this repo has no description
4
fork

Configure Feed

Select the types of activity you want to include in your feed.

navidrome music library stuffs

dawn e5c43a87 ebb1283d

+85 -26
+5 -5
_sources/generated.json
··· 350 350 }, 351 351 "tangled": { 352 352 "cargoLocks": null, 353 - "date": "2025-12-20", 353 + "date": "2026-01-11", 354 354 "extract": null, 355 355 "name": "tangled", 356 356 "passthru": null, ··· 360 360 "fetchSubmodules": false, 361 361 "leaveDotGit": false, 362 362 "name": null, 363 - "rev": "716a5bc0dafb96bbf72fb6e07d20e251f97c9f4e", 364 - "sha256": "sha256-SGG97w/bvffP6zuJwbnFHK6tdfuWEzKNOfjGbh2PIj0=", 363 + "rev": "1cb2fb5cdd0ddfb30575af85d2d3fcf337ac4c4b", 364 + "sha256": "sha256-JZgqPGYaNxFcj4gl4U4eXctDtPv6YHyu3KuHtMNEyZk=", 365 365 "sparseCheckout": [], 366 366 "type": "git", 367 - "url": "https://tangled.org/ptr.pet/core" 367 + "url": "https://tangled.org/tangled.org/core" 368 368 }, 369 - "version": "716a5bc0dafb96bbf72fb6e07d20e251f97c9f4e" 369 + "version": "1cb2fb5cdd0ddfb30575af85d2d3fcf337ac4c4b" 370 370 }, 371 371 "tangled-sqlite-lib": { 372 372 "cargoLocks": null,
+5 -5
_sources/generated.nix
··· 223 223 }; 224 224 tangled = { 225 225 pname = "tangled"; 226 - version = "716a5bc0dafb96bbf72fb6e07d20e251f97c9f4e"; 226 + version = "1cb2fb5cdd0ddfb30575af85d2d3fcf337ac4c4b"; 227 227 src = fetchgit { 228 - url = "https://tangled.org/ptr.pet/core"; 229 - rev = "716a5bc0dafb96bbf72fb6e07d20e251f97c9f4e"; 228 + url = "https://tangled.org/tangled.org/core"; 229 + rev = "1cb2fb5cdd0ddfb30575af85d2d3fcf337ac4c4b"; 230 230 fetchSubmodules = false; 231 231 deepClone = false; 232 232 leaveDotGit = false; 233 233 sparseCheckout = [ ]; 234 - sha256 = "sha256-SGG97w/bvffP6zuJwbnFHK6tdfuWEzKNOfjGbh2PIj0="; 234 + sha256 = "sha256-JZgqPGYaNxFcj4gl4U4eXctDtPv6YHyu3KuHtMNEyZk="; 235 235 }; 236 - date = "2025-12-20"; 236 + date = "2026-01-11"; 237 237 }; 238 238 tangled-sqlite-lib = { 239 239 pname = "tangled-sqlite-lib";
-10
deploy.nu
··· 45 45 } 46 46 47 47 let hosts = { 48 - wolumonde: { 49 - type: "nixos", 50 - user: "root", 51 - addr: "23.88.101.188", 52 - }, 53 48 dzwonek: { 54 49 type: "nixos", 55 50 user: "root", ··· 64 59 type: "nixos", 65 60 user: "root", 66 61 addr: "159.195.58.28", 67 - }, 68 - "dusk@devel.mobi": { 69 - type: "home", 70 - user: "dusk", 71 - addr: "devel.mobi", 72 62 }, 73 63 } 74 64
+2
dns/dnsconfig.js
