this repo has no description
4
fork

Configure Feed

Select the types of activity you want to include in your feed.

bwaaa

dawn 4a88226b a6d22a11

+142 -77
+12 -12
_sources/generated.json
··· 22 22 }, 23 23 "blog": { 24 24 "cargoLock": null, 25 - "date": "2026-03-15", 25 + "date": "2026-03-18", 26 26 "extract": null, 27 27 "name": "blog", 28 28 "passthru": null, ··· 32 32 "fetchSubmodules": false, 33 33 "leaveDotGit": false, 34 34 "name": null, 35 - "rev": "8c75080abe6c733b20a81722252bb4b8062b8b9e", 36 - "sha256": "sha256-WpIEhnAPhqAp5Ln/08UNTVvwH/lGueOckciDbP6QVFI=", 35 + "rev": "0eeab661f0d3fa0de317ea9556ecc94e81955b40", 36 + "sha256": "sha256-m5bS5lMvGF4TER3eXElENZcl43XKsgLSHsCznctITxA=", 37 37 "sparseCheckout": [], 38 38 "type": "git", 39 39 "url": "https://tangled.org/@ptr.pet/endpoint" 40 40 }, 41 - "version": "8c75080abe6c733b20a81722252bb4b8062b8b9e" 41 + "version": "0eeab661f0d3fa0de317ea9556ecc94e81955b40" 42 42 }, 43 43 "clickee": { 44 44 "cargoLock": null, ··· 186 186 }, 187 187 "hydrant": { 188 188 "cargoLock": null, 189 - "date": "2026-03-13", 189 + "date": "2026-03-20", 190 190 "extract": null, 191 191 "name": "hydrant", 192 192 "passthru": null, ··· 196 196 "fetchSubmodules": false, 197 197 "leaveDotGit": false, 198 198 "name": null, 199 - "rev": "4e6272671e7dc90a820deadb1abf6e284e80d1d0", 200 - "sha256": "sha256-nM+e9e2GYsGGZRzVuKDgberDMVIpKt9DskXUcb86dms=", 199 + "rev": "6d735f195277af2f8d6ed6e86590a2027db2c7d4", 200 + "sha256": "sha256-aJAVAtXy5QII/GmXQwAvT/g9K4TogTUNXoY8PgyBgJI=", 201 201 "sparseCheckout": [], 202 202 "type": "git", 203 203 "url": "https://tangled.org/@ptr.pet/hydrant" 204 204 }, 205 - "version": "4e6272671e7dc90a820deadb1abf6e284e80d1d0" 205 + "version": "6d735f195277af2f8d6ed6e86590a2027db2c7d4" 206 206 }, 207 207 "limbusart": { 208 208 "cargoLock": null, ··· 288 288 }, 289 289 "nixpkgs-xr": { 290 290 "cargoLock": null, 291 - "date": "2026-03-14", 291 + "date": "2026-03-23", 292 292 "extract": null, 293 293 "name": "nixpkgs-xr", 294 294 "passthru": null, ··· 300 300 "name": null, 301 301 "owner": "nix-community", 302 302 "repo": "nixpkgs-xr", 303 - "rev": "b661b4f69e9dd0ef7fc243e4abc281620dfba76b", 304 - "sha256": "sha256-3ewc8BXQ7mcvc2OhcPFfWTvMwQedZ+EUkDk3yGO8LIc=", 303 + "rev": "82adacd2ac84b353b98e9462be1e8af969a5c1f7", 304 + "sha256": "sha256-/figgEf9bJgifAotR2z+KqAUSKriOL17DGkgwJqlI6w=", 305 305 "sparseCheckout": [], 306 306 "type": "github" 307 307 }, 308 - "version": "b661b4f69e9dd0ef7fc243e4abc281620dfba76b" 308 + "version": "82adacd2ac84b353b98e9462be1e8af969a5c1f7" 309 309 }, 310 310 "nsid-tracker": { 311 311 "cargoLock": null,
+12 -12
_sources/generated.nix
