Compare changes

Choose any two refs to compare.

Changed files
+211 -171
global
systems
koumakan
networking
services
renko
+1
.gitignore
···
# balls
result
+
result-*
.direnv/
*.qcow2
+102 -115
flake.lock
···
]
},
"locked": {
-
"lastModified": 1759632323,
-
"narHash": "sha256-TzLTfXxhOkR/8oOoVEAYQWb81ADGHdKsQXGicC7kR+M=",
+
"lastModified": 1765839957,
+
"narHash": "sha256-c2k30kehMWLEQpO41OhyDruj1S7RsyBlgx4yHlXKVa4=",
"owner": "hercules-ci",
"repo": "arion",
-
"rev": "24658a03be2d1a6e1e02c01524775d960a82309c",
+
"rev": "9ff7acc2c00a40ecf24894592ea5019439bb9e13",
"type": "github"
},
"original": {
···
},
"crane": {
"locked": {
-
"lastModified": 1754269165,
-
"narHash": "sha256-0tcS8FHd4QjbCVoxN9jI+PjHgA4vc/IjkUSp+N3zy0U=",
+
"lastModified": 1765145449,
+
"narHash": "sha256-aBVHGWWRzSpfL++LubA0CwOOQ64WNLegrYHwsVuVN7A=",
"owner": "ipetkov",
"repo": "crane",
-
"rev": "444e81206df3f7d92780680e45858e31d2f07a08",
+
"rev": "69f538cdce5955fcd47abfed4395dc6d5194c1c5",
"type": "github"
},
"original": {
···
"flake-compat": {
"flake": false,
"locked": {
-
"lastModified": 1747046372,
-
"narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=",
+
"lastModified": 1761588595,
+
"narHash": "sha256-XKUZz9zewJNUj46b4AJdiRZJAvSZ0Dqj2BNfXvFlJC4=",
"owner": "edolstra",
"repo": "flake-compat",
-
"rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885",
+
"rev": "f387cd2afec9419c8ee37694406ca490c3f34ee5",
"type": "github"
},
"original": {
···
"flake-compat_2": {
"flake": false,
"locked": {
-
"lastModified": 1747046372,
-
"narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=",
+
"lastModified": 1761588595,
+
"narHash": "sha256-XKUZz9zewJNUj46b4AJdiRZJAvSZ0Dqj2BNfXvFlJC4=",
"owner": "edolstra",
"repo": "flake-compat",
-
"rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885",
+
"rev": "f387cd2afec9419c8ee37694406ca490c3f34ee5",
"type": "github"
},
"original": {
···
]
},
"locked": {
-
"lastModified": 1759362264,
-
"narHash": "sha256-wfG0S7pltlYyZTM+qqlhJ7GMw2fTF4mLKCIVhLii/4M=",
+
"lastModified": 1763759067,
+
"narHash": "sha256-LlLt2Jo/gMNYAwOgdRQBrsRoOz7BPRkzvNaI/fzXi2Q=",
"owner": "hercules-ci",
"repo": "flake-parts",
-
"rev": "758cf7296bee11f1706a574c77d072b8a7baa881",
+
"rev": "2cccadc7357c0ba201788ae99c4dfa90728ef5e0",
"type": "github"
},
"original": {
···
}
},
"flake-parts_2": {
-
"inputs": {
-
"nixpkgs-lib": [
-
"lanzaboote",
-
"nixpkgs"
-
]
-
},
-
"locked": {
-
"lastModified": 1754091436,
-
"narHash": "sha256-XKqDMN1/Qj1DKivQvscI4vmHfDfvYR2pfuFOJiCeewM=",
-
"owner": "hercules-ci",
-
"repo": "flake-parts",
-
"rev": "67df8c627c2c39c41dbec76a1f201929929ab0bd",
-
"type": "github"
-
},
-
"original": {
-
"owner": "hercules-ci",
-
"repo": "flake-parts",
-
"type": "github"
-
}
-
},
-
"flake-parts_3": {
"inputs": {