··· 82 82 // atproto 83 83 TXT("_atproto.eris", "did=did:plc:bxjnsrfzozl365rsdo5yvuz5", TTL(60)), 84 84 TXT("_atproto.drew", "did=did:plc:vo6ie3kd6xvpjlof4pnb2zzp", TTL(60)), 85 + TXT("_kicya", "3853739a3802a077d62e83494b4603bbdb36332662c5cb58865084bcf0dc87a8"), 85 86 IGNORE_ACME(), 86 87 ); 87 88 ··· 125 126 DnsProvider(DSP_PRIMARY), 126 127 TRIMOUNTS(["@", "tunes", "x"], CF_PROXY_OFF), 127 128 DZWONEK(["nucleus", "trill", "dysnomia"], CF_PROXY_OFF), 129 + TXT("_kicya", "3b11cb74243eea1fc84e62ffefd7e246279c2f203e1cae42e19d0454dc8d2172"), 128 130 // atproto 129 131 TXT("_atproto", "did=did:plc:dfl62fgb7wtjj3fcbb72naae"), 130 132 TXT("_atproto.nil", "did=did:plc:dumbmutt4po52ept2tczimje"),
+50 -2
hosts/trimounts/modules/navidrome.nix
··· 1 - {config, ...}: 1 + {lib, pkgs, config, ...}: 2 2 let 3 3 domain = "tunes.ptr.pet"; 4 + callieMount = "/music/callie"; 4 5 in { 5 6 services.navidrome = { 6 7 enable = true; ··· 14 15 BaseURL = "https://piper.kittysay.xyz/1"; 15 16 }; 16 17 EnableSharing = true; 18 + Scanner.ScanOnStartup = false; 17 19 }; 20 + }; 21 + systemd.services.navidrome.serviceConfig = { 22 + BindReadOnlyPaths = lib.mkForce ["/music" callieMount "/etc" "/nix/store"]; 18 23 }; 19 24 20 25 security.acme.certs."ptr.pet".extraDomainNames = [domain]; ··· 28 33 proxyWebsockets = true; 29 34 }; 30 35 }; 31 - } 36 + 37 + age.secrets.callieMusic = { 38 + file = ../../../secrets/callieMusic.age; 39 + mode = "0600"; 40 + }; 41 + 42 + systemd.services.music-callie-mnt = { 43 + description = "geesefs mount (callie) for music"; 44 + after = [ "network-online.target" ]; 45 + wants = [ "network-online.target" ]; 46 + wantedBy = [ "navidrome.service" ]; 47 + before = [ "navidrome.service" ]; 48 + 49 + serviceConfig = { 50 + Type = "forking"; 51 + ExecStartPre = "${pkgs.coreutils}/bin/mkdir -p ${callieMount}"; 52 + ExecStart = '' 53 + ${pkgs.geesefs}/bin/geesefs \ 54 + --endpoint https://s3.nematodes.net \ 55 + --region us-east-1 \ 56 + --shared-config ${config.age.secrets.callieMusic.path} \ 57 + --cache %C/geesefs-callie \ 58 + --stat-cache-ttl 3600s \ 59 + --http-timeout 2m0s \ 60 + --read-retry-interval 30s \ 61 + --read-retry-max-interval 2m0s \ 62 + --read-ahead-large 20000 \ 63 + --max-parallel-parts 2 \ 64 + --max-parallel-copy 2 \ 65 + --ignore-fsync \ 66 + --disable-xattr \ 67 + --no-specials \ 68 + -o allow_other \ 69 + -o ro \ 70 + musica ${callieMount} 71 + ''; 72 + ExecStop = "${pkgs.fuse}/bin/fusermount -uz ${callieMount}"; 73 + Restart = "on-failure"; 74 + RestartSec = "10s"; 75 + RuntimeDirectory = "geesefs-callie"; 76 + CacheDirectory = "geesefs-callie"; 77 + }; 78 + }; 79 + }