··· 20 20 }; 21 21 blog = { 22 22 pname = "blog"; 23 - version = "8c75080abe6c733b20a81722252bb4b8062b8b9e"; 23 + version = "0eeab661f0d3fa0de317ea9556ecc94e81955b40"; 24 24 src = fetchgit { 25 25 url = "https://tangled.org/@ptr.pet/endpoint"; 26 - rev = "8c75080abe6c733b20a81722252bb4b8062b8b9e"; 26 + rev = "0eeab661f0d3fa0de317ea9556ecc94e81955b40"; 27 27 fetchSubmodules = false; 28 28 deepClone = false; 29 29 leaveDotGit = false; 30 30 sparseCheckout = [ ]; 31 - sha256 = "sha256-WpIEhnAPhqAp5Ln/08UNTVvwH/lGueOckciDbP6QVFI="; 31 + sha256 = "sha256-m5bS5lMvGF4TER3eXElENZcl43XKsgLSHsCznctITxA="; 32 32 }; 33 - date = "2026-03-15"; 33 + date = "2026-03-18"; 34 34 }; 35 35 clickee = { 36 36 pname = "clickee"; ··· 124 124 }; 125 125 hydrant = { 126 126 pname = "hydrant"; 127 - version = "4e6272671e7dc90a820deadb1abf6e284e80d1d0"; 127 + version = "6d735f195277af2f8d6ed6e86590a2027db2c7d4"; 128 128 src = fetchgit { 129 129 url = "https://tangled.org/@ptr.pet/hydrant"; 130 - rev = "4e6272671e7dc90a820deadb1abf6e284e80d1d0"; 130 + rev = "6d735f195277af2f8d6ed6e86590a2027db2c7d4"; 131 131 fetchSubmodules = false; 132 132 deepClone = false; 133 133 leaveDotGit = false; 134 134 sparseCheckout = [ ]; 135 - sha256 = "sha256-nM+e9e2GYsGGZRzVuKDgberDMVIpKt9DskXUcb86dms="; 135 + sha256 = "sha256-aJAVAtXy5QII/GmXQwAvT/g9K4TogTUNXoY8PgyBgJI="; 136 136 }; 137 - date = "2026-03-13"; 137 + date = "2026-03-20"; 138 138 }; 139 139 limbusart = { 140 140 pname = "limbusart"; ··· 190 190 }; 191 191 nixpkgs-xr = { 192 192 pname = "nixpkgs-xr"; 193 - version = "b661b4f69e9dd0ef7fc243e4abc281620dfba76b"; 193 + version = "82adacd2ac84b353b98e9462be1e8af969a5c1f7"; 194 194 src = fetchFromGitHub { 195 195 owner = "nix-community"; 196 196 repo = "nixpkgs-xr"; 197 - rev = "b661b4f69e9dd0ef7fc243e4abc281620dfba76b"; 197 + rev = "82adacd2ac84b353b98e9462be1e8af969a5c1f7"; 198 198 fetchSubmodules = false; 199 - sha256 = "sha256-3ewc8BXQ7mcvc2OhcPFfWTvMwQedZ+EUkDk3yGO8LIc="; 199 + sha256 = "sha256-/figgEf9bJgifAotR2z+KqAUSKriOL17DGkgwJqlI6w="; 200 200 }; 201 - date = "2026-03-14"; 201 + date = "2026-03-23"; 202 202 }; 203 203 nsid-tracker = { 204 204 pname = "nsid-tracker";
+1 -1
dns/dnsconfig.js
··· 67 67 CF_PROXY_OFF, 68 68 ), 69 69 DZWONEK("vpn", CF_PROXY_OFF), 70 - VOLSINII("plc", CF_PROXY_OFF), 70 + VOLSINII(["plc", "hydrant"], CF_PROXY_OFF), 71 71 // github pages 72 72 CNAME("dev", "90-008.github.io."), 73 73 // fastmail
+4 -2
hosts/chernobog/modules/vr.nix
··· 10 10 openFirewall = true; 11 11 defaultRuntime = true; 12 12 autoStart = true; 13 + highPriority = true; 13 14 config = { 14 15 enable = true; 15 16 json = { 16 17 scale = 1.0; 17 18 bitrate = 60000000; 18 - encoders = [ 19 + encoder = 19 20 { 20 21 encoder = "vaapi"; 21 22 codec = "h265"; 23 + bit-depth = 8; 22 24 } 23 - ]; 25 + ; 24 26 }; 25 27 }; 26 28 };
+1
hosts/trimounts/modules/wisp-random.nix
··· 25 25 PORT = toString port; 26 26 WISP_API_URL = "https://wisp.place"; 27 27 HYDRANT_BIN = "${terra.hydrant}/bin/hydrant"; 28 + CURSOR = "0"; 28 29 }; 29 30 30 31 serviceConfig = rec {
+1
hosts/volsinii/default.nix
··· 13 13 ../../modules/stylix-null.nix 14 14 ../../users/root 15 15 ../../users/dawn 16 + ../../users/claudey 16 17 ./disk-config.nix 17 18 ] 18 19 ++ (tlib.importFolder (toString ./modules));
+21
hosts/volsinii/modules/hydrant-doc.nix
