Personal-use NixOS configuration
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

Use personal fork of slskd

encode42 4d3d7fa1 2a32fa13

+48 -44
+32 -32
flake.lock
··· 61 61 ] 62 62 }, 63 63 "locked": { 64 - "lastModified": 1757736554, 65 - "narHash": "sha256-JmpoZrWsSoxwY07B5rfAzGmIWkg/xWdKDhIwepccsIw=", 64 + "lastModified": 1758445065, 65 + "narHash": "sha256-UCjOBmPPHtv0jH1FnkrctdXkxdkpuYq2xx+m/c8NbSI=", 66 66 "owner": "encode42", 67 67 "repo": "nixos-packages", 68 - "rev": "990ce7b331e48e05a812bcc001cac326e245673d", 68 + "rev": "0f4836e5b52c77faf4665e54c54e3104e1a1e404", 69 69 "type": "github" 70 70 }, 71 71 "original": { ··· 82 82 }, 83 83 "locked": { 84 84 "dir": "pkgs/firefox-addons", 85 - "lastModified": 1757822625, 86 - "narHash": "sha256-w+V97GrUZK5Lt50DOzhmFGPf3coxfj4TTNHa0rHswuE=", 85 + "lastModified": 1758427412, 86 + "narHash": "sha256-VbVedyzFU0URoEccHZOzZI3tuCVfGFz12F1/bFdDyAk=", 87 87 "owner": "rycee", 88 88 "repo": "nur-expressions", 89 - "rev": "5a1d5f5453eef0ea2510d9860d2f803911df6776", 89 + "rev": "72d7daed5a5e07593b70a3ab26ad0fdecadc49c3", 90 90 "type": "gitlab" 91 91 }, 92 92 "original": { ··· 248 248 ] 249 249 }, 250 250 "locked": { 251 - "lastModified": 1757808926, 252 - "narHash": "sha256-K6PEI5PYY94TVMH0mX3MbZNYFme7oNRKml/85BpRRAo=", 251 + "lastModified": 1758313341, 252 + "narHash": "sha256-SsI6INUzWwPcRKRaxvi50RttnD9rcC4EjV+67TOEfrQ=", 253 253 "owner": "nix-community", 254 254 "repo": "home-manager", 255 - "rev": "f21d9167782c086a33ad53e2311854a8f13c281e", 255 + "rev": "6f656618ebc71ca82d93d306a8aecb2c5f6f2ab2", 256 256 "type": "github" 257 257 }, 258 258 "original": { ··· 333 333 "xwayland-satellite-unstable": "xwayland-satellite-unstable" 334 334 }, 335 335 "locked": { 336 - "lastModified": 1757942412, 337 - "narHash": "sha256-iDnEKwUYNOJZU/2B4bt8tfKUwN0J7RFJ7BXmf17VJOM=", 336 + "lastModified": 1758434547, 337 + "narHash": "sha256-HV6J991KhLAvPk9jXOiO9kufVm9JwBhggTxx608bxIw=", 338 338 "owner": "sodiboo", 339 339 "repo": "niri-flake", 340 - "rev": "1da07fd6a9d44a7875d2843cccab1179085edb2c", 340 + "rev": "1e707d7863f8c17ff13f4394c6c17df68cd8ac49", 341 341 "type": "github" 342 342 }, 343 343 "original": { ··· 366 366 "niri-unstable": { 367 367 "flake": false, 368 368 "locked": { 369 - "lastModified": 1757916394, 370 - "narHash": "sha256-nSmVJLjTGwQYC+pqD7GLt7Yt6oktawAMRld6oyFwMd0=", 369 + "lastModified": 1758370089, 370 + "narHash": "sha256-0C7695SLx4hU9m3VW4fCrZdvyIY+3kFQTWELHA4hxRQ=", 371 371 "owner": "YaLTeR", 372 372 "repo": "niri", 373 - "rev": "cd0d45fdb88641aa5211c81e69301e85c5dd53a2", 373 + "rev": "a1dccedbb72da372d2a8a84022f37ccaa4d4a6e6", 374 374 "type": "github" 375 375 }, 376 376 "original": { ··· 388 388 "systems": "systems_2" 389 389 }, 390 390 "locked": { 391 - "lastModified": 1757846260, 391 + "lastModified": 1758367636, 392 392 "narHash": "sha256-j5Rj9KAhuoTCQhtD5N2oJYHuEukTmJe8aPgOetWjG7w=", 393 393 "owner": "theCapypara", 394 394 "repo": "nix-jetbrains-plugins", 395 - "rev": "f2cf7768b307f00a883c5d80f7458e6ff7eac978", 395 + "rev": "5b97e4a2f1729b89de1ea46b578eccf242ddbe17", 396 396 "type": "github" 397 397 }, 398 398 "original": { ··· 410 410 ] 411 411 }, 412 412 "locked": { 413 - "lastModified": 1757726013, 414 - "narHash": "sha256-7RPKqqlc5xawEbASZh18b6HX9FogiVTPIw0KdMEjpn8=", 413 + "lastModified": 1758330997, 414 + "narHash": "sha256-OGLb5lU3RiNSqfCDbQSnm+7DzLSldnfWFBWW8ec34G4=", 415 415 "owner": "kaylorben", 416 416 "repo": "nixcord", 417 - "rev": "2133f2ab5af34dab65f5aa17f1f343777bc71070", 