+1
-1
README.md
+1
-1
README.md
···
+1
-1
apps/flash-installer.nix
+1
-1
apps/flash-installer.nix
+2
-1
configurations.nix
+2
-1
configurations.nix
···
+3
-1
home-manager/fragments/git.nix
+3
-1
home-manager/fragments/git.nix
+1
-1
home-manager/fragments/shell.nix
+1
-1
home-manager/fragments/shell.nix
···
+5
-4
home-manager/fragments/stylix.nix
+5
-4
home-manager/fragments/stylix.nix
······
+1
-1
home-manager/fragments/waybar.nix
+1
-1
home-manager/fragments/waybar.nix
+163
hosts/weird-row-server/authelia.nix
+163
hosts/weird-row-server/authelia.nix
···+age.secrets.authelia-jwt-secret = { file = secrets/authelia-jwt-secret.age; owner = config.services.authelia.instances.main.user; };+age.secrets.authelia-issuer-private-key = { file = secrets/authelia-issuer-private-key.age; owner = config.services.authelia.instances.main.user; };+age.secrets.authelia-storage-key = { file = secrets/authelia-storage-key.age; owner = config.services.authelia.instances.main.user; };+age.secrets.authelia-ldap-password = { file = secrets/authelia-ldap-password.age; owner = config.services.authelia.instances.main.user; };+age.secrets.authelia-smtp-password = { file = secrets/authelia-smtp-password.age; owner = config.services.authelia.instances.main.user; };+AUTHELIA_AUTHENTICATION_BACKEND_LDAP_PASSWORD_FILE = config.age.secrets.authelia-ldap-password.path;+users_filter = "(&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=person))";+claims_policies.headscale = { id_token = [ "email" "name" "preferred_username" "picture" "groups" ]; };+client_secret = "$pbkdf2-sha256$310000$XY680D9gkSoWhD0UtYHNFg$ptWB3exOYCga6uq1N.oimuV3ILjK3F8lBWBpsBpibos";+client_secret = "$pbkdf2-sha256$310000$PcUaup9aWKI9ZLeCF6.avw$FpsTxkDaxcoQlBi8aIacegXpjEDiCI6nXcaHyZ2Sxyc";+client_secret = "$pbkdf2-sha256$310000$UkwrqxTZodGMs9.Ca2cXAA$HCWFgQbFHGXZpuz.I3HHdkTZLUevRVGlhKEFaOlPmKs";+client_secret = "$pbkdf2-sha256$310000$uPqbWfCOBXDY6nV1vsx3uA$HOWG2hL.c/bs9Dwaee3b9DxjH7KFO.SaZMbasXV9Vdw";
+137
hosts/weird-row-server/default.nix
+137
hosts/weird-row-server/default.nix
···+boot.initrd.availableKernelModules = [ "ahci" "xhci_pci" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod" "ext4" ];
+25
hosts/weird-row-server/goatcounter.nix
+25
hosts/weird-row-server/goatcounter.nix
···
+84
hosts/weird-row-server/grafana.nix
+84
hosts/weird-row-server/grafana.nix
···+age.secrets.grafana-oidc-secret = { file = secrets/grafana-oidc-secret.age; owner = "grafana"; };+static_configs = [{ targets = [ "localhost:${toString config.services.prometheus.exporters.node.port}" ]; }];
+84
hosts/weird-row-server/headscale.nix
+84
hosts/weird-row-server/headscale.nix
···+age.secrets.headscale-oidc-secret = { file = secrets/headscale-oidc-secret.age; owner = config.services.headscale.user; };
+42
hosts/weird-row-server/hypixel-bank-tracker.nix
+42
hosts/weird-row-server/hypixel-bank-tracker.nix
···+reverse_proxy http://localhost:${toString config.services.hypixel-bank-tracker.instances.main.port}+reverse_proxy http://localhost:${toString config.services.hypixel-bank-tracker.instances.banana.port}
+38
hosts/weird-row-server/lldap.nix
+38
hosts/weird-row-server/lldap.nix
···
+52
hosts/weird-row-server/miniflux.nix
+52
hosts/weird-row-server/miniflux.nix
···+age.secrets.miniflux-oidc-secret = { file = secrets/miniflux-oidc-secret.age; owner = "miniflux"; };
+43
hosts/weird-row-server/pds.nix
+43
hosts/weird-row-server/pds.nix
···
+54
hosts/weird-row-server/tangled.nix
+54
hosts/weird-row-server/tangled.nix
···
+30