"nixpkgs-lib": [
"mystia",
···
"systems": "systems_2"
},
"locked": {
-
"lastModified": 1694529238,
-
"narHash": "sha256-zsNZZGTGnMOf9YpHKJqMSsa0dXbfmxeoJ7xHlrt+xmY=",
+
"lastModified": 1731533236,
+
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
-
"rev": "ff7b65b44d01cf9ba6a71320833626af21126384",
+
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
···
"inputs": {
"flake-compat": "flake-compat",
"flake-utils": "flake-utils",
+
"home-manager": "home-manager",
"nixpkgs": "nixpkgs_2",
"zig": "zig",
"zon2nix": "zon2nix"
},
"locked": {
-
"lastModified": 1765256324,
-
"narHash": "sha256-LB4FO4xP9XlmaxEzruiW88S2n6SEYqALdzKE3oybGkI=",
+
"lastModified": 1767049078,
+
"narHash": "sha256-BZ62cvoAvq74l82PB3gqTgg+ltz47FViC0N3RbWYxys=",
"owner": "ghostty-org",
"repo": "ghostty",
-
"rev": "cf06417b7dfbd0daeb58a9143f9b6ee194cbce26",
+
"rev": "1fa6641a6adf3936f6c8c81e14b5821d2de1a81b",
"type": "github"
},
"original": {
···
"inputs": {
"nixpkgs": [
"lanzaboote",
-
"pre-commit-hooks-nix",
+
"pre-commit",
"nixpkgs"
]
},
···
]
},
"locked": {
-
"lastModified": 1754078208,
-
"narHash": "sha256-YVoIFDCDpYuU3riaDEJ3xiGdPOtsx4sR5eTzHTytPV8=",
+
"lastModified": 1763982521,
+
"narHash": "sha256-ur4QIAHwgFc0vXiaxn5No/FuZicxBr2p0gmT54xZkUQ=",
"owner": "nix-community",
"repo": "gomod2nix",
-
"rev": "7f963246a71626c7fc70b431a315c4388a0c95cf",
+
"rev": "02e63a239d6eabd595db56852535992c898eba72",
"type": "github"
},
"original": {
···
"home-manager": {
"inputs": {
"nixpkgs": [
+
"ghostty",
"nixpkgs"
]
},
"locked": {
-
"lastModified": 1765170903,
-
"narHash": "sha256-O8VTGey1xxiRW+Fpb+Ps9zU7ShmxUA1a7cMTcENCVNg=",
+
"lastModified": 1755776884,
+
"narHash": "sha256-CPM7zm6csUx7vSfKvzMDIjepEJv1u/usmaT7zydzbuI=",
"owner": "nix-community",
"repo": "home-manager",
-
"rev": "20561be440a11ec57a89715480717baf19fe6343",
+
"rev": "4fb695d10890e9fc6a19deadf85ff79ffb78da86",
+
"type": "github"
+
},
+
"original": {
+
"owner": "nix-community",
+
"ref": "release-25.05",
+
"repo": "home-manager",
+
"type": "github"
+
}
+
},
+
"home-manager_2": {
+
"inputs": {
+
"nixpkgs": [
+
"nixpkgs"
+
]
+
},
+
"locked": {
+
"lastModified": 1767024057,
+
"narHash": "sha256-B1aycRjMRvb6QOGbnqDhiDzZwMebj5jxZ5qyJzaKvpI=",
+
"owner": "nix-community",
+
"repo": "home-manager",
+
"rev": "34578a2fdfce4257ce5f5baf6e7efbd4e4e252b1",
"type": "github"
},
"original": {
···
"inputs": {
"nix": "nix",
"nix-eval-jobs": "nix-eval-jobs",
-
"nixpkgs": "nixpkgs_4"
+
"nixpkgs": "nixpkgs_3"
},
"locked": {
"lastModified": 1764105837,
···
"lanzaboote": {
"inputs": {
"crane": "crane",
-
"flake-compat": "flake-compat_2",
-
"flake-parts": "flake-parts_2",
"nixpkgs": [
"nixpkgs"
],
-
"pre-commit-hooks-nix": "pre-commit-hooks-nix",
+
"pre-commit": "pre-commit",
