Compare commits
14 Commits
eac443f280
...
e56271b2c3
Author | SHA1 | Date | |
---|---|---|---|
e56271b2c3 | |||
f9ef5e4b89 | |||
e516bd87b5 | |||
7c9c657bd0 | |||
dff7d65456 | |||
d269d2e5a0 | |||
2527b614e9 | |||
528a53a606 | |||
66bfc62566 | |||
91874b9d53 | |||
50fc0a53d2 | |||
0b3322afda | |||
b32f6fa315 | |||
fe41ffc788 |
@ -1,4 +1,4 @@
|
|||||||
{ config, pkgs, ... }:
|
{ config, pkgs, lib, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
@ -20,7 +20,7 @@
|
|||||||
|
|
||||||
system.stateVersion = "23.11";
|
system.stateVersion = "23.11";
|
||||||
|
|
||||||
networking.useDHCP = false;
|
networking.useDHCP = lib.mkDefault true;
|
||||||
|
|
||||||
networking.firewall.enable = true;
|
networking.firewall.enable = true;
|
||||||
networking.firewall.allowPing = true;
|
networking.firewall.allowPing = true;
|
||||||
|
@ -19,6 +19,15 @@ in
|
|||||||
jack.enable = true;
|
jack.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
services.pipewire.extraConfig.pipewire."92-fix-wine-audio" = {
|
||||||
|
context.properties = {
|
||||||
|
default.clock.rate = 48000;
|
||||||
|
default.clock.quantum = 2048;
|
||||||
|
default.clock.min-quantum = 512;
|
||||||
|
default.clock.max-quantum = 2048;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
users.users.googlebot.extraGroups = [ "audio" ];
|
users.users.googlebot.extraGroups = [ "audio" ];
|
||||||
|
|
||||||
# bt headset support
|
# bt headset support
|
||||||
|
@ -41,7 +41,7 @@ in
|
|||||||
"SpellcheckLanguage" = [ "en-US" ];
|
"SpellcheckLanguage" = [ "en-US" ];
|
||||||
};
|
};
|
||||||
defaultSearchProviderSuggestURL = null;
|
defaultSearchProviderSuggestURL = null;
|
||||||
defaultSearchProviderSearchURL = " https://duckduckgo.com/?q={searchTerms}&kp=-1&kl=us-en";
|
defaultSearchProviderSearchURL = "https://duckduckgo.com/?q={searchTerms}&kp=-1&kl=us-en";
|
||||||
};
|
};
|
||||||
|
|
||||||
# hardware accelerated video playback (on intel)
|
# hardware accelerated video playback (on intel)
|
||||||
@ -52,7 +52,7 @@ in
|
|||||||
# ungoogled = true;
|
# ungoogled = true;
|
||||||
# --enable-native-gpu-memory-buffers # fails on AMD APU
|
# --enable-native-gpu-memory-buffers # fails on AMD APU
|
||||||
# --enable-webrtc-vp9-support
|
# --enable-webrtc-vp9-support
|
||||||
commandLineArgs = "--use-vulkan --use-gl=desktop --enable-zero-copy --enable-hardware-overlays --enable-features=VaapiVideoDecoder,CanvasOopRasterization --ignore-gpu-blocklist --enable-accelerated-mjpeg-decode --enable-accelerated-video --enable-gpu-rasterization";
|
commandLineArgs = "--use-vulkan";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
# todo vulkan in chrome
|
# todo vulkan in chrome
|
||||||
|
@ -89,5 +89,8 @@ in
|
|||||||
# for luks onlock over tor
|
# for luks onlock over tor
|
||||||
services.tor.enable = true;
|
services.tor.enable = true;
|
||||||
services.tor.client.enable = true;
|
services.tor.client.enable = true;
|
||||||
|
|
||||||
|
# Enable wayland support in various chromium based applications
|
||||||
|
environment.sessionVariables.NIXOS_OZONE_WL = "1";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -11,6 +11,8 @@ let
|
|||||||
golang.go
|
golang.go
|
||||||
jnoortheen.nix-ide
|
jnoortheen.nix-ide
|
||||||
ms-vscode.cpptools
|
ms-vscode.cpptools
|
||||||
|
rust-lang.rust-analyzer
|
