+1
.ignore
···
···
+1
-1
README.md
···- `hardware/<hostname>.nix`: Device-specific settings like settings generated by `nixos-generate-config`
···- `hardware/<hostname>.nix`: Device-specific settings like settings generated by `nixos-generate-config`
+1
-1
apps/flash-installer.nix
+2
-1
configurations.nix
···
+95
-64
flake.lock
······························"url": "https://github.com/lucide-icons/lucide/releases/download/0.536.0/lucide-icons-0.536.0.zip"························
······························"url": "https://github.com/lucide-icons/lucide/releases/download/0.536.0/lucide-icons-0.536.0.zip"························
+7
-6
flake.nix
·········
·········
+7
-6
home-manager/fragments/git.nix
···-{ assertion = config.local.fragment.agenix.enable; message = "`git` fragment depends on `agenix` fragment"; }······
·········
+1
home-manager/fragments/jujutsu.nix
+3
-2
home-manager/fragments/shell.nix
······
······
+5
-4
home-manager/fragments/stylix.nix
······
······
+6
home-manager/fragments/sway.nix
+1
home-manager/fragments/tools.nix
+1
-1
home-manager/fragments/waybar.nix
+1
-1
home-manager/profiles/desktop.nix
+163
hosts/weird-row-server/authelia.nix
···
···+age.secrets.authelia-jwt-secret = { file = secrets/authelia-jwt-secret.age; owner = config.services.authelia.instances.main.user; };+age.secrets.authelia-issuer-private-key = { file = secrets/authelia-issuer-private-key.age; owner = config.services.authelia.instances.main.user; };+age.secrets.authelia-storage-key = { file = secrets/authelia-storage-key.age; owner = config.services.authelia.instances.main.user; };+age.secrets.authelia-ldap-password = { file = secrets/authelia-ldap-password.age; owner = config.services.authelia.instances.main.user; };+age.secrets.authelia-smtp-password = { file = secrets/authelia-smtp-password.age; owner = config.services.authelia.instances.main.user; };+AUTHELIA_AUTHENTICATION_BACKEND_LDAP_PASSWORD_FILE = config.age.secrets.authelia-ldap-password.path;+users_filter = "(&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=person))";+claims_policies.headscale = { id_token = [ "email" "name" "preferred_username" "picture" "groups" ]; };+client_secret = "$pbkdf2-sha256$310000$XY680D9gkSoWhD0UtYHNFg$ptWB3exOYCga6uq1N.oimuV3ILjK3F8lBWBpsBpibos";+client_secret = "$pbkdf2-sha256$310000$PcUaup9aWKI9ZLeCF6.avw$FpsTxkDaxcoQlBi8aIacegXpjEDiCI6nXcaHyZ2Sxyc";+client_secret = "$pbkdf2-sha256$310000$UkwrqxTZodGMs9.Ca2cXAA$HCWFgQbFHGXZpuz.I3HHdkTZLUevRVGlhKEFaOlPmKs";+client_secret = "$pbkdf2-sha256$310000$uPqbWfCOBXDY6nV1vsx3uA$HOWG2hL.c/bs9Dwaee3b9DxjH7KFO.SaZMbasXV9Vdw";
+143
hosts/weird-row-server/default.nix
···
···+boot.initrd.availableKernelModules = [ "ahci" "xhci_pci" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod" "ext4" ];
+25
hosts/weird-row-server/goatcounter.nix
···
···
+85
hosts/weird-row-server/grafana.nix
···
···+age.secrets.grafana-oidc-secret = { file = secrets/grafana-oidc-secret.age; owner = "grafana"; };+static_configs = [{ targets = [ "localhost:${toString config.services.prometheus.exporters.node.port}" ]; }];
+84
hosts/weird-row-server/headscale.nix
···
···+age.secrets.headscale-oidc-secret = { file = secrets/headscale-oidc-secret.age; owner = config.services.headscale.user; };
+42
hosts/weird-row-server/hypixel-bank-tracker.nix
···
···+reverse_proxy http://localhost:${toString config.services.hypixel-bank-tracker.instances.main.port}+reverse_proxy http://localhost:${toString config.services.hypixel-bank-tracker.instances.banana.port}
+39
hosts/weird-row-server/lldap.nix
···
···
+52
hosts/weird-row-server/miniflux.nix
···
···+age.secrets.miniflux-oidc-secret = { file = secrets/miniflux-oidc-secret.age; owner = "miniflux"; };
+43
hosts/weird-row-server/pds.nix
···
···
hosts/weird-row-server/secrets/authelia-issuer-private-key.age
This is a binary file and will not be displayed.
hosts/weird-row-server/secrets/authelia-jwt-secret.age
This is a binary file and will not be displayed.
hosts/weird-row-server/secrets/authelia-ldap-password.age
This is a binary file and will not be displayed.
