# Enable OSCP Must-Staple(see https://blog.apnic.net/2019/01/15/is-the-web-ready-for-ocsp-must-staple/ )
-30
systems/x86_64-linux/prefect/services/blog-update.nix
···
-5
systems/x86_64-linux/prefect/services/blog-update.sh
-17
systems/x86_64-linux/prefect/services/caddy.nix
···
-4
systems/x86_64-linux/prefect/services/dn42-peerfinder.nix
-38
systems/x86_64-linux/prefect/services/fail2ban.nix
···
-73
systems/x86_64-linux/prefect/services/headscale.nix
···
-127
systems/x86_64-linux/prefect/services/mailserver/default.nix
···-cp -fvr /var/lib/caddy/.local/share/caddy/certificates/acme-v02.api.letsencrypt.org-directory/mail.pyrox.dev/mail.pyrox.dev.crt /var/lib/mail/mail.crt-cp -fvr /var/lib/caddy/.local/share/caddy/certificates/acme-v02.api.letsencrypt.org-directory/mail.pyrox.dev/mail.pyrox.dev.key /var/lib/mail/mail.key
-37
systems/x86_64-linux/prefect/services/mailserver/logins.nix
···
-46
systems/x86_64-linux/prefect/services/mailserver/monitoring.nix
···-if failed host ${config.mailserver.fqdn} port 993 type tcpssl sslauto protocol imap for 5 cycles then restart
-21
systems/x86_64-linux/prefect/services/mailserver/overrides.nix
···
-158
systems/x86_64-linux/prefect/services/named.conf
···
-7
systems/x86_64-linux/prefect/services/netdata.nix
-38
systems/x86_64-linux/prefect/services/nginx/default.nix
···
-1
systems/x86_64-linux/prefect/services/nginx/pyrox.dev.nix
···
-37
systems/x86_64-linux/prefect/services/prometheus.nix
···
-26
systems/x86_64-linux/prefect/services/secrets.nix
···
-11
systems/x86_64-linux/prefect/services/tailscale.nix
-6
systems/x86_64-linux/prefect/services/zerotier.nix
-39
systems/x86_64-linux/thought/bootloader.nix
···
-34
systems/x86_64-linux/thought/default.nix
···
-25
systems/x86_64-linux/thought/disks.nix
···
-46
systems/x86_64-linux/thought/firewall.nix
···-proto tcp dport (22 25 53 80 143 389 443 465 587 636 993 4190 6900 8000 http https 34197) ACCEPT;-proto (ipv6-icmp icmp) ACCEPT; # Allow SSH Access from dn42 to devices behind tailscale0 Interfaces
-1
systems/x86_64-linux/thought/hardware.nix
···
-22
systems/x86_64-linux/thought/networking.nix
···
-4
systems/x86_64-linux/thought/packages.nix
-14
systems/x86_64-linux/thought/secrets/secrets.nix
···-yubi-back = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDTVGi3PItsbUhFgnFZlqo1iUggL4npMg94+9FsyhEPfShcQwJK2/jJzjv5S9KPuk3cY7aoqyVFLbnasSBZPXmscJmOiVNvtWvHoC3QPXvf3IAcVZ5KOLpY2NJlPx/pAb31C6ewtg8v3VlyhL4zEp6M+AGwXX51tFDh2GnYD+7SNF+aMhKCrX63syAhgPy3F8mZ2RIDLAu+lsYlwdpWRkSEv9kcjX/6+3QgUWjfPBaKEeYID22ihSuj7+AiuAt0gM4q0TY/Hpcx+qDLonrIuBnm1hMZDgbv//D0sHIUxJQkGTKTEbkZxoh0Qri7UV/V6l3mETaG40deuemMU7RFY7Khl8RajNZ+9z0FdquS/HCt8+fYQk6eLneJrMIQ1bI4awrtblG3P2Yf2QUu+H3kfCQe44R3WjUugTbNtumVgyQBzl2dzlIVn1pZBeyZy70XCgbaFKkDR8Y/qZiUoZ0afP3vTOXhkn5UBfutTKwUiSGh3S8Ge5YhNgKHWE2eQp1ckEm0IMJV/q5Nsw/yBBXj/kfD8ekz96LQ+gP5JFLq4EaipXI7FM4aZNOBUZU1l/sCEuq7m997nrBucTKqGm7Ho3rq7bgdj4f6GyUJXSMOM1cN61LLrRumZGGTH8WghVL7ligxZyNFcQoudR8jfpf4mrgRxipQOe1A2umvuufMr+l/bw==";-backup = "ssh-rsa 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";
-37
systems/x86_64-linux/thought/services/prometheus.nix
···
-11
systems/x86_64-linux/thought/services/tailscale.nix
-45
systems/x86_64-linux/zaphod/bootloader.nix
···
-22
systems/x86_64-linux/zaphod/console.nix
-57
systems/x86_64-linux/zaphod/default.nix
···
-25
systems/x86_64-linux/zaphod/fonts.nix
···
-42
systems/x86_64-linux/zaphod/hardware.nix
···
-20
systems/x86_64-linux/zaphod/kde.nix
···
-57
systems/x86_64-linux/zaphod/misc.nix
···-users.users.root.hashedPassword = "$6$6EtuZhVOJdfI9DYP$1Qnd7R8qdN.E5yE2kDQCNg2zgJ5cIjNBKsIW/qJgb8wcKlUpIoVg/fEKvBkAgCiLyojVG2kzfu4J9LR8rA8a2/";
-51
systems/x86_64-linux/zaphod/networking.nix
···
-36
systems/x86_64-linux/zaphod/packages.nix
···
-1
systems/x86_64-linux/zaphod/power.nix
···
-10
systems/x86_64-linux/zaphod/programs/gnupg.nix
-6
systems/x86_64-linux/zaphod/programs/ssh.nix
-13
systems/x86_64-linux/zaphod/programs/sway.nix
-13
systems/x86_64-linux/zaphod/programs/zsh.nix
···
-8
systems/x86_64-linux/zaphod/secret-files.nix
-12
systems/x86_64-linux/zaphod/secrets/secrets.nix
···-yubi-back = "ssh-rsa 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";-backup = "ssh-rsa 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";
systems/x86_64-linux/zaphod/secrets/wg-privkey.age
This is a binary file and will not be displayed.
-6
systems/x86_64-linux/zaphod/security/modules.nix
-9
systems/x86_64-linux/zaphod/security/pam.nix
-6
systems/x86_64-linux/zaphod/services/avahi.nix
-20
systems/x86_64-linux/zaphod/services/docker.nix
···
-4
systems/x86_64-linux/zaphod/services/flatpak.nix
-8
systems/x86_64-linux/zaphod/services/fprintd.nix
-9
systems/x86_64-linux/zaphod/services/fwupd.nix
-12
systems/x86_64-linux/zaphod/services/greetd.nix
-13
systems/x86_64-linux/zaphod/services/kmscon.nix
-12
systems/x86_64-linux/zaphod/services/misc.nix
···
-17
systems/x86_64-linux/zaphod/services/modules.nix
-5
systems/x86_64-linux/zaphod/services/packagekit.nix
-5
systems/x86_64-linux/zaphod/services/pcscd.nix
-12
systems/x86_64-linux/zaphod/services/pipewire.nix
-6
systems/x86_64-linux/zaphod/services/ssh.nix
-5
systems/x86_64-linux/zaphod/services/tailscale.nix
+15
templates/default.nix
-78
topology.nix
···