||||||
|
vadimcn.vscode-lldb
|
||||||
] ++ pkgs.vscode-utils.extensionsFromVscodeMarketplace [
|
] ++ pkgs.vscode-utils.extensionsFromVscodeMarketplace [
|
||||||
{
|
{
|
||||||
name = "platformio-ide";
|
name = "platformio-ide";
|
||||||
@ -18,6 +20,12 @@ let
|
|||||||
version = "3.1.1";
|
version = "3.1.1";
|
||||||
sha256 = "g9yTG3DjVUS2w9eHGAai5LoIfEGus+FPhqDnCi4e90Q=";
|
sha256 = "g9yTG3DjVUS2w9eHGAai5LoIfEGus+FPhqDnCi4e90Q=";
|
||||||
}
|
}
|
||||||
|
{
|
||||||
|
name = "wgsl-analyzer";
|
||||||
|
publisher = "wgsl-analyzer";
|
||||||
|
version = "0.8.1";
|
||||||
|
sha256 = "ckclcxdUxhjWlPnDFVleLCWgWxUEENe0V328cjaZv+Y=";
|
||||||
|
}
|
||||||
];
|
];
|
||||||
|
|
||||||
vscodium-with-extensions = pkgs.vscode-with-extensions.override {
|
vscodium-with-extensions = pkgs.vscode-with-extensions.override {
|
||||||
|
@ -3,6 +3,7 @@
|
|||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
|
./frigate.nix
|
||||||
./home-automation.nix
|
./home-automation.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
@ -193,9 +194,6 @@
|
|||||||
(mkVirtualHost "music.s0.neet.dev" "http://localhost:4533")
|
(mkVirtualHost "music.s0.neet.dev" "http://localhost:4533")
|
||||||
(mkVirtualHost "jellyfin.s0.neet.dev" "http://localhost:8096")
|
(mkVirtualHost "jellyfin.s0.neet.dev" "http://localhost:8096")
|
||||||
(mkVirtualHost "s0.neet.dev" "http://localhost:56815")
|
(mkVirtualHost "s0.neet.dev" "http://localhost:56815")
|
||||||
(mkVirtualHost "ha.s0.neet.dev" "http://localhost:8123") # home assistant
|
|
||||||
(mkVirtualHost "esphome.s0.neet.dev" "http://localhost:6052")
|
|
||||||
(mkVirtualHost "zigbee.s0.neet.dev" "http://localhost:55834")
|
|
||||||
{
|
{
|
||||||
# Landing page LAN redirect
|
# Landing page LAN redirect
|
||||||
"s0" = {
|
"s0" = {
|
||||||
@ -203,27 +201,20 @@
|
|||||||
redirectCode = 302;
|
redirectCode = 302;
|
||||||
globalRedirect = "s0.neet.dev";
|
globalRedirect = "s0.neet.dev";
|
||||||
};
|
};
|
||||||
|
}
|
||||||
|
(mkVirtualHost "ha.s0.neet.dev" "http://localhost:8123") # home assistant
|
||||||
|
(mkVirtualHost "esphome.s0.neet.dev" "http://localhost:6052")
|
||||||
|
(mkVirtualHost "zigbee.s0.neet.dev" "http://localhost:55834")
|
||||||
|
{
|
||||||
"frigate.s0.neet.dev" = {
|
"frigate.s0.neet.dev" = {
|
||||||
# Just configure SSL, frigate module configures the rest of nginx
|
# Just configure SSL, frigate module configures the rest of nginx
|
||||||
useACMEHost = "s0.neet.dev";
|
useACMEHost = "s0.neet.dev";
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
(mkVirtualHost "vacuum.s0.neet.dev" "http://192.168.1.125") # valetudo
|
||||||
];
|
];
|
||||||
|
|
||||||
# Problem #1: Keeping certain programs from being accessed from certain external networks/VLANs
|
|
||||||
# Solution #1: Isolate that service in a container system that automatically fowards the ports to the right network interface(s)
|
|
||||||
# Solution #2: Don't open the firewall for these services, manually open the ports instead for the specific network interface(s) (trickier and easy to miss ports or ports can change)
|
|
||||||
# Untrusted network list:
|
|
||||||
# - VLANs [cameras]
|
|
||||||
|
|
||||||
# Problem #2: Untrusted internal services. Prevent them from accessing certain internal services (usually key unauth'd services like frigate)