+2 -2
nvfetcher.toml
··· 59 59 ## TANGLED ## 60 60 61 61 [tangled] 62 - src.git = "https://tangled.org/ptr.pet/core" 63 - fetch.git = "https://tangled.org/ptr.pet/core" 62 + src.git = "https://tangled.org/tangled.org/core" 63 + fetch.git = "https://tangled.org/tangled.org/core" 64 64 65 65 [tangled-sqlite-lib] 66 66 src.manual = "3450100"
+2 -2
pkgs-set/pkgs/helium.nix
··· 5 5 }: 6 6 pkgs.appimageTools.wrapType2 rec { 7 7 pname = "helium"; 8 - version = "0.7.4.1"; 8 + version = "0.7.10.1"; 9 9 10 10 src = let 11 11 platformMap = { ··· 16 16 platform = platformMap.${pkgs.system}; 17 17 18 18 hashes = { 19 - "x86_64-linux" = "sha256-JFaGuRbjNEzFOEpntbzARxCOxA/2Fxhd31nXaVPfpFg="; 19 + "x86_64-linux" = "sha256-11xSlHIqmyyVwjjwt5FmLhp72P3m07PppOo7a9DbTcE="; 20 20 "aarch64-linux" = "sha256-B63tvOtSRlMRJozvzC7lqG2LM0ZgLIq2G/AHABl+Qqg="; 21 21 }; 22 22
+17
secrets/callieMusic.age
··· 1 + age-encryption.org/v1 2 + -> ssh-rsa Abmvag 3 + wkCnkXbbmI6jIFQKw8KQSDJl1krvHYO69Uk551DnwzhWzqhSfCDVG5XfzQFpwGOU 4 + ivVW3khAIoSQGVs5jlxRqvuqncNhpZXt71kOKWjOU2fNG49xqs3tn+nhiu+S9wDI 5 + sJhZsLRTjKELxetALZm9WHAr88FzF6n3pnRFhpsD5+Gbsbmj2n49HZqvNW1GfqF/ 6 + q7lT/BJJPApfI+ZDwMWuBm6i0XEMLbyIcHwRCGPwHAAr8R51ENaolW69IAgQH7vM 7 + mA0ZeYEuU7tAuu26ifavow50X3xjvLtHfr6oj4ncHVk/uekz5Foq3vltzaYxrNr2 8 + OpoFfPm95yy0G80RlJKdFmQIhpadbEx29B+Kr+BZl3I6aK4wFu0PFSuHM9WK2uvZ 9 + SlSwX27pRDdaC4KGAyVpaBo0JJQNLXTqjPd9Xr5oLAnfwvKosm+rUdXLeRb9Bz0n 10 + p8gzyCs3YGeSF6IZcyIK2zbXpBN6TbwX27VqWrccvLQumcG9bOLkMLrO7RjV6UxJ 11 + oFHQ9Qm0W3kl7nYHRKFG4ElWj6Ps7bWtTUImb7aIXTSwjyBDOO4il+KcaK56uicy 12 + 4E5kddWEwFh1bDYYYHs473laUK8aBJ9guxKSqRKfVESUzZLX+Fe+pJNHp47DxsVM 13 + 1G4WLSUJDBzo9E4Lw3rPyxUVKLXRPPu6ewUsQSl6zQg 14 + -> ssh-ed25519 LaQclg CP9PHP2EI2zwJQP5zjYnwaBaZKDkXRNTWfV2eF5rvDA 15 + x7x68kjXun029iKfXuUMck14lmdCVA+X0sszOTgsf2Q 16 + --- sW8ERID3ljm4fyq4dILoixn6BQ5GcpqbV2V3/PV5Yr8 17 + <�(�K89�&���x�g���iC{nہ��a�,\}���(r�i;.cX��F� C���Y�F-�:�R�v��� ���urAZ������RO���'����Pk>HB��ۓVQɑc�G̚����+[s`�IH���㫠V�:Q�$�;��
+1
secrets/secrets.nix
··· 37 37 ]; 38 38 "atfileCfg.age".publicKeys = [yusdacra]; 39 39 "ziplineCfg.age".publicKeys = [yusdacra trimounts]; 40 + "callieMusic.age".publicKeys = [yusdacra trimounts]; 40 41 }
+1
users/mayer/default.nix
··· 161 161 tor-browser 162 162 # supersonic-wayland 163 163 feishin 164 + antigravity-fhs 164 165 ]) ++ [ 165 166 terra.helium 166 167 (terra.pds-upload.override {