+18
-17
.sops.nix
+18
-17
.sops.nix
······
······
+47
-39
flake.nix
+47
-39
flake.nix
···
···
+2
-1
global/core.nix
+2
-1
global/core.nix
+2
-1
global/default.nix
+2
-1
global/default.nix
+2
-1
global/gensokyo/default.nix
+2
-1
global/gensokyo/default.nix
+25
-21
global/gensokyo/presets/certificates.nix
+25
-21
global/gensokyo/presets/certificates.nix
···
···
+2
-1
global/gensokyo/presets/default.nix
+2
-1
global/gensokyo/presets/default.nix
+9
-4
global/gensokyo/presets/nginx.nix
+9
-4
global/gensokyo/presets/nginx.nix
······-static_configs = [{targets = ["localhost:${builtins.toString config.services.prometheus.exporters.nginx.port}"];}];···
······+{ targets = [ "localhost:${builtins.toString config.services.prometheus.exporters.nginx.port}" ]; }···
+9
-9
global/gensokyo/presets/secureboot.nix
+9
-9
global/gensokyo/presets/secureboot.nix
···
···
+36
-30
global/gensokyo/presets/vmetrics.nix
+36
-30
global/gensokyo/presets/vmetrics.nix
···-static_configs = [{targets = ["localhost:${builtins.toString config.services.prometheus.exporters.node.port}"];}];
···+{ targets = [ "localhost:${builtins.toString config.services.prometheus.exporters.node.port}" ]; }
+2
-1
global/gensokyo/traits.nix
+2
-1
global/gensokyo/traits.nix
+2
-1
global/gui/default.nix
+2
-1
global/gui/default.nix
+1
-1
global/gui/locale.nix
+1
-1
global/gui/locale.nix
+11
-6
global/gui/power.nix
+11
-6
global/gui/power.nix
+2
-1
global/home.nix
+2
-1
global/home.nix
+2
-1
global/programs/compat.nix
+2
-1
global/programs/compat.nix
+2
-1
global/programs/default.nix
+2
-1
global/programs/default.nix
+2
-1
global/programs/editors.nix
+2
-1
global/programs/editors.nix
+2
-1
global/programs/misc.nix
+2
-1
global/programs/misc.nix
+2
-1
global/programs/multiplexers.nix
+2
-1
global/programs/multiplexers.nix
+1
-1
global/programs/networking.nix
+1
-1
global/programs/networking.nix
+3
-2
global/programs/nix/config.nix
+3
-2
global/programs/nix/config.nix
+2
-1
global/programs/nix/default.nix
+2
-1
global/programs/nix/default.nix
+22
-11
global/programs/nix/dist-builds.nix
+22
-11
global/programs/nix/dist-builds.nix
·········publicHostKey = "c3NoLWVkMjU1MTkgQUFBQUMzTnphQzFsWkRJMU5URTVBQUFBSUoreGNleXA4YnRVNnd0dThpRUFKMkZ4cm5rZlBsS1M3TWFJL2xLT0ZuUDEgcm9vdEByZW5rbwo=";publicHostKey = "c3NoLWVkMjU1MTkgQUFBQUMzTnphQzFsWkRJMU5URTVBQUFBSVBsWGZ5MnMxejRIQ05oem92Rk55UzBhcCtyMEF2ZzAzNDlKeFFjMW0xaFEK";
·········publicHostKey = "c3NoLWVkMjU1MTkgQUFBQUMzTnphQzFsWkRJMU5URTVBQUFBSUoreGNleXA4YnRVNnd0dThpRUFKMkZ4cm5rZlBsS1M3TWFJL2xLT0ZuUDEgcm9vdEByZW5rbwo=";publicHostKey = "c3NoLWVkMjU1MTkgQUFBQUMzTnphQzFsWkRJMU5URTVBQUFBSVBsWGZ5MnMxejRIQ05oem92Rk55UzBhcCtyMEF2ZzAzNDlKeFFjMW0xaFEK";
+2
-1
global/programs/scm.nix
+2
-1
global/programs/scm.nix
+2
-1
global/programs/security/crypto.nix
+2
-1
global/programs/security/crypto.nix
+2
-1
global/programs/security/default.nix
+2
-1
global/programs/security/default.nix
+2
-1
global/programs/security/firewall.nix
+2
-1
global/programs/security/firewall.nix
+12
-4
global/programs/security/ip-bans.nix
+12
-4
global/programs/security/ip-bans.nix
···-networking.firewall.extraCommands = builtins.concatStringsSep "\n" (lib.flatten (lib.mapAttrsToList (family: ips: builtins.map (ip: "${family}tables -w -I INPUT -s ${ip} -j DROP") ips) banned));
···
+3
-2
global/programs/security/sudo.nix
+3
-2
global/programs/security/sudo.nix
+2
-1
global/programs/shells.nix
+2
-1
