Compare commits
1 Commits
master
...
rpi-hotspo
Author | SHA1 | Date | |
---|---|---|---|
f30595fa2d |
@ -4,7 +4,7 @@
|
|||||||
- `/common` - common configuration imported into all `/machines`
|
- `/common` - common configuration imported into all `/machines`
|
||||||
- `/boot` - config related to bootloaders, cpu microcode, and unlocking LUKS root disks over tor
|
- `/boot` - config related to bootloaders, cpu microcode, and unlocking LUKS root disks over tor
|
||||||
- `/network` - config for tailscale, and NixOS container with automatic vpn tunneling via PIA
|
- `/network` - config for tailscale, and NixOS container with automatic vpn tunneling via PIA
|
||||||
- `/pc` - config that a graphical PC should have. Have the `personal` role set in the machine's `properties.nix` to enable everthing.
|
- `/pc` - config that a graphical desktop computer should have. Use `de.enable = true;` to enable everthing.
|
||||||
- `/server` - config that creates new nixos services or extends existing ones to meet my needs
|
- `/server` - config that creates new nixos services or extends existing ones to meet my needs
|
||||||
- `/machines` - all my NixOS machines along with their machine unique configuration for hardware and services
|
- `/machines` - all my NixOS machines along with their machine unique configuration for hardware and services
|
||||||
- `/kexec` - a special machine for generating minimal kexec images. Does not import `/common`
|
- `/kexec` - a special machine for generating minimal kexec images. Does not import `/common`
|
||||||
|
@ -1,17 +1,29 @@
|
|||||||
{ config, lib, ... }:
|
{ config, lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
|
||||||
|
in
|
||||||
{
|
{
|
||||||
nix = {
|
options.enableExtraSubstituters = lib.mkEnableOption "Enable extra substituters";
|
||||||
settings = {
|
|
||||||
substituters = [
|
config = lib.mkMerge [
|
||||||
"https://cache.nixos.org/"
|
{
|
||||||
"https://nix-community.cachix.org"
|
enableExtraSubstituters = lib.mkDefault true;
|
||||||
"http://s0.koi-bebop.ts.net:5000"
|
}
|
||||||
];
|
(lib.mkIf config.enableExtraSubstituters {
|
||||||
trusted-public-keys = [
|
nix = {
|
||||||
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
|
settings = {
|
||||||
"s0.koi-bebop.ts.net:OjbzD86YjyJZpCp9RWaQKANaflcpKhtzBMNP8I2aPUU="
|
substituters = [
|
||||||
];
|
"https://cache.nixos.org/"
|
||||||
};
|
"https://nix-community.cachix.org"
|
||||||
};
|
"http://s0.koi-bebop.ts.net:5000"
|
||||||
|
];
|
||||||
|
trusted-public-keys = [
|
||||||
|
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
|
||||||
|
"s0.koi-bebop.ts.net:OjbzD86YjyJZpCp9RWaQKANaflcpKhtzBMNP8I2aPUU="
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
})
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
@ -98,9 +98,4 @@
|
|||||||
|
|
||||||
security.acme.acceptTerms = true;
|
security.acme.acceptTerms = true;
|
||||||
security.acme.defaults.email = "zuckerberg@neet.dev";
|
security.acme.defaults.email = "zuckerberg@neet.dev";
|
||||||
|
|
||||||
# Enable Desktop Environment if this is a PC (machine role is "personal")
|
|
||||||
de.enable = (
|
|
||||||
builtins.elem config.networking.hostName config.machines.roles.personal
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
|
@ -13,6 +13,12 @@ in
|
|||||||
extraOptions = ''
|
extraOptions = ''
|
||||||
experimental-features = nix-command flakes
|
experimental-features = nix-command flakes
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
# pin nixpkgs for system commands such as "nix shell"
|
||||||
|
registry.nixpkgs.flake = config.inputs.nixpkgs;
|
||||||
|
|
||||||
|
# pin system nixpkgs to the same version as the flake input
|
||||||
|
nixPath = [ "nixpkgs=${config.inputs.nixpkgs}" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -151,7 +151,7 @@ in
|
|||||||
partOf = [ containerServiceName ];
|
partOf = [ containerServiceName ];
|
||||||
wantedBy = [ "multi-user.target" ];
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
|
||||||
path = with pkgs; [ wireguard-tools jq curl iproute2 iputils ];
|
path = with pkgs; [ wireguard-tools jq curl iproute iputils ];
|
||||||
|
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
Type = "oneshot";
|
Type = "oneshot";
|
||||||
@ -224,7 +224,7 @@ in
|
|||||||
after = [ "network.target" "network-online.target" ];
|
after = [ "network.target" "network-online.target" ];
|
||||||
wantedBy = [ "multi-user.target" ];
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
|
||||||
path = with pkgs; [ wireguard-tools iproute2 curl jq iptables ];
|
path = with pkgs; [ wireguard-tools iproute curl jq iptables ];
|
||||||
|
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
Type = "oneshot";
|
Type = "oneshot";
|
||||||
|
@ -22,8 +22,8 @@ in
|
|||||||
services.pipewire.extraConfig.pipewire."92-fix-wine-audio" = {
|
services.pipewire.extraConfig.pipewire."92-fix-wine-audio" = {
|
||||||
context.properties = {
|
context.properties = {
|
||||||
default.clock.rate = 48000;
|
default.clock.rate = 48000;
|
||||||
default.clock.quantum = 256;
|
default.clock.quantum = 2048;
|
||||||
default.clock.min-quantum = 256;
|
default.clock.min-quantum = 512;
|
||||||
default.clock.max-quantum = 2048;
|
default.clock.max-quantum = 2048;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -57,7 +57,7 @@ in
|
|||||||
};
|
};
|
||||||
# todo vulkan in chrome
|
# todo vulkan in chrome
|
||||||
# todo video encoding in chrome
|
# todo video encoding in chrome
|
||||||
hardware.graphics = {
|
hardware.opengl = {
|
||||||
enable = true;
|
enable = true;
|
||||||
extraPackages = with pkgs; [
|
extraPackages = with pkgs; [
|
||||||
intel-media-driver # LIBVA_DRIVER_NAME=iHD
|
intel-media-driver # LIBVA_DRIVER_NAME=iHD
|
||||||
|
@ -6,10 +6,12 @@ in
|
|||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./kde.nix
|
./kde.nix
|
||||||
|
# ./xfce.nix
|
||||||
./yubikey.nix
|
./yubikey.nix
|
||||||
./chromium.nix
|
./chromium.nix
|
||||||
./firefox.nix
|
./firefox.nix
|
||||||
./audio.nix
|
./audio.nix
|
||||||
|
# ./torbrowser.nix
|
||||||
./pithos.nix
|
./pithos.nix
|
||||||
./vscodium.nix
|
./vscodium.nix
|
||||||
./discord.nix
|
./discord.nix
|
||||||
@ -25,10 +27,9 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
config = lib.mkIf cfg.enable {
|
config = lib.mkIf cfg.enable {
|
||||||
environment.systemPackages = with pkgs; [
|
# vulkan
|
||||||
# https://github.com/NixOS/nixpkgs/pull/328086#issuecomment-2235384618
|
hardware.opengl.driSupport = true;
|
||||||
gparted
|
hardware.opengl.driSupport32Bit = true;
|
||||||
];
|
|
||||||
|
|
||||||
# Applications
|
# Applications
|
||||||
users.users.googlebot.packages = with pkgs; [
|
users.users.googlebot.packages = with pkgs; [
|
||||||
@ -41,6 +42,7 @@ in
|
|||||||
mpv
|
mpv
|
||||||
nextcloud-client
|
nextcloud-client
|
||||||
signal-desktop
|
signal-desktop
|
||||||
|
gparted
|
||||||
libreoffice-fresh
|
libreoffice-fresh
|
||||||
thunderbird
|
thunderbird
|
||||||
spotify
|
spotify
|
||||||
@ -54,8 +56,6 @@ in
|
|||||||
|
|
||||||
# For Nix IDE
|
# For Nix IDE
|
||||||
nixpkgs-fmt
|
nixpkgs-fmt
|
||||||
nixd
|
|
||||||
nil
|
|
||||||
];
|
];
|
||||||
|
|
||||||
# Networking
|
# Networking
|
||||||
|
@ -14,7 +14,7 @@ in
|
|||||||
# akonadi
|
# akonadi
|
||||||
# kmail
|
# kmail
|
||||||
# plasma5Packages.kmail-account-wizard
|
# plasma5Packages.kmail-account-wizard
|
||||||
kdePackages.kate
|
kate
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
25
common/pc/torbrowser.nix
Normal file
25
common/pc/torbrowser.nix
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{ lib, config, pkgs, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
cfg = config.de;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
nixpkgs.overlays = [
|
||||||
|
(self: super: {
|
||||||
|
tor-browser-bundle-bin = super.tor-browser-bundle-bin.overrideAttrs (old: rec {
|
||||||
|
version = "10.0.10";
|
||||||
|
lang = "en-US";
|
||||||
|
src = pkgs.fetchurl {
|
||||||
|
url = "https://dist.torproject.org/torbrowser/${version}/tor-browser-linux64-${version}_${lang}.tar.xz";
|
||||||
|
sha256 = "vYWZ+NsGN8YH5O61+zrUjlFv3rieaBqjBQ+a18sQcZg=";
|
||||||
|
};
|
||||||
|
});
|
||||||
|
})
|
||||||
|
];
|
||||||
|
|
||||||
|
users.users.googlebot.packages = with pkgs; [
|
||||||
|
tor-browser-bundle-bin
|
||||||
|
];
|
||||||
|
};
|
||||||
|
}
|
@ -1,9 +1,13 @@
|
|||||||
{ lib, config, pkgs, ... }:
|
{ lib, config, pkgs, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
cfg = config.de;
|
cfg = config.de.touchpad;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
options.de.touchpad = {
|
||||||
|
enable = lib.mkEnableOption "enable touchpad";
|
||||||
|
};
|
||||||
|
|
||||||
config = lib.mkIf cfg.enable {
|
config = lib.mkIf cfg.enable {
|
||||||
services.libinput.enable = true;
|
services.libinput.enable = true;
|
||||||
services.libinput.touchpad.naturalScrolling = true;
|
services.libinput.touchpad.naturalScrolling = true;
|
||||||
|
@ -13,7 +13,6 @@ let
|
|||||||
ms-vscode.cpptools
|
ms-vscode.cpptools
|
||||||
rust-lang.rust-analyzer
|
rust-lang.rust-analyzer
|
||||||
vadimcn.vscode-lldb
|
vadimcn.vscode-lldb
|
||||||
tauri-apps.tauri-vscode
|
|
||||||
] ++ pkgs.vscode-utils.extensionsFromVscodeMarketplace [
|
] ++ pkgs.vscode-utils.extensionsFromVscodeMarketplace [
|
||||||
{
|
{
|
||||||
name = "platformio-ide";
|
name = "platformio-ide";
|
||||||
@ -27,12 +26,6 @@ let
|
|||||||
version = "0.8.1";
|
version = "0.8.1";
|
||||||
sha256 = "ckclcxdUxhjWlPnDFVleLCWgWxUEENe0V328cjaZv+Y=";
|
sha256 = "ckclcxdUxhjWlPnDFVleLCWgWxUEENe0V328cjaZv+Y=";
|
||||||
}
|
}
|
||||||
{
|
|
||||||
name = "volar";
|
|
||||||
publisher = "Vue";
|
|
||||||
version = "2.2.4";
|
|
||||||
sha256 = "FHS/LNjSUVfCb4SVF9naR4W0JqycWzSWiK54jfbRagA=";
|
|
||||||
}
|
|
||||||
];
|
];
|
||||||
|
|
||||||
vscodium-with-extensions = pkgs.vscode-with-extensions.override {
|