|
|
||||||
# Solution #1: Isolate the untrusted services into their own container
|
|
||||||
# Untrusted services list:
|
|
||||||
# - Unifi? (it already has access to the cameras anyway?)
|
|
||||||
# - torrenting, *arr (worried about vulns)
|
|
||||||
|
|
||||||
|
|
||||||
tailscaleAuth = {
|
tailscaleAuth = {
|
||||||
enable = true;
|
enable = true;
|
||||||
virtualHosts = [
|
virtualHosts = [
|
||||||
@ -240,6 +231,7 @@
|
|||||||
# "ha.s0.neet.dev" # messes up home assistant
|
# "ha.s0.neet.dev" # messes up home assistant
|
||||||
"esphome.s0.neet.dev"
|
"esphome.s0.neet.dev"
|
||||||
"zigbee.s0.neet.dev"
|
"zigbee.s0.neet.dev"
|
||||||
|
"vacuum.s0.neet.dev"
|
||||||
];
|
];
|
||||||
expectedTailnet = "koi-bebop.ts.net";
|
expectedTailnet = "koi-bebop.ts.net";
|
||||||
};
|
};
|
||||||
|
155
machines/storage/s0/frigate.nix
Normal file
155
machines/storage/s0/frigate.nix
Normal file
@ -0,0 +1,155 @@
|
|||||||
|
{ config, pkgs, lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
frigateHostname = "frigate.s0.neet.dev";
|
||||||
|
|
||||||
|
mkGo2RtcStream = name: url: withAudio: {
|
||||||
|
${name} = [
|
||||||
|
url
|
||||||
|
"ffmpeg:${name}#video=copy${if withAudio then "#audio=copy" else ""}"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
# Assumes camera is set to output:
|
||||||
|
# - rtsp
|
||||||
|
# - H.264 + AAC
|
||||||
|
# - a downscaled substream for detection
|
||||||
|
mkCamera = name: primaryUrl: detectUrl: {
|
||||||
|
# Reference https://docs.frigate.video/configuration/reference/
|
||||||
|
services.frigate.settings = {
|
||||||
|
cameras.${name} = {
|
||||||
|
ffmpeg = {
|
||||||
|
# Camera feeds are relayed through go2rtc
|
||||||
|
inputs = [
|
||||||
|
{
|
||||||
|
path = "rtsp://127.0.0.1:8554/${name}";
|
||||||
|
# input_args = "preset-rtsp-restream";
|
||||||
|
input_args = "preset-rtsp-restream-low-latency";
|
||||||
|
roles = [ "record" ];
|
||||||
|
}
|
||||||
|
{
|
||||||
|
path = detectUrl;
|
||||||
|
roles = [ "detect" ];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
output_args = {
|
||||||
|
record = "preset-record-generic-audio-copy";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
services.go2rtc.settings.streams = lib.mkMerge [
|
||||||
|
(mkGo2RtcStream name primaryUrl false)