+9
hosts/weird-row-server/secrets/authelia-smtp-password.age
···
···
+11
hosts/weird-row-server/secrets/authelia-storage-key.age
···
···
hosts/weird-row-server/secrets/caddy-env.age
This is a binary file and will not be displayed.
+27
hosts/weird-row-server/secrets/default.nix
···
···+# Defines `PDS_JWT_SECRET`, `PDS_ADMIN_PASSWORD`, `PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX`, `PDS_EMAIL_SMTP_URL`, `PDS_EMAIL_FROM_ADDRESS`.
+9
hosts/weird-row-server/secrets/grafana-oidc-secret.age
···
···
hosts/weird-row-server/secrets/headscale-oidc-secret.age
This is a binary file and will not be displayed.
hosts/weird-row-server/secrets/hypixel-bank-tracker-banana.age
This is a binary file and will not be displayed.
+12
hosts/weird-row-server/secrets/hypixel-bank-tracker-main.age
···
···+�LJu���k��_��%��|�J]��KN��?]��tR�<�]�|���ߟ��¾FzU��������:�Y��TX����p,9v6q�7�~�y�]X���͇ǷR5՚>[������#�#�-
hosts/weird-row-server/secrets/lldap-env.age
This is a binary file and will not be displayed.
+11
hosts/weird-row-server/secrets/lldap-user-pass.age
···
···
+9
hosts/weird-row-server/secrets/miniflux-oidc-secret.age
···
···
hosts/weird-row-server/secrets/pds-env.age
This is a binary file and will not be displayed.
+9
hosts/weird-row-server/secrets/tuwunel-registration-tokens.age
···
···
hosts/weird-row-server/secrets/vaultwarden-env.age
This is a binary file and will not be displayed.
+54
hosts/weird-row-server/tangled.nix
···
···
+31
hosts/weird-row-server/thelounge.nix
···
···
+45
hosts/weird-row-server/tuwunel.nix
···
···+age.secrets.tuwunel-registration-tokens = { file = secrets/tuwunel-registration-tokens.age; owner = config.services.matrix-tuwunel.user; };
+38
hosts/weird-row-server/vaultwarden.nix
···
···+ADMIN_TOKEN = "$argon2id$v=19$m=65540,t=3,p=4$YIe9wmrTsmjgZNPxe8m34O/d3XW3Fl/uZPPLQs79dAc$mjDVQSdBJqz2uBJuxtAvCIoHPzOnTDhNPuhER3dhHrY";
+24
hosts/weird-row-server/warrior.nix
···
···
+77
hosts/weird-row-server/webfinger.nix
···
···
+8
-1
lib/flake/default.nix
···
+1
-1
lib/flake/managedDiskLayout.nix
+1
-1
modules/home-manager/xcompose.nix
···Load the XCompose file by passing the `XCOMPOSEFILE` environment variable instead of linking to ~/.XCompose.That is nice to avoid cluttering the HOME directory, it's preferable to disable it when experimenting
···Load the XCompose file by passing the `XCOMPOSEFILE` environment variable instead of linking to ~/.XCompose.That is nice to avoid cluttering the HOME directory, it's preferable to disable it when experimenting
+1
-1
nixos/fragments/kanata/arsenik.kbd.lisp
+2
-2
nixos/fragments/logiops.nix
···
···
+1
-1
nixos/fragments/security.nix
+1
-1
nixos/profiles/laptop.nix
···
···
-724
nixos/profiles/server.nix
···-boot.initrd.availableKernelModules = [ "ahci" "xhci_pci" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod" "ext4" ];-age.secrets.grafana-oidc-secret = { file = ../../secrets/grafana-oidc-secret.age; owner = "grafana"; };-static_configs = [{ targets = [ "localhost:${toString config.services.prometheus.exporters.node.port}" ]; }];-age.secrets.headscale-oidc-secret = { file = ../../secrets/headscale-oidc-secret.age; owner = config.services.headscale.user; };-age.secrets.authelia-jwt-secret = { file = ../../secrets/authelia-jwt-secret.age; owner = config.services.authelia.instances.main.user; };-age.secrets.authelia-issuer-private-key = { file = ../../secrets/authelia-issuer-private-key.age; owner = config.services.authelia.instances.main.user; };-age.secrets.authelia-storage-key = { file = ../../secrets/authelia-storage-key.age; owner = config.services.authelia.instances.main.user; };-age.secrets.authelia-ldap-password = { file = ../../secrets/authelia-ldap-password.age; owner = config.services.authelia.instances.main.user; };-age.secrets.authelia-smtp-password = { file = ../../secrets/authelia-smtp-password.age; owner = config.services.authelia.instances.main.user; };-AUTHELIA_AUTHENTICATION_BACKEND_LDAP_PASSWORD_FILE = config.age.secrets.authelia-ldap-password.path;-users_filter = "(&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=person))";-claims_policies.headscale = { id_token = [ "email" "name" "preferred_username" "picture" "groups" ]; };-client_secret = "$pbkdf2-sha256$310000$XY680D9gkSoWhD0UtYHNFg$ptWB3exOYCga6uq1N.oimuV3ILjK3F8lBWBpsBpibos";-client_secret = "$pbkdf2-sha256$310000$PcUaup9aWKI9ZLeCF6.avw$FpsTxkDaxcoQlBi8aIacegXpjEDiCI6nXcaHyZ2Sxyc";-client_secret = "$pbkdf2-sha256$310000$UkwrqxTZodGMs9.Ca2cXAA$HCWFgQbFHGXZpuz.I3HHdkTZLUevRVGlhKEFaOlPmKs";-client_secret = "$pbkdf2-sha256$310000$uPqbWfCOBXDY6nV1vsx3uA$HOWG2hL.c/bs9Dwaee3b9DxjH7KFO.SaZMbasXV9Vdw";-age.secrets.tuwunel-registration-tokens = { file = ../../secrets/tuwunel-registration-tokens.age; owner = config.services.matrix-tuwunel.user; };-ADMIN_TOKEN = "$argon2id$v=19$m=65540,t=3,p=4$YIe9wmrTsmjgZNPxe8m34O/d3XW3Fl/uZPPLQs79dAc$mjDVQSdBJqz2uBJuxtAvCIoHPzOnTDhNPuhER3dhHrY";-age.secrets.miniflux-oidc-secret = { file = ../../secrets/miniflux-oidc-secret.age; owner = "miniflux"; };
···
+2
pkgs/default.nix
······
secrets/authelia-issuer-private-key.age
This is a binary file and will not be displayed.
secrets/authelia-jwt-secret.age
This is a binary file and will not be displayed.
secrets/authelia-ldap-password.age
This is a binary file and will not be displayed.
-9
secrets/authelia-smtp-password.age
···
···
-11
secrets/authelia-storage-key.age
···
···
+22
secrets/default.nix
···
···
-9
secrets/grafana-oidc-secret.age
···
···
secrets/headscale-oidc-secret.age
This is a binary file and will not be displayed.
secrets/hypixel-bank-tracker-banana.age
This is a binary file and will not be displayed.
-12
secrets/hypixel-bank-tracker-main.age
···-�LJu���k��_��%��|�J]��KN��?]��tR�<�]�|���ߟ��¾FzU��������:�Y��TX����p,9v6q�7�~�y�]X���͇ǷR5՚>[������#�#�-
···
secrets/lldap-env.age
This is a binary file and will not be displayed.
-11
secrets/lldap-user-pass.age
···
···
-9
secrets/miniflux-oidc-secret.age
···
···
secrets/pds-env.age
This is a binary file and will not be displayed.
-43
secrets/secrets.nix
···-# Defines `PDS_JWT_SECRET`, `PDS_ADMIN_PASSWORD`, `PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX`, `PDS_EMAIL_SMTP_URL`, `PDS_EMAIL_FROM_ADDRESS`.
···
-9
secrets/tuwunel-registration-tokens.age
···
···
secrets/vaultwarden-env.age
This is a binary file and will not be displayed.
+9
-2
secrets.nix
···-# You can use agenix directly at repo top-level instead of having to change directory into `secrets/`-mapAttrs' (name: value: { name = ("secrets/" + name); inherit value; }) (import ./secrets/secrets.nix)
···