vscodium-with-extensions = pkgs.vscode-with-extensions.override {
|
||||||
|
23
common/pc/xfce.nix
Normal file
23
common/pc/xfce.nix
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
{ lib, config, pkgs, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
cfg = config.de;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
services.xserver = {
|
||||||
|
enable = true;
|
||||||
|
desktopManager = {
|
||||||
|
xterm.enable = false;
|
||||||
|
xfce.enable = true;
|
||||||
|
};
|
||||||
|
displayManager.sddm.enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# xfce apps
|
||||||
|
# TODO for some reason whiskermenu needs to be global for it to work
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
xfce.xfce4-whiskermenu-plugin
|
||||||
|
];
|
||||||
|
};
|
||||||
|
}
|
41
common/server/dashy.nix
Normal file
41
common/server/dashy.nix
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
|
with lib;
|
||||||
|
|
||||||
|
let
|
||||||
|
cfg = config.services.dashy;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options.services.dashy = {
|
||||||
|
enable = mkEnableOption "dashy";
|
||||||
|
imageTag = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "latest";
|
||||||
|
};
|
||||||
|
port = mkOption {
|
||||||
|
type = types.int;
|
||||||
|
default = 56815;
|
||||||
|
};
|
||||||
|
configFile = lib.mkOption {
|
||||||
|
type = lib.types.path;
|
||||||
|
description = "Path to the YAML configuration file";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = mkIf cfg.enable {
|
||||||
|
virtualisation.oci-containers.containers = {
|
||||||
|
dashy = {
|
||||||
|
image = "lissy93/dashy:${cfg.imageTag}";
|
||||||
|
environment = {
|
||||||
|
TZ = "${config.time.timeZone}";
|
||||||
|
};
|
||||||
|
ports = [
|
||||||
|
"127.0.0.1:${toString cfg.port}:80"
|
||||||
|
];
|
||||||
|
volumes = [
|
||||||
|
"${cfg.configFile}:/app/public/conf.yml"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
@ -10,6 +10,7 @@
|
|||||||
./matrix.nix
|
./matrix.nix
|
||||||
./zerobin.nix
|
./zerobin.nix
|
||||||
./gitea.nix
|
./gitea.nix
|
||||||
|
./privatebin/privatebin.nix
|
||||||
./radio.nix
|
./radio.nix
|
||||||
./samba.nix
|
./samba.nix
|
||||||
./owncast.nix
|
./owncast.nix
|
||||||
@ -18,6 +19,7 @@
|
|||||||
./iodine.nix
|
./iodine.nix
|
||||||
./searx.nix
|
./searx.nix
|
||||||
./gitea-actions-runner.nix
|
./gitea-actions-runner.nix
|
||||||
|
./dashy.nix
|
||||||
./librechat.nix
|
./librechat.nix
|
||||||
./actualbudget.nix
|
./actualbudget.nix
|
||||||
./unifi.nix
|
./unifi.nix
|
||||||
|
@ -24,7 +24,7 @@ in
|
|||||||
SHOW_FOOTER_VERSION = false;
|
SHOW_FOOTER_VERSION = false;
|
||||||
};
|
};
|
||||||
ui = {
|
ui = {
|
||||||
DEFAULT_THEME = "gitea-dark";
|
DEFAULT_THEME = "arc-green";
|
||||||
};
|
};
|
||||||
service = {
|
service = {
|
||||||
DISABLE_REGISTRATION = true;
|
DISABLE_REGISTRATION = true;
|
||||||
|
@ -21,17 +21,11 @@ in
|
|||||||
config = mkIf cfg.enable {
|
config = mkIf cfg.enable {
|
||||||
virtualisation.oci-containers.containers = {
|
virtualisation.oci-containers.containers = {
|
||||||
librechat = {
|
librechat = {
|
||||||
image = "ghcr.io/danny-avila/librechat:v0.7.7";
|
image = "ghcr.io/danny-avila/librechat:v0.6.6";
|
||||||
environment = {
|
environment = {
|
||||||
HOST = "0.0.0.0";
|
HOST = "0.0.0.0";
|
||||||
MONGO_URI = "mongodb://host.containers.internal:27017/LibreChat";
|
MONGO_URI = "mongodb://host.containers.internal:27017/LibreChat";
|
||||||
ENDPOINTS = "openAI,google,bingAI,gptPlugins";
|
ENDPOINTS = "openAI,google,bingAI,gptPlugins";
|
||||||
OPENAI_MODELS = lib.concatStringsSep "," [
|
|
||||||
"gpt-4o-mini"
|
|
||||||
"o3-mini"
|
|
||||||
"gpt-4o"
|
|
||||||
"o1"
|
|
||||||
];
|
|
||||||
REFRESH_TOKEN_EXPIRY = toString (1000 * 60 * 60 * 24 * 30); # 30 days
|
REFRESH_TOKEN_EXPIRY = toString (1000 * 60 * 60 * 24 * 30); # 30 days
|
||||||
};
|
};
|
||||||
environmentFiles = [
|
environmentFiles = [
|
||||||
|
42
common/server/privatebin/conf.php
Normal file
42
common/server/privatebin/conf.php
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
;<?php http_response_code(403); /*
|
||||||
|
[main]
|
||||||
|
name = "Kode Paste"
|
||||||
|
discussion = false
|
||||||
|
opendiscussion = false
|
||||||
|
password = true
|
||||||
|
fileupload = false
|
||||||
|
burnafterreadingselected = false
|
||||||
|
defaultformatter = "plaintext"
|
||||||
|
sizelimit = 10485760
|
||||||
|
template = "bootstrap"
|
||||||
|
languageselection = false
|
||||||
|
|
||||||
|
[expire]
|
||||||
|
default = "1week"
|
||||||
|
|
||||||
|
[expire_options]
|
||||||
|
5min = 300
|
||||||
|
10min = 600
|
||||||
|
1hour = 3600
|
||||||
|
1day = 86400
|
||||||
|
1week = 604800
|
||||||
|
|
||||||
|
[formatter_options]
|
||||||
|
plaintext = "Plain Text"
|
||||||
|
syntaxhighlighting = "Source Code"
|
||||||
|
markdown = "Markdown"
|
||||||
|
|
||||||
|
[traffic]
|
||||||
|
limit = 10
|
||||||
|
dir = "/var/lib/privatebin"
|
||||||
|
|
||||||
|
[purge]
|
||||||
|
limit = 300
|
||||||
|
batchsize = 10
|
||||||
|
dir = "/var/lib/privatebin"
|
||||||
|
|
||||||
|
[model]
|
||||||
|
class = Filesystem
|
||||||
|
|
||||||
|
[model_options]
|
||||||
|
dir = "/var/lib/privatebin"
|
74
common/server/privatebin/privatebin.nix
Normal file
74
common/server/privatebin/privatebin.nix
Normal file
@ -0,0 +1,74 @@
|
|||||||
|
{ config, pkgs, lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
cfg = config.services.privatebin;
|
||||||
|
privateBinSrc = pkgs.stdenv.mkDerivation {
|
||||||
|
name = "privatebin";
|
||||||
|
src = pkgs.fetchFromGitHub {
|
||||||
|
owner = "privatebin";
|
||||||
|
repo = "privatebin";
|
||||||
|
rev = "d65bf02d7819a530c3c2a88f6f9947651fe5258d";
|
||||||
|
sha256 = "7ttAvEDL1ab0cUZcqZzXFkXwB2rF2t4eNpPxt48ap94=";
|
||||||
|
};
|
||||||
|
installPhase = ''
|
||||||
|
cp -ar $src $out
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options.services.privatebin = {
|
||||||
|
enable = lib.mkEnableOption "enable privatebin";
|
||||||
|
host = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
example = "example.com";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
|
||||||
|
users.users.privatebin = {
|
||||||
|
description = "privatebin service user";
|
||||||
|
group = "privatebin";
|
||||||
|
isSystemUser = true;
|
||||||
|
};
|
||||||
|
users.groups.privatebin = { };
|
||||||
|
|
||||||
|
services.nginx.enable = true;
|
||||||
|
services.nginx.virtualHosts.${cfg.host} = {
|
||||||
|
enableACME = true;
|
||||||
|
forceSSL = true;
|
||||||
|
locations."/" = {
|
||||||
|
root = privateBinSrc;
|
||||||
|
index = "index.php";
|
||||||
|
};
|
||||||
|
locations."~ \.php$" = {
|
||||||
|
root = privateBinSrc;
|
||||||
|
extraConfig = ''
|
||||||
|
fastcgi_pass unix:${config.services.phpfpm.pools.privatebin.socket};
|
||||||
|
fastcgi_index index.php;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.tmpfiles.rules = [
|
||||||
|
"d '/var/lib/privatebin' 0750 privatebin privatebin - -"
|
||||||
|
];
|
||||||
|
|
||||||
|
services.phpfpm.pools.privatebin = {
|
||||||
|
user = "privatebin";
|
||||||
|
group = "privatebin";
|
||||||
|
phpEnv = {
|
||||||
|
CONFIG_PATH = "${./conf.php}";
|
||||||
|
};
|
||||||
|
settings = {
|
||||||
|
pm = "dynamic";
|
||||||
|
"listen.owner" = config.services.nginx.user;
|
||||||
|
"pm.max_children" = 5;
|
||||||
|
"pm.start_servers" = 2;
|
||||||
|
"pm.min_spare_servers" = 1;
|
||||||
|
"pm.max_spare_servers" = 3;
|
||||||
|
"pm.max_requests" = 500;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
@ -5,28 +5,30 @@
|
|||||||
services.samba = {
|
services.samba = {
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
package = pkgs.sambaFull; # printer sharing
|
package = pkgs.sambaFull; # printer sharing
|
||||||
|
securityType = "user";
|
||||||
|
|
||||||
# should this be on?
|
# should this be on?
|
||||||
nsswins = true;
|
nsswins = true;
|
||||||
|
|
||||||
settings = {
|
extraConfig = ''
|
||||||
global = {
|
workgroup = HOME
|
||||||
security = "user";
|
server string = smbnix
|
||||||
workgroup = "HOME";
|
netbios name = smbnix
|
||||||
"server string" = "smbnix";
|
security = user
|
||||||
"netbios name" = "smbnix";
|
use sendfile = yes
|
||||||
"use sendfile" = "yes";
|
min protocol = smb2
|
||||||
"min protocol" = "smb2";
|
guest account = nobody
|
||||||
"guest account" = "nobody";
|
map to guest = bad user
|
||||||
"map to guest" = "bad user";
|
|
||||||
|
|
||||||
# printing
|
# printing
|
||||||
"load printers" = "yes";
|
load printers = yes
|
||||||
printing = "cups";
|
printing = cups
|
||||||
"printcap name" = "cups";
|
printcap name = cups
|
||||||
|
|
||||||
"hide files" = "/.nobackup/.DS_Store/._.DS_Store/";
|
hide files = /.nobackup/.DS_Store/._.DS_Store/
|
||||||
};
|
'';
|
||||||
|
|
||||||
|
shares = {
|
||||||
public = {
|
public = {
|
||||||
path = "/data/samba/Public";
|
path = "/data/samba/Public";
|
||||||
browseable = "yes";
|
browseable = "yes";
|
||||||
@ -75,9 +77,9 @@
|
|||||||
|
|
||||||
# backups
|
# backups
|
||||||
backup.group."samba".paths = [
|
backup.group."samba".paths = [
|
||||||
config.services.samba.settings.googlebot.path
|
config.services.samba.shares.googlebot.path
|
||||||
config.services.samba.settings.cris.path
|
config.services.samba.shares.cris.path
|
||||||
config.services.samba.settings.public.path
|
config.services.samba.shares.public.path
|
||||||
];
|
];
|
||||||
|
|
||||||
# Windows discovery of samba server
|
# Windows discovery of samba server
|
||||||
|
@ -10,8 +10,7 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
config = lib.mkIf cfg.enable {
|
config = lib.mkIf cfg.enable {
|
||||||
services.unifi.unifiPackage = pkgs.unifi;
|
services.unifi.unifiPackage = pkgs.unifi8;
|
||||||
services.unifi.mongodbPackage = pkgs.mongodb-7_0;
|
|
||||||
|
|
||||||
networking.firewall = lib.mkIf cfg.openMinimalFirewall {
|
networking.firewall = lib.mkIf cfg.openMinimalFirewall {
|
||||||
allowedUDPPorts = [
