335 Commits

Author SHA1 Message Date
930fea9ed9 added word to cspell
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 1m54s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 10m27s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 16m58s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 22m52s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-20 11:51:48 -04:00
01834b7029 Merge pull request 'Revert "Enable stats statements temporarily on Postgres"' (#49) from feature/revert-46 into main
Some checks failed
Check flake.lock / Check health of `flake.lock` (push) Successful in 10s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m41s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 10m28s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 15m1s
Update flakes / update_lockfile (push) Failing after 16m56s
Reviewed-on: #49
2025-03-20 09:37:15 -04:00
91693e6bfa Revert "Enable stats statements temporarily on Postgres"
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 16s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m51s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 12m15s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 16m0s
This reverts commit 9b42a703d2.

Closes #47
2025-03-20 09:21:09 -04:00
994d948589 Merge pull request 'automated: Update flake.lock' (#50) from update-flake-lock into main
Reviewed-on: #50
2025-03-20 09:20:12 -04:00
2445859b12 automated: Update flake.lock
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 17s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 12m1s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 8m42s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 40m33s
- The following Nix Flake inputs were updated:

```
• Updated input 'firefox-addons':
    'gitlab:rycee/nur-expressions/d91a2ea080804c3a9213d6e460e8cff68cfacf8d?dir=pkgs/firefox-addons&narHash=sha256-cvqCqT7op8uRCIPUYK8CPJbRRmKytFtOzHqomMyO7u8%3D' (2025-03-18)
  → 'gitlab:rycee/nur-expressions/1b0b14b56353040142e0ef5b0ab37743bbbf4ab4?dir=pkgs/firefox-addons&narHash=sha256-UVz7NhPzbEWey6mMJU3Jwjqfbp0xH0iKZDuoRjhZEN0%3D' (2025-03-20)
• Updated input 'home-manager':
    'github:nix-community/home-manager/22a36aa709de7dd42b562a433b9cefecf104a6ee?narHash=sha256-Tumt3tcMXJniSh7tw2gW%2BWAnVLeB3WWm%2BE%2ByYFnLBXo%3D' (2025-03-18)
  → 'github:nix-community/home-manager/94605dcadefeaff6b35c8931c9f38e4f4dc7ad0a?narHash=sha256-Q0KXcHQmum8L6IzGhhkVhjFMKY6BvYa/rhmLP26Ws8o%3D' (2025-03-20)
• Updated input 'nixos-modules':
    'github:SuperSandro2000/nixos-modules/f8b6e1d4ea6c9c958b27445c70434b00e8d7f520?narHash=sha256-Um3vjr%2Bnh7MdvdRjPkRX0RiicOWttZd1CuCVEKvOQz8%3D' (2025-03-15)
  → 'github:SuperSandro2000/nixos-modules/82491ff311152b87fe7cfbdaf545f727e0750aa9?narHash=sha256-%2BBw1HR4oX6vUbCMhwWbW%2BNr20F%2BUesNdUd7b17s3ESE%3D' (2025-03-19)
• Updated input 'nixpkgs':
    'github:nixos/nixpkgs/903d679a5a674158c3f8d823f62680d5664d15c6?narHash=sha256-wonmHfY804hKBC0SA/s3rOhjgNseURTLjpOXfAC2MkE%3D' (2025-03-19)
  → 'github:nixos/nixpkgs/b64ec1944ea40d9f3920f938e17ed39a9978c6c7?narHash=sha256-lfOAAaX68Ed7R6Iy2nbFAkGj6B8kHBp3nqZhgZjxR5c%3D' (2025-03-20)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/b0a7450168c62a46f87d204280e6d9d1c0292671?narHash=sha256-GPubFcOXyi8TVm1xpltHYPcfGr%2BiO%2Bif2u/EtzFVnHQ%3D' (2025-03-19)
  → 'github:oxalica/rust-overlay/f03085549609e49c7bcbbee86a1949057d087199?narHash=sha256-Vflb6KJVDikFcM9E231mRN88uk4%2Bjo7BWtaaQMifthI%3D' (2025-03-20)
• Updated input 'sops-nix':
    'github:Mic92/sops-nix/787afce414bcce803b605c510b60bf43c11f4b55?narHash=sha256-ptn8dR4Uat3UUadGYNnB7CIH9SQm8mK69D2A/twBUXQ%3D' (2025-03-17)
  → 'github:Mic92/sops-nix/1770be8ad89e41f1ed5a60ce628dd10877cb3609?narHash=sha256-r0aq70/3bmfjTP%2BJZs4%2BXV5SgmCtk1BLU4CQPWGtA7o%3D' (2025-03-19)
• Updated input 'stylix':
    'github:danth/stylix/ff9ae322bcaeccabc65812390000276455331123?narHash=sha256-enlpX8hwrfmjv/dHTKWzAB5Cwt1Kr6%2BptikjX3Ob%2BFY%3D' (2025-03-18)
  → 'github:danth/stylix/f122d70925ca44e5ee4216661769437ab36a6a3f?narHash=sha256-Djg5uMhIDPdFOZ7kTrqNlHaAqcx/4rp7BofZLsUHkLY%3D' (2025-03-19)
```

```
comparing devShells.x86_64-linux.default:
<<< /nix/store/3vg66bimfy7bb38qawbf3xlvqc9maiqw-nix-shell.drv
>>> /nix/store/3vg66bimfy7bb38qawbf3xlvqc9maiqw-nix-shell.drv
No version or selection state changes.
Closure size: 2964 -> 2964 (0 paths added, 0 paths removed, delta +0, disk usage +0B).

comparing formatter.x86_64-linux:
<<< /nix/store/6mnywnsbyzlwrwmh82h0wnszd3nwz1j1-nixfmt-unstable-2025-03-03.drv
>>> /nix/store/6mnywnsbyzlwrwmh82h0wnszd3nwz1j1-nixfmt-unstable-2025-03-03.drv
No version or selection state changes.
Closure size: 1308 -> 1308 (0 paths added, 0 paths removed, delta +0, disk usage +0B).

comparing checks.x86_64-linux.pre-commit-check:
<<< /nix/store/3adzg3qazi7jxi2235qfg2kqs61yjjgi-pre-commit-run.drv
>>> /nix/store/bqshaygwcki9gd5gxhr6lh5vsfalj7m6-pre-commit-run.drv
Added packages:
[A+]  #1  fqyq3x2s9v1lxl2hzxraacd1w74qspd3-source  <none>
Removed packages:
[R-]  #1  9ng1pfac9l8hjnxxbrhw5wz2nc3r1vga-source  <none>
Closure size: 2605 -> 2605 (2 paths added, 2 paths removed, delta +0, disk usage +0B).

comparing nixosConfigurations.artemision.config.system.build.toplevel:
<<< /nix/store/qy7sjd7gmagws2iq68vq9igc702l47r8-nixos-system-artemision-25.05.20250319.903d679.drv
>>> /nix/store/kxb2hsll4vvfsh63bscdxdw2wwspdz2j-nixos-system-artemision-25.05.20250320.b64ec19.drv
Version changes:
[C.]  #1  CVE                      2014-8139.diff, 2014-8140.diff, 2014-8141.diff, 2014-9636.diff, 2014-9913.patch, 2015-7696.diff, 2015-7697.diff, 2015-7747.patch, 2016-9844.patch, 2017-2887, 2017-6827+CVE-2017-6828+CVE-2017-6832+CVE-2017-6835+CVE-2017-6837.patch x2, 2017-6829.patch x2, 2017-6830+CVE-2017-6834+CVE-2017-6836+CVE-2017-6838.patch x2, 2017-6831.patch x2, 2017-6833.patch x2, 2017-6839.patch x2, 2017-8372-CVE-2017-8373.patch x2, 2017-8374.patch x2, 2017-10140-cwd-db_config.patch, 2017-10140-4.8-cwd-db_config.patch, 2017-11550-and-CVE-2017-11551.patch, 2018-6951.patch, 2018-6952.patch, 2018-18384.patch, 2018-19876.patch, 2018-1000156.patch, 2019-13232-1.patch x3, 2019-13232-2.patch x3, 2019-13232-3.patch x3, 2019-13636.patch, 2019-13638-and-CVE-2018-20969.patch, 2020-35492.patch, 2021-3468.patch x2, 2021-3500+CVE-2021-32490+CVE-2021-32491+CVE-2021-32492+CVE-2021-32493.patch, 2021-3502.patch x2, 2021-3933.patch, 2021-4217.patch x2, 2021-38185-1.patch, 2021-38185-2.patch, 2021-38185-3.patch, 2021-40633.patch, 2021-45942.patch x2, 2022-3219.patch, 2022-28391.patch x4, 2022-28506.patch, 2022-28805.patch x2, 2022-33099.patch, 2022-34568.patch x2, 2022-47021.patch x2, 2022-48174.patch x2, 2022-48281.patch, 2023-0795.CVE-2023-0796.CVE-2023-0797.CVE-2023-0798.CVE-2023-0799.patch, 2023-0795.CVE-2023-0796.CVE-2023-0797.CVE-2023-0798.CVE-2023-0799.prerequisite-0.patch, 2023-0795.CVE-2023-0796.CVE-2023-0797.CVE-2023-0798.CVE-2023-0799.prerequisite-1.patch, 2023-0800.CVE-2023-0801.CVE-2023-0802.CVE-2023-0803.CVE-2023-0804.patch, 2023-1981.patch x2, 2023-27371.patch, 2023-38469.patch x2, 2023-38470.patch x2, 2023-38471.patch x2, 2023-38471-2.patch x2, 2023-38472.patch x2, 2023-38473.patch x2, 2023-42363.patch x2, 2023-42364_CVE-2023-42365.patch x2, 2023-42366.patch x2, 2023-49501.patch, 2023-49502.patch, 2023-50007.patch, 2023-50008.patch, 2024-6239.patch, 2024-6655.patch, 2024-25081.CVE-2024-25082.patch x2, 2024-31578.patch, 2024-31582.patch, 2024-52530.patch x2, 2024-52531_1.patch x2, 2024-52531_2.patch x2, 2024-52532_1.patch x2, 2024-52532_2.patch x2, 2024-52616.patch x2, 2024-56826_ISSUE1563.patch x2, 