"rust-overlay": "rust-overlay"
},
"locked": {
-
"lastModified": 1762205063,
-
"narHash": "sha256-If6vQ+KvtKs3ARBO9G3l+4wFSCYtRBrwX1z+I+B61wQ=",
+
"lastModified": 1765382359,
+
"narHash": "sha256-RJmgVDzjRI18BWVogG6wpsl1UCuV6ui8qr4DJ1LfWZ8=",
"owner": "nix-community",
"repo": "lanzaboote",
-
"rev": "88b8a563ff5704f4e8d8e5118fb911fa2110ca05",
+
"rev": "e8c096ade12ec9130ff931b0f0e25d2f1bc63607",
"type": "github"
},
"original": {
"owner": "nix-community",
-
"ref": "v0.4.3",
+
"ref": "v1.0.0",
"repo": "lanzaboote",
"type": "github"
}
···
"inputs": {
"flake-compat": "flake-compat_3",
"nix-update-soopy": "nix-update-soopy",
-
"nixpkgs": "nixpkgs_5",
+
"nixpkgs": "nixpkgs_4",
"treefmt-nix": "treefmt-nix_2"
},
"locked": {
-
"lastModified": 1764144136,
-
"narHash": "sha256-EqViuxH+g4lo5GlcQ5UjkIIdIF3tjF3K9gdmyXWt9gQ=",
+
"lastModified": 1765558006,
+
"narHash": "sha256-8o8J6YJgx7ZLZJfXlKL/upDyGuRFoTOTKeaLT4ZgUHw=",
"owner": "soopyc",
"repo": "mystia",
-
"rev": "ecf8e23ef3d0f4687043154a51056b1c5cba144e",
+
"rev": "5b177c1b32e2f671c1b4b92f0d71ec2a6a55fa9a",
"type": "github"
},
"original": {
···
},
"nix-update-soopy": {
"inputs": {
-
"flake-parts": "flake-parts_3",
+
"flake-parts": "flake-parts_2",
"nixpkgs": [
"mystia",
"nixpkgs"
···
},
"nixos-hardware": {
"locked": {
-
"lastModified": 1764729408,
-
"narHash": "sha256-BnwVvpidFX9hPwRkHuHw2y5ZgJWNeoHKd2fj2qls9NM=",
+
"lastModified": 1767105924,
+
"narHash": "sha256-Sr2uqrc5VVFm5zIqJw87MtB2skLcIQGMywmtjFecWn0=",
"owner": "soopyc",
"repo": "nixos-hardware",
-
"rev": "c45404cdfb6c4eb9d99f88e383c703db6e5db442",
+
"rev": "cd2b93bdcf720c6b68522eafd5aa1347a25a41b0",
"type": "github"
},
"original": {
···
},
"nixpkgs_2": {
"locked": {
-
"lastModified": 315532800,
-
"narHash": "sha256-sV6pJNzFkiPc6j9Bi9JuHBnWdVhtKB/mHgVmMPvDFlk=",
-
"rev": "82c2e0d6dde50b17ae366d2aa36f224dc19af469",
+
"lastModified": 1763191728,
+
"narHash": "sha256-gI9PpaoX4/f28HkjcTbFVpFhtOxSDtOEdFaHZrdETe0=",
+
"rev": "1d4c88323ac36805d09657d13a5273aea1b34f0c",
"type": "tarball",
-
"url": "https://releases.nixos.org/nixpkgs/nixpkgs-25.11pre877938.82c2e0d6dde5/nixexprs.tar.xz"
+
"url": "https://releases.nixos.org/nixpkgs/nixpkgs-25.11pre896415.1d4c88323ac3/nixexprs.tar.xz"
},
"original": {
"type": "tarball",
···
},
"nixpkgs_3": {
"locked": {
-
"lastModified": 1758360447,
-
"narHash": "sha256-XDY3A83bclygHDtesRoaRTafUd80Q30D/Daf9KSG6bs=",
-
"rev": "8eaee110344796db060382e15d3af0a9fc396e0e",
-
"type": "tarball",
-
"url": "https://releases.nixos.org/nixos/unstable/nixos-25.11pre864002.8eaee1103447/nixexprs.tar.xz"
-
},
-
"original": {
-
"type": "tarball",
-
"url": "https://channels.nixos.org/nixos-unstable/nixexprs.tar.xz"
-
}
-
},
-
"nixpkgs_4": {
-
"locked": {
"lastModified": 1764020296,
