Compare commits
32 Commits
b7f82f2d44
...
rpi-hotspo
| Author | SHA1 | Date | |
|---|---|---|---|
| f30595fa2d | |||
| 5b666a0565 | |||
| 6bc11767ca | |||
| bdd2d9bef9 | |||
| 5acc8b3fca | |||
| 1e25d8bb71 | |||
| ac1cf1c531 | |||
| 02357198bc | |||
| 89b49aafc0 | |||
| e56271b2c3 | |||
| f9ef5e4b89 | |||
| e516bd87b5 | |||
| 7c9c657bd0 | |||
| dff7d65456 | |||
| d269d2e5a0 | |||
| 2527b614e9 | |||
| 528a53a606 | |||
| 66bfc62566 | |||
| 91874b9d53 | |||
| 50fc0a53d2 | |||
| 0b3322afda | |||
| b32f6fa315 | |||
| fe41ffc788 | |||
| eac443f280 | |||
| d557820d6c | |||
| 4d658e10d3 | |||
| 9ac9613d67 | |||
| e657ebb134 | |||
| d1b07ec06b | |||
| 89621945f8 | |||
| e69fd5bf8f | |||
| c856b762e7 |
5
Makefile
5
Makefile
@@ -20,3 +20,8 @@ rekey-secrets:
|
|||||||
.PHONY: clean-old-nixos-profiles
|
.PHONY: clean-old-nixos-profiles
|
||||||
clean-old-nixos-profiles:
|
clean-old-nixos-profiles:
|
||||||
doas nix-collect-garbage -d
|
doas nix-collect-garbage -d
|
||||||
|
|
||||||
|
# Garbage Collect
|
||||||
|
.PHONY: gc
|
||||||
|
gc:
|
||||||
|
nix store gc
|
||||||
@@ -1,17 +1,29 @@
|
|||||||
{ config, lib, ... }:
|
{ config, lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
|
||||||
|
in
|
||||||
{
|
{
|
||||||
nix = {
|
options.enableExtraSubstituters = lib.mkEnableOption "Enable extra substituters";
|
||||||
settings = {
|
|
||||||
substituters = [
|
config = lib.mkMerge [
|
||||||
"https://cache.nixos.org/"
|
{
|
||||||
"https://nix-community.cachix.org"
|
enableExtraSubstituters = lib.mkDefault true;
|
||||||
"http://s0.koi-bebop.ts.net:5000"
|
}
|
||||||
];
|
(lib.mkIf config.enableExtraSubstituters {
|
||||||
trusted-public-keys = [
|
nix = {
|
||||||
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
|
settings = {
|
||||||
"s0.koi-bebop.ts.net:OjbzD86YjyJZpCp9RWaQKANaflcpKhtzBMNP8I2aPUU="
|
substituters = [
|
||||||
];
|
"https://cache.nixos.org/"
|
||||||
};
|
"https://nix-community.cachix.org"
|
||||||
};
|
"http://s0.koi-bebop.ts.net:5000"
|
||||||
|
];
|
||||||
|
trusted-public-keys = [
|
||||||
|
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
|
||||||
|
"s0.koi-bebop.ts.net:OjbzD86YjyJZpCp9RWaQKANaflcpKhtzBMNP8I2aPUU="
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
})
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
{ config, pkgs, ... }:
|
{ config, pkgs, lib, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
@@ -20,12 +20,12 @@
|
|||||||
|
|
||||||
system.stateVersion = "23.11";
|
system.stateVersion = "23.11";
|
||||||
|
|
||||||
networking.useDHCP = false;
|
networking.useDHCP = lib.mkDefault true;
|
||||||
|
|
||||||
networking.firewall.enable = true;
|
networking.firewall.enable = true;
|
||||||
networking.firewall.allowPing = true;
|
networking.firewall.allowPing = true;
|
||||||
|
|
||||||
time.timeZone = "America/Denver";
|
time.timeZone = "America/Los_Angeles";
|
||||||
i18n = {
|
i18n = {
|
||||||
defaultLocale = "en_US.UTF-8";
|
defaultLocale = "en_US.UTF-8";
|
||||||
extraLocaleSettings = {
|
extraLocaleSettings = {
|
||||||
|
|||||||
@@ -19,6 +19,15 @@ in
|
|||||||
jack.enable = true;
|
jack.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
services.pipewire.extraConfig.pipewire."92-fix-wine-audio" = {
|
||||||
|
context.properties = {
|
||||||
|
default.clock.rate = 48000;
|
||||||
|
default.clock.quantum = 2048;
|
||||||
|
default.clock.min-quantum = 512;
|
||||||
|
default.clock.max-quantum = 2048;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
users.users.googlebot.extraGroups = [ "audio" ];
|
users.users.googlebot.extraGroups = [ "audio" ];
|
||||||
|
|
||||||
# bt headset support
|
# bt headset support
|
||||||
|
|||||||
@@ -41,7 +41,7 @@ in
|
|||||||
"SpellcheckLanguage" = [ "en-US" ];
|
"SpellcheckLanguage" = [ "en-US" ];
|
||||||
};
|
};
|
||||||
defaultSearchProviderSuggestURL = null;
|
defaultSearchProviderSuggestURL = null;
|
||||||
defaultSearchProviderSearchURL = " https://duckduckgo.com/?q={searchTerms}&kp=-1&kl=us-en";
|
defaultSearchProviderSearchURL = "https://duckduckgo.com/?q={searchTerms}&kp=-1&kl=us-en";
|
||||||
};
|
};
|
||||||
|
|
||||||
# hardware accelerated video playback (on intel)
|
# hardware accelerated video playback (on intel)
|
||||||
@@ -52,7 +52,7 @@ in
|
|||||||
# ungoogled = true;
|
# ungoogled = true;
|
||||||
# --enable-native-gpu-memory-buffers # fails on AMD APU
|
# --enable-native-gpu-memory-buffers # fails on AMD APU
|
||||||
# --enable-webrtc-vp9-support
|
# --enable-webrtc-vp9-support
|
||||||
commandLineArgs = "--use-vulkan --use-gl=desktop --enable-zero-copy --enable-hardware-overlays --enable-features=VaapiVideoDecoder,CanvasOopRasterization --ignore-gpu-blocklist --enable-accelerated-mjpeg-decode --enable-accelerated-video --enable-gpu-rasterization";
|
commandLineArgs = "--use-vulkan";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
# todo vulkan in chrome
|
# todo vulkan in chrome
|
||||||
|
|||||||
@@ -9,7 +9,7 @@ in
|
|||||||
# ./xfce.nix
|
# ./xfce.nix
|
||||||
./yubikey.nix
|
./yubikey.nix
|
||||||
./chromium.nix
|
./chromium.nix
|
||||||
# ./firefox.nix
|
./firefox.nix
|
||||||
./audio.nix
|
./audio.nix
|
||||||
# ./torbrowser.nix
|
# ./torbrowser.nix
|
||||||
./pithos.nix
|
./pithos.nix
|
||||||
@@ -89,5 +89,8 @@ in
|
|||||||
# for luks onlock over tor
|
# for luks onlock over tor
|
||||||
services.tor.enable = true;
|
services.tor.enable = true;
|
||||||
services.tor.client.enable = true;
|
services.tor.client.enable = true;
|
||||||
|
|
||||||
|
# Enable wayland support in various chromium based applications
|
||||||
|
environment.sessionVariables.NIXOS_OZONE_WL = "1";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -20,31 +20,6 @@ let
|
|||||||
};
|
};
|
||||||
|
|
||||||
firefox = pkgs.wrapFirefox somewhatPrivateFF {
|
firefox = pkgs.wrapFirefox somewhatPrivateFF {
|
||||||
desktopName = "Sneed Browser";
|
|
||||||
|
|
||||||
nixExtensions = [
|
|
||||||
(pkgs.fetchFirefoxAddon {
|
|
||||||
name = "ublock-origin";
|
|
||||||
url = "https://addons.mozilla.org/firefox/downloads/file/3719054/ublock_origin-1.33.2-an+fx.xpi";
|
|
||||||
sha256 = "XDpe9vW1R1iVBTI4AmNgAg1nk7BVQdIAMuqd0cnK5FE=";
|
|
||||||
})
|
|
||||||
(pkgs.fetchFirefoxAddon {
|
|
||||||
name = "sponsorblock";
|
|
||||||
url = "https://addons.mozilla.org/firefox/downloads/file/3720594/sponsorblock_skip_sponsorships_on_youtube-2.0.12.3-an+fx.xpi";
|
|
||||||
sha256 = "HRtnmZWyXN3MKo4AvSYgNJGkBEsa2RaMamFbkz+YzQg=";
|
|
||||||
})
|
|
||||||
(pkgs.fetchFirefoxAddon {
|
|
||||||
name = "KeePassXC-Browser";
|
|
||||||
url = "https://addons.mozilla.org/firefox/downloads/file/3720664/keepassxc_browser-1.7.6-fx.xpi";
|
|
||||||
sha256 = "3K404/eq3amHhIT0WhzQtC892he5I0kp2SvbzE9dbZg=";
|
|
||||||
})
|
|
||||||
(pkgs.fetchFirefoxAddon {
|
|
||||||
name = "https-everywhere";
|
|
||||||
url = "https://addons.mozilla.org/firefox/downloads/file/3716461/https_everywhere-2021.1.27-an+fx.xpi";
|
|
||||||
sha256 = "2gSXSLunKCwPjAq4Wsj0lOeV551r3G+fcm1oeqjMKh8=";
|
|
||||||
})
|
|
||||||
];
|
|
||||||
|
|
||||||
extraPolicies = {
|
extraPolicies = {
|
||||||
CaptivePortal = false;
|
CaptivePortal = false;
|
||||||
DisableFirefoxStudies = true;
|
DisableFirefoxStudies = true;
|
||||||
@@ -74,12 +49,6 @@ let
|
|||||||
ExtensionRecommendations = false;
|
ExtensionRecommendations = false;
|
||||||
SkipOnboarding = true;
|
SkipOnboarding = true;
|
||||||
};
|
};
|
||||||
WebsiteFilter = {
|
|
||||||
Block = [
|
|
||||||
"http://paradigminteractive.io/"
|
|
||||||
"https://paradigminteractive.io/"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
|
||||||
extraPrefs = ''
|
extraPrefs = ''
|
||||||
|
|||||||
@@ -10,7 +10,6 @@ in
|
|||||||
services.desktopManager.plasma6.enable = true;
|
services.desktopManager.plasma6.enable = true;
|
||||||
|
|
||||||
# kde apps
|
# kde apps
|
||||||
nixpkgs.config.firefox.enablePlasmaBrowserIntegration = true;
|
|
||||||
users.users.googlebot.packages = with pkgs; [
|
users.users.googlebot.packages = with pkgs; [
|
||||||
# akonadi
|
# akonadi
|
||||||
# kmail
|
# kmail
|
||||||
|
|||||||
@@ -11,6 +11,8 @@ let
|
|||||||
golang.go
|
golang.go
|
||||||
jnoortheen.nix-ide
|
jnoortheen.nix-ide
|
||||||
ms-vscode.cpptools
|
ms-vscode.cpptools
|
||||||
|
rust-lang.rust-analyzer
|
||||||
|
vadimcn.vscode-lldb
|
||||||
] ++ pkgs.vscode-utils.extensionsFromVscodeMarketplace [
|
] ++ pkgs.vscode-utils.extensionsFromVscodeMarketplace [
|
||||||
{
|
{
|
||||||
name = "platformio-ide";
|
name = "platformio-ide";
|
||||||
@@ -18,6 +20,12 @@ let
|
|||||||
version = "3.1.1";
|
version = "3.1.1";
|
||||||
sha256 = "g9yTG3DjVUS2w9eHGAai5LoIfEGus+FPhqDnCi4e90Q=";
|
sha256 = "g9yTG3DjVUS2w9eHGAai5LoIfEGus+FPhqDnCi4e90Q=";
|
||||||
}
|
}
|
||||||
|
{
|
||||||
|
name = "wgsl-analyzer";
|
||||||
|
publisher = "wgsl-analyzer";
|
||||||
|
version = "0.8.1";
|
||||||
|
sha256 = "ckclcxdUxhjWlPnDFVleLCWgWxUEENe0V328cjaZv+Y=";
|
||||||
|
}
|
||||||
];
|
];
|
||||||
|
|