2024-56826_ISSUE1564.patch x2, 2025-0938.patch, 2025-26519_0.patch x2, 2025-26519_1.patch x2 -> 2014-8139.diff, 2014-8140.diff, 2014-8141.diff, 2014-9636.diff, 2014-9913.patch, 2015-7696.diff, 2015-7697.diff, 2015-7747.patch, 2016-9844.patch, 2017-6827+CVE-2017-6828+CVE-2017-6832+CVE-2017-6835+CVE-2017-6837.patch x2, 2017-6829.patch x2, 2017-6830+CVE-2017-6834+CVE-2017-6836+CVE-2017-6838.patch x2, 2017-6831.patch x2, 2017-6833.patch x2, 2017-6839.patch x2, 2017-8372-CVE-2017-8373.patch x2, 2017-8374.patch x2, 2017-10140-cwd-db_config.patch, 2017-10140-4.8-cwd-db_config.patch, 2017-11550-and-CVE-2017-11551.patch, 2018-6951.patch, 2018-6952.patch, 2018-18384.patch, 2018-19876.patch, 2018-1000156.patch, 2019-13232-1.patch x3, 2019-13232-2.patch x3, 2019-13232-3.patch x3, 2019-13636.patch, 2019-13638-and-CVE-2018-20969.patch, 2020-35492.patch, 2021-3468.patch x2, 2021-3500+CVE-2021-32490+CVE-2021-32491+CVE-2021-32492+CVE-2021-32493.patch, 2021-3502.patch x2, 2021-3933.patch, 2021-4217.patch x2, 2021-38185-1.patch, 2021-38185-2.patch, 2021-38185-3.patch, 2021-40633.patch, 2021-45942.patch x2, 2022-3219.patch, 2022-28391.patch x4, 2022-28506.patch, 2022-28805.patch x2, 2022-33099.patch, 2022-34568.patch x2, 2022-47021.patch x2, 2022-48174.patch x2, 2022-48281.patch, 2023-0795.CVE-2023-0796.CVE-2023-0797.CVE-2023-0798.CVE-2023-0799.patch, 2023-0795.CVE-2023-0796.CVE-2023-0797.CVE-2023-0798.CVE-2023-0799.prerequisite-0.patch, 2023-0795.CVE-2023-0796.CVE-2023-0797.CVE-2023-0798.CVE-2023-0799.prerequisite-1.patch, 2023-0800.CVE-2023-0801.CVE-2023-0802.CVE-2023-0803.CVE-2023-0804.patch, 2023-1981.patch x2, 2023-27371.patch, 2023-38469.patch x2, 2023-38470.patch x2, 2023-38471.patch x2, 2023-38471-2.patch x2, 2023-38472.patch x2, 2023-38473.patch x2, 2023-42363.patch x2, 2023-42364_CVE-2023-42365.patch x2, 2023-42366.patch x2, 2023-49501.patch, 2023-49502.patch, 2023-50007.patch, 2023-50008.patch, 2024-6239.patch, 2024-6655.patch, 2024-25081.CVE-2024-25082.patch x2, 2024-31578.patch, 2024-31582.patch, 2024-52530.patch x2, 2024-52531_1.patch x2, 2024-52531_2.patch x2, 2024-52532_1.patch x2, 2024-52532_2.patch x2, 2024-52616.patch x2, 2024-56826_ISSUE1563.patch x2, 2024-56826_ISSUE1564.patch x2, 2025-0938.patch, 2025-26519_0.patch x2, 2025-26519_1.patch x2
[U.]  #2  aquamarine               0.7.2 -> 0.8.0
[U.]  #3  cargo-tarpaulin          0.32.1, 0.32.1-vendor, 0.32.1-vendor-staging -> 0.32.3, 0.32.3-vendor, 0.32.3-vendor-staging
[U.]  #4  kitty                    0.40.0 -> 0.40.1
[U.]  #5  kitty-go-modules         0.40.0-go-modules -> 0.40.1-go-modules
[U.]  #6  nixos-system-artemision  25.05.20250319.903d679 -> 25.05.20250320.b64ec19
Added packages:
[A.]  #1  1d78c8bd4295262a3118f478e6b3a7c7536fa282.patch  <none>
[A.]  #2  ba5dc03aecc1d96f81b76838f845ebde7348cf62.diff   <none>
[A.]  #3  fqyq3x2s9v1lxl2hzxraacd1w74qspd3-source         <none>
[A.]  #4  starship-config                                 <none>
Removed packages:
[R.]  #1  6171ca6.patch                            <none>
[R.]  #2  8cbdd003e2.patch                         <none>
[R.]  #3  9ng1pfac9l8hjnxxbrhw5wz2nc3r1vga-source  <none>
[R.]  #4  SDL_image                                1.2.12, 1.2.12.tar.gz
[R.]  #5  clang16-webp-errors.patch                <none>
[R.]  #6  unit-script-docker-prune-start           <none>
Closure size: 18721 -> 18717 (104 paths added, 108 paths removed, delta -4, disk usage +380.2KiB).

comparing nixosConfigurations.palatine-hill.config.system.build.toplevel:
<<< /nix/store/7vgd3d9zg363iffic7clbwcj0p69ya2k-nixos-system-palatine-hill-25.05.20250319.903d679.drv
>>> /nix/store/1gdsnn4m0h748y46biipprv96y8whni5-nixos-system-palatine-hill-25.05.20250320.b64ec19.drv
Version changes:
[U.]  #1  nixos-system-palatine-hill  25.05.20250319.903d679 -> 25.05.20250320.b64ec19
Added packages:
[A.]  #1  1d78c8bd4295262a3118f478e6b3a7c7536fa282.patch  <none>
[A.]  #2  fqyq3x2s9v1lxl2hzxraacd1w74qspd3-source         <none>
Removed packages:
[R.]  #1  9ng1pfac9l8hjnxxbrhw5wz2nc3r1vga-source  <none>
[R.]  #2  unit-script-docker-prune-start           <none>
Closure size: 8595 -> 8595 (61 paths added, 61 paths removed, delta +0, disk usage +389.2KiB).

comparing packages.x86_64-linux.lego-latest:
<<< /nix/store/7nqs7hbygz05w1v0ma24hjby5c2wr7sk-lego-4.21.0.drv
>>> /nix/store/7nqs7hbygz05w1v0ma24hjby5c2wr7sk-lego-4.21.0.drv
No version or selection state changes.
Closure size: 768 -> 768 (0 paths added, 0 paths removed, delta +0, disk usage +0B).

```

Auto-generated by [update.yml][1] with the help of
[create-pull-request][2].

[1]: https://nayeonie.com/ahuston-0/nix-dotfiles/src/branch/main/.github/workflows/flake-update.yml
[2]: https://forgejo.stefka.eu/jiriks74/create-pull-request
2025-03-20 12:10:15 +00:00
083e091fef Merge pull request 're-enable auto-update' (#48) from feature/enable-autopull into main
All checks were successful
Update flakes / update_lockfile (push) Successful in 14m25s
Check flake.lock / Check health of `flake.lock` (push) Successful in 12s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m30s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 9m14s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 14m17s
Reviewed-on: #48
2025-03-20 00:30:04 -04:00
3586a4bbb8 re-enable auto-update
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 14s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 6m58s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 14m29s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 19m14s
2025-03-20 00:10:45 -04:00
3c336c0bae Merge pull request 'automated: Update flake.lock' (#44) from update-flake-lock into main
All checks were successful
Check flake.lock / Check health of `flake.lock` (push) Successful in 9s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m58s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 11m10s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 14m25s
Reviewed-on: #44
2025-03-19 14:06:10 -04:00
dce084e1ae automated: Update flake.lock
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 10s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 3m21s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 14m26s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 28m13s
- The following Nix Flake inputs were updated:

```
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/4f4d97d7b7be387286cc9c988760a7ebaa5be1f1?narHash=sha256-3fwpN7KN226ghLlpO9TR0/WpgQOmOj1e8bieUxpIYSk%3D' (2025-03-17)
  → 'github:NixOS/nixos-hardware/daaae13dff0ecc692509a1332ff9003d9952d7a9?narHash=sha256-VFMgJkp/COvkt5dnkZB4D2szVdmF6DGm5ZdVvTUy61c%3D' (2025-03-19)
• Updated input 'nixpkgs':
    'github:nixos/nixpkgs/2b3795787eba0066a2bc8bba7362422e5713840f?narHash=sha256-bsg9y3NoMGu0jgTI5XbxvzQFc9JtZB51i500WlVws80%3D' (2025-03-18)
  → 'github:nixos/nixpkgs/903d679a5a674158c3f8d823f62680d5664d15c6?narHash=sha256-wonmHfY804hKBC0SA/s3rOhjgNseURTLjpOXfAC2MkE%3D' (2025-03-19)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/87f0965f9f5b13fca9f38074eee8369dc767550d?narHash=sha256-RB0UEF9IXIgwuuBFC%2Bs9H4rDyvmMZePHlBAK4vRAwf4%3D' (2025-03-18)
  → 'github:oxalica/rust-overlay/b0a7450168c62a46f87d204280e6d9d1c0292671?narHash=sha256-GPubFcOXyi8TVm1xpltHYPcfGr%2BiO%2Bif2u/EtzFVnHQ%3D' (2025-03-19)
```

```
comparing formatter.x86_64-linux:
<<< /nix/store/6mnywnsbyzlwrwmh82h0wnszd3nwz1j1-nixfmt-unstable-2025-03-03.drv
>>> /nix/store/6mnywnsbyzlwrwmh82h0wnszd3nwz1j1-nixfmt-unstable-2025-03-03.drv
No version or selection state changes.
Closure size: 1308 -> 1308 (0 paths added, 0 paths removed, delta +0, disk usage +0B).