global/programs/shells.nix
+8
-3
global/programs/ssh.nix
+8
-3
global/programs/ssh.nix
······
······
+5
-3
global/programs/system-manager/default.nix
+5
-3
global/programs/system-manager/default.nix
···enable = lib.mkEnableOption "a shortcut to manage the system no matter where you are (in the system)";···
···enable = lib.mkEnableOption "a shortcut to manage the system no matter where you are (in the system)";···
+1
-1
global/programs/system-manager/package.nix
+1
-1
global/programs/system-manager/package.nix
···# we could make this more robust by not using `just` and (hardcode?) commands in, but this is by far the easiest
···# we could make this more robust by not using `just` and (hardcode?) commands in, but this is by far the easiest
+3
-2
global/sops.nix
+3
-2
global/sops.nix
+2
-1
global/upgrade-diff.nix
+2
-1
global/upgrade-diff.nix
+81
-55
global/utils.nix
+81
-55
global/utils.nix
······-assert lib.assertMsg (port != null || socketPath != null) "one of port or socketPath must be specified";-assert lib.assertMsg (!(port != null && socketPath != null)) "only one of port or socketPath may be specified at the same time";-assert lib.assertMsg (socketPath != null -> host == "localhost") "setting host has no effect when socketPath is set";assert lib.assertMsg (port != null -> builtins.isInt port) "port must be an integer if specified";-namespace ? (lib.warn "secret namespace left as default, which is empty. it is encouraged to set a namespace for easier secret management. to override, explicitly set this to an empty value." ""),-"secret path `${path}` is not defined in namespace `${namespace}`. (resolved to: ${_r_ns namespace}/${path})"; path;
······assert lib.assertMsg (port != null -> builtins.isInt port) "port must be an integer if specified";++ (if (socketPath == null) then "${host}:${builtins.toString port}" else "unix:${socketPath}");+lib.warn "secret namespace left as default, which is empty. it is encouraged to set a namespace for easier secret management. to override, explicitly set this to an empty value." ""+"secret path `${path}` is not defined in namespace `${namespace}`. (resolved to: ${_r_ns namespace}/${path})";
+3
-2
nix/checks.nix
+3
-2
nix/checks.nix
+2
-1
nix/devshell.nix
+2
-1
nix/devshell.nix
+3
-2
nix/treefmt.nix
+3
-2
nix/treefmt.nix
+8
-5
systems/default.nix
+8
-5
systems/default.nix
······
······
+2
-1
systems/kita/certificates/default.nix
+2
-1
systems/kita/certificates/default.nix
+2
-1
systems/kita/certificates/mail.nix
+2
-1
systems/kita/certificates/mail.nix
+2
-1
systems/kita/certificates/web.nix
+2
-1
systems/kita/certificates/web.nix
+2
-1
systems/kita/configuration.nix
+2
-1
systems/kita/configuration.nix
+10
-4
systems/kita/hardware-configuration.nix
+10
-4
systems/kita/hardware-configuration.nix
···
···
+2
-1
systems/kita/networking.nix
+2
-1
systems/kita/networking.nix
+2
-1
systems/kita/services/default.nix
+2
-1
systems/kita/services/default.nix
+2
-1
systems/kita/services/dns.nix
+2
-1
systems/kita/services/dns.nix
+3
-2
systems/kita/services/fallback_page/default.nix
+3
-2
systems/kita/services/fallback_page/default.nix
+1
-1
systems/kita/services/fallback_page/package.nix
+1
-1
systems/kita/services/fallback_page/package.nix
+5
-3
systems/kita/services/gatus.nix
+5
-3
systems/kita/services/gatus.nix
·········-(mkHttpEndpoint "Gateway (Kanidm)" "koumakan" "https://gateway.soopy.moe" // {enabled = false;}) # TODO