"narHash": "sha256-6zddwDs2n+n01l+1TG6PlyokDdXzu/oBmEejcH5L5+A=",
"owner": "NixOS",
···
"type": "github"
}
},
-
"nixpkgs_5": {
+
"nixpkgs_4": {
"locked": {
"lastModified": 1763966396,
"narHash": "sha256-6eeL1YPcY1MV3DDStIDIdy/zZCDKgHdkCmsrLJFiZf0=",
···
"type": "indirect"
}
},
-
"nixpkgs_6": {
+
"nixpkgs_5": {
"locked": {
-
"lastModified": 1764983851,
-
"narHash": "sha256-pyyfJp6Q80D0YhEuuP/qzasUZjoK3C3PrCp8BPWcDZE=",
-
"rev": "d9bc5c7dceb30d8d6fafa10aeb6aa8a48c218454",
+
"lastModified": 1766885793,
+
"narHash": "sha256-3wE9FvGp15AXnwNsGH8gs+i/j/25EBvIoJapquYvB6I=",
+
"rev": "9ef261221d1e72399f2036786498d78c38185c46",
"type": "tarball",
-
"url": "https://releases.nixos.org/nixos/25.11/nixos-25.11.1056.d9bc5c7dceb3/nixexprs.tar.xz"
+
"url": "https://releases.nixos.org/nixos/25.11/nixos-25.11.2679.9ef261221d1e/nixexprs.tar.xz"
},
"original": {
"type": "tarball",
"url": "https://nixpkgs.dev/channel/nixos-25.11"
}
},
-
"pre-commit-hooks-nix": {
+
"pre-commit": {
"inputs": {
-
"flake-compat": [
-
"lanzaboote",
-
"flake-compat"
-
],
+
"flake-compat": "flake-compat_2",
"gitignore": "gitignore",
"nixpkgs": [
"lanzaboote",
···
]
},
"locked": {
-
"lastModified": 1750779888,
-
"narHash": "sha256-wibppH3g/E2lxU43ZQHC5yA/7kIKLGxVEnsnVK1BtRg=",
+
"lastModified": 1765016596,
+
"narHash": "sha256-rhSqPNxDVow7OQKi4qS5H8Au0P4S3AYbawBSmJNUtBQ=",
"owner": "cachix",
"repo": "pre-commit-hooks.nix",
-
"rev": "16ec914f6fb6f599ce988427d9d94efddf25fe6d",
+
"rev": "548fc44fca28a5e81c5d6b846e555e6b9c2a5a3c",
"type": "github"
},
"original": {
···
"arion": "arion",
"catppuccin": "catppuccin",
"ghostty": "ghostty",
-
"home-manager": "home-manager",
+
"home-manager": "home-manager_2",
"hydra": "hydra",
"knotserver-module": "knotserver-module",
"lanzaboote": "lanzaboote",
"mystia": "mystia",
"nix-index-database": "nix-index-database",
"nixos-hardware": "nixos-hardware",
-
"nixpkgs": "nixpkgs_6",
+
"nixpkgs": "nixpkgs_5",
"sops-nix": "sops-nix",
"tangled-core": "tangled-core",
"treefmt-nix": "treefmt-nix_3",
···
]
},
"locked": {
-
"lastModified": 1761791894,
-
"narHash": "sha256-myRIDh+PxaREz+z9LzbqBJF+SnTFJwkthKDX9zMyddY=",
+
"lastModified": 1765075567,
+
"narHash": "sha256-KFDCdQcHJ0hE3Nt5Gm5enRIhmtEifAjpxgUQ3mzSJpA=",
"owner": "oxalica",
"repo": "rust-overlay",
-
"rev": "59c45eb69d9222a4362673141e00ff77842cd219",
+
"rev": "769156779b41e8787a46ca3d7d76443aaf68be6f",
"type": "github"
},
"original": {
···
]
},
"locked": {
-
"lastModified": 1765231718,
-
"narHash": "sha256-qdBzo6puTgG4G2RHG0PkADg22ZnQo1JmSVFRxrD4QM4=",
+
"lastModified": 1766894905,
+
"narHash": "sha256-pn8AxxfajqyR/Dmr1wnZYdUXHgM3u6z9x0Z1Ijmz2UQ=",
"owner": "Mic92",
"repo": "sops-nix",
-
"rev": "7fd1416aba1865eddcdec5bb11339b7222c2363e",
+
"rev": "61b39c7b657081c2adc91b75dd3ad8a91d6f07a7",