comparing nixosConfigurations.artemision.config.system.build.toplevel:
<<< /nix/store/zqihby778h5y34xmnq3hh2mlv0bkfm4k-nixos-system-artemision-25.05.20250318.2b37957.drv
>>> /nix/store/mrvr2wvmkq35kq8mqh9rk6qgjzkh890i-nixos-system-artemision-25.05.20250319.903d679.drv
Version changes:
[U.]  #01  Microsoft.AspNetCore.App.Ref                            8.0.12 -> 8.0.13
[U.]  #02  Microsoft.AspNetCore.App.Runtime.linux-x64              8.0.12 -> 8.0.13
[U.]  #03  Microsoft.DotNet.ILCompiler                             8.0.12 -> 8.0.13
[U.]  #04  Microsoft.NET.ILLink.Tasks                              8.0.12 -> 8.0.13
[U.]  #05  Microsoft.NETCore.App.Crossgen2.linux-x64               8.0.12 -> 8.0.13
[U.]  #06  Microsoft.NETCore.App.Host.linux-x64                    8.0.12 -> 8.0.13
[U.]  #07  Microsoft.NETCore.App.Ref                               8.0.12 -> 8.0.13
[U.]  #08  Microsoft.NETCore.App.Runtime.Mono.linux-x64            8.0.12 -> 8.0.13
[U.]  #09  Microsoft.NETCore.App.Runtime.linux-x64                 8.0.12 -> 8.0.13
[U.]  #10  Microsoft.NETCore.DotNetAppHost                         8.0.12 -> 8.0.13
[U.]  #11  Microsoft.NETCore.DotNetHost                            8.0.12 -> 8.0.13
[U.]  #12  Microsoft.NETCore.DotNetHostPolicy                      8.0.12 -> 8.0.13
[U.]  #13  Microsoft.NETCore.DotNetHostResolver                    8.0.12 -> 8.0.13
[U.]  #14  SDL2_image                                              2.8.4, 2.8.4.tar.gz -> 2.8.5, 2.8.5.tar.gz
[U.]  #15  amdgpu_top                                              0.10.3, 0.10.3-vendor, 0.10.3-vendor-staging -> 0.10.4, 0.10.4-vendor, 0.10.4-vendor-staging
[U.]  #16  dotnet-aspnetcore-runtime                               8.0.13 -> 8.0.14
[U.]  #17  dotnet-aspnetcore-runtime-wrapped                       8.0.13 -> 8.0.14
[U.]  #18  dotnet-runtime                                          8.0.13 -> 8.0.14
[U.]  #19  dotnet-runtime-wrapped                                  8.0.13 -> 8.0.14
[C.]  #20  dotnet-sdk                                              8.0.112, 8.0.112-linux-x64.tar.gz, 8.0.112-packages, 8.0.406 x2, 8.0.406-linux-x64.tar.gz -> 8.0.113, 8.0.113-linux-x64.tar.gz, 8.0.113-packages, 8.0.407 x2, 8.0.407-linux-x64.tar.gz
[U.]  #21  dotnet-sdk-wrapped                                      8.0.406 x2 -> 8.0.407 x2
[U.]  #22  dotnet-stage0-sdk                                       8.0.113 -> 8.0.114
[U.]  #23  dotnet-stage0-vmr                                       8.0.13 -> 8.0.14
[U.]  #24  dotnet-vmr                                              8.0.13 -> 8.0.14
[C.]  #25  firefox                                                 128.5.0esr.source.tar.xz, 136.0.1, 136.0.1.source.tar.xz -> 128.5.0esr.source.tar.xz, 136.0.2, 136.0.2.source.tar.xz
[U.]  #26  firefox-unwrapped                                       136.0.1 -> 136.0.2
[U.]  #27  libdatachannel                                          0.22.5 -> 0.22.6
[U.]  #28  nixos-system-artemision                                 25.05.20250318.2b37957 -> 25.05.20250319.903d679
[U.]  #29  prettier                                                3.5.2, 3.5.2.tgz -> 3.5.3, 3.5.3.tgz
[U.]  #30  runtime.linux-arm64.Microsoft.NETCore.ILAsm             8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #31  runtime.linux-arm64.Microsoft.NETCore.ILDAsm            8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #32  runtime.linux-x64.Microsoft.DotNet.ILCompiler           8.0.12 -> 8.0.13
[U.]  #33  runtime.linux-x64.Microsoft.NETCore.DotNetAppHost       8.0.12 -> 8.0.13
[U.]  #34  runtime.linux-x64.Microsoft.NETCore.DotNetHost          8.0.12 -> 8.0.13
[U.]  #35  runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy    8.0.12 -> 8.0.13
[U.]  #36  runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver  8.0.12 -> 8.0.13
[U.]  #37  runtime.linux-x64.Microsoft.NETCore.ILAsm               8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #38  runtime.linux-x64.Microsoft.NETCore.ILDAsm              8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #39  runtime.osx-arm64.Microsoft.NETCore.ILAsm               8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #40  runtime.osx-arm64.Microsoft.NETCore.ILDAsm              8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #41  runtime.osx-x64.Microsoft.NETCore.ILAsm                 8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #42  runtime.osx-x64.Microsoft.NETCore.ILDAsm                8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #43  tealdeer                                                1.7.1, 1.7.1-vendor, 1.7.1-vendor-staging -> 1.7.2, 1.7.2-vendor, 1.7.2-vendor-staging
Added packages:
[A.]  #01  Microsoft.AspNetCore.App.Ref.8.0.13.nupkg                                    <none>
[A.]  #02  Microsoft.AspNetCore.App.Runtime.linux-x64.8.0.13.nupkg                      <none>
[A.]  #03  Microsoft.DotNet.ILCompiler.8.0.13.nupkg                                     <none>
[A.]  #04  Microsoft.NET.ILLink.Tasks.8.0.13.nupkg                                      <none>
[A.]  #05  Microsoft.NETCore.App.Crossgen2.linux-x64.8.0.13.nupkg                       <none>
[A.]  #06  Microsoft.NETCore.App.Host.linux-x64.8.0.13.nupkg                            <none>
[A.]  #07  Microsoft.NETCore.App.Ref.8.0.13.nupkg                                       <none>
[A.]  #08  Microsoft.NETCore.App.Runtime.Mono.linux-x64.8.0.13.nupkg                    <none>
[A.]  #09  Microsoft.NETCore.App.Runtime.linux-x64.8.0.13.nupkg                         <none>
[A.]  #10  Microsoft.NETCore.DotNetAppHost.8.0.13.nupkg                                 <none>
[A.]  #11  Microsoft.NETCore.DotNetHost.8.0.13.nupkg                                    <none>
[A.]  #12  Microsoft.NETCore.DotNetHostPolicy.8.0.13.nupkg                              <none>
[A.]  #13  Microsoft.NETCore.DotNetHostResolver.8.0.13.nupkg                            <none>
[A.]  #14  Private.SourceBuilt.Artifacts.8.0.113-servicing.25072.1.centos.9-x64         <none>
[A.]  #15  Private.SourceBuilt.Artifacts.8.0.113-servicing.25072.1.centos.9-x64.tar.gz  <none>
[A.]  #16  System.Formats.Asn1                                                          8.0.1
[A.]  #17  System.Formats.Asn1.8.0.1.nupkg                                              <none>
[A.]  #18  h0hr3gas9dbffx74f7s9201hsd1wbnpk-source                                      <none>
[A.]  #19  runtime.linux-arm64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg   <none>
[A.]  #20  runtime.linux-arm64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg  <none>
[A.]  #21  runtime.linux-x64.Microsoft.DotNet.ILCompiler.8.0.13.nupkg                   <none>
[A.]  #22  runtime.linux-x64.Microsoft.NETCore.DotNetAppHost.8.0.13.nupkg               <none>
[A.]  #23  runtime.linux-x64.Microsoft.NETCore.DotNetHost.8.0.13.nupkg                  <none>
[A.]  #24  runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy.8.0.13.nupkg            <none>
[A.]  #25  runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver.8.0.13.nupkg          <none>
[A.]  #26  runtime.linux-x64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg     <none>
[A.]  #27  runtime.linux-x64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg    <none>
[A.]  #28  runtime.osx-arm64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg     <none>
[A.]  #29  runtime.osx-arm64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg    <none>
[A.]  #30  runtime.osx-x64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg       <none>
[A.]  #31  runtime.osx-x64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg      <none>
[A.]  #32  v8.0.14.tar.gz                                                               <none>
Removed packages:
[R.]  #01  Microsoft.AspNetCore.App.Ref.8.0.12.nupkg                                    <none>
[R.]  #02  Microsoft.AspNetCore.App.Runtime.linux-x64.8.0.12.nupkg                      <none>
[R.]  #03  Microsoft.DotNet.ILCompiler.8.0.12.nupkg                                     <none>
[R.]  #04  Microsoft.NET.ILLink.Tasks.8.0.12.nupkg                                      <none>
[R.]  #05  Microsoft.NETCore.App.Crossgen2.linux-x64.8.0.12.nupkg                       <none>
[R.]  #06  Microsoft.NETCore.App.Host.linux-x64.8.0.12.nupkg                            <none>
[R.]  #07  Microsoft.NETCore.App.Ref.8.0.12.nupkg                                       <none>
[R.]  #08  Microsoft.NETCore.App.Runtime.Mono.linux-x64.8.0.12.nupkg                    <none>
[R.]  #09  Microsoft.NETCore.App.Runtime.linux-x64.8.0.12.nupkg                         <none>
[R.]  #10  Microsoft.NETCore.DotNetAppHost.8.0.12.nupkg                                 <none>
[R.]  #11  Microsoft.NETCore.DotNetHost.8.0.12.nupkg                                    <none>
[R.]  #12  Microsoft.NETCore.DotNetHostPolicy.8.0.12.nupkg                              <none>
[R.]  #13  Microsoft.NETCore.DotNetHostResolver.8.0.12.nupkg                            <none>
[R.]  #14  Private.SourceBuilt.Artifacts.8.0.112-servicing.24604.1.centos.9-x64         <none>
[R.]  #15  Private.SourceBuilt.Artifacts.8.0.112-servicing.24604.1.centos.9-x64.tar.gz  <none>
[R.]  #16  runtime.linux-arm64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg   <none>
[R.]  #17  runtime.linux-arm64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg  <none>
[R.]  #18  runtime.linux-x64.Microsoft.DotNet.ILCompiler.8.0.12.nupkg                   <none>
[R.]  #19  runtime.linux-x64.Microsoft.NETCore.DotNetAppHost.8.0.12.nupkg               <none>
[R.]  #20  runtime.linux-x64.Microsoft.NETCore.DotNetHost.8.0.12.nupkg                  <none>
[R.]  #21  runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy.8.0.12.nupkg            <none>
[R.]  #22  runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver.8.0.12.nupkg          <none>
[R.]  #23  runtime.linux-x64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg     <none>
[R.]  #24  runtime.linux-x64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg    <none>
[R.]  #25  runtime.osx-arm64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg     <none>
[R.]  #26  runtime.osx-arm64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg    <none>
[R.]  #27  runtime.osx-x64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg       <none>
[R.]  #28  runtime.osx-x64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg      <none>
[R.]  #29  v8.0.13.tar.gz                                                               <none>
[R.]  #30  yys9xms4bag54j1jjhcsqk1g7x1pcdba-source                                      <none>
Closure size: 18716 -> 18718 (159 paths added, 157 paths removed, delta +2, disk usage -18.1KiB).