|
allowedUDPPorts = [
|
||||||
|
45
flake.lock
generated
45
flake.lock
generated
@ -3,9 +3,7 @@
|
|||||||
"agenix": {
|
"agenix": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"darwin": "darwin",
|
"darwin": "darwin",
|
||||||
"home-manager": [
|
"home-manager": "home-manager",
|
||||||
"home-manager"
|
|
||||||
],
|
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"nixpkgs"
|
"nixpkgs"
|
||||||
],
|
],
|
||||||
@ -53,11 +51,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1739947126,
|
"lastModified": 1651719222,
|
||||||
"narHash": "sha256-JoiddH5H9up8jC/VKU8M7wDlk/bstKoJ3rHj+TkW4Zo=",
|
"narHash": "sha256-p/GY5vOP+HUlxNL4OtEhmBNEVQsedOHXEmjfCGONVmE=",
|
||||||
"ref": "refs/heads/master",
|
"ref": "refs/heads/master",
|
||||||
"rev": "ea1ad60f1c6662103ef4a3705d8e15aa01219529",
|
"rev": "1290ddd9a2ff2bf2d0f702750768312b80efcd34",
|
||||||
"revCount": 20,
|
"revCount": 19,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "https://git.neet.dev/zuckerberg/dailybot.git"
|
"url": "https://git.neet.dev/zuckerberg/dailybot.git"
|
||||||
},
|
},
|
||||||
@ -153,15 +151,16 @@
|
|||||||
"home-manager": {
|
"home-manager": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
|
"agenix",
|
||||||
"nixpkgs"
|
"nixpkgs"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1740845322,
|
"lastModified": 1703113217,
|
||||||
"narHash": "sha256-AXEgFj3C0YJhu9k1OhbRhiA6FnDr81dQZ65U3DhaWpw=",
|
"narHash": "sha256-7ulcXOk63TIT2lVDSExj7XzFx09LpdSAPtvgtM7yQPE=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "fcac3d6d88302a5e64f6cb8014ac785e08874c8d",
|
"rev": "3bfaacf46133c037bb356193bd2f1765d9dc82c1",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -208,20 +207,36 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1740374225,
|
"lastModified": 1728193676,
|
||||||
"narHash": "sha256-Dnmzy5YWUVj3BNaZo5jRpZslXexbNKEk3ADGGcz9RpY=",
|
"narHash": "sha256-PbDWAIjKJdlVg+qQRhzdSor04bAPApDqIv2DofTyynk=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "3349acd765bdffe454f7c8bbc450855577c1a6cf",
|
"rev": "ecbc1ca8ffd6aea8372ad16be9ebbb39889e55b6",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"ref": "master",
|
"ref": "nixos-24.05",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"nixpkgs-frigate": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1695825837,
|
||||||
|
"narHash": "sha256-4Ne11kNRnQsmSJCRSSNkFRSnHC4Y5gPDBIQGjjPfJiU=",
|
||||||
|
"owner": "NixOS",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "5cfafa12d57374f48bcc36fda3274ada276cf69e",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "NixOS",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "5cfafa12d57374f48bcc36fda3274ada276cf69e",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"radio": {
|
"radio": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"flake-utils": [
|
"flake-utils": [
|
||||||
@ -270,10 +285,10 @@
|
|||||||
"deploy-rs": "deploy-rs",
|
"deploy-rs": "deploy-rs",
|
||||||
"flake-compat": "flake-compat",
|
"flake-compat": "flake-compat",
|
||||||
"flake-utils": "flake-utils",
|
"flake-utils": "flake-utils",
|
||||||
"home-manager": "home-manager",
|
|
||||||
"nix-index-database": "nix-index-database",
|
"nix-index-database": "nix-index-database",
|
||||||
"nixos-hardware": "nixos-hardware",
|
"nixos-hardware": "nixos-hardware",
|
||||||
"nixpkgs": "nixpkgs",
|
"nixpkgs": "nixpkgs",
|
||||||
|
"nixpkgs-frigate": "nixpkgs-frigate",
|
||||||
"radio": "radio",
|
"radio": "radio",
|
||||||
"radio-web": "radio-web",
|
"radio-web": "radio-web",
|
||||||
"simple-nixos-mailserver": "simple-nixos-mailserver",
|
"simple-nixos-mailserver": "simple-nixos-mailserver",
|
||||||
|
27
flake.nix
27
flake.nix
@ -1,7 +1,8 @@
|
|||||||
{
|
{
|
||||||
inputs = {
|
inputs = {
|
||||||
# nixpkgs
|
# nixpkgs
|
||||||
nixpkgs.url = "github:NixOS/nixpkgs/master";
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.05";
|
||||||
|
nixpkgs-frigate.url = "github:NixOS/nixpkgs/5cfafa12d57374f48bcc36fda3274ada276cf69e";
|
||||||
|
|
||||||
# Common Utils Among flake inputs
|
# Common Utils Among flake inputs
|
||||||
systems.url = "github:nix-systems/default";
|
systems.url = "github:nix-systems/default";
|
||||||
@ -17,12 +18,6 @@
|
|||||||
# NixOS hardware
|
# NixOS hardware
|
||||||
nixos-hardware.url = "github:NixOS/nixos-hardware/master";
|
nixos-hardware.url = "github:NixOS/nixos-hardware/master";
|
||||||
|
|
||||||
# Home Manager
|
|
||||||
home-manager = {
|
|
||||||
url = "github:nix-community/home-manager";
|
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
|
||||||
};
|
|
||||||
|
|
||||||
# Mail Server
|
# Mail Server
|
||||||
simple-nixos-mailserver = {
|
simple-nixos-mailserver = {
|
||||||
url = "gitlab:simple-nixos-mailserver/nixos-mailserver/master";
|
url = "gitlab:simple-nixos-mailserver/nixos-mailserver/master";
|
||||||
@ -39,7 +34,6 @@
|
|||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs.follows = "nixpkgs";
|
nixpkgs.follows = "nixpkgs";
|
||||||
systems.follows = "systems";
|
systems.follows = "systems";
|
||||||
home-manager.follows = "home-manager";
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -88,9 +82,7 @@
|
|||||||
{
|
{
|
||||||
inherit nixpkgs;
|
inherit nixpkgs;
|
||||||
assertionsModule = "${nixpkgs}/nixos/modules/misc/assertions.nix";
|
assertionsModule = "${nixpkgs}/nixos/modules/misc/assertions.nix";
|
||||||
}).machines;
|
}).machines.hosts;
|
||||||
machineHosts = machines.hosts;
|
|
||||||
machineRoles = machines.roles;
|
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
nixosConfigurations =
|
nixosConfigurations =
|
||||||
@ -101,7 +93,6 @@
|
|||||||
agenix.nixosModules.default
|
agenix.nixosModules.default
|
||||||
dailybuild_modules.nixosModule
|
dailybuild_modules.nixosModule
|
||||||
nix-index-database.nixosModules.nix-index
|
nix-index-database.nixosModules.nix-index
|
||||||
home-manager.nixosModules.home-manager
|
|
||||||
self.nixosModules.kernel-modules
|
self.nixosModules.kernel-modules
|
||||||
({ lib, ... }: {
|
({ lib, ... }: {
|
||||||
config = {
|
config = {
|
||||||
@ -112,13 +103,6 @@
|
|||||||
];
|
];
|
||||||
|
|
||||||
networking.hostName = hostname;
|
networking.hostName = hostname;
|
||||||
|
|
||||||
home-manager.useGlobalPkgs = true;
|
|
||||||
home-manager.useUserPackages = true;
|
|
||||||
home-manager.users.googlebot = import ./home/googlebot.nix {
|
|
||||||
inherit hostname;
|
|
||||||
inherit machineRoles;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
|
||||||
# because nixos specialArgs doesn't work for containers... need to pass in inputs a different way
|
# because nixos specialArgs doesn't work for containers... need to pass in inputs a different way
|
||||||
@ -137,7 +121,6 @@
|
|||||||
src = nixpkgs;
|
src = nixpkgs;
|
||||||
patches = [
|
patches = [
|
||||||
./patches/gamepadui.patch
|
./patches/gamepadui.patch
|
||||||
./patches/dont-break-nix-serve.patch
|
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
patchedNixpkgs = nixpkgs.lib.fix (self: (import "${patchedNixpkgsSrc}/flake.nix").outputs { self = nixpkgs; });
|
patchedNixpkgs = nixpkgs.lib.fix (self: (import "${patchedNixpkgsSrc}/flake.nix").outputs { self = nixpkgs; });
|
||||||
@ -157,7 +140,7 @@
|
|||||||
nixpkgs.lib.mapAttrs
|
nixpkgs.lib.mapAttrs
|
||||||
(hostname: cfg:
|
(hostname: cfg:
|
||||||
mkSystem cfg.arch nixpkgs cfg.configurationPath hostname)
|
mkSystem cfg.arch nixpkgs cfg.configurationPath hostname)
|
||||||
machineHosts;
|
machines;
|
||||||
|
|
||||||
packages =
|
packages =
|
||||||
let
|
let
|
||||||
@ -194,7 +177,7 @@
|
|||||||
nixpkgs.lib.mapAttrs
|
nixpkgs.lib.mapAttrs
|
||||||
(hostname: cfg:
|
(hostname: cfg:
|
||||||
mkDeploy hostname cfg.arch (builtins.head cfg.hostNames))
|
mkDeploy hostname cfg.arch (builtins.head cfg.hostNames))
|
||||||
machineHosts;
|
machines;
|
||||||
|
|
||||||
checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) inputs.deploy-rs.lib;
|
checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) inputs.deploy-rs.lib;
|
||||||
|
|
||||||
|
@ -1,83 +0,0 @@
|
|||||||
{ hostname, machineRoles }:
|
|
||||||
{ config, lib, pkgs, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
# Check if the current machine has the role "personal"
|
|
||||||
thisMachineIsPersonal = builtins.elem hostname machineRoles.personal;
|
|
||||||
in
|
|
||||||
{
|
|
||||||
home.username = "googlebot";
|
|
||||||
home.homeDirectory = "/home/googlebot";
|
|
||||||
|
|
||||||
home.stateVersion = "24.11";
|
|
||||||
programs.home-manager.enable = true;
|
|
||||||
|
|
||||||
programs.zed-editor = {
|
|
||||||
enable = thisMachineIsPersonal;
|
|
||||||
extensions = [
|
|
||||||
"nix"
|
|
||||||
"toml"
|
|
||||||
"html"
|
|
||||||
"make"
|
|
||||||
"git-firefly"
|
|
||||||
"vue"
|
|
||||||
"scss"
|
|
||||||
];
|
|
||||||
|
|
||||||
userSettings = {
|
|
||||||
assistant = {
|
|
||||||
enabled = true;
|
|
||||||
version = "2";
|
|
||||||
default_model = {
|
|
||||||
provider = "openai";
|
|
||||||
model = "gpt-4-turbo";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
features = {
|
|
||||||
edit_prediction_provider = "zed";
|
|
||||||
};
|
|
||||||
|
|
||||||
node = {
|
|
||||||
path = lib.getExe pkgs.nodejs;
|
|
||||||
npm_path = lib.getExe' pkgs.nodejs "npm";
|
|
||||||
};
|
|
||||||
|
|
||||||
auto_update = false;
|
|
||||||
|
|
||||||
terminal = {
|
|
||||||
blinking = "off";
|
|
||||||
copy_on_select = false;
|
|
||||||
};
|
|
||||||
|
|
||||||
lsp = {
|
|
||||||
rust-analyzer = {
|
|
||||||
# binary = {
|
|
||||||
# path = lib.getExe pkgs.rust-analyzer;
|
|
||||||
# };
|
|
||||||
binary = {
|
|
||||||
path = "/run/current-system/sw/bin/nix";
|
|
||||||
arguments = [ "develop" "--command" "rust-analyzer" ];
|
|
||||||
};
|
|
||||||
initialization_options = {
|
|
||||||
cargo = {
|
|
||||||
features = "all";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# tell zed to use direnv and direnv can use a flake.nix enviroment.
