yep, more dotfiles

Compare changes

Choose any two refs to compare.

+1
.ignore
···
···
+
*.age
+60 -1
flake.lock
···
}
},
"flake-compat_2": {
"flake": false,
"locked": {
"lastModified": 1751685974,
···
"url": "https://github.com/lucide-icons/lucide/releases/download/0.536.0/lucide-icons-0.536.0.zip"
}
},
"nix-darwin": {
"inputs": {
"nixpkgs": [
···
"owner": "nix-darwin",
"ref": "nix-darwin-25.11",
"repo": "nix-darwin",
"type": "github"
}
},
···
"home-manager": "home-manager",
"hypixel-bank-tracker": "hypixel-bank-tracker",
"lanzaboote": "lanzaboote",
"nix-darwin": "nix-darwin",
"nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs",
···
"tangled": {
"inputs": {
"actor-typeahead-src": "actor-typeahead-src",
-
"flake-compat": "flake-compat_2",
"gomod2nix": "gomod2nix",
"htmx-src": "htmx-src",
"htmx-ws-src": "htmx-ws-src",
···
}
},
"flake-compat_2": {
+
"locked": {
+
"lastModified": 1761588595,
+
"narHash": "sha256-XKUZz9zewJNUj46b4AJdiRZJAvSZ0Dqj2BNfXvFlJC4=",
+
"owner": "edolstra",
+
"repo": "flake-compat",
+
"rev": "f387cd2afec9419c8ee37694406ca490c3f34ee5",
+
"type": "github"
+
},
+
"original": {
+
"owner": "edolstra",
+
"repo": "flake-compat",
+
"type": "github"
+
}
+
},
+
"flake-compat_3": {
"flake": false,
"locked": {
"lastModified": 1751685974,
···
"url": "https://github.com/lucide-icons/lucide/releases/download/0.536.0/lucide-icons-0.536.0.zip"
}
},
+
"nix-alien": {
+
"inputs": {
+
"flake-compat": "flake-compat_2",
+
"nix-index-database": "nix-index-database",
+
"nixpkgs": [
+
"nixpkgs"
+
]
+
},
+
"locked": {
+
"lastModified": 1764061716,
+
"narHash": "sha256-xKnIoMPv2kIsWhjRhJayqMWU2xkjeq2pyPmR1dLFPHs=",
+
"owner": "thiagokokada",
+
"repo": "nix-alien",
+
"rev": "9bc9c1ab671eb1b610f549e15bc0b750ab987409",
+
"type": "github"
+
},
+
"original": {
+
"owner": "thiagokokada",
+
"repo": "nix-alien",
+
"type": "github"
+
}
+
},
"nix-darwin": {
"inputs": {
"nixpkgs": [
···
"owner": "nix-darwin",
"ref": "nix-darwin-25.11",
"repo": "nix-darwin",
+
"type": "github"
+
}
+
},
+
"nix-index-database": {
+
"inputs": {
+
"nixpkgs": [
+
"nix-alien",
+
"nixpkgs"
+
]
+
},
+
"locked": {
+
"lastModified": 1762660502,
+
"narHash": "sha256-C9F1C31ys0V7mnp4EcDy7L1cLZw/sCTEXqqTtGnvu08=",
+
"owner": "nix-community",
+
"repo": "nix-index-database",
+
"rev": "15c5451c63f4c612874a43846bfe3fa828b03eee",
+
"type": "github"
+
},
+
"original": {
+
"owner": "nix-community",
+
"repo": "nix-index-database",
"type": "github"
}
},
···
"home-manager": "home-manager",
"hypixel-bank-tracker": "hypixel-bank-tracker",
"lanzaboote": "lanzaboote",
+
"nix-alien": "nix-alien",
"nix-darwin": "nix-darwin",
"nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs",
···
"tangled": {
"inputs": {
"actor-typeahead-src": "actor-typeahead-src",
+
"flake-compat": "flake-compat_3",
"gomod2nix": "gomod2nix",
"htmx-src": "htmx-src",
"htmx-ws-src": "htmx-ws-src",
+3
flake.nix
···
hypixel-bank-tracker.url = "github:pixilie/hypixel-bank-tracker";
hypixel-bank-tracker.inputs.nixpkgs.follows = "nixpkgs";
tangled.url = "git+https://tangled.org/tangled.org/core";
tangled.inputs.nixpkgs.follows = "unixpkgs";
···
hypixel-bank-tracker.url = "github:pixilie/hypixel-bank-tracker";
hypixel-bank-tracker.inputs.nixpkgs.follows = "nixpkgs";
+
nix-alien.url = "github:thiagokokada/nix-alien";
+
nix-alien.inputs.nixpkgs.follows = "nixpkgs";
+
tangled.url = "git+https://tangled.org/tangled.org/core";
tangled.inputs.nixpkgs.follows = "unixpkgs";
+1
home-manager/fragments/jujutsu.nix
···
templates = {
log = "custom_log_compact";
};
ui = {
···
templates = {