comparing packages.x86_64-linux.lego-latest:
<<< /nix/store/7nqs7hbygz05w1v0ma24hjby5c2wr7sk-lego-4.21.0.drv
>>> /nix/store/7nqs7hbygz05w1v0ma24hjby5c2wr7sk-lego-4.21.0.drv
No version or selection state changes.
Closure size: 768 -> 768 (0 paths added, 0 paths removed, delta +0, disk usage +0B).

comparing devShells.x86_64-linux.default:
<<< /nix/store/p920xkn8wk7pxxq67l3wpav4cv83jgwl-nix-shell.drv
>>> /nix/store/3vg66bimfy7bb38qawbf3xlvqc9maiqw-nix-shell.drv
Version changes:
[U.]  #01  Microsoft.AspNetCore.App.Ref                            8.0.12 -> 8.0.13
[U.]  #02  Microsoft.AspNetCore.App.Runtime.linux-x64              8.0.12 -> 8.0.13
[U.]  #03  Microsoft.DotNet.ILCompiler                             8.0.12 -> 8.0.13
[U.]  #04  Microsoft.NET.ILLink.Tasks                              8.0.12 -> 8.0.13
[U.]  #05  Microsoft.NETCore.App.Crossgen2.linux-x64               8.0.12 -> 8.0.13
[U.]  #06  Microsoft.NETCore.App.Host.linux-x64                    8.0.12 -> 8.0.13
[U.]  #07  Microsoft.NETCore.App.Ref                               8.0.12 -> 8.0.13
[U.]  #08  Microsoft.NETCore.App.Runtime.Mono.linux-x64            8.0.12 -> 8.0.13
[U.]  #09  Microsoft.NETCore.App.Runtime.linux-x64                 8.0.12 -> 8.0.13
[U.]  #10  Microsoft.NETCore.DotNetAppHost                         8.0.12 -> 8.0.13
[U.]  #11  Microsoft.NETCore.DotNetHost                            8.0.12 -> 8.0.13
[U.]  #12  Microsoft.NETCore.DotNetHostPolicy                      8.0.12 -> 8.0.13
[U.]  #13  Microsoft.NETCore.DotNetHostResolver                    8.0.12 -> 8.0.13
[U.]  #14  dotnet-aspnetcore-runtime                               8.0.13 -> 8.0.14
[U.]  #15  dotnet-aspnetcore-runtime-wrapped                       8.0.13 -> 8.0.14
[U.]  #16  dotnet-runtime                                          8.0.13 -> 8.0.14
[U.]  #17  dotnet-runtime-wrapped                                  8.0.13 -> 8.0.14
[C.]  #18  dotnet-sdk                                              8.0.112, 8.0.112-linux-x64.tar.gz, 8.0.112-packages, 8.0.406 x2, 8.0.406-linux-x64.tar.gz -> 8.0.113, 8.0.113-linux-x64.tar.gz, 8.0.113-packages, 8.0.407 x2, 8.0.407-linux-x64.tar.gz
[U.]  #19  dotnet-sdk-wrapped                                      8.0.406 x2 -> 8.0.407 x2
[U.]  #20  dotnet-stage0-sdk                                       8.0.113 -> 8.0.114
[U.]  #21  dotnet-stage0-vmr                                       8.0.13 -> 8.0.14
[U.]  #22  dotnet-vmr                                              8.0.13 -> 8.0.14
[U.]  #23  runtime.linux-arm64.Microsoft.NETCore.ILAsm             8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #24  runtime.linux-arm64.Microsoft.NETCore.ILDAsm            8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #25  runtime.linux-x64.Microsoft.DotNet.ILCompiler           8.0.12 -> 8.0.13
[U.]  #26  runtime.linux-x64.Microsoft.NETCore.DotNetAppHost       8.0.12 -> 8.0.13
[U.]  #27  runtime.linux-x64.Microsoft.NETCore.DotNetHost          8.0.12 -> 8.0.13
[U.]  #28  runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy    8.0.12 -> 8.0.13
[U.]  #29  runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver  8.0.12 -> 8.0.13
[U.]  #30  runtime.linux-x64.Microsoft.NETCore.ILAsm               8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #31  runtime.linux-x64.Microsoft.NETCore.ILDAsm              8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #32  runtime.osx-arm64.Microsoft.NETCore.ILAsm               8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #33  runtime.osx-arm64.Microsoft.NETCore.ILDAsm              8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #34  runtime.osx-x64.Microsoft.NETCore.ILAsm                 8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #35  runtime.osx-x64.Microsoft.NETCore.ILDAsm                8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
Added packages:
[A.]  #01  Microsoft.AspNetCore.App.Ref.8.0.13.nupkg                                    <none>
[A.]  #02  Microsoft.AspNetCore.App.Runtime.linux-x64.8.0.13.nupkg                      <none>
[A.]  #03  Microsoft.DotNet.ILCompiler.8.0.13.nupkg                                     <none>
[A.]  #04  Microsoft.NET.ILLink.Tasks.8.0.13.nupkg                                      <none>
[A.]  #05  Microsoft.NETCore.App.Crossgen2.linux-x64.8.0.13.nupkg                       <none>
[A.]  #06  Microsoft.NETCore.App.Host.linux-x64.8.0.13.nupkg                            <none>
[A.]  #07  Microsoft.NETCore.App.Ref.8.0.13.nupkg                                       <none>
[A.]  #08  Microsoft.NETCore.App.Runtime.Mono.linux-x64.8.0.13.nupkg                    <none>
[A.]  #09  Microsoft.NETCore.App.Runtime.linux-x64.8.0.13.nupkg                         <none>
[A.]  #10  Microsoft.NETCore.DotNetAppHost.8.0.13.nupkg                                 <none>
[A.]  #11  Microsoft.NETCore.DotNetHost.8.0.13.nupkg                                    <none>
[A.]  #12  Microsoft.NETCore.DotNetHostPolicy.8.0.13.nupkg                              <none>
[A.]  #13  Microsoft.NETCore.DotNetHostResolver.8.0.13.nupkg                            <none>
[A.]  #14  Private.SourceBuilt.Artifacts.8.0.113-servicing.25072.1.centos.9-x64         <none>
[A.]  #15  Private.SourceBuilt.Artifacts.8.0.113-servicing.25072.1.centos.9-x64.tar.gz  <none>
[A.]  #16  System.Formats.Asn1                                                          8.0.1
[A.]  #17  System.Formats.Asn1.8.0.1.nupkg                                              <none>
[A.]  #18  runtime.linux-arm64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg   <none>
[A.]  #19  runtime.linux-arm64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg  <none>
[A.]  #20  runtime.linux-x64.Microsoft.DotNet.ILCompiler.8.0.13.nupkg                   <none>
[A.]  #21  runtime.linux-x64.Microsoft.NETCore.DotNetAppHost.8.0.13.nupkg               <none>
[A.]  #22  runtime.linux-x64.Microsoft.NETCore.DotNetHost.8.0.13.nupkg                  <none>
[A.]  #23  runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy.8.0.13.nupkg            <none>
[A.]  #24  runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver.8.0.13.nupkg          <none>
[A.]  #25  runtime.linux-x64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg     <none>
[A.]  #26  runtime.linux-x64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg    <none>
[A.]  #27  runtime.osx-arm64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg     <none>
[A.]  #28  runtime.osx-arm64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg    <none>
[A.]  #29  runtime.osx-x64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg       <none>
[A.]  #30  runtime.osx-x64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg      <none>
[A.]  #31  v8.0.14.tar.gz                                                               <none>
Removed packages:
[R.]  #01  Microsoft.AspNetCore.App.Ref.8.0.12.nupkg                                    <none>
[R.]  #02  Microsoft.AspNetCore.App.Runtime.linux-x64.8.0.12.nupkg                      <none>
[R.]  #03  Microsoft.DotNet.ILCompiler.8.0.12.nupkg                                     <none>
[R.]  #04  Microsoft.NET.ILLink.Tasks.8.0.12.nupkg                                      <none>
[R.]  #05  Microsoft.NETCore.App.Crossgen2.linux-x64.8.0.12.nupkg                       <none>
[R.]  #06  Microsoft.NETCore.App.Host.linux-x64.8.0.12.nupkg                            <none>
[R.]  #07  Microsoft.NETCore.App.Ref.8.0.12.nupkg                                       <none>
[R.]  #08  Microsoft.NETCore.App.Runtime.Mono.linux-x64.8.0.12.nupkg                    <none>
[R.]  #09  Microsoft.NETCore.App.Runtime.linux-x64.8.0.12.nupkg                         <none>
[R.]  #10  Microsoft.NETCore.DotNetAppHost.8.0.12.nupkg                                 <none>
[R.]  #11  Microsoft.NETCore.DotNetHost.8.0.12.nupkg                                    <none>
[R.]  #12  Microsoft.NETCore.DotNetHostPolicy.8.0.12.nupkg                              <none>
[R.]  #13  Microsoft.NETCore.DotNetHostResolver.8.0.12.nupkg                            <none>
[R.]  #14  Private.SourceBuilt.Artifacts.8.0.112-servicing.24604.1.centos.9-x64         <none>
[R.]  #15  Private.SourceBuilt.Artifacts.8.0.112-servicing.24604.1.centos.9-x64.tar.gz  <none>
[R.]  #16  runtime.linux-arm64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg   <none>
[R.]  #17  runtime.linux-arm64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg  <none>
[R.]  #18  runtime.linux-x64.Microsoft.DotNet.ILCompiler.8.0.12.nupkg                   <none>
[R.]  #19  runtime.linux-x64.Microsoft.NETCore.DotNetAppHost.8.0.12.nupkg               <none>
[R.]  #20  runtime.linux-x64.Microsoft.NETCore.DotNetHost.8.0.12.nupkg                  <none>
[R.]  #21  runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy.8.0.12.nupkg            <none>
[R.]  #22  runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver.8.0.12.nupkg          <none>
[R.]  #23  runtime.linux-x64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg     <none>
[R.]  #24  runtime.linux-x64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg    <none>
[R.]  #25  runtime.osx-arm64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg     <none>
[R.]  #26  runtime.osx-arm64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg    <none>
[R.]  #27  runtime.osx-x64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg       <none>
[R.]  #28  runtime.osx-x64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg      <none>
[R.]  #29  v8.0.13.tar.gz                                                               <none>
Closure size: 2962 -> 2964 (77 paths added, 75 paths removed, delta +2, disk usage +6.0KiB).