|
|
||||||
load_direnv = "shell_hook";
|
|
||||||
|
|
||||||
base_keymap = "VSCode";
|
|
||||||
theme = {
|
|
||||||
mode = "system";
|
|
||||||
light = "One Light";
|
|
||||||
dark = "Andrometa";
|
|
||||||
};
|
|
||||||
ui_font_size = 12;
|
|
||||||
buffer_font_size = 12;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
@ -29,10 +29,10 @@
|
|||||||
text = ''
|
text = ''
|
||||||
#!${pkgs.stdenv.shell}
|
#!${pkgs.stdenv.shell}
|
||||||
set -e
|
set -e
|
||||||
${pkgs.kexec-tools}/bin/kexec -l ${image}/kernel --initrd=${image}/initrd --append="init=${builtins.unsafeDiscardStringContext config.system.build.toplevel}/init ${toString config.boot.kernelParams}"
|
${pkgs.kexectools}/bin/kexec -l ${image}/kernel --initrd=${image}/initrd --append="init=${builtins.unsafeDiscardStringContext config.system.build.toplevel}/init ${toString config.boot.kernelParams}"
|
||||||
sync
|
sync
|
||||||
echo "executing kernel, filesystems will be improperly umounted"
|
echo "executing kernel, filesystems will be improperly umounted"
|
||||||
${pkgs.kexec-tools}/bin/kexec -e
|
${pkgs.kexectools}/bin/kexec -e
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
kexec_tarball = pkgs.callPackage (modulesPath + "/../lib/make-system-tarball.nix") {
|
kexec_tarball = pkgs.callPackage (modulesPath + "/../lib/make-system-tarball.nix") {
|
||||||
|
69
machines/hotspot/default.nix
Normal file
69
machines/hotspot/default.nix
Normal file
@ -0,0 +1,69 @@
|
|||||||
|
{ config, pkgs, lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
internal = "end0";
|
||||||
|
wireless = "wlan0";
|
||||||
|
internal-gateway-ip = "192.168.0.1";
|
||||||
|
internal-ip-lower = "192.168.0.10";
|
||||||
|
internal-ip-upper = "192.168.0.100";
|
||||||
|
in
|
||||||
|
{
|
||||||
|
imports = [
|
||||||
|
./hardware-configuration.nix
|
||||||
|
];
|
||||||
|
|
||||||
|
enableExtraSubstituters = false;
|
||||||
|
|
||||||
|
# networking.interfaces.${internal}.ipv4.addresses = [{
|
||||||
|
# address = internal-gateway-ip;
|
||||||
|
# prefixLength = 24;
|
||||||
|
# }];
|
||||||
|
|
||||||
|
# DHCP on all interfaces except for the internal interface
|
||||||
|
networking.useDHCP = true;
|
||||||
|
networking.interfaces.${internal}.useDHCP = true;
|
||||||
|
networking.interfaces.${wireless}.useDHCP = true;
|
||||||
|
|
||||||
|
# Enable NAT
|
||||||
|
networking.ip_forward = true;
|
||||||
|
networking.nat = {
|
||||||
|
enable = true;
|
||||||
|
internalInterfaces = [ internal ];
|
||||||
|
externalInterface = wireless;
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.wireless = {
|
||||||
|
enable = true;
|
||||||
|
networks = {
|
||||||
|
"Pixel_6054".psk = "@PSK_Pixel_6054@";
|
||||||
|
};
|
||||||
|
interfaces = [ wireless ];
|
||||||
|
environmentFile = "/run/agenix/hostspot-passwords";
|
||||||
|
};
|
||||||
|
age.secrets.hostspot-passwords.file = ../../secrets/hostspot-passwords.age;
|
||||||
|
|
||||||
|
# dnsmasq for internal interface
|
||||||
|
services.dnsmasq = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
server = [ "1.1.1.1" "8.8.8.8" ];
|
||||||
|
dhcp-range = "${internal-ip-lower},${internal-ip-upper},24h";
|
||||||
|
dhcp-option = [
|
||||||
|
"option:router,${internal-gateway-ip}"
|
||||||
|
"option:broadcast,10.0.0.255"
|
||||||
|
"option:ntp-server,0.0.0.0"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.firewall.interfaces.${internal}.allowedTCPPorts = [
|
||||||
|
53 # dnsmasq
|
||||||
|
];
|
||||||
|
|
||||||
|
# Make it appear we are not using phone tethering to the ISP
|
||||||
|
networking.firewall = {
|
||||||
|
extraCommands = ''
|
||||||
|
iptables -t mangle -A POSTROUTING -o ${wireless} -j TTL --ttl-set 65
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
}
|
27
machines/hotspot/hardware-configuration.nix
Normal file
27
machines/hotspot/hardware-configuration.nix
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
{ config, lib, pkgs, modulesPath, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
imports =
|
||||||
|
[
|
||||||
|
(modulesPath + "/installer/scan/not-detected.nix")
|
||||||
|
];
|
||||||
|
|
||||||
|
boot = {
|
||||||
|
kernelPackages = pkgs.linuxKernel.packages.linux_rpi4;
|
||||||
|
initrd.availableKernelModules = [ "xhci_pci" "usbhid" "usb_storage" ];
|
||||||
|
loader = {
|
||||||
|
grub.enable = false;
|
||||||
|
generic-extlinux-compatible.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
fileSystems."/" =
|
||||||
|
{
|
||||||
|
device = "/dev/disk/by-uuid/44444444-4444-4444-8888-888888888888";
|
||||||
|
fsType = "ext4";
|
||||||
|
};
|
||||||
|
|
||||||
|
swapDevices = [ ];
|
||||||
|
|
||||||
|
nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux";
|
||||||
|
}
|
13
machines/hotspot/properties.nix
Normal file
13
machines/hotspot/properties.nix
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
{
|
||||||
|
hostNames = [
|
||||||
|
"hotspot"
|
||||||
|
];
|
||||||
|
|
||||||
|
arch = "aarch64-linux";
|
||||||
|
|
||||||
|
systemRoles = [
|
||||||
|
"hotspot"
|
||||||
|
];
|
||||||
|
|
||||||
|
hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAION4IUAef687RIzWrP4HEZnpdSJswt06QmrdRMDPHHGY";
|
||||||
|
}
|
@ -8,5 +8,6 @@
|
|||||||
# don't use remote builders
|
# don't use remote builders
|
||||||
nix.distributedBuilds = lib.mkForce false;
|
nix.distributedBuilds = lib.mkForce false;
|
||||||
|
|
||||||
nix.gc.automatic = lib.mkForce false;
|
de.enable = true;
|
||||||
|
de.touchpad.enable = true;
|
||||||
}
|
}
|
||||||
|
@ -30,22 +30,22 @@
|
|||||||
# disks
|
# disks
|
||||||
remoteLuksUnlock.enable = true;
|
remoteLuksUnlock.enable = true;
|
||||||
boot.initrd.luks.devices."enc-pv" = {
|
boot.initrd.luks.devices."enc-pv" = {
|
||||||
device = "/dev/disk/by-uuid/2e4a6960-a6b1-40ee-9c2c-2766eb718d52";
|
device = "/dev/disk/by-uuid/c801586b-f0a2-465c-8dae-532e61b83fee";
|
||||||
allowDiscards = true;
|
allowDiscards = true;
|
||||||
};
|
};
|
||||||
fileSystems."/" =
|
fileSystems."/" =
|
||||||
{
|
{
|
||||||
device = "/dev/disk/by-uuid/1f62386c-3243-49f5-b72f-df8fc8f39db8";
|
device = "/dev/disk/by-uuid/95db6950-a7bc-46cf-9765-3ea675ccf014";
|
||||||
fsType = "btrfs";
|
fsType = "btrfs";
|
||||||
};
|
};
|
||||||
fileSystems."/boot" =
|
fileSystems."/boot" =
|
||||||
{
|
{
|
||||||
device = "/dev/disk/by-uuid/F4D9-C5E8";
|
device = "/dev/disk/by-uuid/B087-2C20";
|
||||||
fsType = "vfat";
|
fsType = "vfat";
|
||||||
options = [ "fmask=0022" "dmask=0022" ];
|
options = [ "fmask=0022" "dmask=0022" ];
|
||||||
};
|
};
|
||||||
swapDevices =
|
swapDevices =
|
||||||
[{ device = "/dev/disk/by-uuid/5f65cb11-2649-48fe-9c78-3e325b857c53"; }];
|
[{ device = "/dev/disk/by-uuid/49fbdf62-eef4-421b-aac3-c93494afd23c"; }];
|
||||||
|
|
||||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||||
|
@ -9,4 +9,7 @@
|
|||||||
|
|
||||||
networking.hostName = "nat";
|
networking.hostName = "nat";
|
||||||
networking.interfaces.ens160.useDHCP = true;
|
networking.interfaces.ens160.useDHCP = true;
|
||||||
|
|
||||||
|
de.enable = true;
|
||||||
|
de.touchpad.enable = true;
|
||||||
}
|
}
|
||||||
|
@ -10,8 +10,6 @@
|
|||||||
# p2p mesh network
|
# p2p mesh network
|
||||||
services.tailscale.exitNode = true;
|
services.tailscale.exitNode = true;
|
||||||
|
|
||||||
services.iperf3.enable = true;
|
|
||||||
|
|
||||||
# email server
|
# email server
|
||||||
mailserver.enable = true;
|
mailserver.enable = true;
|
||||||
|
|
||||||
|
@ -1,307 +0,0 @@
|
|||||||
{
|
|
||||||
appConfig = {
|
|
||||||
theme = "vaporware";
|
|
||||||
customColors = {
|
|
||||||
"material-dark-original" = {
|
|
||||||
primary = "#f36558";
|
|
||||||
background = "#39434C";
|
|
||||||
"background-darker" = "#eb615c";
|
|
||||||
"material-light" = "#f36558";
|
|
||||||
"item-text-color" = "#ff948a";
|
|
||||||
"curve-factor" = "5px";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
enableErrorReporting = false;
|
|
||||||
layout = "auto";
|
|
||||||
iconSize = "large";
|
|
||||||
language = "en";
|
|
||||||
startingView = "default";
|
|
||||||
defaultOpeningMethod = "sametab";
|
|
||||||
statusCheck = true;
|
|
||||||
statusCheckInterval = 20;
|
|
||||||
faviconApi = "faviconkit";
|
|
||||||
routingMode = "history";
|
|
||||||
enableMultiTasking = false;
|
|
||||||
webSearch = {
|
|
||||||
disableWebSearch = false;
|
|
||||||
searchEngine = "duckduckgo";
|
|
||||||
openingMethod = "sametab";
|
|
||||||
searchBangs = { };
|
|
||||||
};
|
|
||||||
enableFontAwesome = true;
|
|
||||||
cssThemes = [ ];
|
|
||||||
externalStyleSheet = [ ];
|
|
||||||
hideComponents = {
|
|
||||||
hideHeading = false;
|
|
||||||
hideNav = false;
|
|
||||||
hideSearch = false;
|
|
||||||
hideSettings = false;
|
|
||||||
hideFooter = false;
|
|
||||||
hideSplashScreen = false;
|
|
||||||
};
|
|
||||||
auth = {
|
|
||||||
enableGuestAccess = false;
|
|
||||||
users = [ ];
|
|
||||||
enableKeycloak = false;
|
|
||||||
keycloak = { };
|
|
||||||
};
|
|
||||||
allowConfigEdit = true;
|
|
||||||
enableServiceWorker = false;
|
|
||||||
disableContextMenu = false;
|
|
||||||
disableUpdateChecks = false;
|
|
||||||
disableSmartSort = false;
|
|
||||||
};
|
|
||||||
|
|
||||||
pageInfo = {
|
|
||||||
title = "s0";
|
|
||||||
description = "s0";
|
|
||||||
};
|
|
||||||
|
|
||||||
sections = [
|
|
||||||
(
|
|
||||||
let
|
|
||||||
# Define the media section items once.
|
|
||||||
mediaItems = {
|
|
||||||
jellyfin = {
|
|
||||||
title = "Jellyfin";
|
|
||||||
icon = "hl-jellyfin";
|
|
||||||
url = "https://jellyfin.s0.neet.dev";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = false;
|
|
||||||
id = "0_1956_jellyfin";
|
|
||||||
};
|
|
||||||
sonarr = {
|
|
||||||
title = "Sonarr";
|
|
||||||
description = "Manage TV";
|
|
||||||
icon = "hl-sonarr";
|
|
||||||
url = "https://sonarr.s0.neet.dev";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = false;
|
|
||||||
id = "1_1956_sonarr";
|
|
||||||
};
|
|
||||||
radarr = {
|
|
||||||
title = "Radarr";
|
|
||||||
description = "Manage Movies";
|
|
||||||
icon = "hl-radarr";
|
|
||||||
url = "https://radarr.s0.neet.dev";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = false;
|
|
||||||
id = "2_1956_radarr";
|
|
||||||
};
|
|
||||||
lidarr = {
|
|
||||||
title = "Lidarr";
|
|
||||||
description = "Manage Music";
|
|
||||||
icon = "hl-lidarr";
|
|
||||||
url = "https://lidarr.s0.neet.dev";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = false;
|
|
||||||
id = "3_1956_lidarr";
|
|
||||||
};
|
|
||||||
prowlarr = {
|
|
||||||
title = "Prowlarr";
|
|
||||||
description = "Indexers";
|
|
||||||
icon = "hl-prowlarr";
|
|
||||||
url = "https://prowlarr.s0.neet.dev";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = false;
|
|
||||||
id = "4_1956_prowlarr";
|
|
||||||
};
|
|
||||||
bazarr = {
|
|
||||||
title = "Bazarr";
|
|
||||||
description = "Subtitles";
|
|
||||||
icon = "hl-bazarr";
|
|
||||||
url = "https://bazarr.s0.neet.dev";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = false;
|
|
||||||
id = "5_1956_bazarr";
|
|
||||||
};
|
|
||||||
navidrome = {
|
|
||||||
title = "Navidrome";
|
|
||||||
description = "Play Music";
|
|
||||||
icon = "hl-navidrome";
|
|
||||||
url = "https://music.s0.neet.dev";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = false;
|
|
||||||
id = "6_1956_navidrome";
|
|
||||||
};
|
|
||||||
transmission = {
|
|
||||||
title = "Transmission";
|
|
||||||
description = "Torrenting";
|
|
||||||
icon = "hl-transmission";
|
|
||||||
url = "https://transmission.s0.neet.dev";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = false;