"type": "github"
},
"original": {
···
"sqlite-lib-src": "sqlite-lib-src"
},
"locked": {
-
"lastModified": 1765274502,
-
"narHash": "sha256-bvn+7LjDKYloOw4n5wCXt2QvDxYrx1dF2xgebtm4w54=",
+
"lastModified": 1767063361,
+
"narHash": "sha256-MyxjxAfOw6LgPGbv/m/am5E080jtc+FunlYFu5HIVUU=",
"ref": "refs/heads/master",
-
"rev": "d2d6839612e37cdc52d0e25e1502459fc3dfda3f",
-
"revCount": 1729,
+
"rev": "4bdc9dfe9bb5ed8f5dfea30b9a45bc93b1430535",
+
"revCount": 1779,
"type": "git",
"url": "https://tangled.org/@tangled.sh/core"
},
···
]
},
"locked": {
-
"lastModified": 1762938485,
-
"narHash": "sha256-AlEObg0syDl+Spi4LsZIBrjw+snSVU4T8MOeuZJUJjM=",
+
"lastModified": 1767086983,
+
"narHash": "sha256-l4c8HQkgsB15BUZI1SHLAZHQ7822iIkJtOsdIuXIO4s=",
"owner": "numtide",
"repo": "treefmt-nix",
-
"rev": "5b4ee75aeefd1e2d5a1cc43cf6ba65eba75e83e4",
+
"rev": "c9eb5bb179067ddced348aca023a3fbf8b5832c5",
"type": "github"
},
"original": {
···
]
},
"locked": {
-
"lastModified": 1760401936,
-
"narHash": "sha256-/zj5GYO5PKhBWGzbHbqT+ehY8EghuABdQ2WGfCwZpCQ=",
+
"lastModified": 1763295135,
+
"narHash": "sha256-sGv/NHCmEnJivguGwB5w8LRmVqr1P72OjS+NzcJsssE=",
"owner": "mitchellh",
"repo": "zig-overlay",
-
"rev": "365085b6652259753b598d43b723858184980bbe",
+
"rev": "64f8b42cfc615b2cf99144adf2b7728c7847c72a",
"type": "github"
},
"original": {
···
},
"zon2nix": {
"inputs": {
-
"nixpkgs": "nixpkgs_3"
+
"nixpkgs": [
+
"ghostty",
+
"nixpkgs"
+
]
},
"locked": {
"lastModified": 1758405547,
+1 -1
flake.nix
···
};
lanzaboote = {
-
url = "github:nix-community/lanzaboote/v0.4.3";
+
url = "github:nix-community/lanzaboote/v1.0.0";
inputs.nixpkgs.follows = "nixpkgs";
};
+7 -7
global/gui/dm.nix
···
{
config,
lib,
-
pkgs,
+
# pkgs,
...
}:
lib.mkIf config.gensokyo.traits.gui {
···
enable = true;
autoNumlock = true;
wayland.enable = true;
-
theme = "catppuccin-frappe";
+
# theme = "catppuccin-frappe";
};
-
environment.systemPackages = [
-
(pkgs.catppuccin-sddm.override {
-
flavor = "frappe";
-
})
-
];
+
# environment.systemPackages = [
+
# (pkgs.catppuccin-sddm.override {
+
# flavor = "frappe";
+
# })
+
# ];
}
+6 -5
global/gui/packages.nix
···
...
}:
lib.mkIf config.gensokyo.traits.gui {
-
environment.systemPackages = [
-
pkgs.vlc
-
pkgs.flameshot
-
pkgs.libnotify
-
pkgs.thunderbird
+
environment.systemPackages = with pkgs; [
+
vlc
+
flameshot
+
libnotify
+
thunderbird
+
inputs.ghostty.packages.${pkgs.system}.default
];
}
+1 -1
global/overlays/default.nix
···
-
_: []
+
_: [ ]
# inputs: [
# # we can probably live without an overlay?
# # inputs.mystia.overlays.default
+8
global/programs/networking.nix
···
{
lib,
config,
+
pkgs,
...
}:
lib.mkMerge [
···
(lib.mkIf config.gensokyo.traits.portable {
networking.networkmanager.wifi.backend = "wpa_supplicant";
+
})