comparing checks.x86_64-linux.pre-commit-check:
<<< /nix/store/44jlvfb3mz7dxjjn6wswddz7d3chh043-pre-commit-run.drv
>>> /nix/store/w7mypicg31gg35i1sbyymwa6gszzvywl-pre-commit-run.drv
Version changes:
[U.]  #01  Microsoft.AspNetCore.App.Ref                            8.0.12 -> 8.0.13
[U.]  #02  Microsoft.AspNetCore.App.Runtime.linux-x64              8.0.12 -> 8.0.13
[U.]  #03  Microsoft.DotNet.ILCompiler                             8.0.12 -> 8.0.13
[U.]  #04  Microsoft.NET.ILLink.Tasks                              8.0.12 -> 8.0.13
[U.]  #05  Microsoft.NETCore.App.Crossgen2.linux-x64               8.0.12 -> 8.0.13
[U.]  #06  Microsoft.NETCore.App.Host.linux-x64                    8.0.12 -> 8.0.13
[U.]  #07  Microsoft.NETCore.App.Ref                               8.0.12 -> 8.0.13
[U.]  #08  Microsoft.NETCore.App.Runtime.Mono.linux-x64            8.0.12 -> 8.0.13
[U.]  #09  Microsoft.NETCore.App.Runtime.linux-x64                 8.0.12 -> 8.0.13
[U.]  #10  Microsoft.NETCore.DotNetAppHost                         8.0.12 -> 8.0.13
[U.]  #11  Microsoft.NETCore.DotNetHost                            8.0.12 -> 8.0.13
[U.]  #12  Microsoft.NETCore.DotNetHostPolicy                      8.0.12 -> 8.0.13
[U.]  #13  Microsoft.NETCore.DotNetHostResolver                    8.0.12 -> 8.0.13
[U.]  #14  dotnet-aspnetcore-runtime                               8.0.13 -> 8.0.14
[U.]  #15  dotnet-aspnetcore-runtime-wrapped                       8.0.13 -> 8.0.14
[U.]  #16  dotnet-runtime                                          8.0.13 -> 8.0.14
[U.]  #17  dotnet-runtime-wrapped                                  8.0.13 -> 8.0.14
[C.]  #18  dotnet-sdk                                              8.0.112, 8.0.112-linux-x64.tar.gz, 8.0.112-packages, 8.0.406 x2, 8.0.406-linux-x64.tar.gz -> 8.0.113, 8.0.113-linux-x64.tar.gz, 8.0.113-packages, 8.0.407 x2, 8.0.407-linux-x64.tar.gz
[U.]  #19  dotnet-sdk-wrapped                                      8.0.406 x2 -> 8.0.407 x2
[U.]  #20  dotnet-stage0-sdk                                       8.0.113 -> 8.0.114
[U.]  #21  dotnet-stage0-vmr                                       8.0.13 -> 8.0.14
[U.]  #22  dotnet-vmr                                              8.0.13 -> 8.0.14
[U.]  #23  runtime.linux-arm64.Microsoft.NETCore.ILAsm             8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #24  runtime.linux-arm64.Microsoft.NETCore.ILDAsm            8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #25  runtime.linux-x64.Microsoft.DotNet.ILCompiler           8.0.12 -> 8.0.13
[U.]  #26  runtime.linux-x64.Microsoft.NETCore.DotNetAppHost       8.0.12 -> 8.0.13
[U.]  #27  runtime.linux-x64.Microsoft.NETCore.DotNetHost          8.0.12 -> 8.0.13
[U.]  #28  runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy    8.0.12 -> 8.0.13
[U.]  #29  runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver  8.0.12 -> 8.0.13
[U.]  #30  runtime.linux-x64.Microsoft.NETCore.ILAsm               8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #31  runtime.linux-x64.Microsoft.NETCore.ILDAsm              8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #32  runtime.osx-arm64.Microsoft.NETCore.ILAsm               8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #33  runtime.osx-arm64.Microsoft.NETCore.ILDAsm              8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #34  runtime.osx-x64.Microsoft.NETCore.ILAsm                 8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #35  runtime.osx-x64.Microsoft.NETCore.ILDAsm                8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
Added packages:
[A.]  #01  Microsoft.AspNetCore.App.Ref.8.0.13.nupkg                                    <none>
[A.]  #02  Microsoft.AspNetCore.App.Runtime.linux-x64.8.0.13.nupkg                      <none>
[A.]  #03  Microsoft.DotNet.ILCompiler.8.0.13.nupkg                                     <none>
[A.]  #04  Microsoft.NET.ILLink.Tasks.8.0.13.nupkg                                      <none>
[A.]  #05  Microsoft.NETCore.App.Crossgen2.linux-x64.8.0.13.nupkg                       <none>
[A.]  #06  Microsoft.NETCore.App.Host.linux-x64.8.0.13.nupkg                            <none>
[A.]  #07  Microsoft.NETCore.App.Ref.8.0.13.nupkg                                       <none>
[A.]  #08  Microsoft.NETCore.App.Runtime.Mono.linux-x64.8.0.13.nupkg                    <none>
[A.]  #09  Microsoft.NETCore.App.Runtime.linux-x64.8.0.13.nupkg                         <none>
[A.]  #10  Microsoft.NETCore.DotNetAppHost.8.0.13.nupkg                                 <none>
[A.]  #11  Microsoft.NETCore.DotNetHost.8.0.13.nupkg                                    <none>
[A.]  #12  Microsoft.NETCore.DotNetHostPolicy.8.0.13.nupkg                              <none>
[A.]  #13  Microsoft.NETCore.DotNetHostResolver.8.0.13.nupkg                            <none>
[A.]  #14  Private.SourceBuilt.Artifacts.8.0.113-servicing.25072.1.centos.9-x64         <none>
[A.]  #15  Private.SourceBuilt.Artifacts.8.0.113-servicing.25072.1.centos.9-x64.tar.gz  <none>
[A.]  #16  System.Formats.Asn1                                                          8.0.1
[A.]  #17  System.Formats.Asn1.8.0.1.nupkg                                              <none>
[A+]  #18  h0hr3gas9dbffx74f7s9201hsd1wbnpk-source                                      <none>
[A.]  #19  runtime.linux-arm64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg   <none>
[A.]  #20  runtime.linux-arm64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg  <none>
[A.]  #21  runtime.linux-x64.Microsoft.DotNet.ILCompiler.8.0.13.nupkg                   <none>
[A.]  #22  runtime.linux-x64.Microsoft.NETCore.DotNetAppHost.8.0.13.nupkg               <none>
[A.]  #23  runtime.linux-x64.Microsoft.NETCore.DotNetHost.8.0.13.nupkg                  <none>
[A.]  #24  runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy.8.0.13.nupkg            <none>
[A.]  #25  runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver.8.0.13.nupkg          <none>
[A.]  #26  runtime.linux-x64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg     <none>
[A.]  #27  runtime.linux-x64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg    <none>
[A.]  #28  runtime.osx-arm64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg     <none>
[A.]  #29  runtime.osx-arm64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg    <none>
[A.]  #30  runtime.osx-x64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg       <none>
[A.]  #31  runtime.osx-x64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg      <none>
[A.]  #32  v8.0.14.tar.gz                                                               <none>
Removed packages:
[R.]  #01  Microsoft.AspNetCore.App.Ref.8.0.12.nupkg                                    <none>
[R.]  #02  Microsoft.AspNetCore.App.Runtime.linux-x64.8.0.12.nupkg                      <none>
[R.]  #03  Microsoft.DotNet.ILCompiler.8.0.12.nupkg                                     <none>
[R.]  #04  Microsoft.NET.ILLink.Tasks.8.0.12.nupkg                                      <none>
[R.]  #05  Microsoft.NETCore.App.Crossgen2.linux-x64.8.0.12.nupkg                       <none>
[R.]  #06  Microsoft.NETCore.App.Host.linux-x64.8.0.12.nupkg                            <none>
[R.]  #07  Microsoft.NETCore.App.Ref.8.0.12.nupkg                                       <none>
[R.]  #08  Microsoft.NETCore.App.Runtime.Mono.linux-x64.8.0.12.nupkg                    <none>
[R.]  #09  Microsoft.NETCore.App.Runtime.linux-x64.8.0.12.nupkg                         <none>
[R.]  #10  Microsoft.NETCore.DotNetAppHost.8.0.12.nupkg                                 <none>
[R.]  #11  Microsoft.NETCore.DotNetHost.8.0.12.nupkg                                    <none>
[R.]  #12  Microsoft.NETCore.DotNetHostPolicy.8.0.12.nupkg                              <none>
[R.]  #13  Microsoft.NETCore.DotNetHostResolver.8.0.12.nupkg                            <none>
[R.]  #14  Private.SourceBuilt.Artifacts.8.0.112-servicing.24604.1.centos.9-x64         <none>
[R.]  #15  Private.SourceBuilt.Artifacts.8.0.112-servicing.24604.1.centos.9-x64.tar.gz  <none>
[R.]  #16  runtime.linux-arm64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg   <none>
[R.]  #17  runtime.linux-arm64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg  <none>
[R.]  #18  runtime.linux-x64.Microsoft.DotNet.ILCompiler.8.0.12.nupkg                   <none>
[R.]  #19  runtime.linux-x64.Microsoft.NETCore.DotNetAppHost.8.0.12.nupkg               <none>
[R.]  #20  runtime.linux-x64.Microsoft.NETCore.DotNetHost.8.0.12.nupkg                  <none>
[R.]  #21  runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy.8.0.12.nupkg            <none>
[R.]  #22  runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver.8.0.12.nupkg          <none>
[R.]  #23  runtime.linux-x64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg     <none>
[R.]  #24  runtime.linux-x64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg    <none>
[R.]  #25  runtime.osx-arm64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg     <none>
[R.]  #26  runtime.osx-arm64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg    <none>
[R.]  #27  runtime.osx-x64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg       <none>
[R.]  #28  runtime.osx-x64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg      <none>
[R.]  #29  v8.0.13.tar.gz                                                               <none>
[R-]  #30  yys9xms4bag54j1jjhcsqk1g7x1pcdba-source                                      <none>
Closure size: 2603 -> 2605 (78 paths added, 76 paths removed, delta +2, disk usage +6.0KiB).