·········+(mkHttpEndpoint "Gateway (Kanidm)" "koumakan" "https://gateway.soopy.moe" // { enabled = false; }) # TODO
+2
-1
systems/kita/services/mail/default.nix
+2
-1
systems/kita/services/mail/default.nix
+2
-1
systems/kita/services/mail/maddy.nix
+2
-1
systems/kita/services/mail/maddy.nix
+2
-1
systems/kita/services/mail/mta-sts.nix
+2
-1
systems/kita/services/mail/mta-sts.nix
+9
-3
systems/kita/services/mail/roundcube.nix
+9
-3
systems/kita/services/mail/roundcube.nix
···
+9
-9
systems/kita/services/mail/rspamd.nix
+9
-9
systems/kita/services/mail/rspamd.nix
······
······
+3
-2
systems/kita/services/postgresql.nix
+3
-2
systems/kita/services/postgresql.nix
+2
-1
systems/kita/services/radicale.nix
+2
-1
systems/kita/services/radicale.nix
+2
-1
systems/koumakan/administration/default.nix
+2
-1
systems/koumakan/administration/default.nix
+2
-1
systems/koumakan/administration/telemetry.nix
+2
-1
systems/koumakan/administration/telemetry.nix
+2
-1
systems/koumakan/certificates/breezewiki.nix
+2
-1
systems/koumakan/certificates/breezewiki.nix
+2
-1
systems/koumakan/certificates/bsky-pds.nix
+2
-1
systems/koumakan/certificates/bsky-pds.nix
+2
-1
systems/koumakan/certificates/default.nix
+2
-1
systems/koumakan/certificates/default.nix
+2
-1
systems/koumakan/certificates/fediverse.nix
+2
-1
systems/koumakan/certificates/fediverse.nix
+2
-1
systems/koumakan/certificates/global.nix
+2
-1
systems/koumakan/certificates/global.nix
+11
-8
systems/koumakan/certificates/postgresql.nix
+11
-8
systems/koumakan/certificates/postgresql.nix
······
······
+2
-1
systems/koumakan/configuration.nix
+2
-1
systems/koumakan/configuration.nix
+19
-7
systems/koumakan/hardware-configuration.nix
+19
-7
systems/koumakan/hardware-configuration.nix
···-boot.initrd.availableKernelModules = ["xhci_pci" "ehci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" "sr_mod"];···
······
+2
-1
systems/koumakan/networking/cjdns.nix
+2
-1
systems/koumakan/networking/cjdns.nix
+2
-1
systems/koumakan/networking/default.nix
+2
-1
systems/koumakan/networking/default.nix
+2
-1
systems/koumakan/networking/firewall.nix
+2
-1
systems/koumakan/networking/firewall.nix
+2
-1
systems/koumakan/networking/interface.nix
+2
-1
systems/koumakan/networking/interface.nix
+2
-1
systems/koumakan/security/default.nix
+2
-1
systems/koumakan/security/default.nix
+2
-1
systems/koumakan/security/pam.nix
+2
-1
systems/koumakan/security/pam.nix
+8
-8
systems/koumakan/services/anubis.nix
+8
-8
systems/koumakan/services/anubis.nix
···-# assertion = v.settings.METRICS_BIND_NETWORK == "tcp" -> !builtins.isNull (builtins.match "127.0.0.1:.*" v.settings.METRICS_BIND);-assertion = !builtins.isNull (builtins.match "^127.0.0.1:17[[:digit:]]\{3\}$" v.settings.METRICS_BIND); # stricter-message = "koumakan-internal(anubis `${k}`): settings.METRICS_BIND must be in the form `127.0.0.1:17xxx`";# neither VM nor Prom supports scraping unix domain sockets and i currently cba writing a custom scraper for it
···+# assertion = v.settings.METRICS_BIND_NETWORK == "tcp" -> !builtins.isNull (builtins.match "127.0.0.1:.*" v.settings.METRICS_BIND);+!builtins.isNull (builtins.match "^127.0.0.1:17[[:digit:]]\{3\}$" v.settings.METRICS_BIND); # stricter+message = "koumakan-internal(anubis `${k}`): settings.METRICS_BIND must be in the form `127.0.0.1:17xxx`";# neither VM nor Prom supports scraping unix domain sockets and i currently cba writing a custom scraper for it
