this repo has no description
2
fork

Configure Feed

Select the types of activity you want to include in your feed.

bunch of updates

+143 -34
+6 -6
dns/dnsconfig.js
··· 41 41 A('ci', '69.61.2.203', TTL(300)), 42 42 A('write', '69.61.2.203', TTL(300)), 43 43 A('photos', '69.61.2.203', TTL(300)), 44 - // vultr: lituus 45 - A('@', '45.77.48.108', TTL(300)), 46 - A('jitsi', '45.77.48.108', TTL(300)), 47 - A('chat', '45.77.48.108', TTL(300)), 48 - A('element', '45.77.48.108', TTL(300)), 49 - A('turn', '45.77.48.108', TTL(300)), 44 + // vultr melbourne: lituus 45 + A('@', '67.219.99.225', TTL(300)), 46 + A('jitsi', '67.219.99.225', TTL(300)), 47 + A('chat', '67.219.99.225', TTL(300)), 48 + A('element', '67.219.99.225', TTL(300)), 49 + A('turn', '67.219.99.225', TTL(300)), 50 50 //nullhex free email real estate 51 51 CNAME('key1._domainkey', 'key1.nullhex.com.'), 52 52 CNAME('autoconfig', 'autoconfig.nullhex.com.'),
+3 -2
flake.nix
··· 331 331 pkgs = deckPkgsFor.${system}; 332 332 modules = [ 333 333 ./hosts/deck 334 - jovian.nixosModules.default 334 + # jovian.nixosModules.default 335 335 self.nixosModules.wireguard 336 336 agenix.nixosModules.age 337 337 self.nixosModules.backup ··· 392 392 }; 393 393 }; 394 394 lituus = { 395 - hostname = "sealight.xyz"; 395 + hostname = "67.219.99.225"; 396 396 autoRollback = false; 397 + remoteBuild = true; 397 398 profiles.system = { 398 399 user = "root"; 399 400 path = deploy-rs.lib.x86_64-linux.activate.nixos
+4
home/profiles/cli/default.nix
··· 10 10 git-machete 11 11 bottom 12 12 gptfdisk 13 + difftastic 13 14 starship 14 15 jq 15 16 manix ··· 55 56 gnupg 56 57 syncthing 57 58 dijo 59 + nixfmt-rfc-style 60 + nix-tree 58 61 #ssb-patchwork 59 62 fontconfig 60 63 pandoc ··· 159 162 initContent = '' 160 163 bindkey -v 161 164 autopair-init 165 + export PATH="$PATH:/Users/anishlakhwara/go/bin" 162 166 ''; 163 167 sessionVariables = { 164 168 EDITOR = "nvim";
+5
home/profiles/git/default.nix
··· 1 + { pkgs, ... }: 1 2 { 2 3 #xdg.configFile = { 3 4 # "git/config".source = ./config; ··· 6 7 #}; 7 8 8 9 programs.lazygit.enable = true; 10 + 11 + home.packages = with pkgs; [ 12 + unstable.git-spice 13 + ]; 9 14 10 15 programs.git = { 11 16 enable = true;
+1 -1
home/profiles/nvim/default.nix
··· 1023 1023 vim.keymap.set({'n', 't'}, '<M-l>', '<CMD>NavigatorRight<CR>') 1024 1024 1025 1025 -- Disable Ctrl+V in nvim so Kitty can handle paste 1026 - vim.keymap.set({'v', 'i'}, '<C-v>', '<Nop>', {noremap = true, silent = true}) 1026 + vim.keymap.set('i', '<C-v>', '<C-r>+', {noremap = true, silent = true}) 1027 1027 1028 1028 -- Pane resizing with Alt+Shift+hjkl (to match tmux) 1029 1029 vim.keymap.set('n', '<M-S-h>', '<Cmd>vertical resize -2<CR>', {silent = true})
+33 -1
home/profiles/tmux/tmux.conf
··· 2 2 setw -g pane-base-index 1 3 3 4 4 # https://old.reddit.com/r/tmux/comments/mesrci/tmux_2_doesnt_seem_to_use_256_colors/ 5 - set -g default-terminal "xterm-256color" 5 + # colors 6 + set -g default-terminal "tmux-256color" 6 7 set -ga terminal-overrides ",*256col*:Tc" 7 8 set -ga terminal-overrides '*:Ss=\E[%p1%d q:Se=\E[ q' 8 9 set-environment -g COLORTERM "truecolor" 10 + set -sa terminal-features ",tmux-256color:RGB:Nobr" 11 + set -g allow-passthrough on 12 + 13 + set -g set-clipboard on 14 + 15 + # shift enter for amp 16 + set -s extended-keys on 17 + set -as terminal-features 'tmux*:extkeys' 18 + 19 + # pane colors for amp diff view 20 + # set-option -g pane-colours[0] "#4D5566" 21 + # set-option -g pane-colours[1] "#F27983" 22 + # set-option -g pane-colours[2] "#A6CC70" 23 + # set-option -g pane-colours[3] "#F29E74" 24 + # set-option -g pane-colours[4] "#77A8D9" 25 + # set-option -g pane-colours[5] "#A37ACC" 26 + # set-option -g pane-colours[6] "#4CBF99" 27 + # set-option -g pane-colours[7] "#F0F0F0" 28 + # set-option -g pane-colours[8] "#000000" 29 + # set-option -g pane-colours[9] "#FF3333" 30 + # set-option -g pane-colours[10] "#BAE67E" 31 + # set-option -g pane-colours[11] "#FFA759" 32 + # set-option -g pane-colours[12] "#73D0FF" 33 + # set-option -g pane-colours[13] "#D4BFFF" 34 + # set-option -g pane-colours[14] "#95E6CB" 35 + # set-option -g pane-colours[15] "#ffffff" 9 36 10 37 # Mouse works as expected 11 38 set-option -g mouse on ··· 15 42 # easy-to-remember split pane commands 16 43 bind | split-window -h -c "#{pane_current_path}" 17 44 bind - split-window -v -c "#{pane_current_path}" 45 + 46 + # amp commands 47 + set -g @amp/fork-thread-command 'new-window -n forked-thread $SHELL -c "amp threads fork; amp threads continue"' 48 + bind -N 'Fork Amp thread' f "#{@amp/fork-thread-command}" 18 49 19 50 # don't rename windows automatically 20 51 set-option -g allow-rename off ··· 63 94 64 95 # Unbind Ctrl+V so it passes through to Kitty for paste 65 96 unbind C-v 97 + set -g set-clipboard on 66 98 67 99 # Vim-aware pane navigation with Alt+hjkl 68 100 is_vim="ps -o state= -o comm= -t '#{pane_tty}' | grep -iqE '^[^TXZ ]+ +(\\S+\\/)?g?(view|n?vim?x?)(diff)?$'"
+3 -2
hosts/deck/configuration.nix
··· 73 73 # }; 74 74 75 75 # Enable automatic login for the user. 76 - services.xserver.displayManager.autoLogin.enable = true; 77 - services.xserver.displayManager.autoLogin.user = "anish"; 76 + # Disabled: jovian.steam.autoStart handles this 77 + # services.xserver.displayManager.autoLogin.enable = true; 78 + # services.xserver.displayManager.autoLogin.user = "anish"; 78 79 79 80 # Workaround for GNOME autologin: https://github.com/NixOS/nixpkgs/issues/103746#issuecomment-945091229 80 81 systemd.services."getty@tty1".enable = false;
+9 -6
hosts/deck/default.nix
··· 1 - { self, pkgs, config, ... }: 1 + { self, pkgs, config, lib, ... }: 2 2 { 3 3 imports = [ 4 4 ./configuration.nix ··· 31 31 # theme = "motion"; 32 32 # }; 33 33 34 - jovian.steam.enable = true; 35 - jovian.devices.steamdeck.enable = true; 36 - jovian.steam.user = "anish"; 37 - jovian.steam.autoStart = true; 38 - jovian.steam.desktopSession = "gnome"; 34 + # jovian.steam.enable = true; 35 + # jovian.devices.steamdeck.enable = true; 36 + # jovian.steam.user = "anish"; 37 + # jovian.steam.autoStart = true; 38 + # jovian.steam.desktopSession = "gnome"; 39 39 # jovian.steam.desktopSession = "none+bspwm"; 40 + 41 + # Disable lightdm from desktop profile 42 + services.xserver.displayManager.lightdm.enable = lib.mkForce false; 40 43 41 44 # Install XR drivers 42 45 # environment.systemPackages = with pkgs; [
+53
hosts/lituus/block-storage.nix
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + { 4 + # Block storage mount 5 + fileSystems."/srv/sealight" = { 6 + device = "/dev/disk/by-id/virtio-mel-3b1f60a89cd649"; 7 + fsType = "ext4"; 8 + options = [ "noatime" ]; 9 + }; 10 + 11 + # Bind mounts for service data 12 + # PostgreSQL moved to NVMe for performance - data lives directly on /var/lib/postgresql 13 + # fileSystems."/var/lib/postgresql" = { 14 + # device = "/srv/sealight/postgresql"; 15 + # fsType = "none"; 16 + # options = [ "bind" "x-systemd.requires-mounts-for=/srv/sealight" ]; 17 + # }; 18 + 19 + fileSystems."/var/lib/matrix-synapse" = { 20 + device = "/srv/sealight/matrix-synapse"; 21 + fsType = "none"; 22 + options = [ "bind" "x-systemd.requires-mounts-for=/srv/sealight" ]; 23 + }; 24 + 25 + fileSystems."