||||||
vscodium-with-extensions = pkgs.vscode-with-extensions.override {
|
vscodium-with-extensions = pkgs.vscode-with-extensions.override {
|
||||||
|
|||||||
@@ -37,17 +37,5 @@ in
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.nginx.enable = true;
|
|
||||||
services.nginx.virtualHosts."s0.koi-bebop.ts.net" = {
|
|
||||||
default = true;
|
|
||||||
addSSL = true;
|
|
||||||
serverAliases = [ "s0" ];
|
|
||||||
sslCertificate = "/secret/ssl/s0.koi-bebop.ts.net.crt";
|
|
||||||
sslCertificateKey = "/secret/ssl/s0.koi-bebop.ts.net.key";
|
|
||||||
locations."/" = {
|
|
||||||
proxyPass = "http://localhost:${toString cfg.port}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -22,5 +22,6 @@
|
|||||||
./dashy.nix
|
./dashy.nix
|
||||||
./librechat.nix
|
./librechat.nix
|
||||||
./actualbudget.nix
|
./actualbudget.nix
|
||||||
|
./unifi.nix
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -26,6 +26,7 @@ in
|
|||||||
HOST = "0.0.0.0";
|
HOST = "0.0.0.0";
|
||||||
MONGO_URI = "mongodb://host.containers.internal:27017/LibreChat";
|
MONGO_URI = "mongodb://host.containers.internal:27017/LibreChat";
|
||||||
ENDPOINTS = "openAI,google,bingAI,gptPlugins";
|
ENDPOINTS = "openAI,google,bingAI,gptPlugins";
|
||||||
|
REFRESH_TOKEN_EXPIRY = toString (1000 * 60 * 60 * 24 * 30); # 30 days
|
||||||
};
|
};
|
||||||
environmentFiles = [
|
environmentFiles = [
|
||||||
"/run/agenix/librechat-env-file"
|
"/run/agenix/librechat-env-file"
|
||||||
|
|||||||
@@ -56,6 +56,7 @@ in
|
|||||||
"damon@runyan.org"
|
"damon@runyan.org"
|
||||||
"jonas@runyan.org"
|
"jonas@runyan.org"
|
||||||
"simon@neet.dev"
|
"simon@neet.dev"
|
||||||
|
"ellen@runyan.org"
|
||||||
];
|
];
|
||||||
forwards = {
|
forwards = {
|
||||||
"amazon@runyan.org" = [
|
"amazon@runyan.org" = [
|
||||||
|
|||||||
@@ -8,12 +8,23 @@ in
|
|||||||
config = lib.mkIf cfg.enable {
|
config = lib.mkIf cfg.enable {
|
||||||
services.nextcloud = {
|
services.nextcloud = {
|
||||||
https = true;
|
https = true;
|
||||||
package = pkgs.nextcloud29;
|
package = pkgs.nextcloud30;
|
||||||
hostName = "neet.cloud";
|
hostName = "neet.cloud";
|
||||||
config.dbtype = "sqlite";
|
config.dbtype = "sqlite";
|
||||||
config.adminuser = "jeremy";
|
config.adminuser = "jeremy";
|
||||||
config.adminpassFile = "/run/agenix/nextcloud-pw";
|
config.adminpassFile = "/run/agenix/nextcloud-pw";
|
||||||
autoUpdateApps.enable = true;
|
autoUpdateApps.enable = true;
|
||||||
|
extraApps = with config.services.nextcloud.package.packages.apps; {
|
||||||
|
# Want
|
||||||
|
inherit end_to_end_encryption mail spreed;
|
||||||
|
|
||||||
|
# Might use
|
||||||
|
inherit bookmarks calendar cookbook deck memories onlyoffice qownnotesapi;
|
||||||
|
|
||||||
|
# Try out
|
||||||
|
# inherit maps music news notes phonetrack polls forms;
|
||||||
|
};
|
||||||
|
extraAppsEnable = true;
|
||||||
};
|
};
|
||||||
age.secrets.nextcloud-pw = {
|
age.secrets.nextcloud-pw = {
|
||||||
file = ../../secrets/nextcloud-pw.age;
|
file = ../../secrets/nextcloud-pw.age;
|
||||||
|
|||||||
@@ -4,6 +4,10 @@ let
|
|||||||
cfg = config.services.nginx;
|
cfg = config.services.nginx;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
options.services.nginx = {
|
||||||
|
openFirewall = lib.mkEnableOption "Open firewall ports 80 and 443";
|
||||||
|
};
|
||||||
|
|
||||||
config = lib.mkIf cfg.enable {
|
config = lib.mkIf cfg.enable {
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
recommendedGzipSettings = true;
|
recommendedGzipSettings = true;
|
||||||
@@ -12,6 +16,8 @@ in
|
|||||||
recommendedTlsSettings = true;
|
recommendedTlsSettings = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 80 443 ];
|
services.nginx.openFirewall = lib.mkDefault true;
|
||||||
|
|
||||||
|
networking.firewall.allowedTCPPorts = lib.mkIf cfg.openFirewall [ 80 443 ];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
25
common/server/unifi.nix
Normal file
25
common/server/unifi.nix
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
cfg = config.services.unifi;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options.services.unifi = {
|
||||||
|
# Open select Unifi ports instead of using openFirewall to avoid opening access to unifi's control panel
|
||||||
|
openMinimalFirewall = lib.mkEnableOption "Open bare minimum firewall ports";
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
services.unifi.unifiPackage = pkgs.unifi8;
|
||||||
|
|
||||||
|
networking.firewall = lib.mkIf cfg.openMinimalFirewall {
|
||||||
|
allowedUDPPorts = [
|
||||||
|
3478 # STUN
|
||||||
|
10001 # used for device discovery.
|
||||||
|
];
|
||||||
|
allowedTCPPorts = [
|
||||||
|
8080 # Used for device and application communication.
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -34,6 +34,8 @@
|
|||||||
io_seq_write = "${pkgs.fio}/bin/fio --name TEST --eta-newline=5s --filename=temp.file --rw=write --size=2g --io_size=10g --blocksize=1024k --ioengine=libaio --fsync=10000 --iodepth=32 --direct=1 --numjobs=1 --runtime=60 --group_reporting; rm temp.file";
|
io_seq_write = "${pkgs.fio}/bin/fio --name TEST --eta-newline=5s --filename=temp.file --rw=write --size=2g --io_size=10g --blocksize=1024k --ioengine=libaio --fsync=10000 --iodepth=32 --direct=1 --numjobs=1 --runtime=60 --group_reporting; rm temp.file";
|
||||||
io_rand_read = "${pkgs.fio}/bin/fio --name TEST --eta-newline=5s --filename=temp.file --rw=randread --size=2g --io_size=10g --blocksize=4k --ioengine=libaio --fsync=1 --iodepth=1 --direct=1 --numjobs=32 --runtime=60 --group_reporting; rm temp.file";
|
io_rand_read = "${pkgs.fio}/bin/fio --name TEST --eta-newline=5s --filename=temp.file --rw=randread --size=2g --io_size=10g --blocksize=4k --ioengine=libaio --fsync=1 --iodepth=1 --direct=1 --numjobs=32 --runtime=60 --group_reporting; rm temp.file";
|
||||||
io_rand_write = "${pkgs.fio}/bin/fio --name TEST --eta-newline=5s --filename=temp.file --rw=randrw --size=2g --io_size=10g --blocksize=4k --ioengine=libaio --fsync=1 --iodepth=1 --direct=1 --numjobs=1 --runtime=60 --group_reporting; rm temp.file";
|
io_rand_write = "${pkgs.fio}/bin/fio --name TEST --eta-newline=5s --filename=temp.file --rw=randrw --size=2g --io_size=10g --blocksize=4k --ioengine=libaio --fsync=1 --iodepth=1 --direct=1 --numjobs=1 --runtime=60 --group_reporting; rm temp.file";
|
||||||
|
|
||||||
|
llsblk = "lsblk -o +uuid,fsType";
|
||||||
};
|
};
|
||||||
|
|
||||||
nixpkgs.overlays = [
|
nixpkgs.overlays = [
|
||||||
|
|||||||
119
flake.lock
generated
119
flake.lock
generated
@@ -7,14 +7,16 @@
|
|||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"nixpkgs"
|
"nixpkgs"
|
||||||
],
|
],
|
||||||
"systems": "systems"
|
"systems": [
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1716561646,
|
"lastModified": 1723293904,
|
||||||
"narHash": "sha256-UIGtLO89RxKt7RF2iEgPikSdU53r6v/6WYB0RW3k89I=",
|
"narHash": "sha256-b+uqzj+Wa6xgMS9aNbX4I+sXeb5biPDi39VgvSFqFvU=",
|
||||||
"owner": "ryantm",
|
"owner": "ryantm",
|
||||||
"repo": "agenix",
|
"repo": "agenix",
|
||||||
"rev": "c2fc0762bbe8feb06a2e59a364fa81b3a57671c9",
|
"rev": "f6291c5935fdc4e0bef208cfc0dcab7e3f7a1c41",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -55,11 +57,11 @@
|
|||||||
"rev": "1290ddd9a2ff2bf2d0f702750768312b80efcd34",
|
"rev": "1290ddd9a2ff2bf2d0f702750768312b80efcd34",
|
||||||
"revCount": 19,
|
"revCount": 19,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "https://git.neet.dev/zuckerberg/dailybuild_modules.git"
|
"url": "https://git.neet.dev/zuckerberg/dailybot.git"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "https://git.neet.dev/zuckerberg/dailybuild_modules.git"
|
"url": "https://git.neet.dev/zuckerberg/dailybot.git"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"darwin": {
|
"darwin": {
|
||||||
@@ -86,21 +88,22 @@
|
|||||||
},
|
},
|
||||||
"deploy-rs": {
|
"deploy-rs": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"flake-compat": "flake-compat",
|
"flake-compat": [
|
||||||
|
"flake-compat"
|
||||||
|
],
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"nixpkgs"
|
"nixpkgs"
|
||||||
],
|
],
|
||||||
"utils": [
|
"utils": [
|
||||||
"simple-nixos-mailserver",
|
"flake-utils"
|
||||||
"utils"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1715699772,
|
"lastModified": 1727447169,
|
||||||
"narHash": "sha256-sKhqIgucN5sI/7UQgBwsonzR4fONjfMr9OcHK/vPits=",
|
"narHash": "sha256-3KyjMPUKHkiWhwR91J1YchF6zb6gvckCAY1jOE+ne0U=",
|
||||||
"owner": "serokell",
|
"owner": "serokell",
|
||||||
"repo": "deploy-rs",
|
"repo": "deploy-rs",
|
||||||
"rev": "b3ea6f333f9057b77efd9091119ba67089399ced",
|
"rev": "aa07eb05537d4cd025e2310397a6adcedfe72c76",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -125,32 +128,18 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"flake-compat_2": {
|
|
||||||
"flake": false,
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1696426674,
|
|
||||||
"narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