log = "custom_log_compact";
+
git_push_bookmark = ''"push-" ++ change_id.short()'';
};
ui = {
+1 -1
hosts/weird-row-server/authelia.nix
···
authelia-metrics-port = 9004;
headscale-hostname = "headscale.wiro.world";
-
grafana-hostname = "console.wiro.world";
miniflux-hostname = "news.wiro.world";
in
{
···
authelia-metrics-port = 9004;
headscale-hostname = "headscale.wiro.world";
+
grafana-hostname = "console.net.wiro.world";
miniflux-hostname = "news.wiro.world";
in
{
+8 -2
hosts/weird-row-server/default.nix
···
jails = { };
};
services.caddy = {
enable = true;
package = pkgs.caddy.withPlugins {
-
doInstallCheck = false;
plugins = [
"github.com/tailscale/caddy-tailscale@v0.0.0-20251016213337-01d084e119cb"
-
"github.com/caddy-dns/hetzner@v2.0.0-preview-1"
];
hash = "sha256-muKwDYs5Jp4ib/psZxpp1Kyfsqz6wPz/lpHFGtx67uY=";
};
globalConfig = ''
tailscale {
ephemeral
}
'';
···
jails = { };
};
+
age.secrets.caddy-env.file = secrets/caddy-env.age;
services.caddy = {
enable = true;
package = pkgs.caddy.withPlugins {
plugins = [
+
"github.com/caddy-dns/hetzner/v2@v2.0.0-preview-1"
"github.com/tailscale/caddy-tailscale@v0.0.0-20251016213337-01d084e119cb"
];
hash = "sha256-muKwDYs5Jp4ib/psZxpp1Kyfsqz6wPz/lpHFGtx67uY=";
};
+
environmentFile = config.age.secrets.caddy-env.path;
+
globalConfig = ''
tailscale {
+
# this caddy instance already proxies headscale but needs to access headscale to start
+
# control_url https://headscale.wiro.world
+
control_url http://localhost:3006
+
ephemeral
}
'';
+1 -1
hosts/weird-row-server/goatcounter.nix
···
services.caddy = {
virtualHosts.${goatcounter-hostname}.extraConfig = ''
-
reverse_proxy http://localhost:${toString goatcounter-port}
'';
};
};
···
services.caddy = {
virtualHosts.${goatcounter-hostname}.extraConfig = ''
+
reverse_proxy http://localhost:${toString config.services.goatcounter.port}
'';
};
};
+3 -2
hosts/weird-row-server/grafana.nix
···
let
grafana-port = 3002;
-
grafana-hostname = "console.wiro.world";
prometheus-port = 9001;
prometheus-node-exporter-port = 9002;
···
globalConfig = ''
metrics { per_host }
'';
-
virtualHosts.${grafana-hostname}.extraConfig = ''
reverse_proxy http://localhost:${toString grafana-port}
'';
};
···
let
grafana-port = 3002;
+
grafana-hostname = "console.net.wiro.world";
prometheus-port = 9001;
prometheus-node-exporter-port = 9002;
···
globalConfig = ''
metrics { per_host }
'';
+
virtualHosts."http://${grafana-hostname}".extraConfig = ''
+
bind tailscale/console
reverse_proxy http://localhost:${toString grafana-port}
'';
};
+4 -3
hosts/weird-row-server/lldap.nix
···
let
lldap-port = 3007;
-
lldap-hostname = "ldap.wiro.world";
in
{
config = {
···
};
services.caddy = {
-
virtualHosts.${lldap-hostname}.extraConfig = ''
-
reverse_proxy http://localhost:${toString lldap-port}
'';
};
};
···
let
lldap-port = 3007;
+
lldap-hostname = "ldap.net.wiro.world";
in
{
config = {
···
};
services.caddy = {
+
virtualHosts."http://${lldap-hostname}".extraConfig = ''
+
bind tailscale/ldap
+
reverse_proxy http://localhost:${toString config.services.lldap.settings.http_port}
'';
};
};
+2 -2
hosts/weird-row-server/pds.nix
···
virtualHosts.${pds-hostname} = {
serverAliases = [ "*.${pds-hostname}" ];
extraConfig = ''
-
tls { on_demand }
-
reverse_proxy http://localhost:${toString pds-port}
'';
};
};
···
virtualHosts.${pds-hostname} = {
serverAliases = [ "*.${pds-hostname}" ];
extraConfig = ''
+
tls { on_demand }
+
reverse_proxy http://localhost:${toString config.services.bluesky-pds.settings.PDS_HOSTNAME}
'';
};
};
hosts/weird-row-server/secrets/caddy-env.age