|
|
||||||
id = "7_1956_transmission";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
# Build the list once.
|
|
||||||
mediaList = [
|
|
||||||
mediaItems.jellyfin
|
|
||||||
mediaItems.sonarr
|
|
||||||
mediaItems.radarr
|
|
||||||
mediaItems.lidarr
|
|
||||||
mediaItems.prowlarr
|
|
||||||
mediaItems.bazarr
|
|
||||||
mediaItems.navidrome
|
|
||||||
mediaItems.transmission
|
|
||||||
];
|
|
||||||
in
|
|
||||||
{
|
|
||||||
name = "Media & Entertainment";
|
|
||||||
icon = "fas fa-photo-video";
|
|
||||||
displayData = {
|
|
||||||
sortBy = "most-used";
|
|
||||||
cols = 1;
|
|
||||||
rows = 1;
|
|
||||||
collapsed = false;
|
|
||||||
hideForGuests = false;
|
|
||||||
};
|
|
||||||
items = mediaList;
|
|
||||||
filteredItems = mediaList;
|
|
||||||
}
|
|
||||||
)
|
|
||||||
(
|
|
||||||
let
|
|
||||||
networkItems = {
|
|
||||||
gateway = {
|
|
||||||
title = "Gateway";
|
|
||||||
description = "openwrt";
|
|
||||||
icon = "hl-openwrt";
|
|
||||||
url = "http://openwrt.lan/";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = true;
|
|
||||||
id = "0_746_gateway";
|
|
||||||
};
|
|
||||||
wireless = {
|
|
||||||
title = "Wireless";
|
|
||||||
description = "openwrt (ish)";
|
|
||||||
icon = "hl-openwrt";
|
|
||||||
url = "http://PacketProvocateur.lan";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = true;
|
|
||||||
id = "1_746_wireless";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
networkList = [
|
|
||||||
networkItems.gateway
|
|
||||||
networkItems.wireless
|
|
||||||
];
|
|
||||||
in
|
|
||||||
{
|
|
||||||
name = "Network";
|
|
||||||
icon = "fas fa-network-wired";
|
|
||||||
items = networkList;
|
|
||||||
filteredItems = networkList;
|
|
||||||
displayData = {
|
|
||||||
sortBy = "default";
|
|
||||||
rows = 1;
|
|
||||||
cols = 1;
|
|
||||||
collapsed = false;
|
|
||||||
hideForGuests = false;
|
|
||||||
};
|
|
||||||
}
|
|
||||||
)
|
|
||||||
|
|
||||||
(
|
|
||||||
let
|
|
||||||
servicesItems = {
|
|
||||||
matrix = {
|
|
||||||
title = "Matrix";
|
|
||||||
description = "";
|
|
||||||
icon = "hl-matrix";
|
|
||||||
url = "https://chat.neet.space";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = true;
|
|
||||||
id = "0_836_matrix";
|
|
||||||
};
|
|
||||||
radio = {
|
|
||||||
title = "Radio";
|
|
||||||
description = "Radio service";
|
|
||||||
icon = "generative";
|
|
||||||
url = "https://radio.runyan.org";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = true;
|
|
||||||
id = "1_836_radio";
|
|
||||||
};
|
|
||||||
mumble = {
|
|
||||||
title = "Mumble";
|
|
||||||
description = "voice.neet.space";
|
|
||||||
icon = "hl-mumble";
|
|
||||||
url = "https://voice.neet.space";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = false;
|
|
||||||
id = "2_836_mumble";
|
|
||||||
};
|
|
||||||
irc = {
|
|
||||||
title = "IRC";
|
|
||||||
description = "irc.neet.dev";
|
|
||||||
icon = "hl-thelounge";
|
|
||||||
url = "https://irc.neet.dev";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = true;
|
|
||||||
id = "3_836_irc";
|
|
||||||
};
|
|
||||||
git = {
|
|
||||||
title = "Git";
|
|
||||||
description = "git.neet.dev";
|
|
||||||
icon = "hl-gitea";
|
|
||||||
url = "https://git.neet.dev";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = true;
|
|
||||||
id = "4_836_git";
|
|
||||||
};
|
|
||||||
nextcloud = {
|
|
||||||
title = "Nextcloud";
|
|
||||||
description = "neet.cloud";
|
|
||||||
icon = "hl-nextcloud";
|
|
||||||
url = "https://neet.cloud";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = true;
|
|
||||||
id = "5_836_nextcloud";
|
|
||||||
};
|
|
||||||
roundcube = {
|
|
||||||
title = "Roundcube";
|
|
||||||
description = "mail.neet.dev";
|
|
||||||
icon = "hl-roundcube";
|
|
||||||
url = "https://mail.neet.dev";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = true;
|
|
||||||
id = "6_836_roundcube";
|
|
||||||
};
|
|
||||||
jitsimeet = {
|
|
||||||
title = "Jitsi Meet";
|
|
||||||
description = "meet.neet.space";
|
|
||||||
icon = "hl-jitsimeet";
|
|
||||||
url = "https://meet.neet.space";
|
|
||||||
target = "sametab";
|
|
||||||
statusCheck = true;
|
|
||||||
id = "7_836_jitsimeet";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
servicesList = [
|
|
||||||
servicesItems.matrix
|
|
||||||
servicesItems.radio
|
|
||||||
servicesItems.mumble
|
|
||||||
servicesItems.irc
|
|
||||||
servicesItems.git
|
|
||||||
servicesItems.nextcloud
|
|
||||||
servicesItems.roundcube
|
|
||||||
servicesItems.jitsimeet
|
|
||||||
];
|
|
||||||
in
|
|
||||||
{
|
|
||||||
name = "Services";
|
|
||||||
icon = "fas fa-monitor-heart-rate";
|
|
||||||
items = servicesList;
|
|
||||||
filteredItems = servicesList;
|
|
||||||
displayData = {
|
|
||||||
sortBy = "default";
|
|
||||||
rows = 1;
|
|
||||||
cols = 1;
|
|
||||||
collapsed = false;
|
|
||||||
hideForGuests = false;
|
|
||||||
};
|
|
||||||
}
|
|
||||||
)
|
|
||||||
];
|
|
||||||
}
|
|
241
machines/storage/s0/dashy.yaml
Normal file
241
machines/storage/s0/dashy.yaml
Normal file
@ -0,0 +1,241 @@
|
|||||||
|
appConfig:
|
||||||
|
theme: vaporware
|
||||||
|
customColors:
|
||||||
|
material-dark-original:
|
||||||
|
primary: '#f36558'
|
||||||
|
background: '#39434C'
|
||||||
|
background-darker: '#eb615c'
|
||||||
|
material-light: '#f36558'
|
||||||
|
item-text-color: '#ff948a'
|
||||||
|
curve-factor: 5px
|
||||||
|
enableErrorReporting: false
|
||||||
|
layout: auto
|
||||||
|
iconSize: large
|
||||||
|
language: en
|
||||||
|
startingView: default
|
||||||
|
defaultOpeningMethod: sametab
|
||||||
|
statusCheck: true
|
||||||
|
statusCheckInterval: 20
|
||||||
|
faviconApi: faviconkit
|
||||||
|
routingMode: history
|
||||||
|
enableMultiTasking: false
|
||||||
|
webSearch:
|
||||||
|
disableWebSearch: false
|
||||||
|
searchEngine: duckduckgo
|
||||||
|
openingMethod: sametab
|
||||||
|
searchBangs: {}
|
||||||
|
enableFontAwesome: true
|
||||||
|
cssThemes: []
|
||||||
|
externalStyleSheet: []
|
||||||
|
hideComponents:
|
||||||
|
hideHeading: false
|
||||||
|
hideNav: false
|
||||||
|
hideSearch: false
|
||||||
|
hideSettings: false
|
||||||
|
hideFooter: false
|
||||||
|
hideSplashScreen: false
|
||||||
|
auth:
|
||||||
|
enableGuestAccess: false
|
||||||
|
users: []
|
||||||
|
enableKeycloak: false
|
||||||
|
keycloak: {}
|
||||||
|
allowConfigEdit: true
|
||||||
|
enableServiceWorker: false
|
||||||
|
disableContextMenu: false
|
||||||
|
disableUpdateChecks: false
|
||||||
|
disableSmartSort: false
|
||||||
|
pageInfo:
|
||||||
|
title: s0
|
||||||
|
description: s0
|
||||||
|
sections:
|
||||||
|
- name: Media & Entertainment
|
||||||
|
icon: fas fa-photo-video
|
||||||
|
displayData:
|
||||||
|
sortBy: most-used
|
||||||
|
cols: 1
|
||||||
|
rows: 1
|
||||||
|
collapsed: false
|
||||||
|
hideForGuests: false
|
||||||
|
items:
|
||||||
|
- &ref_0
|
||||||
|
title: Jellyfin
|
||||||
|
icon: hl-jellyfin
|
||||||
|
url: https://jellyfin.s0.neet.dev
|
||||||
|
target: sametab
|
||||||
|
statusCheck: false
|
||||||
|
id: 0_1956_jellyfin
|
||||||
|
- &ref_1
|
||||||
|
title: Sonarr
|
||||||
|
description: Manage TV
|
||||||
|
icon: hl-sonarr
|
||||||
|
url: https://sonarr.s0.neet.dev
|
||||||
|
target: sametab
|
||||||
|
statusCheck: false
|
||||||
|
id: 1_1956_sonarr
|
||||||
|
- &ref_2
|
||||||
|
title: Radarr
|
||||||
|
description: Manage Movies
|
||||||
|
icon: hl-radarr
|
||||||
|
url: https://radarr.s0.neet.dev
|
||||||
|
target: sametab
|
||||||
|
statusCheck: false
|
||||||
|
id: 2_1956_radarr
|
||||||
|
- &ref_3
|
||||||
|
title: Lidarr
|
||||||
|
description: Manage Music
|
||||||
|
icon: hl-lidarr
|
||||||
|
url: https://lidarr.s0.neet.dev
|
||||||
|
target: sametab
|
||||||
|
statusCheck: false
|
||||||
|
id: 3_1956_lidarr
|
||||||
|
- &ref_4
|
||||||
|
title: Prowlarr
|
||||||
|
description: Indexers
|
||||||
|
icon: hl-prowlarr
|
||||||
|
url: https://prowlarr.s0.neet.dev
|
||||||
|
target: sametab
|
||||||
|
statusCheck: false
|
||||||
|
id: 4_1956_prowlarr
|
||||||
|
- &ref_5
|
||||||
|
title: Bazarr
|
||||||
|
description: Subtitles
|
||||||
|
icon: hl-bazarr
|
||||||
|
url: https://bazarr.s0.neet.dev
|
||||||
|
target: sametab
|
||||||
|
statusCheck: false
|
||||||
|
id: 5_1956_bazarr
|
||||||
|
- &ref_6
|
||||||
|
title: Navidrome
|
||||||
|
description: Play Music
|
||||||
|
icon: hl-navidrome
|
||||||
|
url: https://music.s0.neet.dev
|
||||||
|
target: sametab
|
||||||
|
statusCheck: false
|
||||||
|
id: 6_1956_navidrome
|
||||||
|
- &ref_7
|
||||||
|
title: Transmission
|
||||||
|
description: Torrenting
|
||||||
|
icon: hl-transmission
|
||||||
|
url: https://transmission.s0.neet.dev
|
||||||
|
target: sametab
|
||||||
|
statusCheck: false
|
||||||
|
id: 7_1956_transmission
|
||||||
|
filteredItems:
|
||||||
|
- *ref_0
|
||||||
|
- *ref_1
|
||||||
|
- *ref_2
|
||||||
|
- *ref_3
|
||||||
|
- *ref_4
|
||||||
|
- *ref_5
|
||||||
|
- *ref_6
|
||||||
|
- *ref_7
|
||||||
|
- name: Network
|
||||||
|
icon: fas fa-network-wired
|
||||||
|
items:
|
||||||
|
- &ref_8
|
||||||
|
title: Gateway
|
||||||
|
description: openwrt
|
||||||
|
icon: hl-openwrt
|
||||||
|
url: http://openwrt.lan/
|
||||||
|
target: sametab
|
||||||
|
statusCheck: true
|
||||||
|
id: 0_746_gateway
|
||||||
|
- &ref_9
|
||||||
|
title: Wireless
|
||||||
|
description: openwrt (ish)
|
||||||
|
icon: hl-openwrt
|
||||||
|
url: http://PacketProvocateur.lan
|
||||||
|
target: sametab
|
||||||
|
statusCheck: true
|
||||||
|
id: 1_746_wireless
|
||||||
|
filteredItems:
|
||||||
|
- *ref_8
|
||||||
|
- *ref_9
|
||||||
|
displayData:
|
||||||
|
sortBy: default
|
||||||
|
rows: 1
|
||||||
|
cols: 1
|
||||||
|
collapsed: false
|
||||||
|
hideForGuests: false
|
||||||
|
- name: Services
|
||||||
|
icon: fas fa-monitor-heart-rate
|
||||||
|
