this repo has no description
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

aaaa

+95 -64
+4 -4
hosts/sand-archives/core/caddy.nix
··· 72 72 } 73 73 } 74 74 route @inner_http { 75 - proxy ${pm.net.ipv4.vulpes.addr}:80 75 + proxy 0.0.0.0:80 76 76 } 77 77 } 78 78 ··· 134 134 } 135 135 } 136 136 route @inner_https { 137 - proxy ${pm.net.ipv4.vulpes.addr}:443 137 + proxy 0.0.0.0:443 138 138 } 139 139 } 140 140 141 141 udp/:5353 { 142 142 route { 143 - proxy udp/${pm.net.ipv4.vulpes.addr}:5300 143 + proxy udp/0.0.0.0:5300 144 144 } 145 145 } 146 146 147 147 tcp/:5353 { 148 148 route { 149 - proxy tcp/${pm.net.ipv4.vulpes.addr}:5300 149 + proxy tcp/0.0.0.0:5300 150 150 } 151 151 } 152 152 }
+1 -1
hosts/vulpes/core/virtualization.nix
··· 22 22 }; 23 23 preseed = { 24 24 config = { 25 - "core.https_address" = "${pm.net.ipv4.vulpes.addr}:8443"; 25 + "core.https_address" = "0.0.0.0:8443"; 26 26 "oidc.audience" = "incus"; 27 27 "oidc.issuer" = "https://auth.awoo.ren/oauth2/openid/incus"; 28 28 "oidc.client.id" = "incus";
+5 -5
hosts/vulpes/infra/caddy.nix
··· 7 7 }: 8 8 let 9 9 photos-pkg = ( 10 - pkgs.ente-web.override { 10 + args.pkgs-master.ente-web.override { 11 11 enteApp = "photos"; 12 12 enteMainUrl = "https://ente.awoo.ren"; 13 13 extraBuildEnv = { ··· 37 37 } 38 38 ''; 39 39 extraConfig = '' 40 - http://${pm.net.ipv4.vulpes.addr}:3893 { 40 + http://0.0.0.0:3893 { 41 41 handle /xrpc/com.atproto.identity.resolveHandle* { 42 42 @pup query handle=awoo.ren 43 43 @snow query handle=mrsnowy.dev ··· 55 55 } 56 56 } 57 57 58 - http://${pm.net.ipv4.vulpes.addr}:7001 { 58 + http://0.0.0.0:7001 { 59 59 header Host ente.awoo.ren 60 60 root * ${photos-pkg} 61 61 file_server 62 62 try_files {path} {path}.html /index.html 63 63 } 64 64 65 - http://${pm.net.ipv4.vulpes.addr}:7002 { 65 + http://0.0.0.0:7002 { 66 66 header Host albums.ente.awoo.ren 67 67 root * ${photos-pkg} 68 68 file_server 69 69 try_files {path} {path}.html /index.html 70 70 } 71 71 72 - http://${pm.net.ipv4.vulpes.addr}:8934 { 72 + http://0.0.0.0:8934 { 73 73 root * ${pkgs.firefly-iii}/public 74 74 request_header Host firefly.awoo.ren 75 75 php_fastcgi unix/${config.services.phpfpm.pools.firefly-iii.socket} {
+12 -1
hosts/vulpes/infra/coder.nix
··· 5 5 { 6 6 services.coder = { 7 7 enable = true; 8 - listenAddress = "${pm.net.ipv4.vulpes.addr}:3300"; 8 + listenAddress = "0.0.0.0:3300"; 9 9 accessUrl = "https://code.awoo.ren"; 10 10 wildcardAccessUrl = "*.code.awoo.ren"; 11 11 database = { ··· 20 20 CODER_BLOCK_DIRECT = "true"; 21 21 CODER_DERP_FORCE_WEBSOCKETS = "true"; 22 22 # CODER_DISABLE_PASSWORD_AUTH = "true"; 23 + }; 24 + }; 25 + systemd = { 26 + services = { 27 + coder = { 28 + after = [ 29 + "netbird-vulpes.service" 30 + "sys-subsystem-net-devices-nb\\x2dvulpes.device" 31 + ]; 32 + requires = [ "netbird-vulpes.service" ]; 33 + }; 23 34 }; 24 35 }; 25 36 }