··· 1 + { ... }: 2 + let 3 + domain = "hydrant.gaze.systems"; 4 + in 5 + { 6 + security.acme.certs."plc.gaze.systems".extraDomainNames = [domain]; 7 + 8 + services.nginx.virtualHosts.${domain} = { 9 + useACMEHost = "plc.gaze.systems"; 10 + forceSSL = true; 11 + quic = true; 12 + kTLS = true; 13 + root = "/www/hydrant"; 14 + locations."/" = { 15 + tryFiles = "$uri $uri/ =404"; 16 + }; 17 + locations."= /" = { 18 + return = "301 /hydrant/index.html"; 19 + }; 20 + }; 21 + }
+6 -5
hosts/volsinii/modules/hydrant.disabled
··· 12 12 after = ["network.target"]; 13 13 environment = { 14 14 HYDRANT_FULL_NETWORK = "true"; 15 - HYDRANT_FIREHOSE_WORKERS = "128"; 16 - HYDRANT_BACKFILL_CONCURRENCY_LIMIT = "256"; 17 - HYDRANT_DB_WORKER_THREADS = "16"; 18 - HYDRANT_CRAWLER_MAX_PENDING_REPOS = "10000"; 19 - HYDRANT_PLC_URL = "https://plc.wtf,https://plc.directory"; 15 + HYDRANT_CRAWLER_MAX_PENDING_REPOS = "5000"; 16 + HYDRANT_CRAWLER_RESUME_PENDING_REPOS = "2000"; 17 + HYDRANT_CURSOR_SAVE_INTERVAL = "1"; 18 + HYDRANT_PLC_URL = "https://plc.directory,http://localhost:8000"; 19 + HYDRANT_DATA_COMPRESSION = "zstd"; 20 + HYDRANT_JOURNAL_COMPRESSION = "lz4"; 20 21 }; 21 22 serviceConfig = { 22 23 Type = "simple";
+5 -2
hosts/volsinii/modules/nginx.nix
··· 41 41 42 42 security.acme = { 43 43 acceptTerms = true; 44 - defaults.email = (import "${inputs.self}/personal.nix").emails.primary; 45 - defaults.webroot = "/var/lib/acme/acme-challenge"; 44 + defaults = { 45 + group = "nginx"; 46 + email = (import "${inputs.self}/personal.nix").emails.primary; 47 + webroot = "/var/lib/acme/acme-challenge"; 48 + }; 46 49 certs."plc.gaze.systems" = { }; 47 50 }; 48 51
+20 -39
hosts/volsinii/modules/tap.disabled
··· 1 - { terra, config, ... }: 2 - let 3 - domain = "tap.gaze.systems"; 4 - cfg = config.services.bluesky-tap; 5 - in 1 + { terra, ... }: 6 2 { 7 3 imports = [../../../modules/bluesky-tap.nix]; 8 4 9 - services.bluesky-tap = { 10 - enable = true; 11 - package = terra.bluesky-tap; 12 - fullNetwork = true; 13 - databaseUrl = "postgresql://bluesky-tap@/bluesky-tap"; 14 - bind = "127.0.0.1:2480"; 15 - # metricsListen = "127.0.0.1:8765"; 16 - # logLevel = "debug"; 17 - disableAcks = true; 18 - }; 19 - systemd.services.bluesky-tap.environment = { 20 - TAP_OUTBOX_PARALLELISM = "8"; 21 - TAP_RESYNC_PARALLELISM = "16"; 22 - TAP_FIREHOSE_PARALLELISM = "16"; 23 - TAP_MAX_DB_CONNS = "64"; 24 - # TAP_OUTBOX_CAPACITY = "70000"; 25 - # TAP_OUTBOX_ONLY = "true"; 26 - # TAP_RETRY_TIMEOUT = "10s"; 27 - }; 5 + # services.bluesky-tap = { 6 + # enable = true; 7 + # package = terra.bluesky-tap; 8 + # fullNetwork = true; 9 + # databaseUrl = "postgresql://bluesky-tap@/bluesky-tap"; 10 + # bind = "127.0.0.1:2480"; 11 + # # metricsListen = "127.0.0.1:8765"; 12 + # # logLevel = "debug"; 13 + # disableAcks = true; 14 + # }; 15 + # systemd.services.bluesky-tap.environment = { 16 + # TAP_OUTBOX_PARALLELISM = "4"; 17 + # TAP_RESYNC_PARALLELISM = "64"; 18 + # TAP_FIREHOSE_PARALLELISM = "24"; 19 + # TAP_MAX_DB_CONNS = "64"; 20 + # TAP_RELAY_URL = "https://relay.fire.hose.cam"; 21 + # }; 28 22 29 23 # setup postgres 30 24 services.postgresql = { 31 25 enable = true; 32 - ensureDatabases = ["bluesky-tap"]; 26 + ensureDatabases = ["claudey"]; 33 27 ensureUsers = [{ 34 - name = "bluesky-tap"; 28 + name = "claudey"; 35 29 ensureDBOwnership = true; 36 30 }]; 37 31 }; 38 - 39 - # # nginx reverse proxy 40 - # services.nginx.virtualHosts.