|
||||||
|
|
||||||
|
# Sadly having the detection stream go through go2rpc too makes the stream unreadable by frigate for some reason.
|
||||||
|
# It might need to be re-encoded to work. But I am not interested in wasting the processing power if only frigate
|
||||||
|
# need the detection stream anyway. So just let frigate grab the stream directly since it works.
|
||||||
|
# (mkGo2RtcStream detectName detectUrl false)
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
mkDahuaCamera = name: address:
|
||||||
|
let
|
||||||
|
# go2rtc and frigate have a slightly different syntax for inserting env vars. So the URLs are not interchangable :(
|
||||||
|
# - go2rtc: ${VAR}
|
||||||
|
# - frigate: {VAR}
|
||||||
|
primaryUrl = "rtsp://admin:\${FRIGATE_RTSP_PASSWORD}@${address}/cam/realmonitor?channel=1&subtype=0";
|
||||||
|
detectUrl = "rtsp://admin:{FRIGATE_RTSP_PASSWORD}@${address}/cam/realmonitor?channel=1&subtype=1";
|
||||||
|
in
|
||||||
|
mkCamera name primaryUrl detectUrl;
|
||||||
|
|
||||||
|
mkEsp32Camera = name: address: {
|
||||||
|
services.frigate.settings.cameras.${name} = {
|
||||||
|
ffmpeg = {
|
||||||
|
input_args = "";
|
||||||
|
inputs = [{
|
||||||
|
path = "http://${address}:8080";
|
||||||
|
roles = [ "detect" "record" ];
|
||||||
|
}];
|
||||||
|
|
||||||
|
output_args.record = "-f segment -pix_fmt yuv420p -segment_time 10 -segment_format mp4 -reset_timestamps 1 -strftime 1 -c:v libx264 -preset ultrafast -an ";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
in
|
||||||
|
lib.mkMerge [
|
||||||
|
(mkDahuaCamera "dog-cam" "192.168.10.31")
|
||||||
|
# (mkEsp32Camera "dahlia-cam" "dahlia-cam.lan")
|
||||||
|
{
|
||||||
|
services.frigate = {
|
||||||
|
enable = true;
|
||||||
|
hostname = frigateHostname;
|
||||||
|
settings = {
|
||||||
|
mqtt = {
|
||||||
|
enabled = true;
|
||||||
|
host = "localhost:1883";
|
||||||
|
};
|
||||||
|
rtmp.enabled = false;
|
||||||
|
snapshots = {
|
||||||
|
enabled = true;
|
||||||
|
bounding_box = true;
|
||||||
|
};
|
||||||
|
record = {
|
||||||
|
enabled = true;
|
||||||
|
# sync_recordings = true; # detect if recordings were deleted outside of frigate (expensive)
|
||||||
|
retain = {
|
||||||
|
days = 2; # Keep video for 2 days
|
||||||
|
mode = "motion";
|
||||||
|
};
|
||||||
|
events = {
|
||||||
|
retain = {
|
||||||
|
default = 10; # Keep video with detections for 10 days
|
||||||
|
mode = "motion";
|
||||||
|
# mode = "active_objects";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
# Make frigate aware of the go2rtc streams
|
||||||
|
go2rtc.streams = config.services.go2rtc.settings.streams;
|
||||||
|
detect.enabled = true;
|
||||||
|
objects = {
|
||||||
|
track = [ "person" "dog" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
services.go2rtc = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
rtsp.listen = ":8554";
|
||||||
|
webrtc.listen = ":8555";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Pass in env file with secrets to frigate/go2rtc
|
||||||
|
systemd.services.frigate.serviceConfig.EnvironmentFile = "/run/agenix/frigate-credentials";
|
||||||
|
systemd.services.go2rtc.serviceConfig.EnvironmentFile = "/run/agenix/frigate-credentials";