comparing nixosConfigurations.palatine-hill.config.system.build.toplevel:
<<< /nix/store/ql0dizkdphdjkvxp63v1xqz5xqavsnl0-nixos-system-palatine-hill-25.05.20250318.2b37957.drv
>>> /nix/store/ji8dfbkbhhfkn8bqkp73adk7mmx75i22-nixos-system-palatine-hill-25.05.20250319.903d679.drv
Version changes:
[U.]  #01  Microsoft.AspNetCore.App.Ref                            8.0.12 -> 8.0.13
[U.]  #02  Microsoft.AspNetCore.App.Runtime.linux-x64              8.0.12 -> 8.0.13
[U.]  #03  Microsoft.DotNet.ILCompiler                             8.0.12 -> 8.0.13
[U.]  #04  Microsoft.NET.ILLink.Tasks                              8.0.12 -> 8.0.13
[U.]  #05  Microsoft.NETCore.App.Crossgen2.linux-x64               8.0.12 -> 8.0.13
[U.]  #06  Microsoft.NETCore.App.Host.linux-x64                    8.0.12 -> 8.0.13
[U.]  #07  Microsoft.NETCore.App.Ref                               8.0.12 -> 8.0.13
[U.]  #08  Microsoft.NETCore.App.Runtime.Mono.linux-x64            8.0.12 -> 8.0.13
[U.]  #09  Microsoft.NETCore.App.Runtime.linux-x64                 8.0.12 -> 8.0.13
[U.]  #10  Microsoft.NETCore.DotNetAppHost                         8.0.12 -> 8.0.13
[U.]  #11  Microsoft.NETCore.DotNetHost                            8.0.12 -> 8.0.13
[U.]  #12  Microsoft.NETCore.DotNetHostPolicy                      8.0.12 -> 8.0.13
[U.]  #13  Microsoft.NETCore.DotNetHostResolver                    8.0.12 -> 8.0.13
[U.]  #14  dotnet-aspnetcore-runtime                               8.0.13 -> 8.0.14
[U.]  #15  dotnet-aspnetcore-runtime-wrapped                       8.0.13 -> 8.0.14
[U.]  #16  dotnet-runtime                                          8.0.13 -> 8.0.14
[U.]  #17  dotnet-runtime-wrapped                                  8.0.13 -> 8.0.14
[C.]  #18  dotnet-sdk                                              8.0.112, 8.0.112-linux-x64.tar.gz, 8.0.112-packages, 8.0.406 x2, 8.0.406-linux-x64.tar.gz -> 8.0.113, 8.0.113-linux-x64.tar.gz, 8.0.113-packages, 8.0.407 x2, 8.0.407-linux-x64.tar.gz
[U.]  #19  dotnet-sdk-wrapped                                      8.0.406 x2 -> 8.0.407 x2
[U.]  #20  dotnet-stage0-sdk                                       8.0.113 -> 8.0.114
[U.]  #21  dotnet-stage0-vmr                                       8.0.13 -> 8.0.14
[U.]  #22  dotnet-vmr                                              8.0.13 -> 8.0.14
[U.]  #23  intel-gmmlib                                            22.6.0 -> 22.7.0
[U.]  #24  intel-media-driver                                      24.3.4 -> 24.4.4
[U.]  #25  nixos-system-palatine-hill                              25.05.20250318.2b37957 -> 25.05.20250319.903d679
[U.]  #26  prettier                                                3.5.2, 3.5.2.tgz -> 3.5.3, 3.5.3.tgz
[U.]  #27  runtime.linux-arm64.Microsoft.NETCore.ILAsm             8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #28  runtime.linux-arm64.Microsoft.NETCore.ILDAsm            8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #29  runtime.linux-x64.Microsoft.DotNet.ILCompiler           8.0.12 -> 8.0.13
[U.]  #30  runtime.linux-x64.Microsoft.NETCore.DotNetAppHost       8.0.12 -> 8.0.13
[U.]  #31  runtime.linux-x64.Microsoft.NETCore.DotNetHost          8.0.12 -> 8.0.13
[U.]  #32  runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy    8.0.12 -> 8.0.13
[U.]  #33  runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver  8.0.12 -> 8.0.13
[U.]  #34  runtime.linux-x64.Microsoft.NETCore.ILAsm               8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #35  runtime.linux-x64.Microsoft.NETCore.ILDAsm              8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #36  runtime.osx-arm64.Microsoft.NETCore.ILAsm               8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #37  runtime.osx-arm64.Microsoft.NETCore.ILDAsm              8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #38  runtime.osx-x64.Microsoft.NETCore.ILAsm                 8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #39  runtime.osx-x64.Microsoft.NETCore.ILDAsm                8.0.12-servicing.24603.5 -> 8.0.13-servicing.25066.9
[U.]  #40  tealdeer                                                1.7.1, 1.7.1-vendor, 1.7.1-vendor-staging -> 1.7.2, 1.7.2-vendor, 1.7.2-vendor-staging
Added packages:
[A.]  #01  Microsoft.AspNetCore.App.Ref.8.0.13.nupkg                                    <none>
[A.]  #02  Microsoft.AspNetCore.App.Runtime.linux-x64.8.0.13.nupkg                      <none>
[A.]  #03  Microsoft.DotNet.ILCompiler.8.0.13.nupkg                                     <none>
[A.]  #04  Microsoft.NET.ILLink.Tasks.8.0.13.nupkg                                      <none>
[A.]  #05  Microsoft.NETCore.App.Crossgen2.linux-x64.8.0.13.nupkg                       <none>
[A.]  #06  Microsoft.NETCore.App.Host.linux-x64.8.0.13.nupkg                            <none>
[A.]  #07  Microsoft.NETCore.App.Ref.8.0.13.nupkg                                       <none>
[A.]  #08  Microsoft.NETCore.App.Runtime.Mono.linux-x64.8.0.13.nupkg                    <none>
[A.]  #09  Microsoft.NETCore.App.Runtime.linux-x64.8.0.13.nupkg                         <none>
[A.]  #10  Microsoft.NETCore.DotNetAppHost.8.0.13.nupkg                                 <none>
[A.]  #11  Microsoft.NETCore.DotNetHost.8.0.13.nupkg                                    <none>
[A.]  #12  Microsoft.NETCore.DotNetHostPolicy.8.0.13.nupkg                              <none>
[A.]  #13  Microsoft.NETCore.DotNetHostResolver.8.0.13.nupkg                            <none>
[A.]  #14  Private.SourceBuilt.Artifacts.8.0.113-servicing.25072.1.centos.9-x64         <none>
[A.]  #15  Private.SourceBuilt.Artifacts.8.0.113-servicing.25072.1.centos.9-x64.tar.gz  <none>
[A.]  #16  System.Formats.Asn1                                                          8.0.1
[A.]  #17  System.Formats.Asn1.8.0.1.nupkg                                              <none>
[A.]  #18  h0hr3gas9dbffx74f7s9201hsd1wbnpk-source                                      <none>
[A.]  #19  runtime.linux-arm64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg   <none>
[A.]  #20  runtime.linux-arm64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg  <none>
[A.]  #21  runtime.linux-x64.Microsoft.DotNet.ILCompiler.8.0.13.nupkg                   <none>
[A.]  #22  runtime.linux-x64.Microsoft.NETCore.DotNetAppHost.8.0.13.nupkg               <none>
[A.]  #23  runtime.linux-x64.Microsoft.NETCore.DotNetHost.8.0.13.nupkg                  <none>
[A.]  #24  runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy.8.0.13.nupkg            <none>
[A.]  #25  runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver.8.0.13.nupkg          <none>
[A.]  #26  runtime.linux-x64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg     <none>
[A.]  #27  runtime.linux-x64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg    <none>
[A.]  #28  runtime.osx-arm64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg     <none>
[A.]  #29  runtime.osx-arm64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg    <none>
[A.]  #30  runtime.osx-x64.Microsoft.NETCore.ILAsm.8.0.13-servicing.25066.9.nupkg       <none>
[A.]  #31  runtime.osx-x64.Microsoft.NETCore.ILDAsm.8.0.13-servicing.25066.9.nupkg      <none>
[A.]  #32  v8.0.14.tar.gz                                                               <none>
Removed packages:
[R.]  #01  Microsoft.AspNetCore.App.Ref.8.0.12.nupkg                                    <none>
[R.]  #02  Microsoft.AspNetCore.App.Runtime.linux-x64.8.0.12.nupkg                      <none>
[R.]  #03  Microsoft.DotNet.ILCompiler.8.0.12.nupkg                                     <none>
[R.]  #04  Microsoft.NET.ILLink.Tasks.8.0.12.nupkg                                      <none>
[R.]  #05  Microsoft.NETCore.App.Crossgen2.linux-x64.8.0.12.nupkg                       <none>
[R.]  #06  Microsoft.NETCore.App.Host.linux-x64.8.0.12.nupkg                            <none>
[R.]  #07  Microsoft.NETCore.App.Ref.8.0.12.nupkg                                       <none>
[R.]  #08  Microsoft.NETCore.App.Runtime.Mono.linux-x64.8.0.12.nupkg                    <none>
[R.]  #09  Microsoft.NETCore.App.Runtime.linux-x64.8.0.12.nupkg                         <none>
[R.]  #10  Microsoft.NETCore.DotNetAppHost.8.0.12.nupkg                                 <none>
[R.]  #11  Microsoft.NETCore.DotNetHost.8.0.12.nupkg                                    <none>
[R.]  #12  Microsoft.NETCore.DotNetHostPolicy.8.0.12.nupkg                              <none>
[R.]  #13  Microsoft.NETCore.DotNetHostResolver.8.0.12.nupkg                            <none>
[R.]  #14  Private.SourceBuilt.Artifacts.8.0.112-servicing.24604.1.centos.9-x64         <none>
[R.]  #15  Private.SourceBuilt.Artifacts.8.0.112-servicing.24604.1.centos.9-x64.tar.gz  <none>
[R.]  #16  runtime.linux-arm64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg   <none>
[R.]  #17  runtime.linux-arm64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg  <none>
[R.]  #18  runtime.linux-x64.Microsoft.DotNet.ILCompiler.8.0.12.nupkg                   <none>
[R.]  #19  runtime.linux-x64.Microsoft.NETCore.DotNetAppHost.8.0.12.nupkg               <none>
[R.]  #20  runtime.linux-x64.Microsoft.NETCore.DotNetHost.8.0.12.nupkg                  <none>
[R.]  #21  runtime.linux-x64.Microsoft.NETCore.DotNetHostPolicy.8.0.12.nupkg            <none>
[R.]  #22  runtime.linux-x64.Microsoft.NETCore.DotNetHostResolver.8.0.12.nupkg          <none>
[R.]  #23  runtime.linux-x64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg     <none>
[R.]  #24  runtime.linux-x64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg    <none>
[R.]  #25  runtime.osx-arm64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg     <none>
[R.]  #26  runtime.osx-arm64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg    <none>
[R.]  #27  runtime.osx-x64.Microsoft.NETCore.ILAsm.8.0.12-servicing.24603.5.nupkg       <none>
[R.]  #28  runtime.osx-x64.Microsoft.NETCore.ILDAsm.8.0.12-servicing.24603.5.nupkg      <none>
[R.]  #29  v8.0.13.tar.gz                                                               <none>
[R.]  #30  yys9xms4bag54j1jjhcsqk1g7x1pcdba-source                                      <none>
Closure size: 8590 -> 8592 (127 paths added, 125 paths removed, delta +2, disk usage -17.9KiB).