${domain} = { 41 - # useACMEHost = domain; 42 - # forceSSL = true; 43 - # quic = true; 44 - # kTLS = true; 45 - 46 - # # locations."/" = { 47 - # # proxyPass = "http://${cfg.bind}"; 48 - # # proxyWebsockets = true; 49 - # # }; 50 - # }; 51 32 }
+1 -1
pkgs-set/overlays/nixpkgs-xr.nix
··· 1 1 {inputs, ...}: final: prev: 2 2 ((import inputs.nixpkgs-xr).overlays.default final prev) 3 - // { wivrn = prev.wivrn; } 3 + # // { wivrn = prev.wivrn; }
+3 -3
pkgs-set/pkgs/bluesky-tap.nix/default.nix
··· 4 4 ... 5 5 }: 6 6 let 7 - rev = "1286ca7a7cb25ece0e7d49648b7655cc285aee0f"; 7 + rev = "9cf6b7ee3c3a8a8d768b76bc957ef953fa897486"; 8 8 in 9 9 buildGoModule { 10 10 pname = "bluesky-tap"; ··· 14 14 owner = "bluesky-social"; 15 15 repo = "indigo"; 16 16 inherit rev; 17 - hash = "sha256-yksMw5ommI+ewvfudlpfMpSWUtpP3GC4XwnmmSYT7ks="; 17 + hash = "sha256-f5CK4dyyMRfTi54y8maVpKbpJMfkc/0JVlu48lQ7UjQ="; 18 18 }; 19 19 20 20 # patches = [./tap_deadlock_fix.patch]; 21 21 22 - vendorHash = "sha256-KRR+8icVuMGBQlR8h4KE6rpWWj9lrkNOJlxbFLyFsUI="; 22 + vendorHash = "sha256-s1S+b+QbptqJ2mxqkvsn7M5VWfLrlwpWgRjg6lq2WVE="; 23 23 24 24 subPackages = [ "cmd/tap" ]; 25 25
+53
users/claudey/default.nix
··· 1 + {lib, tlib, inputs, pkgs, ...}@nixosArgs: 2 + let 3 + l = lib; 4 + nixosConfig = nixosArgs.config; 5 + in 6 + { 7 + users.users.claudey = { 8 + isNormalUser = true; 9 + createHome = true; 10 + home = "/home/claudey"; 11 + shell = pkgs.bashInteractive; 12 + openssh.authorizedKeys.keys = [ 13 + (builtins.readFile "${inputs.self}/secrets/yusdacra.key.pub") 14 + ]; 15 + extraGroups = ["compsize"]; 16 + }; 17 + users.groups.compsize = {}; 18 + 19 + environment.shells = with pkgs; [ 20 + bashInteractive 21 + nushell 22 + ]; 23 + 24 + nix.settings.allowed-users = ["claudey"]; 25 + security.wrappers.compsize = { 26 + source = "${pkgs.compsize}/bin/compsize"; 27 + capabilities = "cap_sys_admin=ep"; 28 + owner = "root"; 29 + group = "compsize"; 30 + setuid = false; 31 + permissions = "u+rx,g+rx,o-rwx"; 32 + }; 33 + 34 + home-manager.users.claudey = {pkgs, ...}: { 35 + imports = 36 + let 37 + modulesToEnable = l.flatten [ 38 + # dev stuff 39 + [ 40 + "git" 41 + ] 42 + ]; 43 + in 44 + l.flatten [ 45 + (tlib.prefixStrings "${inputs.self}/users/modules/" modulesToEnable) 46 + ]; 47 + 48 + home = { 49 + homeDirectory = nixosConfig.users.users.claudey.home; 50 + packages = with pkgs; [websocat claude-code cargo go gnumake sqlite postgresql (hiPrio clang) (lowPrio gcc) wild python3 nodejs]; 51 + }; 52 + }; 53 + }
+2
users/mayer/default.nix
··· 159 159 (prismlauncher.override { 160 160 additionalLibs = with pkgs; [libXtst libxkbcommon libXt]; 161 161 }) 162 + xivlauncher 162 163 lutris 163 164 signal-desktop 164 165 bs-manager ··· 170 171 gcc 171 172 gnumake 172 173 python3 174 + gh 173 175 # sidelaoding 174 176 ]) ++ [ 175 177 terra.helium