+
+
# TODO: maybe we should move these to /global/gui?
+
(lib.mkIf config.gensokyo.traits.gui {
+
networking.networkmanager.plugins = with pkgs; [
+
networkmanager-openconnect
+
];
})
(lib.mkIf (!config.gensokyo.traits.sensitive) {
+20
systems/koumakan/networking/firewall.nix
···
from = 50000;
to = 50100;
}
+
+
# minecraft
+
{
+
from = 25560;
+
to = 25599;
+
}
];
allowedUDPPorts = [
443 # https over quic (http3)
+
];
+
+
allowedUDPPortRanges = [
+
# more minecraft
+
{
+
from = 25560;
+
to = 25599;
+
}
+
+
# plasmo voice
+
{
+
from = 55111;
+
to = 55199;
+
}
];
};
+16 -20
systems/koumakan/services/databases/postgresql.nix
···
host all all ::1/128 scram-sha-256
'';
-
settings =
-
let
-
credsDir = "/run/credentials/postgresql.service";
-
in
-
{
-
listen_addresses = pkgs.lib.mkForce "*";
-
max_connections = 200;
-
password_encryption = "scram-sha-256";
+
settings = {
+
listen_addresses = pkgs.lib.mkForce "*";
+
max_connections = 200;
+
password_encryption = "scram-sha-256";
-
log_line_prefix = "%m [%p] %h ";
-
# ssl = "on";
-
# ssl_cert_file = "${credsDir}/cert.pem";
-
# ssl_key_file = "${credsDir}/key.pem";
+
log_line_prefix = "%m [%p] %h ";
+
# ssl = "on";
+
# ssl_cert_file = "${credsDir}/cert.pem";
+
# ssl_key_file = "${credsDir}/key.pem";
-
log_hostname = true;
-
datestyle = "iso, dmy";
-
log_timezone = "Asia/Hong_Kong";
-
timezone = "Asia/Hong_Kong";
-
default_text_search_config = "pg_catalog.english";
+
log_hostname = true;
+
datestyle = "iso, dmy";
+
log_timezone = "Asia/Hong_Kong";
+
timezone = "Asia/Hong_Kong";
+
default_text_search_config = "pg_catalog.english";
-
max_wal_size = "2GB";
-
min_wal_size = "80MB";
-
};
+
max_wal_size = "2GB";
+
min_wal_size = "80MB";
+
};
};
users.users.postgres.useDefaultShell = lib.mkForce false;
+1 -1
systems/koumakan/services/proxies/default.nix
···
-
{ ... }:
{
imports = [
./nitter.nix
./searxng.nix
./minio.nix
+
./nginx-stream.nix
];
}
+44
systems/koumakan/services/proxies/nginx-stream.nix
···
+
{
+
systemd.tmpfiles.settings."nginx-stream-log"."/var/log/nginx/stream"."d" = {
+
user = "nginx";
+
group = "nginx";
+
mode = "0750";
+
};
+
# NOTE: this doesn't work properly atm, we cba setting up routing stuff right now.
+
# systemd.services.nginx.serviceConfig = {
+
# # needed for transparent proxying
+
# CapabilityBoundingSet = ["CAP_NET_RAW"];
+
# AmbientCapabilities = ["CAP_NET_RAW"];
+
# };
+
+
services.nginx.streamConfig = ''
+
resolver 100.100.100.100;
+
# proxy_bind $remote_addr transparent;
+
proxy_connect_timeout 1s;
+
proxy_timeout 30s;
+
+
log_format basic_stream '$remote_addr [$time_local] '
+
'$protocol $status $bytes_sent $bytes_received '
+
'$session_time';
+
+
error_log /var/log/nginx/stream/error.log;
+
access_log /var/log/nginx/stream/access.log basic_stream;
+
+
# data
+
server {
+
listen 25565-25599 reuseport;
+
proxy_pass renko.mist-nessie.ts.net:$server_port;
+
}
+
+
# query sockets
+
server {
+
listen 25565-25599 udp reuseport;
+
proxy_pass renko.mist-nessie.ts.net:$server_port;
+
}
+
# voice
+
server {
+
listen 55111-55199 udp reuseport;
+
proxy_pass renko.mist-nessie.ts.net:$server_port;
+
}
+
'';
+
}
+3 -2
systems/koumakan/services/scm/forgejo.nix
···
ENABLE_NOTIFY_MAIL = true;
REGISTER_EMAIL_CONFIRM = true;
-
DISABLE_REGISTRATION = false;
+
DISABLE_REGISTRATION = false; # need to be false to enable any sort of reg.
+
ENABLE_INTERNAL_SIGNIN = true; # we have gatekeeper setup now and working, this can be turned off.
ALLOW_ONLY_EXTERNAL_REGISTRATION = true;
ENABLE_CAPTCHA = true;
···
# Logging {{{
log = {
ROOT_PATH = "/var/log/forgejo/";
-
"logger.router.MODE" = "";
+
LOGGER_ROUTER_MODE = "";
};
# }}}
+1 -19
systems/renko/configuration.nix
···
];
networking.firewall = {
-
allowedTCPPorts = [ 59153 ];
-
allowedTCPPortRanges = [
-
{
-
from = 25560;
-
to = 25570;
-
}
-
];
-
allowedUDPPortRanges = [
-
{
-
from = 25560;
-
to = 25570;
-
}
-
-
# plasmo voice
-
{
-
from = 55111;
-
to = 55199;
-
}
-
];
+
allowedTCPPorts = [ 59153 5515 ];
};
# muh unfree software!!!!!!!!!!!!!!!!!!