+2 -2
hosts/vulpes/infra/dns.nix
··· 7 7 pihole-web = { 8 8 enable = true; 9 9 ports = [ 10 - "${pm.net.ipv4.vulpes.addr}:9001" 10 + "0.0.0.0:9001" 11 11 ]; 12 12 }; 13 13 pihole-ftl = { ··· 121 121 showsonarr IN A ${pm.net.ipv4.sand-archives.addr} 122 122 movieradarr IN A ${pm.net.ipv4.sand-archives.addr} 123 123 prowlarr IN A ${pm.net.ipv4.sand-archives.addr} 124 - torrent IN A ${pm.net.ipv4.vulpes.addr} 124 + torrent IN A 0.0.0.0 125 125 126 126 yap IN A ${pm.net.ipv4.sand-archives.addr} 127 127
+2 -2
hosts/vulpes/infra/git.nix
··· 49 49 server = { 50 50 owner = "did:plc:e6e4lgy3nzdshjbpmjvnkbfd"; 51 51 hostname = "knot.git.awoo.ren"; 52 - listenAddr = "${pm.net.ipv4.vulpes.addr}:5555"; 52 + listenAddr = "0.0.0.0:5555"; 53 53 }; 54 54 }; 55 55 }; ··· 67 67 repo_folder = "/var/lib/git-priv/roufpup/$repo"; 68 68 in 69 69 '' 70 - for repo in priv-dots fluxer-v2; do 70 + for repo in priv-dots fluxer-v2 fd; do 71 71 if [ ! -d "${repo_folder}" ]; then 72 72 ${pkgs.git}/bin/git init --bare ${repo_folder} 73 73 chown -R git-puppy-priv:git-puppy-priv ${repo_folder}
+5 -5
hosts/vulpes/infra/misc.nix
··· 31 31 enable = true; 32 32 settings = { 33 33 base-url = "https://ntfy.killuaa.dev"; 34 - listen-http = "${pm.net.ipv4.vulpes.addr}:2586"; 34 + listen-http = "0.0.0.0:2586"; 35 35 behind-proxy = true; 36 36 }; 37 37 }; ··· 49 49 DOMAIN = "https://vaultwarden.awoo.ren"; 50 50 SIGNUPS_ALLOWED = false; 51 51 ROCKET_LOG = "critical"; 52 - ROCKET_ADDRESS = "${pm.net.ipv4.vulpes.addr}"; 52 + ROCKET_ADDRESS = "0.0.0.0"; 53 53 ROCKET_PORT = 7474; 54 54 DATA_FOLDER = "/var/lib/vaultwarden"; 55 55 WEB_VAULT_FOLDER = "${pkgs.vaultwarden.webvault}/share/vaultwarden/vault"; ··· 60 60 createDatabaseLocally = false; 61 61 config = { 62 62 DATABASE_URL = pm.srv.miniflux.db_connection_url; 63 - LISTEN_ADDR = "${pm.net.ipv4.vulpes.addr}:4678"; 63 + LISTEN_ADDR = "0.0.0.0:4678"; 64 64 OAUTH2_PROVIDER = "oidc"; 65 65 OAUTH2_CLIENT_ID = "miniflux"; 66 66 OAUTH2_CLIENT_SECRET = "${pm.srv.miniflux.oauth2_secret}"; ··· 73 73 instances = { 74 74 tranquil_pds = { 75 75 smtp = "127.0.0.1:1025"; 76 - listen = "${pm.net.ipv4.vulpes.addr}:1026"; 76 + listen = "0.0.0.0:1026"; 77 77 }; 78 78 }; 79 79 }; ··· 102 102 enable = true; 103 103 environmentFile = config.sops.secrets.atticd_env.path; 104 104 settings = { 105 - listen = "${pm.net.ipv4.vulpes.addr}:1090"; 105 + listen = "0.0.0.0:1090"; 106 106 allowed-hosts = [ "nar.awoo.ren" ]; 107 107 api-endpoint = "https://nar.awoo.ren/"; 108 108 database = {