|
||||||
|
age.secrets.frigate-credentials.file = ../../../secrets/frigate-credentials.age;
|
||||||
|
}
|
||||||
|
{
|
||||||
|
# hardware encode/decode with amdgpu vaapi
|
||||||
|
systemd.services.frigate = {
|
||||||
|
environment.LIBVA_DRIVER_NAME = "radeonsi";
|
||||||
|
serviceConfig = {
|
||||||
|
SupplementaryGroups = [ "render" "video" ]; # for access to dev/dri/*
|
||||||
|
AmbientCapabilities = "CAP_PERFMON";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
services.frigate.settings.ffmpeg.hwaccel_args = "preset-vaapi";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
# Coral TPU for frigate
|
||||||
|
services.udev.packages = [ pkgs.libedgetpu ];
|
||||||
|
users.groups.apex = { };
|
||||||
|
systemd.services.frigate.environment.LD_LIBRARY_PATH = "${pkgs.libedgetpu}/lib";
|
||||||
|
systemd.services.frigate.serviceConfig.SupplementaryGroups = [ "apex" ];
|
||||||
|
|
||||||
|
# Coral PCIe driver
|
||||||
|
kernel.enableGasketKernelModule = true;
|
||||||
|
|
||||||
|
services.frigate.settings.detectors.coral = {
|
||||||
|
type = "edgetpu";
|
||||||
|
device = "pci";
|
||||||
|
};
|
||||||
|
}
|
||||||
|
]
|
@ -8,6 +8,7 @@
|
|||||||
|
|
||||||
# boot
|
# boot
|
||||||
boot.loader.systemd-boot.enable = true;
|
boot.loader.systemd-boot.enable = true;
|
||||||
|
boot.loader.systemd-boot.memtest86.enable = true;
|
||||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usb_storage" "uas" "sd_mod" "rtsx_pci_sdmmc" ];
|
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usb_storage" "uas" "sd_mod" "rtsx_pci_sdmmc" ];
|
||||||
boot.initrd.kernelModules = [ ];
|
boot.initrd.kernelModules = [ ];
|
||||||
boot.kernelModules = [ "kvm-intel" ];
|
boot.kernelModules = [ "kvm-intel" ];
|
||||||
@ -58,8 +59,12 @@
|
|||||||
};
|
};
|
||||||
swapDevices = [ ];
|
swapDevices = [ ];
|
||||||
|
|
||||||
networking.interfaces.eth0.useDHCP = true;
|
networking.vlans = {
|
||||||
networking.interfaces.eth1.useDHCP = true;
|
iot = {
|
||||||
|
id = 2;
|
||||||
|
interface = "eth1";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
powerManagement.cpuFreqGovernor = "powersave";
|
powerManagement.cpuFreqGovernor = "powersave";
|
||||||
}
|
}
|
||||||
|
@ -1,81 +1,6 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
let
|
|
||||||
frigateHostname = "frigate.s0.neet.dev";
|
|
||||||
|
|
||||||
mkEsp32Cam = address: {
|
|
||||||
ffmpeg = {
|
|
||||||
input_args = "";
|
|
||||||
inputs = [{
|
|
||||||
path = address;
|
|
||||||
roles = [ "detect" "record" ];
|
|
||||||
}];
|
|
||||||
|
|
||||||
output_args.record = "-f segment -pix_fmt yuv420p -segment_time 10 -segment_format mp4 -reset_timestamps 1 -strftime 1 -c:v libx264 -preset ultrafast -an ";
|
|
||||||
};
|
|
||||||
rtmp.enabled = false;
|
|
||||||
snapshots = {
|
|
||||||
enabled = true;
|
|
||||||
bounding_box = true;
|
|
||||||
};
|
|
||||||
record = {
|
|
||||||
enabled = true;
|
|
||||||
retain.days = 10; # Keep video for 10 days
|
|
||||||
events.retain = {
|
|
||||||
default = 30; # Keep video with detections for 30 days
|
|
||||||
mode = "active_objects";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
