+16
flake.lock
+16
flake.lock
······
+3
-5
flake.nix
+3
-5
flake.nix
···
+20
home/chloe/activation.nix
+20
home/chloe/activation.nix
···
···
+28
home/chloe/autostart.nix
+28
home/chloe/autostart.nix
···
···
+3
home/chloe/default.nix
+3
home/chloe/default.nix
-23
home/chloe/packages/autostart.nix
-23
home/chloe/packages/autostart.nix
···
···
+14
home/chloe/packages/base.nix
+14
home/chloe/packages/base.nix
+15
home/chloe/packages/darwin.nix
+15
home/chloe/packages/darwin.nix
+7
-10
home/chloe/packages/default.nix
+7
-10
home/chloe/packages/default.nix
···
···
+32
home/chloe/packages/linux.nix
+32
home/chloe/packages/linux.nix
···
···
-19
home/chloe/packages/list/default.nix
-19
home/chloe/packages/list/default.nix
-31
home/chloe/packages/list/gui.nix
-31
home/chloe/packages/list/gui.nix
···
···
-15
home/chloe/packages/scripts.nix
-15
home/chloe/packages/scripts.nix
···
···
+25
home/chloe/packages/universal.nix
+25
home/chloe/packages/universal.nix
···
···
+12
-8
home/chloe/programs/cli/zsh.nix
+12
-8
home/chloe/programs/cli/zsh.nix
······
······
+15
home/chloe/scripts.nix
+15
home/chloe/scripts.nix
···
···
+6
hosts/juniper/default.nix
+6
hosts/juniper/default.nix
+1
modules/darwin/default.nix
+1
modules/darwin/default.nix
+1
modules/darwin/extras.nix
+1
modules/darwin/extras.nix
+8
-1
modules/darwin/homebrew.nix
+8
-1
modules/darwin/homebrew.nix
+19
modules/darwin/startup.nix
+19
modules/darwin/startup.nix
···
···
+14
-13
secrets/caddy.age
+14
-13
secrets/caddy.age
···
···
+45
-2
services/bluesky-pds/default.nix
+45
-2
services/bluesky-pds/default.nix
···
+9
-6
services/caddy/default.nix
+9
-6
services/caddy/default.nix
······
······
+1
-1
services/destiny-labeler/default.nix
+1
-1
services/destiny-labeler/default.nix
+25
-40
services/fail2ban/default.nix
+25
-40
services/fail2ban/default.nix
······-"abuseipdb[abuseipdb_apikey=${config.age.secrets.abuseipdb.path}, abuseipdb_category='18,22', abuseipdb_comment='Fail2Ban SSH Brute Force']"-"abuseipdb[abuseipdb_apikey=${config.age.secrets.abuseipdb.path}, abuseipdb_category='21', abuseipdb_comment='Fail2Ban Caddy Abuse']"-"abuseipdb[abuseipdb_apikey=${config.age.secrets.abuseipdb.path}, abuseipdb_category='21', abuseipdb_comment='Fail2Ban Rate Limiting']"···-actionban = /run/current-system/sw/bin/curl -s -X POST https://api.abuseipdb.com/api/v2/report \
······+action = "iptables-multiport[name=SSH, port='ssh'] abuseipdb-agenix[abuseipdb_category='18,22']";+action = "iptables-multiport[name=Caddy, port='http,https'] abuseipdb-agenix[abuseipdb_category='21']";+action = "iptables-multiport[name=Caddy-RateLimit, port='http,https'] abuseipdb-agenix[abuseipdb_category='21']";···+actionban = sleep 12; curl 'https://api.abuseipdb.com/api/v2/report' -H 'Accept: application/json' -H "Key: $(cat /run/agenix/abuseipdb)" --data-urlencode 'ip=<ip>' --data 'categories=<abuseipdb_category>' > /dev/null 2>&1
+1
-2
services/glance/default.nix
+1
-2
services/glance/default.nix
······
······
+29
-3
services/knot/default.nix
+29
-3
services/knot/default.nix
······
······
+1
-1
services/lanyard/default.nix
+1
-1
services/lanyard/default.nix
+2
-4
services/ntfy/default.nix
+2
-4
services/ntfy/default.nix
+2
-2
services/outline/default.nix
+2
-2
services/outline/default.nix
······
······