This is a binary file and will not be displayed.

+1
hosts/weird-row-server/secrets/default.nix
···
# Defines `HYPIXEL_API_KEY`, `PROFILE_UUID`
"hypixel-bank-tracker-main.age".publicKeys = deploy;
"hypixel-bank-tracker-banana.age".publicKeys = deploy;
}
···
# Defines `HYPIXEL_API_KEY`, `PROFILE_UUID`
"hypixel-bank-tracker-main.age".publicKeys = deploy;
"hypixel-bank-tracker-banana.age".publicKeys = deploy;
+
"caddy-env.age".publicKeys = deploy;
}
+4 -3
hosts/weird-row-server/thelounge.nix
···
let
thelounge-port = 3005;
-
thelounge-hostname = "lounge.wiro.world";
in
{
config = {
···
};
services.caddy = {
-
virtualHosts.${thelounge-hostname}.extraConfig = ''
-
reverse_proxy http://localhost:${toString thelounge-port}
'';
};
};
···
let
thelounge-port = 3005;
+
thelounge-hostname = "irc-lounge.net.wiro.world";
in
{
config = {
···
};
services.caddy = {
+
virtualHosts."http://${thelounge-hostname}".extraConfig = ''
+
bind tailscale/irc-lounge
+
reverse_proxy http://localhost:${toString config.services.thelounge.port}
'';
};
};
+1 -1
hosts/weird-row-server/vaultwarden.nix
···
services.caddy = {
virtualHosts.${vaultwarden-hostname}.extraConfig = ''
-
reverse_proxy http://localhost:${toString vaultwarden-port}
'';
};
};
···
services.caddy = {
virtualHosts.${vaultwarden-hostname}.extraConfig = ''
+
reverse_proxy http://localhost:${toString config.services.vaultwarden.config.ROCKET_PORT}
'';
};
};
+3 -7
hosts/weird-row-server/warrior.nix
···
let
warrior-port = 3015;
-
warrior-hostname = "warrior.wiro.world";
-
-
authelia-port = 3008;
in
{
config = {
···
};
services.caddy = {
-
virtualHosts.${warrior-hostname}.extraConfig = ''
-
forward_auth localhost:${toString authelia-port} {
-
uri /api/authz/forward-auth
-
}
reverse_proxy http://localhost:${toString warrior-port}
'';
};
···
let
warrior-port = 3015;
+
warrior-hostname = "warrior.net.wiro.world";
in
{
config = {
···
};
services.caddy = {
+
virtualHosts."http://${warrior-hostname}".extraConfig = ''
+
bind tailscale/warrior
reverse_proxy http://localhost:${toString warrior-port}
'';
};
+2
pkgs/default.nix
···
inherit (self.inputs)
agenix
git-leave
wakatime-ls
;
in
···
# Import packages defined in foreign repositories
inherit (agenix.packages.${system}) agenix;
inherit (git-leave.packages.${system}) git-leave;
inherit (wakatime-ls.packages.${system}) wakatime-ls;
}
···
inherit (self.inputs)
agenix
git-leave
+
nix-alien
wakatime-ls
;
in
···
# Import packages defined in foreign repositories
inherit (agenix.packages.${system}) agenix;
inherit (git-leave.packages.${system}) git-leave;
+
inherit (nix-alien.packages.${system}) nix-alien;
inherit (wakatime-ls.packages.${system}) wakatime-ls;
}