detect = {
|
|
||||||
enabled = true;
|
|
||||||
width = 800;
|
|
||||||
height = 600;
|
|
||||||
fps = 10;
|
|
||||||
};
|
|
||||||
objects = {
|
|
||||||
track = [ "person" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
in
|
|
||||||
{
|
{
|
||||||
networking.firewall.allowedTCPPorts = [
|
|
||||||
# 1883 # mqtt
|
|
||||||
];
|
|
||||||
|
|
||||||
services.frigate = {
|
|
||||||
enable = true;
|
|
||||||
hostname = frigateHostname;
|
|
||||||
settings = {
|
|
||||||
mqtt = {
|
|
||||||
enabled = true;
|
|
||||||
host = "localhost:1883";
|
|
||||||
};
|
|
||||||
cameras = {
|
|
||||||
dahlia-cam = mkEsp32Cam "http://dahlia-cam.lan:8080";
|
|
||||||
};
|
|
||||||
# ffmpeg = {
|
|
||||||
# hwaccel_args = "preset-vaapi";
|
|
||||||
# };
|
|
||||||
detectors.coral = {
|
|
||||||
type = "edgetpu";
|
|
||||||
device = "pci";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# AMD GPU for vaapi
|
|
||||||
systemd.services.frigate.environment.LIBVA_DRIVER_NAME = "radeonsi";
|
|
||||||
|
|
||||||
# Coral TPU for frigate
|
|
||||||
services.udev.packages = [ pkgs.libedgetpu ];
|
|
||||||
users.groups.apex = { };
|
|
||||||
systemd.services.frigate.environment.LD_LIBRARY_PATH = "${pkgs.libedgetpu}/lib";
|
|
||||||
systemd.services.frigate.serviceConfig = {
|
|
||||||
SupplementaryGroups = "apex";
|
|
||||||
};
|
|
||||||
# Coral PCIe driver
|
|
||||||
kernel.enableGasketKernelModule = true;
|
|
||||||
|
|
||||||
services.esphome.enable = true;
|
services.esphome.enable = true;
|
||||||
|
|
||||||
# TODO lock down
|
# TODO lock down
|
||||||
@ -137,6 +62,9 @@ in
|
|||||||
"weather"
|
"weather"
|
||||||
"whois"
|
"whois"
|
||||||
"youtube"
|
"youtube"
|
||||||
|
"homekit_controller"
|
||||||
|
"zha"
|
||||||
|
"bluetooth"
|
||||||
];
|
];
|
||||||
# config = null;
|
# config = null;
|
||||||
config = {
|
config = {
|
||||||
|
@ -11,6 +11,7 @@
|
|||||||
"pia"
|
"pia"
|
||||||
"binary-cache"
|
"binary-cache"
|
||||||
"gitea-actions-runner"
|
"gitea-actions-runner"
|
||||||
|
"frigate"
|
||||||
];
|
];
|
||||||
|
|
||||||
hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAwiXcUFtAvZCayhu4+AIcF+Ktrdgv9ee/mXSIhJbp4q";
|
hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAwiXcUFtAvZCayhu4+AIcF+Ktrdgv9ee/mXSIhJbp4q";
|
||||||
|
7
secrets/frigate-credentials.age
Normal file
7
secrets/frigate-credentials.age
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 hPp1nw Chke1ZtpXxN1c1+AnJ6Cd5kpM1KfQKTwymrfPW53QCA
|
||||||
|
jUcw8eitC7r0rwefjllndZjARIqpWoVqGCnefHfjQ6Y
|
||||||
|
-> ssh-ed25519 w3nu8g KY/5bU1B5uvmfGHF2d6qBL1NYy64qo324rdvkgnXoDA
|
||||||
|
OBvuFtzZXQ0RmmEXelyzHMMiVqZir7zQJMA36ZH2siE
|
||||||
|
--- CSd7lYSYQ2fCTjkJLPGdaNGL8eVpE9IBEyFo0LW907M
|
||||||
|
£³$šO†ÈIß/À//Êw*ƒ™õD¤@u5o[¼â:·äš¥t¾˜]Jñ쮸™@Ùhþu£Àk;?·XüÁHRº’ѰE5¥ÍçÜ9
|
@ -54,4 +54,7 @@ with roles;
|
|||||||
|
|
||||||
# For ACME DNS Challenge
|
# For ACME DNS Challenge
|
||||||
"digitalocean-dns-credentials.age".publicKeys = server;
|
"digitalocean-dns-credentials.age".publicKeys = server;
|
||||||
|
|
||||||
|
# Frigate (DVR)
|
||||||
|
"frigate-credentials.age".publicKeys = frigate;
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user