+21 -1
hosts/vulpes/infra/postgres.nix
··· 82 82 login = true; 83 83 }; 84 84 } 85 + { 86 + name = "netbird"; 87 + ensureDBOwnership = true; 88 + ensureClauses = { 89 + login = true; 90 + }; 91 + } 85 92 ]; 86 93 ensureDatabases = [ 87 94 "roufpup" ··· 93 100 "atticd" 94 101 "firefly_iii" 95 102 "vaultwarden" 103 + "netbird" 96 104 ]; 97 105 settings = { 98 106 listen_addresses = "*"; ··· 113 121 host forgejo forgejo 127.0.0.1/8 scram-sha-256 114 122 host coder coder 127.0.0.1/8 scram-sha-256 115 123 host firefly_iii firefly_iii 127.0.0.1/8 scram-sha-256 124 + host netbird netbird 127.0.0.1/8 scram-sha-256 116 125 ''; 117 126 }; 118 127 ··· 121 130 initialEmail = pm.srv.pgadmin.email; 122 131 initialPasswordFile = config.sops.secrets.pgadmin_password.path; 123 132 settings = { 124 - DEFAULT_SERVER = "${pm.net.ipv4.vulpes.addr}"; 133 + DEFAULT_SERVER = "0.0.0.0"; 125 134 FIXED_BINARY_PATHS = { 126 135 pg-18 = "${pkgs.postgresql_18_jit}/bin"; 127 136 }; 137 + }; 138 + }; 139 + }; 140 + systemd = { 141 + services = { 142 + pgadmin = { 143 + after = [ 144 + "netbird-vulpes.service" 145 + "sys-subsystem-net-devices-nb\\x2dvulpes.device" 146 + ]; 147 + requires = [ "netbird-vulpes.service" ]; 128 148 }; 129 149 }; 130 150 };
+1 -1
hosts/work/core/boot.nix
··· 7 7 "btrfs" 8 8 ]; 9 9 10 - kernelPackages = pkgs.linuxPackages_latest; 10 + kernelPackages = pkgs.linuxPackages_6_18; 11 11 kernelParams = [ 12 12 "preempt=full" 13 13 "amdgpu.ppfeaturemask=0xffffffff"
+2
hosts/work/core/packages.nix
··· 82 82 }) 83 83 mangohud 84 84 moonlight-qt 85 + umu-launcher 85 86 86 87 # Programming 87 88 rustc ··· 90 91 rustfmt 91 92 clippy 92 93 nodejs 94 + pnpm 93 95 nixd 94 96 nixfmt 95 97 schemat
-2
hosts/work/default.nix
··· 133 133 substituters = [ 134 134 "https://cache.garnix.io" 135 135 "https://nix-community.cachix.org" 136 - "https://nar.awoo.ren/fluxer_aggregate" 137 136 ]; 138 137 139 138 trusted-public-keys = [ 140 139 "cache.garnix.io:CTFPyKSLcx5RMJKfLo5EEPUObbA78b0YQ2DTCJXqr9g=" 141 140 "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" 142 - "fluxer_aggregate:CnMxj4NrSzvt9OTIaP+k5UKajpUTquG3VNUFkO5tba0=" 143 141 ]; 144 142 }; 145 143 gc = {
+34 -34
npins/sources.json
··· 9 9 }, 10 10 "branch": "main", 11 11 "submodules": false, 12 - "revision": "1aa96ece7d3c39aee027b126005cf401cfb591f2", 13 - "url": "https://github.com/mrshmllow/affinity-nix/archive/1aa96ece7d3c39aee027b126005cf401cfb591f2.tar.gz", 14 - "hash": "sha256-Ebvn8gN4Vw4FJBQZxKm3sV9Cw+/99IwT7U83zIsboN8=" 12 + "revision": "2eb82159e23e76a2d6fe89473fc7b479f60c6076", 13 + "url": "https://github.com/mrshmllow/affinity-nix/archive/2eb82159e23e76a2d6fe89473fc7b479f60c6076.tar.gz", 14 + "hash": "sha256-N6mS4i0c1owGiOXc1y96t2TcYeb3NCCOVlcZqugSN+0=" 15 15 }, 16 16 "crane": { 17 17 "type": "Git", ··· 22 22 }, 23 23 "branch": "master", 24 24 "submodules": false, 25 - "revision": "7cf72d978629469c4bd4206b95c402514c1f6000", 26 - "url": "https://github.com/ipetkov/crane/archive/7cf72d978629469c4bd4206b95c402514c1f6000.tar.gz", 27 - "hash": "sha256-SPm9ck7jh3Un9nwPuMGbRU04UroFmOHjLP56T10MOeM=" 25 + "revision": "3fbd73bdd9eb572209fdf094abad19d9b6d147b4", 26 + "url": "https://github.com/ipetkov/crane/archive/3fbd73bdd9eb572209fdf094abad19d9b6d147b4.tar.gz", 27 + "hash": "sha256-P7TLDtRgAxmo0Bdw8fkJrrBpX/8/WhO6Bm/uCfl6jXY=" 28 28 }, 29 29 "crate2nix": { 30 30 "type": "Git", ··· 115 115 }, 116 116 "branch": "main", 117 117 "submodules": false, 118 - "revision": "32bd6d54d805a3eb41efa62a940eeceaf263c4a8", 119 - "url": "https://github.com/feel-co/hjem/archive/32bd6d54d805a3eb41efa62a940eeceaf263c4a8.tar.gz", 120 - "hash": "sha256-W+kpLQ5J/DDaY1nUmvN9aIAfh5ixdyqYM76ZUdcvMBU=" 118 + "revision": "3828faa3b6c14d4e557866db01d06137f33ad9f8", 119 + "url": "https://github.com/feel-co/hjem/archive/3828faa3b6c14d4e557866db01d06137f33ad9f8.tar.gz", 120 + "hash": "sha256-xjJpa+PGjB2lZi1saUU+ubWw5+FpAud/T0/jC1gLL1A=" 121 121 }, 122 122 "hjem-rum": { 123 123 "type": "Git", ··· 140 140 }, 141 141 "branch": "master", 142 142 "submodules": false, 143 - "revision": "29d2cca7fc3841708c1d48e2d1272f79db1538b6", 144 - "url": "https://github.com/nix-community/lanzaboote/archive/29d2cca7fc3841708c1d48e2d1272f79db1538b6.tar.gz", 145 - "hash": "sha256-mWn8D/oXXAaqeFFFRorKHvTLw5V9M8eYzAWRr4iffag=" 143 + "revision": "18e9e64bae15b828c092658335599122a6db939b", 144 + "url": "https://github.com/nix-community/lanzaboote/archive/18e9e64bae15b828c092658335599122a6db939b.tar.gz", 145 + "hash": "sha256-TC6yzbCAex1pDfqUZv9u8fVm8e17ft5fNrcZ0JRDOIQ=" 146 146 }, 147 147 "nix-index": { 148 148 "type": "Git", ··· 178 178 }, 179 179 "branch": "nixos-unstable", 180 180 "submodules": false, 181 - "revision": "4c1018dae018162ec878d42fec712642d214fdfa", 182 - "url": "https://github.com/NixOS/nixpkgs/archive/4c1018dae018162ec878d42fec712642d214fdfa.tar.gz", 183 - "hash": "sha256-ar3rofg+awPB8QXDaFJhJ2jJhu+KqN/PRCXeyuXR76E=" 181 + "revision": "4bd9165a9165d7b5e33ae57f3eecbcb28fb231c9", 182 + "url": "https://github.com/NixOS/nixpkgs/archive/4bd9165a9165d7b5e33ae57f3eecbcb28fb231c9.tar.gz", 183 + "hash": "sha256-l/iNYDZ4bGOAFQY2q8y5OAfBBtrDAaPuRQqWaFHVRXM=" 184 184 }, 185 185 "nixpkgs-master": { 186 186 "type": "Git", ··· 191 191 }, 192 192 "branch": "master", 193 193 "submodules": false, 