hosts/weird-row-server/thelounge.nix
+30
hosts/weird-row-server/thelounge.nix
···
+45
hosts/weird-row-server/tuwunel.nix
+45
hosts/weird-row-server/tuwunel.nix
···+age.secrets.tuwunel-registration-tokens = { file = secrets/tuwunel-registration-tokens.age; owner = config.services.matrix-tuwunel.user; };
+38
hosts/weird-row-server/vaultwarden.nix
+38
hosts/weird-row-server/vaultwarden.nix
···+ADMIN_TOKEN = "$argon2id$v=19$m=65540,t=3,p=4$YIe9wmrTsmjgZNPxe8m34O/d3XW3Fl/uZPPLQs79dAc$mjDVQSdBJqz2uBJuxtAvCIoHPzOnTDhNPuhER3dhHrY";
+28
hosts/weird-row-server/warrior.nix
+28
hosts/weird-row-server/warrior.nix
···
+77
hosts/weird-row-server/webfinger.nix
+77
hosts/weird-row-server/webfinger.nix
···
+8
-1
lib/flake/default.nix
+8
-1
lib/flake/default.nix
···
+1
-1
lib/flake/managedDiskLayout.nix
+1
-1
lib/flake/managedDiskLayout.nix
···
+1
-1
modules/home-manager/xcompose.nix
+1
-1
modules/home-manager/xcompose.nix
···Load the XCompose file by passing the `XCOMPOSEFILE` environment variable instead of linking to ~/.XCompose.That is nice to avoid cluttering the HOME directory, it's preferable to disable it when experimenting
+1
-1
nixos/fragments/kanata/arsenik.kbd.lisp
+1
-1
nixos/fragments/kanata/arsenik.kbd.lisp
+2
-2
nixos/fragments/logiops.nix
+2
-2
nixos/fragments/logiops.nix
···
+1
-1
nixos/fragments/security.nix
+1
-1
nixos/fragments/security.nix
+1
-1
nixos/profiles/laptop.nix
+1
-1
nixos/profiles/laptop.nix
···
-724
nixos/profiles/server.nix
-724
nixos/profiles/server.nix
···-boot.initrd.availableKernelModules = [ "ahci" "xhci_pci" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod" "ext4" ];-age.secrets.grafana-oidc-secret = { file = ../../secrets/grafana-oidc-secret.age; owner = "grafana"; };-static_configs = [{ targets = [ "localhost:${toString config.services.prometheus.exporters.node.port}" ]; }];-age.secrets.headscale-oidc-secret = { file = ../../secrets/headscale-oidc-secret.age; owner = config.services.headscale.user; };-age.secrets.authelia-jwt-secret = { file = ../../secrets/authelia-jwt-secret.age; owner = config.services.authelia.instances.main.user; };-age.secrets.authelia-issuer-private-key = { file = ../../secrets/authelia-issuer-private-key.age; owner = config.services.authelia.instances.main.user; };-age.secrets.authelia-storage-key = { file = ../../secrets/authelia-storage-key.age; owner = config.services.authelia.instances.main.user; };-age.secrets.authelia-ldap-password = { file = ../../secrets/authelia-ldap-password.age; owner = config.services.authelia.instances.main.user; };-age.secrets.authelia-smtp-password = { file = ../../secrets/authelia-smtp-password.age; owner = config.services.authelia.instances.main.user; };-AUTHELIA_AUTHENTICATION_BACKEND_LDAP_PASSWORD_FILE = config.age.secrets.authelia-ldap-password.path;-users_filter = "(&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=person))";-claims_policies.headscale = { id_token = [ "email" "name" "preferred_username" "picture" "groups" ]; };-client_secret = "$pbkdf2-sha256$310000$XY680D9gkSoWhD0UtYHNFg$ptWB3exOYCga6uq1N.oimuV3ILjK3F8lBWBpsBpibos";-client_secret = "$pbkdf2-sha256$310000$PcUaup9aWKI9ZLeCF6.avw$FpsTxkDaxcoQlBi8aIacegXpjEDiCI6nXcaHyZ2Sxyc";-client_secret = "$pbkdf2-sha256$310000$UkwrqxTZodGMs9.Ca2cXAA$HCWFgQbFHGXZpuz.I3HHdkTZLUevRVGlhKEFaOlPmKs";-client_secret = "$pbkdf2-sha256$310000$uPqbWfCOBXDY6nV1vsx3uA$HOWG2hL.c/bs9Dwaee3b9DxjH7KFO.SaZMbasXV9Vdw";-age.secrets.tuwunel-registration-tokens = { file = ../../secrets/tuwunel-registration-tokens.age; owner = config.services.matrix-tuwunel.user; };-ADMIN_TOKEN = "$argon2id$v=19$m=65540,t=3,p=4$YIe9wmrTsmjgZNPxe8m34O/d3XW3Fl/uZPPLQs79dAc$mjDVQSdBJqz2uBJuxtAvCIoHPzOnTDhNPuhER3dhHrY";-age.secrets.miniflux-oidc-secret = { file = ../../secrets/miniflux-oidc-secret.age; owner = "miniflux"; };