```

Auto-generated by [update.yml][1] with the help of
[create-pull-request][2].

[1]: https://nayeonie.com/ahuston-0/nix-dotfiles/src/branch/main/.github/workflows/flake-update.yml
[2]: https://forgejo.stefka.eu/jiriks74/create-pull-request
2025-03-19 12:09:10 +00:00
1941d78711 Merge pull request 'Misc changes after debugging graphical corruption on artemision' (#45) from feature/unpin-nixpkgs into main
All checks were successful
Check flake.lock / Check health of `flake.lock` (push) Successful in 10s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m46s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 9m58s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 17m22s
Update flakes / update_lockfile (push) Successful in 13m44s
Reviewed-on: #45
2025-03-18 23:10:20 -04:00
5b5835e004 fix collabora code service name
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 12s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m46s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 9m31s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 13m10s
2025-03-18 22:56:49 -04:00
b6f2071a91 add docker secret, fix docker pool size 2025-03-18 22:56:37 -04:00
5b825ec05c Merge pull request 'Enable stats statements temporarily on Postgres' (#46) from feature/stats into main
All checks were successful
Check Nix formatting / Perform Nix format checks (push) Successful in 3m0s
Check flake.lock / Check health of `flake.lock` (push) Successful in 9s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 10m5s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 13m59s
Reviewed-on: #46
2025-03-18 22:38:31 -04:00
f0b7a74fcb unpin nixpkgs
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 48s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 4m55s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 20m35s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 30m59s
2025-03-18 22:03:02 -04:00
2fcb57962a automated: Update flake.lock
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 2m5s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 8m16s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 18m38s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 29m0s
- The following Nix Flake inputs were updated:

```
• Updated input 'firefox-addons':
    'gitlab:rycee/nur-expressions/e41884886e7798003973f487f37b979ee92f7d99?dir=pkgs/firefox-addons&narHash=sha256-ytHdrfSbbPvla43Ykd61cVkS2JLA8wBEHcnf4yLFP7Y%3D' (2025-03-13)
  → 'gitlab:rycee/nur-expressions/d91a2ea080804c3a9213d6e460e8cff68cfacf8d?dir=pkgs/firefox-addons&narHash=sha256-cvqCqT7op8uRCIPUYK8CPJbRRmKytFtOzHqomMyO7u8%3D' (2025-03-18)
• Updated input 'home-manager':
    'github:nix-community/home-manager/18780912345970e5b546b1b085385789b6935a83?narHash=sha256-4Y427uj0eql4yRU5rely3EcOlB9q457UDbG9omPtXiA%3D' (2025-03-12)
  → 'github:nix-community/home-manager/22a36aa709de7dd42b562a433b9cefecf104a6ee?narHash=sha256-Tumt3tcMXJniSh7tw2gW%2BWAnVLeB3WWm%2BE%2ByYFnLBXo%3D' (2025-03-18)
• Updated input 'hyprland-contrib':
    'github:hyprwm/contrib/e14d9c5e9aea4a84c3677e0a7c73268153b15327?narHash=sha256-SJrLVyoaQUg29fq3nNdRmYrLgiu9dtgcIVqpl8j/Teo%3D' (2025-03-11)
  → 'github:hyprwm/contrib/bd81329944be53b0ffb99e05864804b95f1d7c65?narHash=sha256-I8JVdQRu8eWvY5W8XWYZkdd5pojDHkxeqQV7mMIsbhs%3D' (2025-03-17)
• Updated input 'nix-index-database':
    'github:Mic92/nix-index-database/66537fb185462ba9b07f4e6f2d54894a1b2d04ab?narHash=sha256-koZtlJRqi0/MD/AKd0KrXLA2NuBOVzlIyAJprjzpxZE%3D' (2025-03-10)
  → 'github:Mic92/nix-index-database/2cfb4e1ca32f59dd2811d7a6dd5d4d1225f0955c?narHash=sha256-pDNzMoR6m1ZSJToZQ6XDTLVSdzIzmFl1b8Pc3f7iV6Y%3D' (2025-03-17)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/507911df8c35939050ae324caccc7cf4ffb76565?narHash=sha256-Co2kAD2SZalOm%2B5zoxmzEVZNvZ17TyafuFsD46BwSdY%3D' (2025-03-02)
  → 'github:nix-community/nixos-generators/83900d5154d840dfae1e0367c5290f59b9dccf03?narHash=sha256-pLRjj0jTL1TloB0ptEwVF51IJJX8a17dSxg%2BgqiWb30%3D' (2025-03-17)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/e1f12151258b12c567f456d8248e4694e9390613?narHash=sha256-f0BVt1/cvA0DQ/q3rB%2BHY4g4tKksd03ZkzI4xehC2Ew%3D' (2025-03-12)
  → 'github:NixOS/nixos-hardware/4f4d97d7b7be387286cc9c988760a7ebaa5be1f1?narHash=sha256-3fwpN7KN226ghLlpO9TR0/WpgQOmOj1e8bieUxpIYSk%3D' (2025-03-17)
• Updated input 'nixos-modules':
    'github:SuperSandro2000/nixos-modules/1183c327ba81205158c95d5c40d37af23a10593e?narHash=sha256-04Uw2LyVWcsHiI1iesauJqJPufrRWsggM4TtVmo1b8w%3D' (2025-03-12)
  → 'github:SuperSandro2000/nixos-modules/f8b6e1d4ea6c9c958b27445c70434b00e8d7f520?narHash=sha256-Um3vjr%2Bnh7MdvdRjPkRX0RiicOWttZd1CuCVEKvOQz8%3D' (2025-03-15)
• Updated input 'nixpkgs-stable':
    'github:nixos/nixpkgs/cdd2ef009676ac92b715ff26630164bb88fec4e0?narHash=sha256-prZ0M8vE/ghRGGZcflvxCu40ObKaB%2Bikn74/xQoNrGQ%3D' (2025-03-13)
  → 'github:nixos/nixpkgs/da044451c6a70518db5b730fe277b70f494188f1?narHash=sha256-IhnK4LhkBlf14/F8THvUy3xi/TxSQkp9hikfDZRD4Ic%3D' (2025-03-18)
• Updated input 'pre-commit-hooks':
    'github:cachix/git-hooks.nix/b5a62751225b2f62ff3147d0a334055ebadcd5cc?narHash=sha256-srpAbmJapkaqGRE3ytf3bj4XshspVR5964OX5LfjDWc%3D' (2025-03-07)
  → 'github:cachix/git-hooks.nix/ea26a82dda75bee6783baca6894040c8e6599728?narHash=sha256-QmF0proyjXI9YyZO9GZmc7/uEu5KVwCtcdLsKSoxPAI%3D' (2025-03-18)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/f3cd1e0feb994188fe3ad9a5c3ab021ed433b8c8?narHash=sha256-HUtFcF4NLwvu7CAowWgqCHXVkNj0EOc/W6Ism4biV6I%3D' (2025-03-13)
  → 'github:oxalica/rust-overlay/87f0965f9f5b13fca9f38074eee8369dc767550d?narHash=sha256-RB0UEF9IXIgwuuBFC%2Bs9H4rDyvmMZePHlBAK4vRAwf4%3D' (2025-03-18)
• Updated input 'sops-nix':
    'github:Mic92/sops-nix/d016ce0365b87d848a57c12ffcfdc71da7a2b55f?narHash=sha256-ynOgXAyToeE1UdLNfrUn/hL7MN0OpIS2BtNdLjpjPf0%3D' (2025-03-13)
  → 'github:Mic92/sops-nix/787afce414bcce803b605c510b60bf43c11f4b55?narHash=sha256-ptn8dR4Uat3UUadGYNnB7CIH9SQm8mK69D2A/twBUXQ%3D' (2025-03-17)
• Updated input 'stylix':
    'github:danth/stylix/9e3ab4d208e2cc2aef5ab0f8e18932ebf8064fc5?narHash=sha256-ZN5xn3HmG5%2BRWBc3gGdRfkyt98Tc1IhsUK7txwAw46s%3D' (2025-03-12)
  → 'github:danth/stylix/ff9ae322bcaeccabc65812390000276455331123?narHash=sha256-enlpX8hwrfmjv/dHTKWzAB5Cwt1Kr6%2BptikjX3Ob%2BFY%3D' (2025-03-18)
```

```
comparing devShells.x86_64-linux.default:
<<< /nix/store/g5nrqa762qsbx5d1swnzcb71bq8vlmsb-nix-shell.drv
>>> /nix/store/g5nrqa762qsbx5d1swnzcb71bq8vlmsb-nix-shell.drv
No version or selection state changes.
Closure size: 2965 -> 2965 (0 paths added, 0 paths removed, delta +0, disk usage +0B).

comparing nixosConfigurations.artemision.config.system.build.toplevel:
<<< /nix/store/1sl1snwgxpm61y85zyj5w3kjlpkc96wk-nixos-system-artemision-25.05.20250303.1d2fe01.drv
>>> /nix/store/pgi5rcylyclzcav8haf5grl2dacdfcsw-nixos-system-artemision-25.05.20250303.1d2fe01.drv
Version changes:
[C.]  #1  source  <none> x1603 -> <none> x1602
Added packages:
[A.]  #1  nzqa0s9ml7zv2b4g9w9qshmnw2vk8j3k-source  <none>
Removed packages:
[R.]  #1  dconf-db                                 <none>
[R.]  #2  index.theme                              <none>
[R.]  #3  n2hz7xai5jf1dlbwmqxd0pbjxk71ij3m-source  <none>
[R.]  #4  nixos-generated-dconf-keyfiles           <none> x2
[R.]  #5  nixos-generated-dconf-locks              <none>
[R.]  #6  vanilla-dmz                              0.4.5
[R.]  #7  xcursorgen                               1.0.8, 1.0.8.tar.xz
Closure size: 19598 -> 19589 (48 paths added, 57 paths removed, delta -9, disk usage -17.4KiB).