194 - "revision": "f35eaac5f6572939b7ac15a422dd52690b61a55e", 195 - "url": "https://github.com/NixOS/nixpkgs/archive/f35eaac5f6572939b7ac15a422dd52690b61a55e.tar.gz", 196 - "hash": "sha256-52AHykR9ndjjDDO3CqafKndrm1qSjn3d6SQ0VPo7ca0=" 194 + "revision": "47f0bfeb3b2a4bb10f8f7ade2ad6181ee753de3c", 195 + "url": "https://github.com/NixOS/nixpkgs/archive/47f0bfeb3b2a4bb10f8f7ade2ad6181ee753de3c.tar.gz", 196 + "hash": "sha256-qgoDM/jiT1HdQhfN1hTaSqII5UVOPcO1CfLDt28omWQ=" 197 197 }, 198 198 "nixpkgs-xr": { 199 199 "type": "Git", ··· 204 204 }, 205 205 "branch": "main", 206 206 "submodules": false, 207 - "revision": "c374d05f3bacec9a2f50f4c5621d851751d480a2", 208 - "url": "https://github.com/nix-community/nixpkgs-xr/archive/c374d05f3bacec9a2f50f4c5621d851751d480a2.tar.gz", 209 - "hash": "sha256-k7MaB2xZH7i3JB+ESIkHuAOXpRcNOD6ELeuXWiVJvCk=" 207 + "revision": "40bb99d154d683c175853dffd838e0b2ef2f92b8", 208 + "url": "https://github.com/nix-community/nixpkgs-xr/archive/40bb99d154d683c175853dffd838e0b2ef2f92b8.tar.gz", 209 + "hash": "sha256-fAl9h5MeWOL5xgP+g4UF+yfNUZhcmsZ+kC5XHM/QFD4=" 210 210 }, 211 211 "nur": { 212 212 "type": "Git", ··· 217 217 }, 218 218 "branch": "main", 219 219 "submodules": false, 220 - "revision": "cdfa6c19630b3ac5ed8ff973568fcb8519cc7062", 221 - "url": "https://github.com/nix-community/NUR/archive/cdfa6c19630b3ac5ed8ff973568fcb8519cc7062.tar.gz", 222 - "hash": "sha256-JNfqMOM/4RZEeCUvQbjH1fNMOv3F4IMlS0oWzwpm7eM=" 220 + "revision": "f42d87effcdce034096e7446ba8d99e50a609361", 221 + "url": "https://github.com/nix-community/NUR/archive/f42d87effcdce034096e7446ba8d99e50a609361.tar.gz", 222 + "hash": "sha256-IcM//BbehNjkx27ylghZtUVtotPOa16e6s/bvBkErrQ=" 223 223 }, 224 224 "rust-overlay": { 225 225 "type": "Git", ··· 230 230 }, 231 231 "branch": "master", 232 232 "submodules": false, 233 - "revision": "3c27f4c92a7d977556dd2c10bb564d9c61b375e9", 234 - "url": "https://github.com/oxalica/rust-overlay/archive/3c27f4c92a7d977556dd2c10bb564d9c61b375e9.tar.gz", 235 - "hash": "sha256-/f/6/1WOfBJaGMfqV3VxWD9lpFRbPpF+Cx4MO+0mGok=" 233 + "revision": "e611106c527e8ab0adbb641183cda284411d575c", 234 + "url": "https://github.com/oxalica/rust-overlay/archive/e611106c527e8ab0adbb641183cda284411d575c.tar.gz", 235 + "hash": "sha256-Xq7p+Ex3YHFAd+fFFLOYw2Wv67582X7SAmrEDtIDZQ4=" 236 236 }, 237 237 "sops-nix": { 238 238 "type": "Git", ··· 243 243 }, 244 244 "branch": "master", 245 245 "submodules": false, 246 - "revision": "31ac5fe5d015f76b54058c69fcaebb66a55871a4", 247 - "url": "https://github.com/Mic92/sops-nix/archive/31ac5fe5d015f76b54058c69fcaebb66a55871a4.tar.gz", 248 - "hash": "sha256-VKp9bhVSm0bT6JWctFy06ocqxGGnWHi1NfoE90IgIcY=" 