items:
|
||||||
|
- &ref_10
|
||||||
|
title: Matrix
|
||||||
|
description: ''
|
||||||
|
icon: hl-matrix
|
||||||
|
url: https://chat.neet.space
|
||||||
|
target: sametab
|
||||||
|
statusCheck: true
|
||||||
|
id: 0_836_matrix
|
||||||
|
- &ref_11
|
||||||
|
title: Radio
|
||||||
|
description: Radio service
|
||||||
|
icon: generative
|
||||||
|
url: https://radio.runyan.org
|
||||||
|
target: sametab
|
||||||
|
statusCheck: true
|
||||||
|
id: 1_836_radio
|
||||||
|
- &ref_12
|
||||||
|
title: Mumble
|
||||||
|
description: voice.neet.space
|
||||||
|
icon: hl-mumble
|
||||||
|
url: https://voice.neet.space
|
||||||
|
target: sametab
|
||||||
|
statusCheck: false
|
||||||
|
id: 2_836_mumble
|
||||||
|
- &ref_13
|
||||||
|
title: IRC
|
||||||
|
description: irc.neet.dev
|
||||||
|
icon: hl-thelounge
|
||||||
|
url: https://irc.neet.dev
|
||||||
|
target: sametab
|
||||||
|
statusCheck: true
|
||||||
|
id: 3_836_irc
|
||||||
|
- &ref_14
|
||||||
|
title: Git
|
||||||
|
description: git.neet.dev
|
||||||
|
icon: hl-gitea
|
||||||
|
url: https://git.neet.dev
|
||||||
|
target: sametab
|
||||||
|
statusCheck: true
|
||||||
|
id: 4_836_git
|
||||||
|
- &ref_15
|
||||||
|
title: Nextcloud
|
||||||
|
description: neet.cloud
|
||||||
|
icon: hl-nextcloud
|
||||||
|
url: https://neet.cloud
|
||||||
|
target: sametab
|
||||||
|
statusCheck: true
|
||||||
|
id: 5_836_nextcloud
|
||||||
|
- &ref_16
|
||||||
|
title: Roundcube
|
||||||
|
description: mail.neet.dev
|
||||||
|
icon: hl-roundcube
|
||||||
|
url: https://mail.neet.dev
|
||||||
|
target: sametab
|
||||||
|
statusCheck: true
|
||||||
|
id: 6_836_roundcube
|
||||||
|
- &ref_17
|
||||||
|
title: Jitsi Meet
|
||||||
|
description: meet.neet.space
|
||||||
|
icon: hl-jitsimeet
|
||||||
|
url: https://meet.neet.space
|
||||||
|
target: sametab
|
||||||
|
statusCheck: true
|
||||||
|
id: 7_836_jitsimeet
|
||||||
|
filteredItems:
|
||||||
|
- *ref_10
|
||||||
|
- *ref_11
|
||||||
|
- *ref_12
|
||||||
|
- *ref_13
|
||||||
|
- *ref_14
|
||||||
|
- *ref_15
|
||||||
|
- *ref_16
|
||||||
|
- *ref_17
|
||||||
|
displayData:
|
||||||
|
sortBy: default
|
||||||
|
rows: 1
|
||||||
|
cols: 1
|
||||||
|
collapsed: false
|
||||||
|
hideForGuests: false
|
@ -154,7 +154,7 @@
|
|||||||
nixpkgs.config.packageOverrides = pkgs: {
|
nixpkgs.config.packageOverrides = pkgs: {
|
||||||
vaapiIntel = pkgs.vaapiIntel.override { enableHybridCodec = true; };
|
vaapiIntel = pkgs.vaapiIntel.override { enableHybridCodec = true; };
|
||||||
};
|
};
|
||||||
hardware.graphics = {
|
hardware.opengl = {
|
||||||
enable = true;
|
enable = true;
|
||||||
extraPackages = with pkgs; [
|
extraPackages = with pkgs; [
|
||||||
intel-media-driver
|
intel-media-driver
|
||||||
@ -171,24 +171,17 @@
|
|||||||
openFirewall = false; # All nginx services are internal
|
openFirewall = false; # All nginx services are internal
|
||||||
virtualHosts =
|
virtualHosts =
|
||||||
let
|
let
|
||||||
mkHost = external: config:
|
mkVirtualHost = external: internal:
|
||||||
{
|
{
|
||||||
${external} = {
|
${external} = {
|
||||||
useACMEHost = "s0.neet.dev"; # Use wildcard cert
|
useACMEHost = "s0.neet.dev"; # Use wildcard cert
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
locations."/" = config;
|
locations."/" = {
|
||||||
|
proxyPass = internal;
|
||||||
|
proxyWebsockets = true;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
mkVirtualHost = external: internal:
|
|
||||||
mkHost external {
|
|
||||||
proxyPass = internal;
|
|
||||||
proxyWebsockets = true;
|
|
||||||
};
|
|
||||||
mkStaticHost = external: static:
|
|
||||||
mkHost external {
|
|
||||||
root = static;
|
|
||||||
tryFiles = "$uri /index.html ";
|
|
||||||
};
|
|
||||||
in
|
in
|
||||||
lib.mkMerge [
|
lib.mkMerge [
|
||||||
(mkVirtualHost "bazarr.s0.neet.dev" "http://vpn.containers:6767")
|
(mkVirtualHost "bazarr.s0.neet.dev" "http://vpn.containers:6767")
|
||||||
@ -200,7 +193,7 @@
|
|||||||
(mkVirtualHost "unifi.s0.neet.dev" "https://localhost:8443")
|
(mkVirtualHost "unifi.s0.neet.dev" "https://localhost:8443")
|
||||||
(mkVirtualHost "music.s0.neet.dev" "http://localhost:4533")
|
(mkVirtualHost "music.s0.neet.dev" "http://localhost:4533")
|
||||||
(mkVirtualHost "jellyfin.s0.neet.dev" "http://localhost:8096")
|
(mkVirtualHost "jellyfin.s0.neet.dev" "http://localhost:8096")
|
||||||
(mkStaticHost "s0.neet.dev" config.services.dashy.finalDrv)
|
(mkVirtualHost "s0.neet.dev" "http://localhost:56815")
|
||||||
{
|
{
|
||||||
# Landing page LAN redirect
|
# Landing page LAN redirect
|
||||||
"s0" = {
|
"s0" = {
|
||||||
@ -220,7 +213,6 @@
|
|||||||
};
|
};
|
||||||
}
|
}
|
||||||
(mkVirtualHost "vacuum.s0.neet.dev" "http://192.168.1.125") # valetudo
|
(mkVirtualHost "vacuum.s0.neet.dev" "http://192.168.1.125") # valetudo
|
||||||
(mkVirtualHost "sandman.s0.neet.dev" "http://192.168.9.14:3000") # es
|
|
||||||
(mkVirtualHost "todo.s0.neet.dev" "http://localhost:${toString config.services.vikunja.port}")
|
(mkVirtualHost "todo.s0.neet.dev" "http://localhost:${toString config.services.vikunja.port}")
|
||||||
];
|
];
|
||||||
|
|
||||||
@ -262,7 +254,7 @@
|
|||||||
virtualisation.podman.dockerSocket.enable = true; # TODO needed?
|
virtualisation.podman.dockerSocket.enable = true; # TODO needed?
|
||||||
services.dashy = {
|
services.dashy = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = import ./dashy.nix;
|
configFile = ./dashy.yaml;
|
||||||
};
|
};
|
||||||
|
|
||||||
services.unifi = {
|
services.unifi = {
|
||||||
@ -270,7 +262,6 @@
|
|||||||
openMinimalFirewall = true;
|
openMinimalFirewall = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
# TODO: setup backup
|
|
||||||
services.vikunja = {
|
services.vikunja = {
|
||||||
enable = true;
|
enable = true;
|
||||||
port = 61473;
|
port = 61473;
|
||||||
@ -280,9 +271,6 @@
|
|||||||
service.enableregistration = false;
|
service.enableregistration = false;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
backup.group."vikunja".paths = [
|
|
||||||
"/var/lib/vikunja"
|
|
||||||
];
|
|
||||||
|
|
||||||
boot.binfmt.emulatedSystems = [ "aarch64-linux" "armv7l-linux" ];
|
boot.binfmt.emulatedSystems = [ "aarch64-linux" "armv7l-linux" ];
|
||||||
}
|
}
|
||||||
|
@ -36,11 +36,6 @@ let
|
|||||||
record = "preset-record-generic-audio-copy";
|
record = "preset-record-generic-audio-copy";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
detect = {
|
|
||||||
width = 1280;
|
|
||||||
height = 720;
|
|
||||||
fps = 5;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
services.go2rtc.settings.streams = lib.mkMerge [
|
services.go2rtc.settings.streams = lib.mkMerge [
|
||||||
@ -59,7 +54,7 @@ let
|
|||||||
# - go2rtc: ${VAR}
|
# - go2rtc: ${VAR}
|
||||||
# - frigate: {VAR}
|
# - frigate: {VAR}
|
||||||
primaryUrl = "rtsp://admin:\${FRIGATE_RTSP_PASSWORD}@${address}/cam/realmonitor?channel=1&subtype=0";
|
primaryUrl = "rtsp://admin:\${FRIGATE_RTSP_PASSWORD}@${address}/cam/realmonitor?channel=1&subtype=0";
|
||||||
detectUrl = "rtsp://admin:{FRIGATE_RTSP_PASSWORD}@${address}/cam/realmonitor?channel=1&subtype=3";
|
detectUrl = "rtsp://admin:{FRIGATE_RTSP_PASSWORD}@${address}/cam/realmonitor?channel=1&subtype=1";
|
||||||
in
|
in
|
||||||
mkCamera name primaryUrl detectUrl;
|
mkCamera name primaryUrl detectUrl;
|
||||||
|
|
||||||
@ -87,11 +82,9 @@ lib.mkMerge [
|
|||||||
settings = {
|
settings = {
|
||||||
mqtt = {
|
mqtt = {
|
||||||
enabled = true;
|
enabled = true;
|
||||||
host = "localhost";
|
host = "localhost:1883";
|
||||||
port = 1883;
|
|
||||||
user = "root";
|
|
||||||
password = "{FRIGATE_MQTT_PASSWORD}";
|
|
||||||
};
|
};
|
||||||
|
rtmp.enabled = false;
|
||||||
snapshots = {
|
snapshots = {
|
||||||
enabled = true;
|
enabled = true;
|
||||||
bounding_box = true;
|
bounding_box = true;
|
||||||
@ -100,9 +93,8 @@ lib.mkMerge [
|
|||||||
enabled = true;
|
enabled = true;
|
||||||
# sync_recordings = true; # detect if recordings were deleted outside of frigate (expensive)
|
# sync_recordings = true; # detect if recordings were deleted outside of frigate (expensive)
|
||||||
retain = {
|
retain = {
|
||||||
days = 7; # Keep video for 7 days
|
days = 2; # Keep video for 2 days
|
||||||
mode = "all";
|
mode = "motion";
|
||||||
# mode = "motion";
|
|
||||||
};
|
};
|
||||||
events = {
|
events = {
|
||||||
retain = {
|
retain = {
|
||||||
@ -114,7 +106,7 @@ lib.mkMerge [
|
|||||||
};
|
};
|
||||||
# Make frigate aware of the go2rtc streams
|
# Make frigate aware of the go2rtc streams
|
||||||
go2rtc.streams = config.services.go2rtc.settings.streams;
|
go2rtc.streams = config.services.go2rtc.settings.streams;
|
||||||
detect.enabled = false; # :(
|
detect.enabled = true;
|
||||||
objects = {
|
objects = {
|
||||||
track = [ "person" "dog" ];
|
track = [ "person" "dog" ];
|
||||||
};
|
};
|
||||||
@ -153,23 +145,11 @@ lib.mkMerge [
|
|||||||
systemd.services.frigate.serviceConfig.SupplementaryGroups = [ "apex" ];
|
systemd.services.frigate.serviceConfig.SupplementaryGroups = [ "apex" ];
|
||||||
|
|
||||||
# Coral PCIe driver
|
# Coral PCIe driver
|
||||||
boot.extraModulePackages = with config.boot.kernelPackages; [ gasket ];
|
kernel.enableGasketKernelModule = true;
|
||||||
services.udev.extraRules = ''
|
|
||||||
SUBSYSTEM=="apex", MODE="0660", GROUP="apex"
|
|
||||||
'';
|
|
||||||
|
|
||||||
services.frigate.settings.detectors.coral = {
|
services.frigate.settings.detectors.coral = {
|
||||||
type = "edgetpu";
|
type = "edgetpu";
|
||||||
device = "pci";
|
device = "pci";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
{
|
|
||||||
# Fix bug in nixos module where cache is not cleared when starting the service because "rm" cannot be found
|
|
||||||