|
|
||||||
"owner": "edolstra",
|
|
||||||
"repo": "flake-compat",
|
|
||||||
"rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "edolstra",
|
|
||||||
"repo": "flake-compat",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"flake-utils": {
|
"flake-utils": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"systems": "systems_2"
|
"systems": [
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1710146030,
|
"lastModified": 1726560853,
|
||||||
"narHash": "sha256-SZ5L6eA7HJ/nmkzGG7/ISclqe6oZdOZTNoesiInkXPQ=",
|
"narHash": "sha256-X6rJYSESBVr3hBoH0WbKE5KvhPU5bloyZ2L4K60/fPQ=",
|
||||||
"owner": "numtide",
|
"owner": "numtide",
|
||||||
"repo": "flake-utils",
|
"repo": "flake-utils",
|
||||||
"rev": "b1d9ab70662946ef0850d488da1c9019f3a9752a",
|
"rev": "c1dfcf08411b08f6b8615f7d8971a2bfa81d5e8a",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -187,11 +176,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1716772633,
|
"lastModified": 1728263287,
|
||||||
"narHash": "sha256-Idcye44UW+EgjbjCoklf2IDF+XrehV6CVYvxR1omst4=",
|
"narHash": "sha256-GJDtsxz2/zw6g/Nrp4XVWBS5IaZ7ZUkuvxPOBEDe7pg=",
|
||||||
"owner": "Mic92",
|
"owner": "Mic92",
|
||||||
"repo": "nix-index-database",
|
"repo": "nix-index-database",
|
||||||
"rev": "ff80cb4a11bb87f3ce8459be6f16a25ac86eb2ac",
|
"rev": "5fce10c871bab6d7d5ac9e5e7efbb3a2783f5259",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -202,11 +191,11 @@
|
|||||||
},
|
},
|
||||||
"nixos-hardware": {
|
"nixos-hardware": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1717248095,
|
"lastModified": 1728056216,
|
||||||
"narHash": "sha256-e8X2eWjAHJQT82AAN+mCI0B68cIDBJpqJ156+VRrFO0=",
|
"narHash": "sha256-IrO06gFUDTrTlIP3Sz+mRB6WUoO2YsgMtOD3zi0VEt0=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixos-hardware",
|
"repo": "nixos-hardware",
|
||||||
"rev": "7b49d3967613d9aacac5b340ef158d493906ba79",
|
"rev": "b7ca02c7565fbf6d27ff20dd6dbd49c5b82eef28",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -218,11 +207,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1717144377,
|
"lastModified": 1728193676,
|
||||||
"narHash": "sha256-F/TKWETwB5RaR8owkPPi+SPJh83AQsm6KrQAlJ8v/uA=",
|
"narHash": "sha256-PbDWAIjKJdlVg+qQRhzdSor04bAPApDqIv2DofTyynk=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "805a384895c696f802a9bf5bf4720f37385df547",
|
"rev": "ecbc1ca8ffd6aea8372ad16be9ebbb39889e55b6",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -294,6 +283,7 @@
|
|||||||
"agenix": "agenix",
|
"agenix": "agenix",
|
||||||
"dailybuild_modules": "dailybuild_modules",
|
"dailybuild_modules": "dailybuild_modules",
|
||||||
"deploy-rs": "deploy-rs",
|
"deploy-rs": "deploy-rs",
|
||||||
|
"flake-compat": "flake-compat",
|
||||||
"flake-utils": "flake-utils",
|
"flake-utils": "flake-utils",
|
||||||
"nix-index-database": "nix-index-database",
|
"nix-index-database": "nix-index-database",
|
||||||
"nixos-hardware": "nixos-hardware",
|
"nixos-hardware": "nixos-hardware",
|
||||||
@@ -301,24 +291,29 @@
|
|||||||
"nixpkgs-frigate": "nixpkgs-frigate",
|
"nixpkgs-frigate": "nixpkgs-frigate",
|
||||||
"radio": "radio",
|
"radio": "radio",
|
||||||
"radio-web": "radio-web",
|
"radio-web": "radio-web",
|
||||||
"simple-nixos-mailserver": "simple-nixos-mailserver"
|
"simple-nixos-mailserver": "simple-nixos-mailserver",
|
||||||
|
"systems": "systems"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"simple-nixos-mailserver": {
|
"simple-nixos-mailserver": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"blobs": "blobs",
|
"blobs": "blobs",
|
||||||
"flake-compat": "flake-compat_2",
|
"flake-compat": [
|
||||||
|
"flake-compat"
|
||||||
|
],
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"nixpkgs"
|
"nixpkgs"
|
||||||
],
|
],
|
||||||
"utils": "utils"
|
"nixpkgs-24_05": [
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1714720456,
|
"lastModified": 1722877200,
|
||||||
"narHash": "sha256-e0WFe1BHqX23ADpGBc4ZRu38Mg+GICCZCqyS6EWCbHc=",
|
"narHash": "sha256-qgKDNJXs+od+1UbRy62uk7dYal3h98I4WojfIqMoGcg=",
|
||||||
"owner": "simple-nixos-mailserver",
|
"owner": "simple-nixos-mailserver",
|
||||||
"repo": "nixos-mailserver",
|
"repo": "nixos-mailserver",
|
||||||
"rev": "41059fc548088e49e3ddb3a2b4faeb5de018e60f",
|
"rev": "af7d3bf5daeba3fc28089b015c0dd43f06b176f2",
|
||||||
"type": "gitlab"
|
"type": "gitlab"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -342,36 +337,6 @@
|
|||||||
"repo": "default",
|
"repo": "default",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
|
||||||
"systems_2": {
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1681028828,
|
|
||||||
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
|
|
||||||
"owner": "nix-systems",
|
|
||||||
"repo": "default",
|
|
||||||
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "nix-systems",
|
|
||||||
"repo": "default",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"utils": {
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1605370193,
|
|
||||||
"narHash": "sha256-YyMTf3URDL/otKdKgtoMChu4vfVL3vCMkRqpGifhUn0=",
|
|
||||||
"owner": "numtide",
|
|
||||||
"repo": "flake-utils",
|
|
||||||
"rev": "5021eac20303a61fafe17224c087f5519baed54d",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "numtide",
|
|
||||||
"repo": "flake-utils",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"root": "root",
|
"root": "root",
|
||||||
|
|||||||
87
flake.nix
87
flake.nix
@@ -1,40 +1,79 @@
|
|||||||
{
|
{
|
||||||
inputs = {
|
inputs = {
|
||||||
|
# nixpkgs
|
||||||
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.05";
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.05";
|
||||||
nixpkgs-frigate.url = "github:NixOS/nixpkgs/5cfafa12d57374f48bcc36fda3274ada276cf69e";
|
nixpkgs-frigate.url = "github:NixOS/nixpkgs/5cfafa12d57374f48bcc36fda3274ada276cf69e";
|
||||||
|
|
||||||
flake-utils.url = "github:numtide/flake-utils";
|
# Common Utils Among flake inputs
|
||||||
|
systems.url = "github:nix-systems/default";
|
||||||
|
flake-utils = {
|
||||||
|
url = "github:numtide/flake-utils";
|
||||||
|
inputs.systems.follows = "systems";
|
||||||
|
};
|
||||||
|
flake-compat = {
|
||||||
|
url = "github:edolstra/flake-compat";
|
||||||
|
flake = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
# NixOS hardware
|
||||||
nixos-hardware.url = "github:NixOS/nixos-hardware/master";
|
nixos-hardware.url = "github:NixOS/nixos-hardware/master";
|
||||||
|
|
||||||
# mail server
|
# Mail Server
|
||||||
simple-nixos-mailserver.url = "gitlab:simple-nixos-mailserver/nixos-mailserver/master";
|
simple-nixos-mailserver = {
|
||||||
simple-nixos-mailserver.inputs.nixpkgs.follows = "nixpkgs";
|
url = "gitlab:simple-nixos-mailserver/nixos-mailserver/master";
|
||||||
|
inputs = {
|
||||||
|
nixpkgs.follows = "nixpkgs";
|
||||||
|
nixpkgs-24_05.follows = "nixpkgs";
|
||||||
|
flake-compat.follows = "flake-compat";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
# agenix
|
# Agenix
|
||||||
agenix.url = "github:ryantm/agenix";
|
agenix = {
|
||||||
agenix.inputs.nixpkgs.follows = "nixpkgs";
|
url = "github:ryantm/agenix";
|
||||||
|
inputs = {
|
||||||
|
nixpkgs.follows = "nixpkgs";
|
||||||
|
systems.follows = "systems";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
# radio
|
# Radio
|
||||||
radio.url = "git+https://git.neet.dev/zuckerberg/radio.git?ref=main&rev=5bf607fed977d41a269942a7d1e92f3e6d4f2473";
|
radio = {
|
||||||
radio.inputs.nixpkgs.follows = "nixpkgs";
|
url = "git+https://git.neet.dev/zuckerberg/radio.git?ref=main&rev=5bf607fed977d41a269942a7d1e92f3e6d4f2473";
|
||||||
radio.inputs.flake-utils.follows = "flake-utils";
|
inputs = {
|
||||||
radio-web.url = "git+https://git.neet.dev/zuckerberg/radio-web.git";
|
nixpkgs.follows = "nixpkgs";
|
||||||
radio-web.flake = false;
|
flake-utils.follows = "flake-utils";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
radio-web = {
|
||||||
|
url = "git+https://git.neet.dev/zuckerberg/radio-web.git";
|
||||||
|
flake = false;
|
||||||
|
};
|
||||||
|
|
||||||
# drastikbot
|
# Dailybot
|
||||||
dailybuild_modules.url = "git+https://git.neet.dev/zuckerberg/dailybuild_modules.git";
|
dailybuild_modules = {
|
||||||
dailybuild_modules.inputs.nixpkgs.follows = "nixpkgs";
|
url = "git+https://git.neet.dev/zuckerberg/dailybot.git";
|
||||||
dailybuild_modules.inputs.flake-utils.follows = "flake-utils";
|
inputs = {
|
||||||
|
nixpkgs.follows = "nixpkgs";
|
||||||
|
flake-utils.follows = "flake-utils";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
# nixos config deployment
|
# NixOS deployment
|
||||||
deploy-rs.url = "github:serokell/deploy-rs";
|
deploy-rs = {
|
||||||
deploy-rs.inputs.nixpkgs.follows = "nixpkgs";
|
url = "github:serokell/deploy-rs";
|
||||||
deploy-rs.inputs.utils.follows = "simple-nixos-mailserver/utils";
|
inputs = {
|
||||||
|
nixpkgs.follows = "nixpkgs";
|
||||||
|
flake-compat.follows = "flake-compat";
|
||||||
|