246 + "revision": "d4971dd58c6627bfee52a1ad4237637c0a2fb0cd", 247 + "url": "https://github.com/Mic92/sops-nix/archive/d4971dd58c6627bfee52a1ad4237637c0a2fb0cd.tar.gz", 248 + "hash": "sha256-Zm6bxLNnEOYuS/SzrAGsYuXSwk3cbkRQZY0fJnk8a5M=" 249 249 }, 250 250 "stash": { 251 251 "type": "Git", ··· 269 269 }, 270 270 "branch": "master", 271 271 "submodules": false, 272 - "revision": "f64dbe713c610910a091bce70ce56c7f68556b6b", 272 + "revision": "956f97c314517efbfa18d04ce8e0234e6609a30a", 273 273 "url": null, 274 - "hash": "sha256-FIzyZqcHL27vOioLVf1cVKFkCtWWm3ny7gLPqcLERwM=" 274 + "hash": "sha256-bUR/cHqZP1zigWCo59KFF+F6UDuGM9q5CiFHdvnvSO8=" 275 275 }, 276 276 "tranquil_pds": { 277 277 "type": "Git", ··· 281 281 }, 282 282 "branch": "main", 283 283 "submodules": false, 284 - "revision": "cdbbaaccdf85093c50797281f3e08b6f4f90901b", 284 + "revision": "7edb76507bade77319c06eb1ed515febbd5ed310", 285 285 "url": null, 286 - "hash": "sha256-F2/rG0fzaAA5cjfM1bG8JCZ2o7yYpkUy+XgCurvIUVM=" 286 + "hash": "sha256-9IjgABNXj2+bTFTUco5yEA6l2vrMrpzAWImrPMFWHMA=" 287 287 }, 288 288 "wire": { 289 289 "type": "Git",
+6 -6
packages/fluxer_nix_v2/apps/aggregate.nix
··· 98 98 channel_common = ( 99 99 _: { 100 100 FLUXER_CHANNEL_PROTO_DIR = "${src}/services/channel/proto"; 101 - FLUXER_CHANNEL_GATEWAY_PROTO_DIR = "${src}/services/gateway/proto"; 102 - FLUXER_CHANNEL_AUTH_PROTO_DIR = "${src}/services/authentication/proto"; 101 + FLUXER_GATEWAY_PROTO_DIR = "${src}/services/gateway/proto"; 102 + FLUXER_AUTH_PROTO_DIR = "${src}/services/authentication/proto"; 103 103 } 104 104 ); 105 105 platform_bans_common = ( ··· 145 145 ); 146 146 read_state_common = ( 147 147 _: { 148 - FLUXER_LOCAL_READ_STATE_PROTO_DIR = "${src}/services/read_state/proto"; 148 + FLUXER_READ_STATE_PROTO_DIR = "${src}/services/read_state/proto"; 149 149 FLUXER_GATEWAY_PROTO_DIR = "${src}/services/gateway/proto"; 150 150 FLUXER_AUTH_PROTO_DIR = "${src}/services/authentication/proto"; 151 151 } ··· 193 193 ); 194 194 gateway_dispatch_encoder = ( 195 195 _: { 196 - FLUXER_GATEWAY_DISPATCH_ENCODER_PROTO_DIR = "${src}/services/gateway/proto"; 196 + FLUXER_GATEWAY_PROTO_DIR = "${src}/services/gateway/proto"; 197 197 } 198 198 ); 199 199 unfurl_common = ( ··· 242 242 243 243 FLUXER_MARKETING_SITE_STATIC_DIR = "1"; 244 244 preConfigure = '' 245 - ln -sf ${src}/infrastructure/static ./infra_static 245 + ln -sf ${src}/infrastructure/static ./static_dir 246 246 ''; 247 247 } 248 248 ); ··· 266 266 ); 267 267 fluxer_setup_wizard = ( 268 268 _: { 269 - FLUXER_SETUP_WIZARD_SERVICES_DIR = "${src}/services"; 269 + FLUXER_SERVICES_DIR = "${src}/services"; 270 270 } 271 271 ); 272 272 };