systemd.services.frigate.serviceConfig.ExecStartPre = lib.mkForce "${pkgs.bash}/bin/sh -c 'rm -f /var/cache/frigate/*.mp4'";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
# Don't require authentication for frigate
|
|
||||||
# This is ok because the reverse proxy already requires tailscale access anyway
|
|
||||||
services.frigate.settings.auth.enabled = false;
|
|
||||||
}
|
|
||||||
]
|
]
|
||||||
|
@ -22,6 +22,7 @@
|
|||||||
# zfs
|
# zfs
|
||||||
networking.hostId = "5e6791f0";
|
networking.hostId = "5e6791f0";
|
||||||
boot.supportedFilesystems = [ "zfs" ];
|
boot.supportedFilesystems = [ "zfs" ];
|
||||||
|
boot.kernelPackages = config.boot.zfs.package.latestCompatibleLinuxPackages;
|
||||||
|
|
||||||
# luks
|
# luks
|
||||||
remoteLuksUnlock.enable = true;
|
remoteLuksUnlock.enable = true;
|
||||||
@ -58,43 +59,12 @@
|
|||||||
};
|
};
|
||||||
swapDevices = [ ];
|
swapDevices = [ ];
|
||||||
|
|
||||||
networking = {
|
networking.vlans = {
|
||||||
dhcpcd.enable = false;
|
iot = {
|
||||||
|
id = 2;
|
||||||
vlans = {
|
interface = "eth1";
|
||||||
iot = {
|
|
||||||
id = 2;
|
|
||||||
interface = "eth1";
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
|
||||||
interfaces.eth1.ipv4.addresses = [{
|
|
||||||
address = "192.168.1.2";
|
|
||||||
prefixLength = 21;
|
|
||||||
}];
|
|
||||||
interfaces.iot.ipv4.addresses = [{
|
|
||||||
address = "192.168.9.8";
|
|
||||||
prefixLength = 22;
|
|
||||||
}];
|
|
||||||
|
|
||||||
defaultGateway = "192.168.1.1";
|
|
||||||
nameservers = [ "1.1.1.1" "8.8.8.8" ];
|
|
||||||
};
|
};
|
||||||
|
|
||||||
# networking = {
|
|
||||||
# vlans = {
|
|
||||||
# iot = {
|
|
||||||
# id = 2;
|
|
||||||
# interface = "eth1";
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
|
|
||||||
# defaultGateway = {
|
|
||||||
# interface = "eth1";
|
|
||||||
# address = "192.168.1.1";
|
|
||||||
# metric = 10; # always use this route as default gateway
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
|
|
||||||
powerManagement.cpuFreqGovernor = "powersave";
|
powerManagement.cpuFreqGovernor = "powersave";
|
||||||
}
|
}
|
||||||
|
@ -3,14 +3,14 @@
|
|||||||
{
|
{
|
||||||
services.esphome.enable = true;
|
services.esphome.enable = true;
|
||||||
|
|
||||||
|
# TODO lock down
|
||||||
services.mosquitto = {
|
services.mosquitto = {
|
||||||
enable = true;
|
enable = true;
|
||||||
listeners = [
|
listeners = [
|
||||||
{
|
{
|
||||||
users.root = {
|
acl = [ "pattern readwrite #" ];
|
||||||
acl = [ "readwrite #" ];
|
omitPasswordAuth = true;
|
||||||
hashedPassword = "$7$101$8+QnkTzCdGizaKqq$lpU4o84n6D/1uwfA9pZDVExr1NDm1D/8tNla2tE9J9HdUqkvu192yYfiySY1MFqVNgUKgWEFu5P1bUKqRnzbUw==";
|
settings.allow_anonymous = true;
|
||||||
};
|
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
@ -24,13 +24,11 @@
|
|||||||
homeassistant = true;
|
homeassistant = true;
|
||||||
permit_join = false;
|
permit_join = false;
|
||||||
serial = {
|
serial = {
|
||||||
adapter = "ember";
|
|
||||||
port = "/dev/ttyACM0";
|
port = "/dev/ttyACM0";
|
||||||
};
|
};
|
||||||
mqtt = {
|
mqtt = {
|
||||||
server = "mqtt://localhost:1883";
|
server = "mqtt://localhost:1883";
|
||||||
user = "root";
|
# base_topic = "zigbee2mqtt";
|
||||||
password = "!/run/agenix/zigbee2mqtt.yaml mqtt_password";
|
|
||||||
};
|
};
|
||||||
frontend = {
|
frontend = {
|
||||||
host = "localhost";
|
host = "localhost";
|
||||||
@ -38,10 +36,6 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
age.secrets."zigbee2mqtt.yaml" = {
|
|
||||||
file = ../../../secrets/zigbee2mqtt.yaml.age;
|
|
||||||
owner = "zigbee2mqtt";
|
|
||||||
};
|
|
||||||
|
|
||||||
services.home-assistant = {
|
services.home-assistant = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -12,7 +12,6 @@
|
|||||||
"binary-cache"
|
"binary-cache"
|
||||||
"gitea-actions-runner"
|
"gitea-actions-runner"
|
||||||
"frigate"
|
"frigate"
|
||||||
"zigbee"
|
|
||||||
];
|
];
|
||||||
|
|
||||||
hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAwiXcUFtAvZCayhu4+AIcF+Ktrdgv9ee/mXSIhJbp4q";
|
hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAwiXcUFtAvZCayhu4+AIcF+Ktrdgv9ee/mXSIhJbp4q";
|
||||||
|
@ -5,6 +5,8 @@
|
|||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
|
de.enable = true;
|
||||||
|
|
||||||
# Login DE Option: Steam
|
# Login DE Option: Steam
|
||||||
programs.steam.gamescopeSession.enable = true;
|
programs.steam.gamescopeSession.enable = true;
|
||||||
# programs.gamescope.capSysNice = true;
|
# programs.gamescope.capSysNice = true;
|
||||||
@ -31,9 +33,9 @@
|
|||||||
hardware.enableAllFirmware = true;
|
hardware.enableAllFirmware = true;
|
||||||
|
|
||||||
# ROCm
|
# ROCm
|
||||||
hardware.graphics.extraPackages = with pkgs; [
|
hardware.opengl.extraPackages = with pkgs; [
|
||||||
rocmPackages.clr.icd
|
rocm-opencl-icd
|
||||||
rocmPackages.clr
|
rocm-opencl-runtime
|
||||||
];
|
];
|
||||||
systemd.tmpfiles.rules = [
|
systemd.tmpfiles.rules = [
|
||||||
"L+ /opt/rocm/hip - - - - ${pkgs.rocmPackages.clr}"
|
"L+ /opt/rocm/hip - - - - ${pkgs.rocmPackages.clr}"
|
||||||
|
@ -17,17 +17,16 @@
|
|||||||
boot.extraModulePackages = [ ];
|
boot.extraModulePackages = [ ];
|
||||||
boot.kernelPackages = pkgs.linuxPackages_latest;
|
boot.kernelPackages = pkgs.linuxPackages_latest;
|
||||||
|
|
||||||
# luks unlock with clevis
|
|
||||||
boot.initrd.systemd.enable = true;
|
|
||||||
boot.initrd.clevis = {
|
|
||||||
enable = true;
|
|
||||||
devices."enc-pv".secretFile = "/secret/decrypt.jwe";
|
|
||||||
};
|
|
||||||
|
|
||||||
# disks
|
# disks
|
||||||
|
remoteLuksUnlock.enable = true;
|
||||||
boot.initrd.luks.devices."enc-pv" = {
|
boot.initrd.luks.devices."enc-pv" = {
|
||||||
device = "/dev/disk/by-uuid/04231c41-2f13-49c0-8fce-0357eea67990";
|
device = "/dev/disk/by-uuid/04231c41-2f13-49c0-8fce-0357eea67990";
|
||||||
allowDiscards = true;
|
allowDiscards = true;
|
||||||
|
|
||||||
|
# Fetch key from USB drive
|
||||||
|
keyFileSize = 4096;
|
||||||
|
keyFile = "/dev/disk/by-id/usb-Mass_Storage_Device_121220160204-0:0-part2";
|
||||||
|
fallbackToPassword = true;
|
||||||
};
|
};
|
||||||
fileSystems."/" =
|
fileSystems."/" =
|
||||||
{
|
{
|
||||||
|
@ -3,11 +3,13 @@ final: prev:
|
|||||||
|
|
||||||
let
|
let
|
||||||
system = prev.system;
|
system = prev.system;
|
||||||
|
frigatePkgs = inputs.nixpkgs-frigate.legacyPackages.${system};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
actual-server = prev.callPackage ./actualbudget { };
|
# It seems that libedgetpu needs to be built with the newer version of tensorflow in nixpkgs
|
||||||
|
# but I am lazy so I instead just downgrade by using the old nixpkgs
|
||||||
|
libedgetpu = frigatePkgs.callPackage ./libedgetpu { };
|
||||||
|
frigate = frigatePkgs.frigate;
|
||||||
|
|
||||||
# Copied entire package from nixpkgs to downgrade to python 3.11 since 3.12 is broken.
|
actual-server = prev.callPackage ./actualbudget { };
|
||||||
# See: https://github.com/Py-KMS-Organization/py-kms/issues/117
|
|
||||||
pykms = prev.callPackage ./pykms.nix { };
|
|
||||||
}
|
}
|
||||||
|
@ -7,5 +7,13 @@
|
|||||||
|
|
||||||
let
|
let
|
||||||
cfg = config.kernel;
|
cfg = config.kernel;
|
||||||
|
|
||||||
|
gasket = config.boot.kernelPackages.callPackage ./gasket.nix { };
|
||||||
in
|
in
|
||||||
{ }
|
{
|
||||||
|
options.kernel.enableGasketKernelModule = lib.mkEnableOption "Enable Gasket Kernel Module";
|
||||||
|
|
||||||
|
config = lib.mkIf cfg.enableGasketKernelModule {
|
||||||
|
boot.extraModulePackages = [ gasket ];
|
||||||
|
};
|
||||||
|
}
|
||||||
|
36
overlays/kernel-modules/gasket.nix
Normal file
36
overlays/kernel-modules/gasket.nix
Normal file
@ -0,0 +1,36 @@
|
|||||||
|
{ stdenv, lib, fetchFromGitHub, kernel }:
|
||||||
|
|
||||||
|
stdenv.mkDerivation rec {
|
||||||
|
pname = "gasket";
|
||||||
|
version = "1.0-18-unstable-2023-09-05";
|
||||||
|
|
||||||
|
src = fetchFromGitHub {
|
||||||
|
owner = "google";
|
||||||
|
repo = "gasket-driver";
|
||||||
|
rev = "5815ee3908a46a415aac616ac7b9aedcb98a504c";
|
||||||
|
sha256 = "sha256-O17+msok1fY5tdX1DvqYVw6plkUDF25i8sqwd6mxYf8=";
|
||||||
|
};
|
||||||
|
|
||||||
|
makeFlags = kernel.makeFlags ++ [
|
||||||
|
"-C"
|
||||||
|
"${kernel.dev}/lib/modules/${kernel.modDirVersion}/build"
|
||||||
|
"M=$(PWD)"
|
||||||
|
];
|
||||||
|
buildFlags = [ "modules" ];
|
||||||
|
|
||||||
|
installFlags = [ "INSTALL_MOD_PATH=${placeholder "out"}" ];
|
||||||
|
installTargets = [ "modules_install" ];
|
||||||
|
|
||||||
|
sourceRoot = "${src.name}/src";
|
||||||
|
hardeningDisable = [ "pic" "format" ];
|
||||||
|
nativeBuildInputs = kernel.moduleBuildDependencies;
|
||||||
|
|
||||||
|
meta = with lib; {
|
||||||
|
description = "The Coral Gasket Driver allows usage of the Coral EdgeTPU on Linux systems.";
|
||||||
|
homepage = "https://github.com/google/gasket-driver";
|
||||||
|
license = licenses.gpl2;
|
||||||
|
maintainers = [ lib.maintainers.kylehendricks ];
|
||||||
|
platforms = platforms.linux;
|
||||||
|
broken = versionOlder kernel.version "5.15";
|
||||||
|
};
|
||||||
|
}
|
72
overlays/libedgetpu/default.nix
Normal file
72
overlays/libedgetpu/default.nix
Normal file
@ -0,0 +1,72 @@
|
|||||||
|
{ stdenv
|
||||||
|
, lib
|
||||||
|
, fetchFromGitHub
|
||||||
|
, libusb1
|
||||||
|
, abseil-cpp
|
||||||
|
, flatbuffers
|
||||||
|
, xxd
|
||||||
|
}:
|
||||||
|
|
||||||
|
let
|
||||||
|
flatbuffers_1_12 = flatbuffers.overrideAttrs (oldAttrs: rec {
|
||||||
|
version = "1.12.0";
|
||||||
|
NIX_CFLAGS_COMPILE = "-Wno-error=class-memaccess -Wno-error=maybe-uninitialized";
|
||||||
|
cmakeFlags = (oldAttrs.cmakeFlags or [ ]) ++ [ "-DFLATBUFFERS_BUILD_SHAREDLIB=ON" ];
|
||||||
|
NIX_CXXSTDLIB_COMPILE = "-std=c++17";
|
||||||
|
configureFlags = (oldAttrs.configureFlags or [ ]) ++ [ "--enable-shared" ];
|