utils.follows = "flake-utils";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
# prebuilt nix-index database
|
# Prebuilt nix-index database
|
||||||
nix-index-database.url = "github:Mic92/nix-index-database";
|
nix-index-database = {
|
||||||
nix-index-database.inputs.nixpkgs.follows = "nixpkgs";
|
url = "github:Mic92/nix-index-database";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs = { self, nixpkgs, ... }@inputs:
|
outputs = { self, nixpkgs, ... }@inputs:
|
||||||
|
|||||||
69
machines/hotspot/default.nix
Normal file
69
machines/hotspot/default.nix
Normal file
@@ -0,0 +1,69 @@
|
|||||||
|
{ config, pkgs, lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
internal = "end0";
|
||||||
|
wireless = "wlan0";
|
||||||
|
internal-gateway-ip = "192.168.0.1";
|
||||||
|
internal-ip-lower = "192.168.0.10";
|
||||||
|
internal-ip-upper = "192.168.0.100";
|
||||||
|
in
|
||||||
|
{
|
||||||
|
imports = [
|
||||||
|
./hardware-configuration.nix
|
||||||
|
];
|
||||||
|
|
||||||
|
enableExtraSubstituters = false;
|
||||||
|
|
||||||
|
# networking.interfaces.${internal}.ipv4.addresses = [{
|
||||||
|
# address = internal-gateway-ip;
|
||||||
|
# prefixLength = 24;
|
||||||
|
# }];
|
||||||
|
|
||||||
|
# DHCP on all interfaces except for the internal interface
|
||||||
|
networking.useDHCP = true;
|
||||||
|
networking.interfaces.${internal}.useDHCP = true;
|
||||||
|
networking.interfaces.${wireless}.useDHCP = true;
|
||||||
|
|
||||||
|
# Enable NAT
|
||||||
|
networking.ip_forward = true;
|
||||||
|
networking.nat = {
|
||||||
|
enable = true;
|
||||||
|
internalInterfaces = [ internal ];
|
||||||
|
externalInterface = wireless;
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.wireless = {
|
||||||
|
enable = true;
|
||||||
|
networks = {
|
||||||
|
"Pixel_6054".psk = "@PSK_Pixel_6054@";
|
||||||
|
};
|
||||||
|
interfaces = [ wireless ];
|
||||||
|
environmentFile = "/run/agenix/hostspot-passwords";
|
||||||
|
};
|
||||||
|
age.secrets.hostspot-passwords.file = ../../secrets/hostspot-passwords.age;
|
||||||
|
|
||||||
|
# dnsmasq for internal interface
|
||||||
|
services.dnsmasq = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
server = [ "1.1.1.1" "8.8.8.8" ];
|
||||||
|
dhcp-range = "${internal-ip-lower},${internal-ip-upper},24h";
|
||||||
|
dhcp-option = [
|
||||||
|
"option:router,${internal-gateway-ip}"
|
||||||
|
"option:broadcast,10.0.0.255"
|
||||||
|
"option:ntp-server,0.0.0.0"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.firewall.interfaces.${internal}.allowedTCPPorts = [
|
||||||
|
53 # dnsmasq
|
||||||
|
];
|
||||||
|
|
||||||
|
# Make it appear we are not using phone tethering to the ISP
|
||||||
|
networking.firewall = {
|
||||||
|
extraCommands = ''
|
||||||
|
iptables -t mangle -A POSTROUTING -o ${wireless} -j TTL --ttl-set 65
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
}
|
||||||
27
machines/hotspot/hardware-configuration.nix
Normal file
27
machines/hotspot/hardware-configuration.nix
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
{ config, lib, pkgs, modulesPath, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
imports =
|
||||||
|
[
|
||||||
|
(modulesPath + "/installer/scan/not-detected.nix")
|
||||||
|
];
|
||||||
|
|
||||||
|
boot = {
|
||||||
|
kernelPackages = pkgs.linuxKernel.packages.linux_rpi4;
|
||||||
|
initrd.availableKernelModules = [ "xhci_pci" "usbhid" "usb_storage" ];
|
||||||
|
loader = {
|
||||||
|
grub.enable = false;
|
||||||
|
generic-extlinux-compatible.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
fileSystems."/" =
|
||||||
|
{
|
||||||
|
device = "/dev/disk/by-uuid/44444444-4444-4444-8888-888888888888";
|
||||||
|
fsType = "ext4";
|
||||||
|
};
|
||||||
|
|
||||||
|
swapDevices = [ ];
|
||||||
|
|
||||||
|
nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux";
|
||||||
|
}
|
||||||
13
machines/hotspot/properties.nix
Normal file
13
machines/hotspot/properties.nix
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
{
|
||||||
|
hostNames = [
|
||||||
|
"hotspot"
|
||||||
|
];
|
||||||
|
|
||||||
|
arch = "aarch64-linux";
|
||||||
|
|
||||||
|
systemRoles = [
|
||||||
|
"hotspot"
|
||||||
|
];
|
||||||
|
|
||||||
|
hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAION4IUAef687RIzWrP4HEZnpdSJswt06QmrdRMDPHHGY";
|
||||||
|
}
|
||||||
@@ -102,7 +102,7 @@
|
|||||||
host = "chat.neet.space";
|
host = "chat.neet.space";
|
||||||
};
|
};
|
||||||
jitsi-meet = {
|
jitsi-meet = {
|
||||||
enable = true;
|
enable = false; # disabled until vulnerable libolm dependency is removed/fixed
|
||||||
host = "meet.neet.space";
|
host = "meet.neet.space";
|
||||||
};
|
};
|
||||||
turn = {
|
turn = {
|
||||||
@@ -118,14 +118,6 @@
|
|||||||
|
|
||||||
# proxied web services
|
# proxied web services
|
||||||
services.nginx.enable = true;
|
services.nginx.enable = true;
|
||||||
services.nginx.virtualHosts."jellyfin.neet.cloud" = {
|
|
||||||
enableACME = true;
|
|
||||||
forceSSL = true;
|
|
||||||
locations."/" = {
|
|
||||||
proxyPass = "http://s0.koi-bebop.ts.net";
|
|
||||||
proxyWebsockets = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
services.nginx.virtualHosts."navidrome.neet.cloud" = {
|
services.nginx.virtualHosts."navidrome.neet.cloud" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
|
|||||||
@@ -1,22 +0,0 @@
|
|||||||
{ config, pkgs, lib, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
./hardware-configuration.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
nixpkgs.config.cudaSupport = true;
|
|
||||||
|
|
||||||
# don't use remote builders
|
|
||||||
nix.distributedBuilds = lib.mkForce false;
|
|
||||||
|
|
||||||
# services.howdy.enable = true;
|
|
||||||
|
|
||||||
hardware.openrazer.enable = true;
|
|
||||||
hardware.openrazer.users = [ "googlebot" ];
|
|
||||||
hardware.openrazer.devicesOffOnScreensaver = false;
|
|
||||||
users.users.googlebot.packages = [ pkgs.polychromatic ];
|
|
||||||
|
|
||||||
de.enable = true;
|
|
||||||
de.touchpad.enable = true;
|
|
||||||
}
|
|
||||||
@@ -1,62 +0,0 @@
|
|||||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
|
||||||
# and may be overwritten by future invocations. Please make changes
|
|
||||||
# to /etc/nixos/configuration.nix instead.
|
|
||||||
{ config, lib, pkgs, modulesPath, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
imports =
|
|
||||||
[
|
|
||||||
(modulesPath + "/installer/scan/not-detected.nix")
|
|
||||||
];
|
|
||||||
|
|
||||||
# boot
|
|
||||||
efi.enable = true;
|
|
||||||
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "usbhid" "usb_storage" "sd_mod" ];
|
|
||||||
boot.initrd.kernelModules = [ "dm-snapshot" ];
|
|
||||||
|
|
||||||
# kernel
|
|
||||||
boot.kernelModules = [ "kvm-amd" ];
|
|
||||||
boot.extraModulePackages = [ ];
|
|
||||||
|
|
||||||
# firmware
|
|
||||||
firmware.x86_64.enable = true;
|
|
||||||
hardware.enableAllFirmware = true;
|
|
||||||
|
|
||||||
# gpu
|
|
||||||
services.xserver.videoDrivers = [ "nvidia" ];
|
|
||||||
hardware.nvidia = {
|
|
||||||
modesetting.enable = true; # for nvidia-vaapi-driver
|
|
||||||
prime = {
|
|
||||||
reverseSync.enable = true;
|
|
||||||
offload.enableOffloadCmd = true;
|
|
||||||
nvidiaBusId = "PCI:1:0:0";
|
|
||||||
amdgpuBusId = "PCI:4:0:0";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# disks
|
|
||||||
remoteLuksUnlock.enable = true;
|
|
||||||
boot.initrd.luks.devices."enc-pv" = {
|
|
||||||
device = "/dev/disk/by-uuid/c1822e5f-4137-44e1-885f-954e926583ce";
|
|
||||||
allowDiscards = true;
|
|
||||||
};
|
|
||||||
fileSystems."/" =
|
|
||||||
{
|
|
||||||
device = "/dev/vg/root";
|
|
||||||
fsType = "btrfs";
|
|
||||||
options = [ "subvol=root" ];
|
|
||||||
};
|
|
||||||
fileSystems."/home" =
|
|
||||||
{
|
|
||||||
device = "/dev/vg/root";
|
|
||||||
fsType = "btrfs";
|
|
||||||
options = [ "subvol=home" ];
|
|
||||||
};
|
|
||||||
fileSystems."/boot" =
|
|
||||||
{
|
|
||||||
device = "/dev/disk/by-uuid/2C85-2B59";
|
|
||||||
fsType = "vfat";
|
|
||||||
};
|
|
||||||
swapDevices =
|
|
||||||
[{ device = "/dev/vg/swap"; }];
|
|
||||||
}
|
|
||||||
@@ -1,22 +0,0 @@
|
|||||||
{
|
|
||||||
hostNames = [
|
|
||||||
"ray"
|
|
||||||
];
|
|
||||||
|
|
||||||
arch = "x86_64-linux";
|
|
||||||
|
|
||||||
systemRoles = [
|
|
||||||
"personal"
|
|
||||||
"deploy"
|
|
||||||
];
|
|
||||||
|
|
||||||
hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDQM8hwKRgl8cZj7UVYATSLYu4LhG7I0WFJ9m2iWowiB";
|
|
||||||
|
|
||||||
userKeys = [
|
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFeTK1iARlNIKP/DS8/ObBm9yUM/3L1Ub4XI5A2r9OzP"
|
|
||||||
];
|
|
||||||
|
|
||||||
deployKeys = [
|
|
||||||
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIEaGIwLiUa6wQLlEF+keQOIYy/tCmJvV6eENzUQjSqW2AAAABHNzaDo="
|
|
||||||
];
|
|
||||||
}
|
|
||||||
@@ -60,73 +60,65 @@ sections:
|
|||||||
- &ref_0
|
- &ref_0
|
||||||
title: Jellyfin
|
title: Jellyfin
|
||||||
icon: hl-jellyfin
|
icon: hl-jellyfin
|
||||||
