+1
-1
dandelion/config.nix
+1
-1
dandelion/config.nix
+1
-1
dandelion/hardware.nix
+1
-1
dandelion/hardware.nix
+2
-4
dandelion/services/caddy.nix
+2
-4
dandelion/services/caddy.nix
······
······+cpCertsCommand = "${cpCerts}/bin/cpCerts {event.data.identifier} {event.data.certificate_path} {event.data.private_key_path}";
+3
-1
flake.nix
+3
-1
flake.nix
···# TODO: replace this with treefmt or something since the functionality to scan for all nix files is being
+1
-1
lily/config.nix
+1
-1
lily/config.nix
+1
-1
lily/services/fail2ban.nix
+1
-1
lily/services/fail2ban.nix
+2
-2
lutea/hardware.nix
+2
-2
lutea/hardware.nix
+1
-1
modules/basic.nix
+1
-1
modules/basic.nix
+3
-5
modules/binary-cache.nix
+3
-5
modules/binary-cache.nix
···-(lib.mkIf (config.networking.hostName != "lily") "ssh-ng://nix-ssh@${config.nInfo.lily.netbird-ip}")
···+(lib.mkIf (config.networking.hostName != "lily") "ssh-ng://nix-ssh@${config.garden.info.network.lily.netbird-ip}")+(lib.mkIf (config.networking.hostName != "lutea") "ssh-ng://nix-ssh@${config.garden.info.network.lutea.netbird-ip}")
-3
modules/browsers.nix
-3
modules/browsers.nix
+3
-3
modules/fail2ban.nix
+3
-3
modules/fail2ban.nix
···
···+(lib.mkIf (config.networking.hostName != "dandelion") config.garden.info.network.dandelion.netbird-ip)
+1
-1
modules/games.nix
+1
-1
modules/games.nix
+1
-1
modules/gui.nix
+1
-1
modules/gui.nix
-2
modules/im.nix
-2
modules/im.nix
+1
-1
modules/machineInfo.nix
+1
-1
modules/machineInfo.nix
+1
-1
modules/netbird.nix
+1
-1
modules/netbird.nix
+2
-2
modules/networkInfo.nix
+2
-2
modules/networkInfo.nix
+4
-4
modules/remoteBuildMachines.nix
+4
-4
modules/remoteBuildMachines.nix
······
······
+1
-1
modules/remoteBuilder.nix
+1
-1
modules/remoteBuilder.nix
+1
-2
modules/services/dendrite.nix
+1
-2
modules/services/dendrite.nix
+4
-5
modules/services/nextcloud.nix
+4
-5
modules/services/nextcloud.nix
···-networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts =······
···+networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts = [ 80 ];···+nextcloudUrl = "http://${config.garden.info.network.${config.networking.hostName}.netbird-ip}";···
+2
-2
modules/services/openssh.nix
+2
-2
modules/services/openssh.nix
+1
-2
modules/services/pds.nix
+1
-2
modules/services/pds.nix
+2
-3
modules/services/tangled.nix
+2
-3
modules/services/tangled.nix
···-networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts =
···+"${config.services.tangled-knotserver.gitUser}@${config.garden.info.network.dandelion.netbird-ip}"+networking.firewall.interfaces.${config.services.netbird.clients.homelab.interface}.allowedTCPPorts = [ 5555 ];
+2
-2
modules/sss-mount.nix
+2
-2
modules/sss-mount.nix
······
······
+2
-3
modules/unfree.nix
+2
-3
modules/unfree.nix
···
···+config.nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) config.garden.unfree;