+3
-2
systems/koumakan/services/arion/breezewiki.nix
+3
-2
systems/koumakan/services/arion/breezewiki.nix
···
···
+2
-1
systems/koumakan/services/arion/default.nix
+2
-1
systems/koumakan/services/arion/default.nix
+5
-3
systems/koumakan/services/arion/pixivfe.nix
+5
-3
systems/koumakan/services/arion/pixivfe.nix
+2
-1
systems/koumakan/services/ci/default.nix
+2
-1
systems/koumakan/services/ci/default.nix
+5
-3
systems/koumakan/services/ci/hydra/default.nix
+5
-3
systems/koumakan/services/ci/hydra/default.nix
······
······
+2
-1
systems/koumakan/services/databases/default.nix
+2
-1
systems/koumakan/services/databases/default.nix
+22
-19
systems/koumakan/services/databases/postgresql.nix
+22
-19
systems/koumakan/services/databases/postgresql.nix
······
······
+2
-1
systems/koumakan/services/databases/redis.nix
+2
-1
systems/koumakan/services/databases/redis.nix
+2
-1
systems/koumakan/services/default.nix
+2
-1
systems/koumakan/services/default.nix
+5
-3
systems/koumakan/services/fediverse/bsky-pds.nix
+5
-3
systems/koumakan/services/fediverse/bsky-pds.nix
······
······
+2
-1
systems/koumakan/services/fediverse/default.nix
+2
-1
systems/koumakan/services/fediverse/default.nix
+2
-1
systems/koumakan/services/fediverse/writefreely.nix
+2
-1
systems/koumakan/services/fediverse/writefreely.nix
+2
-1
systems/koumakan/services/feeds/default.nix
+2
-1
systems/koumakan/services/feeds/default.nix
+2
-1
systems/koumakan/services/feeds/miniflux.nix
+2
-1
systems/koumakan/services/feeds/miniflux.nix
+5
-4
systems/koumakan/services/ftp.nix
+5
-4
systems/koumakan/services/ftp.nix
·········
·········
+2
-1
systems/koumakan/services/matrix/default.nix
+2
-1
systems/koumakan/services/matrix/default.nix
+8
-6
systems/koumakan/services/matrix/synapse.nix
+8
-6
systems/koumakan/services/matrix/synapse.nix
············
············
+3
-2
systems/koumakan/services/nginx.nix
+3
-2
systems/koumakan/services/nginx.nix
+2
-1
systems/koumakan/services/proxies/default.nix
+2
-1
systems/koumakan/services/proxies/default.nix
+2
-1
systems/koumakan/services/proxies/minio.nix
+2
-1
systems/koumakan/services/proxies/minio.nix
+2
-1
systems/koumakan/services/proxies/nitter.nix
+2
-1
systems/koumakan/services/proxies/nitter.nix
+10
-5
systems/koumakan/services/proxies/searxng.nix
+10
-5
systems/koumakan/services/proxies/searxng.nix
·········
·········
+2
-1
systems/koumakan/services/scm/default.nix
+2
-1
systems/koumakan/services/scm/default.nix
+4
-3
systems/koumakan/services/scm/forgejo.nix
+4
-3
systems/koumakan/services/scm/forgejo.nix
·········
·········
+5
-3
systems/koumakan/services/scm/tangled-knot.nix
+5
-3
systems/koumakan/services/scm/tangled-knot.nix
+2
-1
systems/koumakan/services/security/default.nix
+2
-1
systems/koumakan/services/security/default.nix
+24
-20
systems/koumakan/services/security/vaultwarden.nix
+24
-20
systems/koumakan/services/security/vaultwarden.nix
······-DATABASE_URL=postgresql://${ph "database/username"}:${ph "database/password"}@localhost/vaultwarden···zone vaultwarden 128k; # XXX: are there any security implications if we reuse the same zone for both webvault and the ws server?
······+DATABASE_URL=postgresql://${ph "database/username"}:${ph "database/password"}@localhost/vaultwarden···zone vaultwarden 128k; # XXX: are there any security implications if we reuse the same zone for both webvault and the ws server?