url: http://s0:8097
|
url: https://jellyfin.s0.neet.dev
|
||||||
target: sametab
|
target: sametab
|
||||||
statusCheck: true
|
statusCheck: false
|
||||||
statusCheckUrl: http://jellyfin.s0
|
|
||||||
id: 0_1956_jellyfin
|
id: 0_1956_jellyfin
|
||||||
- &ref_1
|
- &ref_1
|
||||||
title: Sonarr
|
title: Sonarr
|
||||||
description: Manage TV
|
description: Manage TV
|
||||||
icon: hl-sonarr
|
icon: hl-sonarr
|
||||||
url: http://s0:8989
|
url: https://sonarr.s0.neet.dev
|
||||||
target: sametab
|
target: sametab
|
||||||
statusCheck: true
|
statusCheck: false
|
||||||
statusCheckUrl: http://sonarr.s0
|
|
||||||
id: 1_1956_sonarr
|
id: 1_1956_sonarr
|
||||||
- &ref_2
|
- &ref_2
|
||||||
title: Radarr
|
title: Radarr
|
||||||
description: Manage Movies
|
description: Manage Movies
|
||||||
icon: hl-radarr
|
icon: hl-radarr
|
||||||
url: http://s0:7878
|
url: https://radarr.s0.neet.dev
|
||||||
target: sametab
|
target: sametab
|
||||||
statusCheck: true
|
statusCheck: false
|
||||||
statusCheckUrl: http://radarr.s0
|
|
||||||
id: 2_1956_radarr
|
id: 2_1956_radarr
|
||||||
- &ref_3
|
- &ref_3
|
||||||
title: Lidarr
|
title: Lidarr
|
||||||
description: Manage Music
|
description: Manage Music
|
||||||
icon: hl-lidarr
|
icon: hl-lidarr
|
||||||
url: http://s0:8686
|
url: https://lidarr.s0.neet.dev
|
||||||
target: sametab
|
target: sametab
|
||||||
statusCheck: true
|
statusCheck: false
|
||||||
statusCheckUrl: http://lidarr.s0
|
|
||||||
id: 3_1956_lidarr
|
id: 3_1956_lidarr
|
||||||
- &ref_4
|
- &ref_4
|
||||||
title: Prowlarr
|
title: Prowlarr
|
||||||
description: Indexers
|
description: Indexers
|
||||||
icon: hl-prowlarr
|
icon: hl-prowlarr
|
||||||
url: http://prowlarr.s0
|
url: https://prowlarr.s0.neet.dev
|
||||||
target: sametab
|
target: sametab
|
||||||
statusCheck: true
|
statusCheck: false
|
||||||
statusCheckUrl: http://prowlarr.s0
|
|
||||||
id: 4_1956_prowlarr
|
id: 4_1956_prowlarr
|
||||||
- &ref_5
|
- &ref_5
|
||||||
title: Bazarr
|
title: Bazarr
|
||||||
description: Subtitles
|
description: Subtitles
|
||||||
icon: hl-bazarr
|
icon: hl-bazarr
|
||||||
url: http://s0:6767
|
url: https://bazarr.s0.neet.dev
|
||||||
target: sametab
|
target: sametab
|
||||||
statusCheck: true
|
statusCheck: false
|
||||||
statusCheckUrl: http://bazarr.s0
|
|
||||||
id: 5_1956_bazarr
|
id: 5_1956_bazarr
|
||||||
- &ref_6
|
- &ref_6
|
||||||
title: Navidrome
|
title: Navidrome
|
||||||
description: Play Music
|
description: Play Music
|
||||||
icon: hl-navidrome
|
icon: hl-navidrome
|
||||||
url: http://s0:4534
|
url: https://music.s0.neet.dev
|
||||||
target: sametab
|
target: sametab
|
||||||
statusCheck: true
|
statusCheck: false
|
||||||
statusCheckUrl: http://music.s0
|
|
||||||
id: 6_1956_navidrome
|
id: 6_1956_navidrome
|
||||||
- &ref_7
|
- &ref_7
|
||||||
title: Transmission
|
title: Transmission
|
||||||
description: Torrenting
|
description: Torrenting
|
||||||
icon: hl-transmission
|
icon: hl-transmission
|
||||||
url: http://s0:9091
|
url: https://transmission.s0.neet.dev
|
||||||
target: sametab
|
target: sametab
|
||||||
statusCheck: true
|
statusCheck: false
|
||||||
statusCheckUrl: http://transmission.s0
|
|
||||||
id: 7_1956_transmission
|
id: 7_1956_transmission
|
||||||
filteredItems:
|
filteredItems:
|
||||||
- *ref_0
|
- *ref_0
|
||||||
|
|||||||
@@ -3,6 +3,7 @@
|
|||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
|
./frigate.nix
|
||||||
./home-automation.nix
|
./home-automation.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
@@ -165,61 +166,89 @@
|
|||||||
};
|
};
|
||||||
|
|
||||||
# nginx
|
# nginx
|
||||||
services.nginx.enable = true;
|
services.nginx = {
|
||||||
services.nginx.virtualHosts."bazarr.s0" = {
|
enable = true;
|
||||||
listen = [{ addr = "0.0.0.0"; port = 6767; } { addr = "0.0.0.0"; port = 80; }];
|
openFirewall = false; # All nginx services are internal
|
||||||
locations."/".proxyPass = "http://vpn.containers:6767";
|
virtualHosts =
|
||||||
};
|
let
|
||||||
services.nginx.virtualHosts."radarr.s0" = {
|
mkVirtualHost = external: internal:
|
||||||
listen = [{ addr = "0.0.0.0"; port = 7878; } { addr = "0.0.0.0"; port = 80; }];
|
{
|
||||||
locations."/".proxyPass = "http://vpn.containers:7878";
|
${external} = {
|
||||||
};
|
useACMEHost = "s0.neet.dev"; # Use wildcard cert
|
||||||
services.nginx.virtualHosts."lidarr.s0" = {
|
forceSSL = true;
|
||||||
listen = [{ addr = "0.0.0.0"; port = 8686; } { addr = "0.0.0.0"; port = 80; }];
|
locations."/" = {
|
||||||
locations."/".proxyPass = "http://vpn.containers:8686";
|
proxyPass = internal;
|
||||||
};
|
proxyWebsockets = true;
|
||||||
services.nginx.virtualHosts."sonarr.s0" = {
|
};
|
||||||
listen = [{ addr = "0.0.0.0"; port = 8989; } { addr = "0.0.0.0"; port = 80; }];
|
};
|
||||||
locations."/".proxyPass = "http://vpn.containers:8989";
|
};
|
||||||
};
|
in
|
||||||
services.nginx.virtualHosts."prowlarr.s0" = {
|
lib.mkMerge [
|
||||||
listen = [{ addr = "0.0.0.0"; port = 9696; } { addr = "0.0.0.0"; port = 80; }];
|
(mkVirtualHost "bazarr.s0.neet.dev" "http://vpn.containers:6767")
|
||||||
locations."/".proxyPass = "http://vpn.containers:9696";
|
(mkVirtualHost "radarr.s0.neet.dev" "http://vpn.containers:7878")
|
||||||
};
|
(mkVirtualHost "lidarr.s0.neet.dev" "http://vpn.containers:8686")
|
||||||
services.nginx.virtualHosts."music.s0" = {
|
(mkVirtualHost "sonarr.s0.neet.dev" "http://vpn.containers:8989")
|
||||||
listen = [{ addr = "0.0.0.0"; port = 4534; } { addr = "0.0.0.0"; port = 80; }];
|
(mkVirtualHost "prowlarr.s0.neet.dev" "http://vpn.containers:9696")
|
||||||
locations."/".proxyPass = "http://localhost:4533";
|
(mkVirtualHost "transmission.s0.neet.dev" "http://vpn.containers:9091")
|
||||||
};
|
(mkVirtualHost "unifi.s0.neet.dev" "https://localhost:8443")
|
||||||
services.nginx.virtualHosts."jellyfin.s0" = {
|
(mkVirtualHost "music.s0.neet.dev" "http://localhost:4533")
|
||||||
listen = [{ addr = "0.0.0.0"; port = 8097; } { addr = "0.0.0.0"; port = 80; }];
|
(mkVirtualHost "jellyfin.s0.neet.dev" "http://localhost:8096")
|
||||||
locations."/" = {
|
(mkVirtualHost "s0.neet.dev" "http://localhost:56815")
|
||||||
proxyPass = "http://localhost:8096";
|
{
|
||||||
proxyWebsockets = true;
|
# Landing page LAN redirect
|
||||||
};
|
"s0" = {
|
||||||
};
|
default = true;
|
||||||
services.nginx.virtualHosts."jellyfin.neet.cloud".locations."/" = {
|
redirectCode = 302;
|
||||||
proxyPass = "http://localhost:8096";
|
globalRedirect = "s0.neet.dev";
|
||||||
proxyWebsockets = true;
|
};
|
||||||
};
|
}
|
||||||
services.nginx.virtualHosts."transmission.s0" = {
|
(mkVirtualHost "ha.s0.neet.dev" "http://localhost:8123") # home assistant
|
||||||
listen = [{ addr = "0.0.0.0"; port = 9091; } { addr = "0.0.0.0"; port = 80; }];
|
(mkVirtualHost "esphome.s0.neet.dev" "http://localhost:6052")
|
||||||
locations."/" = {
|
(mkVirtualHost "zigbee.s0.neet.dev" "http://localhost:55834")
|
||||||
proxyPass = "http://vpn.containers:9091";
|
{
|
||||||
proxyWebsockets = true;
|
"frigate.s0.neet.dev" = {
|
||||||
|
# Just configure SSL, frigate module configures the rest of nginx
|
||||||
|
useACMEHost = "s0.neet.dev";
|
||||||
|
forceSSL = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
(mkVirtualHost "vacuum.s0.neet.dev" "http://192.168.1.125") # valetudo
|
||||||
|
(mkVirtualHost "todo.s0.neet.dev" "http://localhost:${toString config.services.vikunja.port}")
|
||||||
|
];
|
||||||
|
|
||||||
|
tailscaleAuth = {
|
||||||
|
enable = true;
|
||||||
|
virtualHosts = [
|
||||||
|
"bazarr.s0.neet.dev"
|
||||||
|
"radarr.s0.neet.dev"
|
||||||
|
"lidarr.s0.neet.dev"
|
||||||
|
"sonarr.s0.neet.dev"
|
||||||
|
"prowlarr.s0.neet.dev"
|
||||||
|
"transmission.s0.neet.dev"
|
||||||
|
"unifi.s0.neet.dev"
|
||||||
|
# "music.s0.neet.dev" # messes up navidrome
|
||||||
|
"jellyfin.s0.neet.dev"
|
||||||
|
"s0.neet.dev"
|
||||||
|
# "ha.s0.neet.dev" # messes up home assistant
|
||||||
|
"esphome.s0.neet.dev"
|
||||||
|
"zigbee.s0.neet.dev"
|
||||||
|
"vacuum.s0.neet.dev"
|
||||||
|
"todo.s0.neet.dev"
|
||||||
|
];
|
||||||
|
expectedTailnet = "koi-bebop.ts.net";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [
|
# Get wildcard cert
|
||||||
6767
|
security.acme.certs."s0.neet.dev" = {
|
||||||
7878
|
dnsProvider = "digitalocean";
|
||||||
8686
|
credentialsFile = "/run/agenix/digitalocean-dns-credentials";
|
||||||
8989
|
extraDomainNames = [ "*.s0.neet.dev" ];
|
||||||
9696
|
group = "nginx";
|
||||||
4534
|
dnsResolver = "1.1.1.1:53";
|
||||||
8097
|
dnsPropagationCheck = false; # sadly this erroneously fails
|
||||||
9091
|
};
|
||||||
8443 # unifi
|
age.secrets.digitalocean-dns-credentials.file = ../../../secrets/digitalocean-dns-credentials.age;
|
||||||
];
|
|
||||||
|
|
||||||
virtualisation.oci-containers.backend = "podman";
|
virtualisation.oci-containers.backend = "podman";
|
||||||
virtualisation.podman.dockerSocket.enable = true; # TODO needed?