/var/lib/matrix-as-discord" = { 26 + device = "/srv/sealight/matrix-as-discord"; 27 + fsType = "none"; 28 + options = [ "bind" "x-systemd.requires-mounts-for=/srv/sealight" ]; 29 + }; 30 + 31 + fileSystems."/var/lib/mautrix-telegram" = { 32 + device = "/srv/sealight/mautrix-telegram"; 33 + fsType = "none"; 34 + options = [ "bind" "x-systemd.requires-mounts-for=/srv/sealight" ]; 35 + }; 36 + 37 + fileSystems."/var/lib/wireguard" = { 38 + device = "/srv/sealight/wireguard"; 39 + fsType = "none"; 40 + options = [ "bind" "x-systemd.requires-mounts-for=/srv/sealight" ]; 41 + }; 42 + 43 + fileSystems."/var/www" = { 44 + device = "/srv/sealight/www"; 45 + fsType = "none"; 46 + options = [ "bind" "x-systemd.requires-mounts-for=/srv/sealight" ]; 47 + }; 48 + 49 + # Ensure services wait for mounts 50 + # PostgreSQL no longer needs to wait for /srv/sealight mount 51 + # systemd.services.postgresql.unitConfig.RequiresMountsFor = [ "/srv/sealight" ]; 52 + systemd.services.matrix-synapse.unitConfig.RequiresMountsFor = [ "/srv/sealight" ]; 53 + }
+2
hosts/lituus/default.nix
··· 1 1 { self, profiles, suites, ... }: 2 2 { 3 3 imports = [ 4 + ./hardware-configuration.nix 4 5 ./configuration.nix 6 + ./block-storage.nix 5 7 ../profiles/core 6 8 ../profiles/server 7 9 ../profiles/metrics
+10 -15
hosts/lituus/hardware-configuration.nix
··· 1 - # Do not modify this file! It was generated by ‘nixos-generate-config’ 2 - # and may be overwritten by future invocations. Please make changes 3 - # to /etc/nixos/configuration.nix instead. 4 1 { config, lib, pkgs, modulesPath, ... }: 5 2 6 3 { 7 - imports = 8 - [ 9 - (modulesPath + "/profiles/qemu-guest.nix") 10 - ]; 4 + imports = [ ]; 11 5 12 - boot.initrd.availableKernelModules = [ "ata_piix" "floppy" "virtio_pci" "sr_mod" "virtio_blk" ]; 6 + boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "sr_mod" "virtio_blk" ]; 13 7 boot.initrd.kernelModules = [ ]; 14 8 boot.kernelModules = [ ]; 15 9 boot.extraModulePackages = [ ]; 16 10 17 - fileSystems."/" = 18 - { 19 - device = "/dev/disk/by-uuid/3b8b2c4b-835e-4822-8ac8-0effdc8270d6"; 20 - fsType = "btrfs"; 21 - }; 11 + fileSystems."/" = { 12 + device = "/dev/disk/by-uuid/f9e9468f-ff3b-430d-9ecf-ba275cf2f716"; 13 + fsType = "ext4"; 14 + }; 22 15 23 16 swapDevices = [ ]; 24 17 25 - hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware; 26 - nixpkgs.hostPlatform = "x86_64-linux"; 18 + networking.useDHCP = lib.mkDefault true; 19 + 20 + nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; 21 + virtualisation.hypervGuest.enable = true; 27 22 }
+14 -1
hosts/profiles/matrix/default.nix
··· 17 17 age.secrets.synapse-config.file = "${self}/secrets/synapse-config.age"; 18 18 age.secrets.synapse-config.owner = "matrix-synapse"; 19 19 20 + systemd.services.matrix-synapse.serviceConfig.TimeoutStartSec = "10min"; 21 + 20 22 services.matrix-synapse = { 21 23 enable = true; 22 24 settings = { 23 25 max_upload_size = "100M"; 24 26 server_name = "sealight.xyz"; 27 + federation_sender_instances = []; 25 28 listeners = [ 26 29 { 27 30 port = 8448; ··· 210 213 root = "/var/www/sealight.xyz"; 211 214 }; 212 215 locations."/_matrix" = { 213 - proxyPass = "http://localhost:8448"; 216 + proxyPass = "http://127.0.0.1:8448"; 217 + extraConfig = '' 218 + proxy_read_timeout 300s; 219 + proxy_connect_timeout 300s; 220 + proxy_send_timeout 300s; 221 + ''; 214 222 }; 215 223 # locations."/slackbridge" = { 216 224 # proxyPass = "http://localhost:9899"; ··· 222 230 enableACME = true; 223 231 locations."/" = { 224 232 proxyPass = "http://localhost:8448"; 233 + extraConfig = '' 234 + proxy_read_timeout 300s; 235 + proxy_connect_timeout 300s; 236 + proxy_send_timeout 300s; 237 + ''; 225 238 }; 226 239 }; 227 240 ## virtual host for Riot/Web