+2
-1
systems/koumakan/services/static-sites/assets.nix
+2
-1
systems/koumakan/services/static-sites/assets.nix
+2
-1
systems/koumakan/services/static-sites/default.nix
+2
-1
systems/koumakan/services/static-sites/default.nix
+2
-1
systems/koumakan/services/static-sites/nonbunary.nix
+2
-1
systems/koumakan/services/static-sites/nonbunary.nix
+11
-7
systems/koumakan/services/static-sites/photography.nix
+11
-7
systems/koumakan/services/static-sites/photography.nix
·········
·········
+2
-1
systems/koumakan/services/storage/atuin.nix
+2
-1
systems/koumakan/services/storage/atuin.nix
+5
-3
systems/koumakan/services/storage/wastebin.nix
+5
-3
systems/koumakan/services/storage/wastebin.nix
+4
-2
systems/koumakan/services/storage/zipline.nix
+4
-2
systems/koumakan/services/storage/zipline.nix
+2
-1
systems/koumakan/services/telemetry/default.nix
+2
-1
systems/koumakan/services/telemetry/default.nix
+4
-2
systems/koumakan/services/telemetry/grafana/default.nix
+4
-2
systems/koumakan/services/telemetry/grafana/default.nix
+5
-2
systems/koumakan/services/telemetry/grafana/provisioning.nix
+5
-2
systems/koumakan/services/telemetry/grafana/provisioning.nix
+24
-24
systems/koumakan/services/telemetry/victoriametrics.nix
+24
-24
systems/koumakan/services/telemetry/victoriametrics.nix
············targets = lib.singleton "localhost:${builtins.toString config.services.prometheus.exporters.node.port}";···-static_configs = lib.singleton {targets = lib.singleton "localhost:${builtins.toString config.services.prometheus.exporters.nginx.port}";};···
············targets = lib.singleton "localhost:${builtins.toString config.services.prometheus.exporters.node.port}";···+targets = lib.singleton "localhost:${builtins.toString config.services.prometheus.exporters.nginx.port}";···
+2
-1
systems/nijika/configuration.nix
+2
-1
systems/nijika/configuration.nix
+9
-4
systems/nijika/hardware-configuration.nix
+9
-4
systems/nijika/hardware-configuration.nix
······
······
+2
-1
systems/nijika/networking.nix
+2
-1
systems/nijika/networking.nix
+2
-1
systems/nijika/services/default.nix
+2
-1
systems/nijika/services/default.nix
+3
-2
systems/nijika/services/fallback_page/default.nix
+3
-2
systems/nijika/services/fallback_page/default.nix
···
···
+1
-1
systems/nijika/services/fallback_page/package.nix
+1
-1
systems/nijika/services/fallback_page/package.nix
+2
-1
systems/renko/configuration.nix
+2
-1
systems/renko/configuration.nix
+2
-1
systems/renko/development/default.nix
+2
-1
systems/renko/development/default.nix
+2
-1
systems/renko/development/docker.nix
+2
-1
systems/renko/development/docker.nix
+2
-1
systems/renko/development/postgresql.nix
+2
-1
systems/renko/development/postgresql.nix
+2
-1
systems/renko/gui/default.nix
+2
-1
systems/renko/gui/default.nix
+2
-1
systems/renko/gui/finance.nix
+2
-1
systems/renko/gui/finance.nix
+2
-1
systems/renko/gui/games/default.nix
+2
-1
systems/renko/gui/games/default.nix
+2
-1
systems/renko/gui/graphics.nix
+2
-1
systems/renko/gui/graphics.nix
+2
-1
systems/renko/gui/virt.nix
+2
-1
systems/renko/gui/virt.nix
+17
-7
systems/renko/hardware-configuration.nix
+17
-7
systems/renko/hardware-configuration.nix
······
······
+2
-1
systems/renko/services/default.nix
+2
-1
systems/renko/services/default.nix
+4
-2
systems/renko/services/minio.nix
+4
-2
systems/renko/services/minio.nix
+6
-4
systems/renko/services/vmagent.nix
+6
-4
systems/renko/services/vmagent.nix
······
······
+2
-1
systems/ryo/configuration.nix
+2
-1
systems/ryo/configuration.nix
+13
-4
systems/ryo/hardware-configuration.nix
+13
-4
systems/ryo/hardware-configuration.nix
···-boot.initrd.availableKernelModules = ["ata_piix" "uhci_hcd" "virtio_pci" "virtio_scsi" "sd_mod" "xen_blkfront" "vmw_pvscsi"];
···
+2
-1
systems/ryo/services/default.nix
+2
-1
systems/ryo/services/default.nix
+4
-3
systems/ryo/services/novnc.nix
+4
-3
systems/ryo/services/novnc.nix
······
······
+26
-25
systems/ryo/services/thefunny.nix
+26
-25
systems/ryo/services/thefunny.nix
·········
·········
+2
-1
systems/satori/configuration.nix
+2
-1
systems/satori/configuration.nix
+18
-7
systems/satori/hardware-configuration.nix
+18
-7
systems/satori/hardware-configuration.nix
······
······
+2
-1
systems/satori/steam.nix
+2
-1
systems/satori/steam.nix
+3
-2
users/_tester.nix
+3
-2
users/_tester.nix