|
virtualisation.podman.dockerSocket.enable = true; # TODO needed?
|
||||||
@@ -230,8 +259,17 @@
|
|||||||
|
|
||||||
services.unifi = {
|
services.unifi = {
|
||||||
enable = true;
|
enable = true;
|
||||||
openFirewall = true;
|
openMinimalFirewall = true;
|
||||||
unifiPackage = pkgs.unifi8;
|
};
|
||||||
|
|
||||||
|
services.vikunja = {
|
||||||
|
enable = true;
|
||||||
|
port = 61473;
|
||||||
|
frontendScheme = "https";
|
||||||
|
frontendHostname = "todo.s0.neet.dev";
|
||||||
|
settings = {
|
||||||
|
service.enableregistration = false;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
boot.binfmt.emulatedSystems = [ "aarch64-linux" "armv7l-linux" ];
|
boot.binfmt.emulatedSystems = [ "aarch64-linux" "armv7l-linux" ];
|
||||||
|
|||||||
155
machines/storage/s0/frigate.nix
Normal file
155
machines/storage/s0/frigate.nix
Normal file
@@ -0,0 +1,155 @@
|
|||||||
|
{ config, pkgs, lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
frigateHostname = "frigate.s0.neet.dev";
|
||||||
|
|
||||||
|
mkGo2RtcStream = name: url: withAudio: {
|
||||||
|
${name} = [
|
||||||
|
url
|
||||||
|
"ffmpeg:${name}#video=copy${if withAudio then "#audio=copy" else ""}"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
# Assumes camera is set to output:
|
||||||
|
# - rtsp
|
||||||
|
# - H.264 + AAC
|
||||||
|
# - a downscaled substream for detection
|
||||||
|
mkCamera = name: primaryUrl: detectUrl: {
|
||||||
|
# Reference https://docs.frigate.video/configuration/reference/
|
||||||
|
services.frigate.settings = {
|
||||||
|
cameras.${name} = {
|
||||||
|
ffmpeg = {
|
||||||
|
# Camera feeds are relayed through go2rtc
|
||||||
|
inputs = [
|
||||||
|
{
|
||||||
|
path = "rtsp://127.0.0.1:8554/${name}";
|
||||||
|
# input_args = "preset-rtsp-restream";
|
||||||
|
input_args = "preset-rtsp-restream-low-latency";
|
||||||
|
roles = [ "record" ];
|
||||||
|
}
|
||||||
|
{
|
||||||
|
path = detectUrl;
|
||||||
|
roles = [ "detect" ];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
output_args = {
|
||||||
|
record = "preset-record-generic-audio-copy";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
services.go2rtc.settings.streams = lib.mkMerge [
|
||||||
|
(mkGo2RtcStream name primaryUrl false)
|
||||||
|
|
||||||
|
# Sadly having the detection stream go through go2rpc too makes the stream unreadable by frigate for some reason.
|
||||||
|
# It might need to be re-encoded to work. But I am not interested in wasting the processing power if only frigate
|
||||||
|
# need the detection stream anyway. So just let frigate grab the stream directly since it works.
|
||||||
|
# (mkGo2RtcStream detectName detectUrl false)
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
mkDahuaCamera = name: address:
|
||||||
|
let
|
||||||
|
# go2rtc and frigate have a slightly different syntax for inserting env vars. So the URLs are not interchangable :(
|
||||||
|
# - go2rtc: ${VAR}
|
||||||
|
# - frigate: {VAR}
|
||||||
|
primaryUrl = "rtsp://admin:\${FRIGATE_RTSP_PASSWORD}@${address}/cam/realmonitor?channel=1&subtype=0";
|
||||||
|
detectUrl = "rtsp://admin:{FRIGATE_RTSP_PASSWORD}@${address}/cam/realmonitor?channel=1&subtype=1";
|
||||||
|
in
|
||||||
|
mkCamera name primaryUrl detectUrl;
|
||||||
|
|
||||||
|
mkEsp32Camera = name: address: {
|
||||||
|
services.frigate.settings.cameras.${name} = {
|
||||||
|
ffmpeg = {
|
||||||
|
input_args = "";
|
||||||
|
inputs = [{
|
||||||
|
path = "http://${address}:8080";
|
||||||
|
roles = [ "detect" "record" ];
|
||||||
|
}];
|
||||||
|
|
||||||
|
output_args.record = "-f segment -pix_fmt yuv420p -segment_time 10 -segment_format mp4 -reset_timestamps 1 -strftime 1 -c:v libx264 -preset ultrafast -an ";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
in
|
||||||
|
lib.mkMerge [
|
||||||
|
(mkDahuaCamera "dog-cam" "192.168.10.31")
|
||||||
|
# (mkEsp32Camera "dahlia-cam" "dahlia-cam.lan")
|
||||||
|
{
|
||||||
|
services.frigate = {
|
||||||
|
enable = true;
|
||||||
|
hostname = frigateHostname;
|
||||||
|
settings = {
|
||||||
|
mqtt = {
|
||||||
|
enabled = true;
|
||||||
|
host = "localhost:1883";
|
||||||
|
};
|
||||||
|
rtmp.enabled = false;
|
||||||
|
snapshots = {
|
||||||
|
enabled = true;
|
||||||
|
bounding_box = true;
|
||||||
|
};
|
||||||
|
record = {
|
||||||
|
enabled = true;
|
||||||
|
# sync_recordings = true; # detect if recordings were deleted outside of frigate (expensive)
|
||||||
|
retain = {
|
||||||
|
days = 2; # Keep video for 2 days
|
||||||
|
mode = "motion";
|
||||||
|
};
|
||||||
|
events = {
|
||||||
|
retain = {
|
||||||
|
default = 10; # Keep video with detections for 10 days
|
||||||
|
mode = "motion";
|
||||||
|
# mode = "active_objects";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
# Make frigate aware of the go2rtc streams
|
||||||
|
go2rtc.streams = config.services.go2rtc.settings.streams;
|
||||||
|
detect.enabled = true;
|
||||||
|
objects = {
|
||||||
|
track = [ "person" "dog" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
services.go2rtc = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
rtsp.listen = ":8554";
|
||||||
|
webrtc.listen = ":8555";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Pass in env file with secrets to frigate/go2rtc
|
||||||
|
systemd.services.frigate.serviceConfig.EnvironmentFile = "/run/agenix/frigate-credentials";
|
||||||
|
systemd.services.go2rtc.serviceConfig.EnvironmentFile = "/run/agenix/frigate-credentials";
|
||||||
|
age.secrets.frigate-credentials.file = ../../../secrets/frigate-credentials.age;
|
||||||
|
}
|
||||||
|
{
|
||||||
|
# hardware encode/decode with amdgpu vaapi
|
||||||
|
systemd.services.frigate = {
|
||||||
|
environment.LIBVA_DRIVER_NAME = "radeonsi";
|
||||||
|
serviceConfig = {
|
||||||
|
SupplementaryGroups = [ "render" "video" ]; # for access to dev/dri/*
|
||||||
|
AmbientCapabilities = "CAP_PERFMON";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
services.frigate.settings.ffmpeg.hwaccel_args = "preset-vaapi";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
# Coral TPU for frigate
|
||||||
|
services.udev.packages = [ pkgs.libedgetpu ];
|
||||||
|
users.groups.apex = { };
|
||||||
|
systemd.services.frigate.environment.LD_LIBRARY_PATH = "${pkgs.libedgetpu}/lib";
|
||||||
|
systemd.services.frigate.serviceConfig.SupplementaryGroups = [ "apex" ];
|
||||||
|
|
||||||
|
# Coral PCIe driver
|
||||||
|
kernel.enableGasketKernelModule = true;
|
||||||
|
|
||||||
|
services.frigate.settings.detectors.coral = {
|
||||||
|
type = "edgetpu";
|
||||||
|
device = "pci";
|
||||||
|
};
|
||||||
|
}
|
||||||
|
]
|
||||||
@@ -8,6 +8,7 @@
|
|||||||
|
|
||||||
# boot
|
# boot
|
||||||
boot.loader.systemd-boot.enable = true;
|
boot.loader.systemd-boot.enable = true;
|
||||||
|
boot.loader.systemd-boot.memtest86.enable = true;
|
||||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usb_storage" "uas" "sd_mod" "rtsx_pci_sdmmc" ];
|
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usb_storage" "uas" "sd_mod" "rtsx_pci_sdmmc" ];
|
||||||
boot.initrd.kernelModules = [ ];
|
boot.initrd.kernelModules = [ ];
|
||||||
boot.kernelModules = [ "kvm-intel" ];
|
boot.kernelModules = [ "kvm-intel" ];
|
||||||
@@ -58,8 +59,12 @@
|
|||||||
};
|
};
|
||||||
swapDevices = [ ];
|
swapDevices = [ ];
|
||||||
|
|
||||||
networking.interfaces.eth0.useDHCP = true;
|
networking.vlans = {
|
||||||
networking.interfaces.eth1.useDHCP = true;
|
iot = {
|
||||||
|
id = 2;
|
||||||
|
interface = "eth1";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
powerManagement.cpuFreqGovernor = "powersave";
|
powerManagement.cpuFreqGovernor = "powersave";
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,100 +1,7 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
let
|
|
||||||
frigateHostname = "frigate.s0";
|
|
||||||
frigatePort = 61617;
|
|
||||||
|
|
||||||
mkEsp32Cam = address: {
|
|
||||||
ffmpeg = {
|
|
||||||
input_args = "";
|
|
||||||
inputs = [{
|
|
||||||
path = address;
|
|
||||||
roles = [ "detect" "record" ];
|
|
||||||
}];
|
|
||||||
|
|
||||||
output_args.record = "-f segment -pix_fmt yuv420p -segment_time 10 -segment_format mp4 -reset_timestamps 1 -strftime 1 -c:v libx264 -preset ultrafast -an ";
|
|
||||||
};
|
|
||||||
rtmp.enabled = false;
|
|
||||||
snapshots = {
|
|
||||||
enabled = true;
|
|
||||||
bounding_box = true;