||||||
|
src = fetchFromGitHub {
|
||||||
|
owner = "google";
|
||||||
|
repo = "flatbuffers";
|
||||||
|
rev = "v${version}";
|
||||||
|
sha256 = "sha256-L1B5Y/c897Jg9fGwT2J3+vaXsZ+lfXnskp8Gto1p/Tg=";
|
||||||
|
};
|
||||||
|
});
|
||||||
|
|
||||||
|
in
|
||||||
|
stdenv.mkDerivation rec {
|
||||||
|
pname = "libedgetpu";
|
||||||
|
version = "grouper";
|
||||||
|
|
||||||
|
src = fetchFromGitHub {
|
||||||
|
owner = "google-coral";
|
||||||
|
repo = pname;
|
||||||
|
rev = "release-${version}";
|
||||||
|
sha256 = "sha256-73hwItimf88Iqnb40lk4ul/PzmCNIfdt6Afi+xjNiBE=";
|
||||||
|
};
|
||||||
|
|
||||||
|
patches = [ ./libedgetpu-stddef.diff ];
|
||||||
|
|
||||||
|
makeFlags = [ "-f" "makefile_build/Makefile" "libedgetpu" ];
|
||||||
|
|
||||||
|
buildInputs = [
|
||||||
|
libusb1
|
||||||
|
abseil-cpp
|
||||||
|
flatbuffers_1_12
|
||||||
|
];
|
||||||
|
|
||||||
|
nativeBuildInputs = [
|
||||||
|
xxd
|
||||||
|
];
|
||||||
|
|
||||||
|
NIX_CXXSTDLIB_COMPILE = "-std=c++17";
|
||||||
|
|
||||||
|
TFROOT = "${fetchFromGitHub {
|
||||||
|
owner = "tensorflow";
|
||||||
|
repo = "tensorflow";
|
||||||
|
rev = "v2.7.4";
|
||||||
|
sha256 = "sha256-liDbUAdaVllB0b74aBeqNxkYNu/zPy7k3CevzRF5dk0=";
|
||||||
|
}}";
|
||||||
|
|
||||||
|
enableParallelBuilding = false;
|
||||||
|
|
||||||
|
installPhase = ''
|
||||||
|
mkdir -p $out/lib
|
||||||
|
cp out/direct/k8/libedgetpu.so.1.0 $out/lib
|
||||||
|
ln -s $out/lib/libedgetpu.so.1.0 $out/lib/libedgetpu.so.1
|
||||||
|
mkdir -p $out/lib/udev/rules.d
|
||||||
|
cp debian/edgetpu-accelerator.rules $out/lib/udev/rules.d/99-edgetpu-accelerator.rules
|
||||||
|
|
||||||
|
# PCIe rule
|
||||||
|
echo 'SUBSYSTEM=="apex", MODE="0660", GROUP="apex"' > $out/lib/udev/rules.d/65-apex.rules
|
||||||
|
'';
|
||||||
|
}
|
12
overlays/libedgetpu/libedgetpu-stddef.diff
Normal file
12
overlays/libedgetpu/libedgetpu-stddef.diff
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
diff --git a/api/allocated_buffer.h b/api/allocated_buffer.h
|
||||||
|
index 97740f0..7bc0547 100644
|
||||||
|
--- a/api/allocated_buffer.h
|
||||||
|
+++ b/api/allocated_buffer.h
|
||||||
|
@@ -16,6 +16,7 @@
|
||||||
|
#define DARWINN_API_ALLOCATED_BUFFER_H_
|
||||||
|
|
||||||
|
#include <functional>
|
||||||
|
+#include <cstddef>
|
||||||
|
|
||||||
|
namespace platforms {
|
||||||
|
namespace darwinn {
|
@ -1,103 +0,0 @@
|
|||||||
{ lib
|
|
||||||
, fetchFromGitHub
|
|
||||||
, python311
|
|
||||||
, writeText
|
|
||||||
, writeShellScript
|
|
||||||
, sqlite
|
|
||||||
, nixosTests
|
|
||||||
}:
|
|
||||||
let
|
|
||||||
pypkgs = python311.pkgs;
|
|
||||||
|
|
||||||
dbSql = writeText "create_pykms_db.sql" ''
|
|
||||||
CREATE TABLE clients(
|
|
||||||
clientMachineId TEXT,
|
|
||||||
machineName TEXT,
|
|
||||||
applicationId TEXT,
|
|
||||||
skuId TEXT,
|
|
||||||
licenseStatus TEXT,
|
|
||||||
lastRequestTime INTEGER,
|
|
||||||
kmsEpid TEXT,
|
|
||||||
requestCount INTEGER
|
|
||||||
);
|
|
||||||
'';
|
|
||||||
|
|
||||||
dbScript = writeShellScript "create_pykms_db.sh" ''
|
|
||||||
set -eEuo pipefail
|
|
||||||
|
|
||||||
db=''${1:-/var/lib/pykms/clients.db}
|
|
||||||
|
|
||||||
if [ ! -e $db ] ; then
|
|
||||||
${lib.getBin sqlite}/bin/sqlite3 $db < ${dbSql}
|
|
||||||
fi
|
|
||||||
'';
|
|
||||||
|
|
||||||
in
|
|
||||||
pypkgs.buildPythonApplication rec {
|
|
||||||
pname = "pykms";
|
|
||||||
version = "unstable-2024-05-28";
|
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "Py-KMS-Organization";
|
|
||||||
repo = "py-kms";
|
|
||||||
rev = "646f4766f4195dbea0695700a7ddaac70a3294f9";
|
|
||||||
hash = "sha256-YCqPo7WkCfXyuTjL4IYapdcUN/Vj465Jz6XhQessyz0=";
|
|
||||||
};
|
|
||||||
|
|
||||||
sourceRoot = "${src.name}/py-kms";
|
|
||||||
|
|
||||||
propagatedBuildInputs = with pypkgs; [
|
|
||||||
systemd
|
|
||||||
pytz
|
|
||||||
tzlocal
|
|
||||||
dnspython
|
|
||||||
];
|
|
||||||
|
|
||||||
postPatch = ''
|
|
||||||
siteDir=$out/${python311.sitePackages}
|
|
||||||
|
|
||||||
substituteInPlace pykms_DB2Dict.py \
|
|
||||||
--replace "'KmsDataBase.xml'" "'$siteDir/KmsDataBase.xml'"
|
|
||||||
'';
|
|
||||||
|
|
||||||
format = "other";
|
|
||||||
|
|
||||||
# there are no tests
|
|
||||||
doCheck = false;
|
|
||||||
|
|
||||||
installPhase = ''
|
|
||||||
runHook preInstall
|
|
||||||
|
|
||||||
mkdir -p $siteDir
|
|
||||||
|
|
||||||
PYTHONPATH="$PYTHONPATH:$siteDir"
|
|
||||||
|
|
||||||
mv * $siteDir
|
|
||||||
for b in Client Server ; do
|
|
||||||
makeWrapper ${python311.interpreter} $out/bin/''${b,,} \
|
|
||||||
--argv0 pykms-''${b,,} \
|
|
||||||
--add-flags $siteDir/pykms_$b.py \
|
|
||||||
--set PYTHONPATH $PYTHONPATH
|
|
||||||
done
|
|
||||||
|
|
||||||
install -Dm755 ${dbScript} $out/libexec/create_pykms_db.sh
|
|
||||||
|
|
||||||
install -Dm644 ../README.md -t $out/share/doc/pykms
|
|
||||||
|
|
||||||
${python311.interpreter} -m compileall $siteDir
|
|
||||||
|
|
||||||
runHook postInstall
|
|
||||||
'';
|
|
||||||
|
|
||||||
passthru.tests = { inherit (nixosTests) pykms; };
|
|
||||||
|
|
||||||
meta = with lib; {
|
|
||||||
description = "Windows KMS (Key Management Service) server written in Python";
|
|
||||||
homepage = "https://github.com/Py-KMS-Organization/py-kms";
|
|
||||||
license = licenses.unlicense;
|
|
||||||
maintainers = with maintainers; [
|
|
||||||
peterhoeg
|
|
||||||
zopieux
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
@ -1,15 +0,0 @@
|
|||||||
diff --git a/nixos/modules/services/video/frigate.nix b/nixos/modules/services/video/frigate.nix
|
|
||||||
index 49f8ed673816..643b59d68dde 100644
|
|
||||||
--- a/nixos/modules/services/video/frigate.nix
|
|
||||||
+++ b/nixos/modules/services/video/frigate.nix
|
|
||||||
@@ -482,10 +482,6 @@ in
|
|
||||||
};
|
|
||||||
};
|
|
||||||
extraConfig = ''
|
|
||||||
- # Frigate wants to connect on 127.0.0.1:5000 for unauthenticated requests
|
|
||||||
- # https://github.com/NixOS/nixpkgs/issues/370349
|
|
||||||
- listen 127.0.0.1:5000;
|
|
||||||
-
|
|
||||||
# vod settings
|
|
||||||
vod_base_url "";
|
|
||||||
vod_segments_base_url "";
|
|
@ -1,11 +1,11 @@
|
|||||||
age-encryption.org/v1
|
age-encryption.org/v1
|
||||||
-> ssh-ed25519 WBT1Hw TGdD8Nw+GPITDOXGhevSu+880DWET7WYN3nIyJ0xy2o
|
-> ssh-ed25519 WBT1Hw wjZGPvilRXGZsC2+7dWm/Nbau8Allv29WwQCr0XSAWU
|
||||||
69xepRTnmaFwa4IsGJjDdwZqTSf5fz6EZK0/q3oz/ZA
|
uTOf/sokutOGDyc8fbTbBWXqCVQCFhGdHxwA6SXqhdA
|
||||||
-> ssh-ed25519 6AT2/g EmqXrXXsRxSS6AsH+7VMgoJTYo9eGj8ebLiLT4IWNxg
|
-> ssh-ed25519 6AT2/g NU068qwqOWiKk0QwqP9vU4xJaND2OR4bo8xkmdWATgY
|
||||||
eKs5/3tQMdg5bGJKNz8PFh9C7HiV+IlOU9dzpYcGIjo
|
uGd0sb5PH+rREn9pgLOFwk29CX66aPBQMvr4rBazylc
|
||||||
-> ssh-ed25519 hPp1nw wsIF676is8FquF6oANNauPrumsMnfVUZpPeVKEtBOzQ
|
-> ssh-ed25519 hPp1nw r2JRiZ7fsHPYDlte6Oh2Gx1KkugekFeeg3xSjziI+hQ
|
||||||
qZR8LSF+TQ2K3K0An69NHfk53ZqNEWev0IVcb71SR40
|
xnO0gscMdR25mj5uAX7D42FCbCQhqbU0wkiLX4OmVqk
|
||||||
-> ssh-ed25519 w3nu8g TKHY/5JuzFMhbW9CQAOI3woX8M9b1H/XXUpIMT0Mylk
|
-> ssh-ed25519 w3nu8g F03mPU63WwEs1SLUFErLOVCkARoggGIvvz9TFZfMOBY
|
||||||
byJV0/BJ3ftG5eYv5BeyIYBi0VoWG31HRiENUxSeYE8
|
HOdVA3xW9pqUPhclO6VueSfXg3ux06Ch3fucF6Vr4hM
|
||||||
--- fwHXHtE/sMLqCLSD8tR0oCPgNuif9Y/ncHU97hbf/Bw
|
--- niyo231HPT/+2dzflP+zhYjL9XiWsk7svesCYdkU1jA
|
||||||
f"+ÉŒqc<71>H†Ñjï!JSšË¡Ì|yMìðX¼þMl<4D>ýçCy™îUXn»Égk¨ë)¤óOY§uº„¦²¶g%è Håvn·œ5ô!$Jœ¤Š…¶›$<24>#Dö;±¥àÖ }ÏŸcçKšˆ{R/
|
DÑØQî¬5–-ô@<40>¢¿—ßÐN5<4E> Ãÿ$Ø‚™’Çž…êÐ<C3AA>X=ŒHŽDÁ`P×5ZA´÷¼YóäÓ?¡é^[³1”6ÕK*mP݈ªæ1æç÷ß›ƒ:$^ÑfDœ*î†ÿ“š-zi´"·Tàuÿüò
|
@ -1,7 +1,7 @@
|
|||||||
age-encryption.org/v1
|
age-encryption.org/v1
|
||||||
-> ssh-ed25519 hPp1nw zOXF7NsZjm+DCYrJ+Ap2mX35JUt37CLJP1RhyOjB/XE
|
-> ssh-ed25519 hPp1nw Chke1ZtpXxN1c1+AnJ6Cd5kpM1KfQKTwymrfPW53QCA
|
||||||
ePprJM2cnhYZhP8aJUXOZeGHJm/DHlRYomWN+lFaU6w
|
jUcw8eitC7r0rwefjllndZjARIqpWoVqGCnefHfjQ6Y
|
||||||
-> ssh-ed25519 w3nu8g gjeFAbFWXyPdGauKHXAzuIP9fmaj2Oysq9fHO8q7u38
|
-> ssh-ed25519 w3nu8g KY/5bU1B5uvmfGHF2d6qBL1NYy64qo324rdvkgnXoDA
|
||||||
KiMR0pgEPtsfZnYAIsH7UHNhnsB6rtsW/hqV03uS2dI
|
OBvuFtzZXQ0RmmEXelyzHMMiVqZir7zQJMA36ZH2siE
|
||||||
--- BPzPECz1g6vEv4OlRn6+FnWP9oq3tn6TN2o867icxYA
|
--- CSd7lYSYQ2fCTjkJLPGdaNGL8eVpE9IBEyFo0LW907M
|
||||||
}ìjºùŽ+l&þàx<C3A0>-TïÝ‹b‡ÅèØÄ·<C384>€Dg‰ñgc’*ˆ0<CB86>÷µcp
…}uþ‹7Íßã%9Ð%ŽÒú›©S¥ ‰|šôêöQœÃ*9Ø$ä ŽŠ
ÍÖi;)c?ÍÍýGh¤VvªnlÚs¤Ç)r }ÒhE5K‡bg–-<2D>®
|
£³$šO†ÈIß/À//Êw*ƒ™õD¤@u5o[¼â:·äš¥t¾˜]Jñ쮸™@Ùhþu£Àk;?·XüÁHRº’ѰE5¥ÍçÜ9
|
7
secrets/hostspot-passwords.age
Normal file
7
secrets/hostspot-passwords.age
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 cObvAg l/suU/M4AATK7lQuZv/qnjG/xqNGoVqhS7b3xirmNUM
|
||||||
|
Ao2tP6BBSZdlL7jZJPmLyJQWfqdU89M9hCjkkuqtxlw
|
||||||
|
-> ssh-ed25519 w3nu8g szQugiuFfzkzVndyIdP1agun4nmCsZzFG/6EEB2V1Gk
|
||||||
|
5+DEUJ5tkVFUpm+w/tptUCByRpMxRigwfrVglTYc8XI
|
||||||
|
--- pjviyhRustHHMipIpkKsQ4cpu+YA66JwvWXjceXopi4
|
||||||
|
)˜Ö®Äý8³È6Y"@?Ý9”®@¡Ÿžè|ÂÄž+©Z*4ö2å“R<qef…êªG¹ïV+{©%CmÞd^™b
|
@ -58,6 +58,6 @@ with roles;
|
|||||||
# Frigate (DVR)
|
# Frigate (DVR)
|
||||||
"frigate-credentials.age".publicKeys = frigate;
|
"frigate-credentials.age".publicKeys = frigate;
|
||||||
|
|
||||||
# zigbee2mqtt secrets
|
# Phone hotspot passwords
|
||||||
"zigbee2mqtt.yaml.age".publicKeys = zigbee;
|
"hostspot-passwords.age".publicKeys = hotspot;
|
||||||
}
|
}
|
||||||
|
@ -1,8 +0,0 @@
|
|||||||
age-encryption.org/v1
|
|
||||||
-> ssh-ed25519 hPp1nw TSDuPaFp/Qcz4r819X4QmU/4J2TGpoX7jCCJCdFDog0
|
|
||||||
SwQUqEp45xMOeTkvBG6uX28kB8YWG66laYqakSgl9w4
|
|
||||||
-> ssh-ed25519 w3nu8g tLZDNE0iBgOpUB3djpNu3CgimsRc0zcds+AgctzxyQ4
|
|
||||||
Oyz6XORsApM4vFxWyaD3bR/ApIUFPY3q4yGvtbosUIY
|
|
||||||
--- vuXlQmuOFbJhBTACN5ciH2GlOCbRCMPZdlogG2O+KOk
|
|
||||||
Áëÿ!}UIì p0@Xž|°þ#晆0HÙõò#BÇRR<52>Ù
|
|
||||||
òùø5¾Iÿ?vX?pÝ<70>—<>fqÍ[lž¸˜xÏG7ü;UäÀOUä¶
|
|
Loading…
x
Reference in New Issue
Block a user