+1
-1
dandelion/config.nix
+1
-1
dandelion/config.nix
+1
-1
dandelion/hardware.nix
+1
-1
dandelion/hardware.nix
···
+2
-4
dandelion/services/caddy.nix
+2
-4
dandelion/services/caddy.nix
······+cpCertsCommand = "${cpCerts}/bin/cpCerts {event.data.identifier} {event.data.certificate_path} {event.data.private_key_path}";
+3
-1
flake.nix
+3
-1
flake.nix
···# TODO: replace this with treefmt or something since the functionality to scan for all nix files is being
+1
-1
lily/config.nix
+1
-1
lily/config.nix
+1
-1
lily/services/fail2ban.nix
+1
-1
lily/services/fail2ban.nix
+2
-2
lutea/hardware.nix
+2
-2
lutea/hardware.nix
···
+1
-1
modules/basic.nix
+1
-1
modules/basic.nix
+3
-5
modules/binary-cache.nix
+3
-5
modules/binary-cache.nix
···-(lib.mkIf (config.networking.hostName != "lily") "ssh-ng://nix-ssh@${config.nInfo.lily.netbird-ip}")+(lib.mkIf (config.networking.hostName != "lily") "ssh-ng://nix-ssh@${config.garden.info.network.lily.netbird-ip}")+(lib.mkIf (config.networking.hostName != "lutea") "ssh-ng://nix-ssh@${config.garden.info.network.lutea.netbird-ip}")
-3
modules/browsers.nix
-3
modules/browsers.nix
+3
-3
modules/fail2ban.nix
+3
-3
modules/fail2ban.nix
···+(lib.mkIf (config.networking.hostName != "dandelion") config.garden.info.network.dandelion.netbird-ip)
+1
-1
modules/games.nix
+1
-1
modules/games.nix
+1
-1
modules/gui.nix
+1
-1
modules/gui.nix
-2
modules/im.nix
-2
modules/im.nix
+1
-1
modules/machineInfo.nix
+1
-1
modules/machineInfo.nix
+1
-1
modules/netbird.nix
+1
-1
modules/netbird.nix
+2
-2
modules/networkInfo.nix
+2
-2
modules/networkInfo.nix
······
+4
-4
modules/remoteBuildMachines.nix
+4
-4
modules/remoteBuildMachines.nix
···publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINaReNM+eSIzbZvqahaAlanf0z89rJQIYWx/rlaS4f1Y";publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICNMTxa2zRmHIXt3ARlCplboWRdCsAmDlN8gDLik4vNs";···
+1
-1
modules/remoteBuilder.nix
+1
-1
modules/remoteBuilder.nix
+1
-2
modules/services/dendrite.nix
+1
-2
modules/services/dendrite.nix
···-networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts =+networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts = [ 8008 ];
+4
-5
modules/services/nextcloud.nix
+4
-5
modules/services/nextcloud.nix
···-networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts =+networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts = [ 80 ];···+nextcloudUrl = "http://${config.garden.info.network.${config.networking.hostName}.netbird-ip}";···
+2
-2
modules/services/openssh.nix
+2
-2
modules/services/openssh.nix
···+(lib.mkIf (config.networking.hostName == "lily") "mou@${config.garden.info.network.lutea.ipv4-local}")
+1
-2
modules/services/pds.nix
+1
-2
modules/services/pds.nix
···-networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts =+networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts = [ 3000 ];
+2
-3
modules/services/tangled.nix
+2
-3
modules/services/tangled.nix
···+"${config.services.tangled-knotserver.gitUser}@${config.garden.info.network.dandelion.netbird-ip}"-networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts =+networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts = [ 5555 ];
+2
-2
modules/sss-mount.nix
+2
-2
modules/sss-mount.nix
······
+2
-3
modules/unfree.nix
+2
-3
modules/unfree.nix
···+config.nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) config.garden.unfree;