|
|
||||||
};
|
|
||||||
record = {
|
|
||||||
enabled = true;
|
|
||||||
retain.days = 10; # Keep video for 10 days
|
|
||||||
events.retain = {
|
|
||||||
default = 30; # Keep video with detections for 30 days
|
|
||||||
mode = "active_objects";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
detect = {
|
|
||||||
enabled = true;
|
|
||||||
width = 800;
|
|
||||||
height = 600;
|
|
||||||
fps = 10;
|
|
||||||
};
|
|
||||||
objects = {
|
|
||||||
track = [ "person" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
in
|
|
||||||
{
|
{
|
||||||
networking.firewall.allowedTCPPorts = [
|
services.esphome.enable = true;
|
||||||
# 1883 # mqtt
|
|
||||||
55834 # mqtt zigbee frontend
|
|
||||||
frigatePort
|
|
||||||
4180 # oauth proxy
|
|
||||||
];
|
|
||||||
|
|
||||||
services.frigate = {
|
|
||||||
enable = true;
|
|
||||||
hostname = frigateHostname;
|
|
||||||
settings = {
|
|
||||||
mqtt = {
|
|
||||||
enabled = true;
|
|
||||||
host = "localhost:1883";
|
|
||||||
};
|
|
||||||
cameras = {
|
|
||||||
dahlia-cam = mkEsp32Cam "http://dahlia-cam.lan:8080";
|
|
||||||
};
|
|
||||||
# ffmpeg = {
|
|
||||||
# hwaccel_args = "preset-vaapi";
|
|
||||||
# };
|
|
||||||
detectors.coral = {
|
|
||||||
type = "edgetpu";
|
|
||||||
device = "pci";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# AMD GPU for vaapi
|
|
||||||
systemd.services.frigate.environment.LIBVA_DRIVER_NAME = "radeonsi";
|
|
||||||
|
|
||||||
# Coral TPU for frigate
|
|
||||||
services.udev.packages = [ pkgs.libedgetpu ];
|
|
||||||
users.groups.apex = { };
|
|
||||||
systemd.services.frigate.environment.LD_LIBRARY_PATH = "${pkgs.libedgetpu}/lib";
|
|
||||||
systemd.services.frigate.serviceConfig = {
|
|
||||||
SupplementaryGroups = "apex";
|
|
||||||
};
|
|
||||||
# Coral PCIe driver
|
|
||||||
kernel.enableGasketKernelModule = true;
|
|
||||||
|
|
||||||
# Allow accessing frigate UI on a specific port in addition to by hostname
|
|
||||||
services.nginx.virtualHosts.${frigateHostname} = {
|
|
||||||
listen = [{ addr = "0.0.0.0"; port = frigatePort; } { addr = "0.0.0.0"; port = 80; }];
|
|
||||||
};
|
|
||||||
|
|
||||||
services.esphome = {
|
|
||||||
enable = true;
|
|
||||||
address = "0.0.0.0";
|
|
||||||
openFirewall = true;
|
|
||||||
};
|
|
||||||
# TODO remove after upgrading nixos version
|
|
||||||
systemd.services.esphome.serviceConfig.ProcSubset = lib.mkForce "all";
|
|
||||||
systemd.services.esphome.serviceConfig.ProtectHostname = lib.mkForce false;
|
|
||||||
systemd.services.esphome.serviceConfig.ProtectKernelLogs = lib.mkForce false;
|
|
||||||
systemd.services.esphome.serviceConfig.ProtectKernelTunables = lib.mkForce false;
|
|
||||||
|
|
||||||
# TODO lock down
|
# TODO lock down
|
||||||
services.mosquitto = {
|
services.mosquitto = {
|
||||||
@@ -107,6 +14,9 @@ in
|
|||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
networking.firewall.allowedTCPPorts = [
|
||||||
|
1883 # mqtt
|
||||||
|
];
|
||||||
|
|
||||||
services.zigbee2mqtt = {
|
services.zigbee2mqtt = {
|
||||||
enable = true;
|
enable = true;
|
||||||
@@ -121,7 +31,7 @@ in
|
|||||||
# base_topic = "zigbee2mqtt";
|
# base_topic = "zigbee2mqtt";
|
||||||
};
|
};
|
||||||
frontend = {
|
frontend = {
|
||||||
host = "0.0.0.0";
|
host = "localhost";
|
||||||
port = 55834;
|
port = 55834;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
@@ -129,60 +39,55 @@ in
|
|||||||
|
|
||||||
services.home-assistant = {
|
services.home-assistant = {
|
||||||
enable = true;
|
enable = true;
|
||||||
openFirewall = true;
|
|
||||||
configWritable = true;
|
|
||||||
extraComponents = [
|
extraComponents = [
|
||||||
|
"default_config"
|
||||||
"esphome"
|
"esphome"
|
||||||
"met"
|
"met"
|
||||||
"radio_browser"
|
"radio_browser"
|
||||||
"wled"
|
"wled"
|
||||||
"mqtt"
|
"mqtt"
|
||||||
|
"apple_tv" # why is this even needed? I get `ModuleNotFoundError: No module named 'pyatv'` errors otherwise for some reason.
|
||||||
|
"unifi"
|
||||||
|
"digital_ocean"
|
||||||
|
"downloader"
|
||||||
|
"mailgun"
|
||||||
|
"minecraft_server"
|
||||||
|
"mullvad"
|
||||||
|
"nextcloud"
|
||||||
|
"ollama"
|
||||||
|
"openweathermap"
|
||||||
|
"jellyfin"
|
||||||
|
"transmission"
|
||||||
|
"radarr"
|
||||||
|
"sonarr"
|
||||||
|
"syncthing"
|
||||||
|
"tailscale"
|
||||||
|
"weather"
|
||||||
|
"whois"
|
||||||
|
"youtube"
|
||||||
|
"homekit_controller"
|
||||||
|
"zha"
|
||||||
|
"bluetooth"
|
||||||
];
|
];
|
||||||
# config = null;
|
# config = null;
|
||||||
config = {
|
config = {
|
||||||
# Includes dependencies for a basic setup
|
# Includes dependencies for a basic setup
|
||||||
# https://www.home-assistant.io/integrations/default_config/
|
# https://www.home-assistant.io/integrations/default_config/
|
||||||
default_config = { };
|
default_config = { };
|
||||||
|
|
||||||
|
# Enable reverse proxy support
|
||||||
|
http = {
|
||||||
|
use_x_forwarded_for = true;
|
||||||
|
trusted_proxies = [
|
||||||
|
"127.0.0.1"
|
||||||
|
"::1"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
"automation manual" = [
|
||||||
|
];
|
||||||
|
# Allow using automations generated from the UI
|
||||||
|
"automation ui" = "!include automations.yaml";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# TODO need services.oauth2-proxy.cookie.domain ?
|
|
||||||
services.oauth2-proxy =
|
|
||||||
let
|
|
||||||
nextcloudServer = "https://neet.cloud/";
|
|
||||||
in
|
|
||||||
{
|
|
||||||
enable = true;
|
|
||||||
|
|
||||||
httpAddress = "http://0.0.0.0:4180";
|
|
||||||
|
|
||||||
nginx.domain = frigateHostname;
|
|
||||||
# nginx.virtualHosts = [
|
|
||||||
# frigateHostname
|
|
||||||
# ];
|
|
||||||
|
|
||||||
email.domains = [ "*" ];
|
|
||||||
|
|
||||||
cookie.secure = false;
|
|
||||||
|
|
||||||
provider = "nextcloud";
|
|
||||||
|
|
||||||
# redirectURL = "http://s0:4180/oauth2/callback"; # todo forward with nginx?
|
|
||||||
clientID = "4FfhEB2DNzUh6wWhXTjqQQKu3Ibm6TeYpS8TqcHe55PJC1DorE7vBZBELMKDjJ0X";
|
|
||||||
keyFile = "/run/agenix/oauth2-proxy-env";
|
|
||||||
|
|
||||||
loginURL = "${nextcloudServer}/index.php/apps/oauth2/authorize";
|
|
||||||
redeemURL = "${nextcloudServer}/index.php/apps/oauth2/api/v1/token";
|
|
||||||
validateURL = "${nextcloudServer}/ocs/v2.php/cloud/user?format=json";
|
|
||||||
|
|
||||||
# todo --cookie-refresh
|
|
||||||
|
|
||||||
extraConfig = {
|
|
||||||
# cookie-csrf-per-request = true;
|
|
||||||
# cookie-csrf-expire = "5m";
|
|
||||||
# user-id-claim = "preferred_username";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
age.secrets.oauth2-proxy-env.file = ../../../secrets/oauth2-proxy-env.age;
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -11,6 +11,7 @@
|
|||||||
"pia"
|
"pia"
|
||||||
"binary-cache"
|
"binary-cache"
|
||||||
"gitea-actions-runner"
|
"gitea-actions-runner"
|
||||||
|
"frigate"
|
||||||
];
|
];
|
||||||
|
|
||||||
hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAwiXcUFtAvZCayhu4+AIcF+Ktrdgv9ee/mXSIhJbp4q";
|
hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAwiXcUFtAvZCayhu4+AIcF+Ktrdgv9ee/mXSIhJbp4q";
|
||||||
|
|||||||
@@ -42,25 +42,25 @@
|
|||||||
];
|
];
|
||||||
|
|
||||||
# System wide barrier instance
|
# System wide barrier instance
|
||||||
systemd.services.barrier-sddm = {
|
# systemd.services.barrier-sddm = {
|
||||||
description = "Barrier mouse/keyboard share";
|
# description = "Barrier mouse/keyboard share";
|
||||||
requires = [ "display-manager.service" ];
|
# requires = [ "display-manager.service" ];
|
||||||
after = [ "network.target" "display-manager.service" ];
|
# after = [ "network.target" "display-manager.service" ];
|
||||||
wantedBy = [ "multi-user.target" ];
|
# wantedBy = [ "multi-user.target" ];
|
||||||
serviceConfig = {
|
# serviceConfig = {
|
||||||
Restart = "always";
|
# Restart = "always";
|
||||||
RestartSec = 10;
|
# RestartSec = 10;
|
||||||
# todo use user/group
|
# # todo use user/group
|
||||||
};
|
# };
|
||||||
path = with pkgs; [ barrier doas ];
|
# path = with pkgs; [ barrier doas ];
|
||||||
script = ''
|
# script = ''
|
||||||
# Wait for file to show up. "display-manager.service" finishes a bit too soon
|
# # Wait for file to show up. "display-manager.service" finishes a bit too soon
|
||||||
while ! [ -e /run/sddm/* ]; do sleep 1; done;
|
# while ! [ -e /run/sddm/* ]; do sleep 1; done;
|