417 + "rev": "f93293513fdf2a5d530e3c3bce9cc87bd9b47b2a", 418 418 "type": "github" 419 419 }, 420 420 "original": { ··· 488 488 }, 489 489 "nixpkgs-stable_2": { 490 490 "locked": { 491 - "lastModified": 1757810152, 492 - "narHash": "sha256-Vp9K5ol6h0J90jG7Rm4RWZsCB3x7v5VPx588TQ1dkfs=", 491 + "lastModified": 1758346548, 492 + "narHash": "sha256-afXE7AJ7MY6wY1pg/Y6UPHNYPy5GtUKeBkrZZ/gC71E=", 493 493 "owner": "NixOS", 494 494 "repo": "nixpkgs", 495 - "rev": "9a094440e02a699be5c57453a092a8baf569bdad", 495 + "rev": "b2a3852bd078e68dd2b3dfa8c00c67af1f0a7d20", 496 496 "type": "github" 497 497 }, 498 498 "original": { ··· 504 504 }, 505 505 "nixpkgs-unstable": { 506 506 "locked": { 507 - "lastModified": 1757745802, 508 - "narHash": "sha256-hLEO2TPj55KcUFUU1vgtHE9UEIOjRcH/4QbmfHNF820=", 507 + "lastModified": 1758277210, 508 + "narHash": "sha256-iCGWf/LTy+aY0zFu8q12lK8KuZp7yvdhStehhyX1v8w=", 509 509 "owner": "NixOS", 510 510 "repo": "nixpkgs", 511 - "rev": "c23193b943c6c689d70ee98ce3128239ed9e32d1", 511 + "rev": "8eaee110344796db060382e15d3af0a9fc396e0e", 512 512 "type": "github" 513 513 }, 514 514 "original": { ··· 520 520 }, 521 521 "nixpkgs_2": { 522 522 "locked": { 523 - "lastModified": 1757745802, 524 - "narHash": "sha256-hLEO2TPj55KcUFUU1vgtHE9UEIOjRcH/4QbmfHNF820=", 523 + "lastModified": 1758277210, 524 + "narHash": "sha256-iCGWf/LTy+aY0zFu8q12lK8KuZp7yvdhStehhyX1v8w=", 525 525 "owner": "NixOS", 526 526 "repo": "nixpkgs", 527 - "rev": "c23193b943c6c689d70ee98ce3128239ed9e32d1", 527 + "rev": "8eaee110344796db060382e15d3af0a9fc396e0e", 528 528 "type": "github" 529 529 }, 530 530 "original": { ··· 536 536 }, 537 537 "nixpkgs_3": { 538 538 "locked": { 539 - "lastModified": 1757810152, 540 - "narHash": "sha256-Vp9K5ol6h0J90jG7Rm4RWZsCB3x7v5VPx588TQ1dkfs=", 539 + "lastModified": 1758346548, 540 + "narHash": "sha256-afXE7AJ7MY6wY1pg/Y6UPHNYPy5GtUKeBkrZZ/gC71E=", 541 541 "owner": "NixOS", 542 542 "repo": "nixpkgs", 543 - "rev": "9a094440e02a699be5c57453a092a8baf569bdad", 543 + "rev": "b2a3852bd078e68dd2b3dfa8c00c67af1f0a7d20", 544 544 "type": "github" 545 545 }, 546 546 "original": {
-9
hosts/index/config/sharing/soulseek.nix
··· 12 12 ssl = "internal"; 13 13 } 14 14 ]; 15 - 16 - interface = config.vpnNamespaces.${interface}.namespaceAddress; 17 15 }; 18 16 in 19 17 { ··· 26 24 27 25 namespaceAddress = "192.168.15.2"; 28 26 bridgeAddress = "192.168.15.6"; 29 - 30 - portMappings = [ 31 - { 32 - from = config.services.slskd.settings.web.port; 33 - to = config.services.slskd.settings.web.port; 34 - } 35 - ]; 36 27 37 28 openVPNPorts = [ 38 29 {
+16 -3
packages/server/sharing/soulseek.nix
··· 1 1 { 2 2 hosts ? [ ], 3 - interface ? "", 4 3 }: 5 4 6 - { config, flakeLib, ... }: 5 + { config, pkgs-personal, flakeLib, ... }: 7 6 8 7 { 9 8 services.slskd = { ··· 108 107 }; 109 108 }; 110 109 }; 110 + 111 + web = { 112 + socket = "/run/slskd/slskd.sock"; 113 + }; 111 114 }; 115 + 116 + package = pkgs-personal.slskd; 112 117 }; 113 118 119 + systemd.services.slskd.serviceConfig = { 120 + RuntimeDirectory = "slskd"; 121 + RuntimeDirectoryMode = "0750"; 122 + UMask = "0007"; 123 + }; 124 + 125 + users.users.caddy.extraGroups = [ "slskd" ]; 126 + 114 127 services.caddy.virtualHosts = flakeLib.mkProxies hosts '' 115 - reverse_proxy ${interface}:${toString config.services.slskd.settings.web.port} { 128 + reverse_proxy unix/${toString config.services.slskd.settings.web.socket} { 116 129 header_up Upgrade "websocket" 117 130 header_up Connection "Upgrade" 118 131 }