+9
-2
secrets.nix
+9
-2
secrets.nix
···-# You can use agenix directly at repo top-level instead of having to change directory into `secrets/`-mapAttrs' (name: value: { name = ("secrets/" + name); inherit value; }) (import ./secrets/secrets.nix)
secrets/authelia-issuer-private-key.age
hosts/weird-row-server/secrets/authelia-issuer-private-key.age
secrets/authelia-issuer-private-key.age
hosts/weird-row-server/secrets/authelia-issuer-private-key.age
secrets/authelia-jwt-secret.age
hosts/weird-row-server/secrets/authelia-jwt-secret.age
secrets/authelia-jwt-secret.age
hosts/weird-row-server/secrets/authelia-jwt-secret.age
secrets/authelia-ldap-password.age
hosts/weird-row-server/secrets/authelia-ldap-password.age
secrets/authelia-ldap-password.age
hosts/weird-row-server/secrets/authelia-ldap-password.age
secrets/authelia-smtp-password.age
hosts/weird-row-server/secrets/authelia-smtp-password.age
secrets/authelia-smtp-password.age
hosts/weird-row-server/secrets/authelia-smtp-password.age
secrets/authelia-storage-key.age
hosts/weird-row-server/secrets/authelia-storage-key.age
secrets/authelia-storage-key.age
hosts/weird-row-server/secrets/authelia-storage-key.age
+22
secrets/default.nix
+22
secrets/default.nix
···
secrets/grafana-oidc-secret.age
hosts/weird-row-server/secrets/grafana-oidc-secret.age
secrets/grafana-oidc-secret.age
hosts/weird-row-server/secrets/grafana-oidc-secret.age
secrets/headscale-oidc-secret.age
hosts/weird-row-server/secrets/headscale-oidc-secret.age
secrets/headscale-oidc-secret.age
hosts/weird-row-server/secrets/headscale-oidc-secret.age
secrets/hypixel-bank-tracker-banana.age
hosts/weird-row-server/secrets/hypixel-bank-tracker-banana.age
secrets/hypixel-bank-tracker-banana.age
hosts/weird-row-server/secrets/hypixel-bank-tracker-banana.age
secrets/hypixel-bank-tracker-main.age
hosts/weird-row-server/secrets/hypixel-bank-tracker-main.age
secrets/hypixel-bank-tracker-main.age
hosts/weird-row-server/secrets/hypixel-bank-tracker-main.age
secrets/lldap-env.age
hosts/weird-row-server/secrets/lldap-env.age
secrets/lldap-env.age
hosts/weird-row-server/secrets/lldap-env.age
secrets/lldap-user-pass.age
hosts/weird-row-server/secrets/lldap-user-pass.age
secrets/lldap-user-pass.age
hosts/weird-row-server/secrets/lldap-user-pass.age
secrets/miniflux-oidc-secret.age
hosts/weird-row-server/secrets/miniflux-oidc-secret.age
secrets/miniflux-oidc-secret.age
hosts/weird-row-server/secrets/miniflux-oidc-secret.age
secrets/pds-env.age
hosts/weird-row-server/secrets/pds-env.age
secrets/pds-env.age
hosts/weird-row-server/secrets/pds-env.age
+2
-19
secrets/secrets.nix
hosts/weird-row-server/secrets/default.nix
+2
-19
secrets/secrets.nix
hosts/weird-row-server/secrets/default.nix
···# Defines `PDS_JWT_SECRET`, `PDS_ADMIN_PASSWORD`, `PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX`, `PDS_EMAIL_SMTP_URL`, `PDS_EMAIL_FROM_ADDRESS`.···
secrets/tuwunel-registration-tokens.age
hosts/weird-row-server/secrets/tuwunel-registration-tokens.age
secrets/tuwunel-registration-tokens.age
hosts/weird-row-server/secrets/tuwunel-registration-tokens.age
secrets/vaultwarden-env.age
hosts/weird-row-server/secrets/vaultwarden-env.age
secrets/vaultwarden-env.age
hosts/weird-row-server/secrets/vaultwarden-env.age