||||||
export XAUTHORITY=$(ls /run/sddm/*)
|
# export XAUTHORITY=$(ls /run/sddm/*)
|
||||||
# Disable crypto is fine because tailscale is E2E encrypting better than barrier could anyway
|
# # Disable crypto is fine because tailscale is E2E encrypting better than barrier could anyway
|
||||||
barrierc -f --disable-crypto --name zoidberg ray.koi-bebop.ts.net
|
# barrierc -f --disable-crypto --name zoidberg ray.koi-bebop.ts.net
|
||||||
'';
|
# '';
|
||||||
};
|
# };
|
||||||
|
|
||||||
# Login into X11 plasma so barrier works well
|
# Login into X11 plasma so barrier works well
|
||||||
services.displayManager.defaultSession = "plasma";
|
services.displayManager.defaultSession = "plasma";
|
||||||
|
|||||||
@@ -7,7 +7,7 @@
|
|||||||
];
|
];
|
||||||
|
|
||||||
# boot
|
# boot
|
||||||
efi.enable = true;
|
boot.loader.systemd-boot.enable = true;
|
||||||
boot.loader.timeout = lib.mkForce 15;
|
boot.loader.timeout = lib.mkForce 15;
|
||||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usb_storage" "usbhid" "sd_mod" ];
|
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usb_storage" "usbhid" "sd_mod" ];
|
||||||
boot.initrd.kernelModules = [ "dm-snapshot" ];
|
boot.initrd.kernelModules = [ "dm-snapshot" ];
|
||||||
@@ -35,7 +35,7 @@
|
|||||||
};
|
};
|
||||||
fileSystems."/boot" =
|
fileSystems."/boot" =
|
||||||
{
|
{
|
||||||
device = "/dev/disk/by-uuid/8074-B04D";
|
device = "/dev/disk/by-uuid/954B-AB3E";
|
||||||
fsType = "vfat";
|
fsType = "vfat";
|
||||||
};
|
};
|
||||||
swapDevices =
|
swapDevices =
|
||||||
|
|||||||
@@ -7,16 +7,16 @@
|
|||||||
}:
|
}:
|
||||||
buildNpmPackage rec {
|
buildNpmPackage rec {
|
||||||
pname = "actual-server";
|
pname = "actual-server";
|
||||||
version = "24.3.0";
|
version = "24.10.1";
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
owner = "actualbudget";
|
owner = "actualbudget";
|
||||||
repo = pname;
|
repo = pname;
|
||||||
rev = "refs/tags/v${version}";
|
rev = "refs/tags/v${version}";
|
||||||
hash = "sha256-y51Dhdn84AWR/gM4LnAzvBIBpvKwUiclnPnwzkRoJ0I=";
|
hash = "sha256-VJAD+lNamwuYmiPJLXkum6piGi5zLOHBp8cUeZagb4s=";
|
||||||
};
|
};
|
||||||
|
|
||||||
npmDepsHash = "sha256-/UM2Tz8t4hi621HtXSu0LTDIzZ9SWMqKXqKfPwkdpE8=";
|
npmDepsHash = "sha256-Z2e4+JMhI/keLerT0F4WYdLnXHRQCqL7NjNyA9SFEF8=";
|
||||||
|
|
||||||
patches = [
|
patches = [
|
||||||
./migrations-should-use-pkg-path.patch
|
./migrations-should-use-pkg-path.patch
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
diff --git a/src/load-config.js b/src/load-config.js
|
diff --git a/src/load-config.js b/src/load-config.js
|
||||||
index d3cc5dd..cfcad8a 100644
|
index d99ce42..42d1351 100644
|
||||||
--- a/src/load-config.js
|
--- a/src/load-config.js
|
||||||
+++ b/src/load-config.js
|
+++ b/src/load-config.js
|
||||||
@@ -3,7 +3,8 @@ import path from 'node:path';
|
@@ -3,7 +3,8 @@ import path from 'node:path';
|
||||||
@@ -12,7 +12,7 @@ index d3cc5dd..cfcad8a 100644
|
|||||||
const debugSensitive = createDebug('actual-sensitive:config');
|
const debugSensitive = createDebug('actual-sensitive:config');
|
||||||
|
|
||||||
const projectRoot = path.dirname(path.dirname(fileURLToPath(import.meta.url)));
|
const projectRoot = path.dirname(path.dirname(fileURLToPath(import.meta.url)));
|
||||||
@@ -90,6 +91,7 @@ const finalConfig = {
|
@@ -108,6 +109,7 @@ const finalConfig = {
|
||||||
serverFiles: process.env.ACTUAL_SERVER_FILES || config.serverFiles,
|
serverFiles: process.env.ACTUAL_SERVER_FILES || config.serverFiles,
|
||||||
userFiles: process.env.ACTUAL_USER_FILES || config.userFiles,
|
userFiles: process.env.ACTUAL_USER_FILES || config.userFiles,
|
||||||
webRoot: process.env.ACTUAL_WEB_ROOT || config.webRoot,
|
webRoot: process.env.ACTUAL_WEB_ROOT || config.webRoot,
|
||||||
@@ -21,7 +21,7 @@ index d3cc5dd..cfcad8a 100644
|
|||||||
process.env.ACTUAL_HTTPS_KEY && process.env.ACTUAL_HTTPS_CERT
|
process.env.ACTUAL_HTTPS_KEY && process.env.ACTUAL_HTTPS_CERT
|
||||||
? {
|
? {
|
||||||
diff --git a/src/migrations.js b/src/migrations.js
|
diff --git a/src/migrations.js b/src/migrations.js
|
||||||
index 964e1f2..3a341d7 100644
|
index cba7db0..9983471 100644
|
||||||
--- a/src/migrations.js
|
--- a/src/migrations.js
|
||||||
+++ b/src/migrations.js
|
+++ b/src/migrations.js
|
||||||
@@ -1,6 +1,12 @@
|
@@ -1,6 +1,12 @@
|
||||||
@@ -37,11 +37,12 @@ index 964e1f2..3a341d7 100644
|
|||||||
|
|
||||||
export default function run(direction = 'up') {
|
export default function run(direction = 'up') {
|
||||||
console.log(
|
console.log(
|
||||||
@@ -13,6 +19,7 @@ export default function run(direction = 'up') {
|
@@ -13,7 +19,7 @@ export default function run(direction = 'up') {
|
||||||
stateStore: `${path.join(config.dataDir, '.migrate')}${
|
stateStore: `${path.join(config.dataDir, '.migrate')}${
|
||||||
config.mode === 'test' ? '-test' : ''
|
config.mode === 'test' ? '-test' : ''
|
||||||
}`,
|
}`,
|
||||||
+ migrationsDirectory,
|
- migrationsDirectory: `${path.join(config.projectRoot, 'migrations')}`,
|
||||||
|
+ migrationsDirectory
|
||||||
},
|
},
|
||||||
(err, set) => {
|
(err, set) => {
|
||||||
if (err) {
|
if (err) {
|
||||||
|
|||||||
1645
overlays/actualbudget/package-lock.json
generated
1645
overlays/actualbudget/package-lock.json
generated
File diff suppressed because it is too large
Load Diff
@@ -12,11 +12,4 @@ in
|
|||||||
frigate = frigatePkgs.frigate;
|
frigate = frigatePkgs.frigate;
|
||||||
|
|
||||||
actual-server = prev.callPackage ./actualbudget { };
|
actual-server = prev.callPackage ./actualbudget { };
|
||||||
unifi8 = prev.unifi.overrideAttrs (oldAttrs: rec {
|
|
||||||
version = "8.1.113";
|
|
||||||
src = prev.fetchurl {
|
|
||||||
url = "https://dl.ui.com/unifi/8.1.113/unifi_sysvinit_all.deb";
|
|
||||||
sha256 = "1knm+l8MSb7XKq2WIbehAnz7loRPjgnc+R98zpWKEAE=";
|
|
||||||
};
|
|
||||||
});
|
|
||||||
}
|
}
|
||||||
|
|||||||
11
secrets/digitalocean-dns-credentials.age
Normal file
11
secrets/digitalocean-dns-credentials.age
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 WBT1Hw wjZGPvilRXGZsC2+7dWm/Nbau8Allv29WwQCr0XSAWU
|
||||||
|
uTOf/sokutOGDyc8fbTbBWXqCVQCFhGdHxwA6SXqhdA
|
||||||
|
-> ssh-ed25519 6AT2/g NU068qwqOWiKk0QwqP9vU4xJaND2OR4bo8xkmdWATgY
|
||||||
|
uGd0sb5PH+rREn9pgLOFwk29CX66aPBQMvr4rBazylc
|
||||||
|
-> ssh-ed25519 hPp1nw r2JRiZ7fsHPYDlte6Oh2Gx1KkugekFeeg3xSjziI+hQ
|
||||||
|
xnO0gscMdR25mj5uAX7D42FCbCQhqbU0wkiLX4OmVqk
|
||||||
|
-> ssh-ed25519 w3nu8g F03mPU63WwEs1SLUFErLOVCkARoggGIvvz9TFZfMOBY
|
||||||
|
HOdVA3xW9pqUPhclO6VueSfXg3ux06Ch3fucF6Vr4hM
|
||||||
|
--- niyo231HPT/+2dzflP+zhYjL9XiWsk7svesCYdkU1jA
|
||||||
|
DÑØQî¬5–-ô@<40>¢¿—ßÐN5<4E> Ãÿ$Ø‚™’Çž…êÐ<C3AA>X=ŒHŽDÁ`P×5ZA´÷¼YóäÓ?¡é^[³1”6ÕK*mP݈ªæ1æç÷ß›ƒ:$^ÑfDœ*î†ÿ“š-zi´"·Tàuÿüò
|
||||||
7
secrets/frigate-credentials.age
Normal file
7
secrets/frigate-credentials.age
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 hPp1nw Chke1ZtpXxN1c1+AnJ6Cd5kpM1KfQKTwymrfPW53QCA
|
||||||
|
jUcw8eitC7r0rwefjllndZjARIqpWoVqGCnefHfjQ6Y
|
||||||
|
-> ssh-ed25519 w3nu8g KY/5bU1B5uvmfGHF2d6qBL1NYy64qo324rdvkgnXoDA
|
||||||
|
OBvuFtzZXQ0RmmEXelyzHMMiVqZir7zQJMA36ZH2siE
|
||||||
|
--- CSd7lYSYQ2fCTjkJLPGdaNGL8eVpE9IBEyFo0LW907M
|
||||||
|
£³$šO†ÈIß/À//Êw*ƒ™õD¤@u5o[¼â:·äš¥t¾˜]Jñ쮸™@Ùhþu£Àk;?·XüÁHRº’ѰE5¥ÍçÜ9
|
||||||
7
secrets/hostspot-passwords.age
Normal file
7
secrets/hostspot-passwords.age
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 cObvAg l/suU/M4AATK7lQuZv/qnjG/xqNGoVqhS7b3xirmNUM
|
||||||
|
Ao2tP6BBSZdlL7jZJPmLyJQWfqdU89M9hCjkkuqtxlw
|
||||||
|
-> ssh-ed25519 w3nu8g szQugiuFfzkzVndyIdP1agun4nmCsZzFG/6EEB2V1Gk
|
||||||
|
5+DEUJ5tkVFUpm+w/tptUCByRpMxRigwfrVglTYc8XI
|
||||||
|
--- pjviyhRustHHMipIpkKsQ4cpu+YA66JwvWXjceXopi4
|
||||||
|
)˜Ö®Äý8³È6Y"@?Ý9”®@¡Ÿžè|ÂÄž+©Z*4ö2å“R<qef…êªG¹ïV+{©%CmÞd^™b
|
||||||
@@ -51,4 +51,13 @@ with roles;
|
|||||||
|
|
||||||
# Librechat
|
# Librechat
|
||||||
"librechat-env-file.age".publicKeys = librechat;
|
"librechat-env-file.age".publicKeys = librechat;
|
||||||
|
|
||||||
|
# For ACME DNS Challenge
|
||||||
|
"digitalocean-dns-credentials.age".publicKeys = server;
|
||||||
|
|
||||||
|
# Frigate (DVR)
|
||||||
|
"frigate-credentials.age".publicKeys = frigate;
|
||||||
|
|
||||||
|
# Phone hotspot passwords
|
||||||
|
"hostspot-passwords.age".publicKeys = hotspot;
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user