comparing checks.x86_64-linux.pre-commit-check:
<<< /nix/store/61ck5nl3z9y7ykxim6l6cb7qiw77a1ac-pre-commit-run.drv
>>> /nix/store/4idqhk2k4rpz25s5hjr15p79vh5znnv8-pre-commit-run.drv
Added packages:
[A+]  #1  nzqa0s9ml7zv2b4g9w9qshmnw2vk8j3k-source  <none>
Removed packages:
[R-]  #1  n2hz7xai5jf1dlbwmqxd0pbjxk71ij3m-source  <none>
Closure size: 2608 -> 2608 (2 paths added, 2 paths removed, delta +0, disk usage +0B).

comparing nixosConfigurations.palatine-hill.config.system.build.toplevel:
comparison output is empty, please check script logs

comparing formatter.x86_64-linux:
<<< /nix/store/q6sp5kbc7x5qjwsxlbw5p4nf7wisb69f-nixfmt-unstable-2024-12-04.drv
>>> /nix/store/q6sp5kbc7x5qjwsxlbw5p4nf7wisb69f-nixfmt-unstable-2024-12-04.drv
No version or selection state changes.
Closure size: 1311 -> 1311 (0 paths added, 0 paths removed, delta +0, disk usage +0B).

comparing packages.x86_64-linux.lego-latest:
<<< /nix/store/lmqq5aqg4fmxkyffvcsckra4936radrf-lego-4.21.0.drv
>>> /nix/store/lmqq5aqg4fmxkyffvcsckra4936radrf-lego-4.21.0.drv
No version or selection state changes.
Closure size: 940 -> 940 (0 paths added, 0 paths removed, delta +0, disk usage +0B).

```

Auto-generated by [update.yml][1] with the help of
[create-pull-request][2].

[1]: https://nayeonie.com/ahuston-0/nix-dotfiles/src/branch/main/.github/workflows/flake-update.yml
[2]: https://forgejo.stefka.eu/jiriks74/create-pull-request
2025-03-18 21:59:58 -04:00
9b42a703d2 Enable stats statements temporarily on Postgres
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 11m55s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 22m46s
this is due to the below fix failing

https://github.com/NuschtOS/nixos-modules/pull/234
2025-03-18 21:42:33 -04:00
e14a004180 Merge pull request 'feature/waybar' (#15) from feature/waybar into main
Some checks failed
Check flake.lock / Check health of `flake.lock` (push) Successful in 8s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m38s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 9m28s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 17m6s
Update flakes / update_lockfile (push) Failing after 2m31s
2025-03-15 22:43:02 -04:00
544129cef5 pin flake.lock
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 13s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 3m40s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 11m7s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 18m49s
2025-03-15 22:21:02 -04:00
62960bda7c ping nixpkgs before the flickering started on artemision, update stable
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 58s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 3m53s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 13m26s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 21m34s
2025-03-14 08:48:53 -04:00
c0a3734f3b re-enable non-LTS linux
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 18s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m39s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 9m17s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 15m31s
2025-03-13 19:26:47 -04:00
7aded1fb40 comment out invalid hyprlock settings
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 13s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Has been cancelled
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Has been cancelled
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m40s
2025-03-13 19:24:29 -04:00
d825b594f8 add graphics corruption fix
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 4m14s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 14m38s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m46s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 16m20s
https://gitlab.freedesktop.org/drm/amd/-/issues/2075
https://community.frame.work/t/responded-severe-artifacts-and-poor-performance-with-dgpu/46470/21
2025-03-13 18:10:15 -04:00
c30f65c17e switch hypridle over to using nixpkgs path
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 18s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m50s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 9m55s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 16m5s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-13 18:05:15 -04:00
02b8a6bc6c format json/yml/sh 2025-03-13 18:05:15 -04:00
8294dbdd0b add waybar 2025-03-13 18:05:15 -04:00
60d48a2231 Merge pull request 'remove discord from artemision' (#42) from feature/remove-discord into main
All checks were successful
Check flake.lock / Check health of `flake.lock` (push) Successful in 16s
Check Nix formatting / Perform Nix format checks (push) Successful in 3m24s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 8m22s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 21m32s
Update flakes / update_lockfile (push) Successful in 13m5s
2025-03-13 17:29:31 -04:00
d2444c1328 remove discord from artemision
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 25s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 3m23s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 8m30s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 21m43s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-13 09:27:52 -04:00
addc28df9d Merge pull request 'automated: Update flake.lock' (#41) from update-flake-lock into main
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 5m53s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 14m49s
Check flake.lock / Check health of `flake.lock` (push) Successful in 13s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m38s
2025-03-13 09:14:52 -04:00
1c2daa3a1e automated: Update flake.lock
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 26s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 3m22s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 9m29s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 20m39s
- The following Nix Flake inputs were updated:

```
• Updated input 'firefox-addons':
    'gitlab:rycee/nur-expressions/51bc10cdd5c2ea8f2cd5adcc587ba0479409312e?dir=pkgs/firefox-addons&narHash=sha256-1m1krwWuROjou56kuILpYZ3imlOgpW2hPqczObinQwQ%3D' (2025-03-12)
  → 'gitlab:rycee/nur-expressions/e41884886e7798003973f487f37b979ee92f7d99?dir=pkgs/firefox-addons&narHash=sha256-ytHdrfSbbPvla43Ykd61cVkS2JLA8wBEHcnf4yLFP7Y%3D' (2025-03-13)
• Updated input 'nixpkgs':
    'github:nixos/nixpkgs/8c1f3147639f009f09d2bfffc64bcf8485bf3fd2?narHash=sha256-AOazEmkhbKnNQi0LqJdAcqPQx711L84a0Vkaos/ZW/A%3D' (2025-03-12)
  → 'github:nixos/nixpkgs/b1f2198021490b51fb92b8b09db97b9ba2a7b4ce?narHash=sha256-gyA3ngXZroBeWdrVsM%2BbL63hQMUheYCrC%2BV78TEgBeU%3D' (2025-03-13)
• Updated input 'sops-nix':
    'github:Mic92/sops-nix/e653d71e82575a43fe9d228def8eddb73887b866?narHash=sha256-E0RrMykMtEv15V3QhpsFutgoSKhL1JBhidn%2BiZajOyg%3D' (2025-03-10)
  → 'github:Mic92/sops-nix/d016ce0365b87d848a57c12ffcfdc71da7a2b55f?narHash=sha256-ynOgXAyToeE1UdLNfrUn/hL7MN0OpIS2BtNdLjpjPf0%3D' (2025-03-13)
```

```
comparing nixosConfigurations.artemision.config.system.build.toplevel:
<<< /nix/store/5wksndlk5yyv3kqih8r6bsgahzsx781s-nixos-system-artemision-25.05.20250312.8c1f314.drv
>>> /nix/store/7p5lsndslzgpvhp2z7k4jji6q43yjssv-nixos-system-artemision-25.05.20250313.b1f2198.drv
Version changes:
[U.]  #1  candy-icons               0-unstable-2025-02-23 -> 0-unstable-2025-03-10
[U.]  #2  nixos-system-artemision   25.05.20250312.8c1f314 -> 25.05.20250313.b1f2198
[U.]  #3  proton-ge-bin-GE-Proton9  25 -> 26
[U.]  #4  terraform                 1.11.1, 1.11.1-go-modules -> 1.11.2, 1.11.2-go-modules
[U.]  #5  zoom                      6.3.10.7150 -> 6.3.11.7212
Added packages:
[A.]  #1  3wanr4zk2kb5w2aq3q1081jh2cp9gl03-source  <none>
Removed packages:
[R.]  #1  pdys2yp28m5nv7xvvrabdkdplj5qy263-source  <none>
Closure size: 18462 -> 18462 (56 paths added, 56 paths removed, delta +0, disk usage -585.8KiB).

comparing formatter.x86_64-linux:
<<< /nix/store/6mnywnsbyzlwrwmh82h0wnszd3nwz1j1-nixfmt-unstable-2025-03-03.drv
>>> /nix/store/6mnywnsbyzlwrwmh82h0wnszd3nwz1j1-nixfmt-unstable-2025-03-03.drv
No version or selection state changes.
Closure size: 1308 -> 1308 (0 paths added, 0 paths removed, delta +0, disk usage +0B).

comparing checks.x86_64-linux.pre-commit-check:
<<< /nix/store/gkscql5l3rchlrlhj39ql0ybn1jdz08j-pre-commit-run.drv
>>> /nix/store/9c06ydgfsdwl3v07halbq3liiisyry3b-pre-commit-run.drv
Added packages:
[A+]  #1  3wanr4zk2kb5w2aq3q1081jh2cp9gl03-source  <none>
Removed packages:
[R-]  #1  pdys2yp28m5nv7xvvrabdkdplj5qy263-source  <none>
Closure size: 2605 -> 2605 (2 paths added, 2 paths removed, delta +0, disk usage +0B).

comparing nixosConfigurations.palatine-hill.config.system.build.toplevel:
<<< /nix/store/v5r1jcf3ybhz6zh520vxgx6qbzv692lv-nixos-system-palatine-hill-25.05.20250312.8c1f314.drv
>>> /nix/store/qdzqydpvpjwhncpb7bb0szbzs688pa1f-nixos-system-palatine-hill-25.05.20250313.b1f2198.drv
Version changes:
[U.]  #1  nixos-system-palatine-hill  25.05.20250312.8c1f314 -> 25.05.20250313.b1f2198
Added packages:
[A.]  #1  3wanr4zk2kb5w2aq3q1081jh2cp9gl03-source  <none>
Removed packages:
[R.]  #1  pdys2yp28m5nv7xvvrabdkdplj5qy263-source  <none>
Closure size: 8563 -> 8563 (30 paths added, 30 paths removed, delta +0, disk usage -585.8KiB).

comparing packages.x86_64-linux.lego-latest:
<<< /nix/store/1xbdhkbrq07pb8wz1i9ml675s7i7g3qv-lego-4.21.0.drv
>>> /nix/store/1xbdhkbrq07pb8wz1i9ml675s7i7g3qv-lego-4.21.0.drv
No version or selection state changes.
Closure size: 939 -> 939 (0 paths added, 0 paths removed, delta +0, disk usage +0B).

comparing devShells.x86_64-linux.default:
<<< /nix/store/vib2dz70yp62nxlxip8g809x2i978vf8-nix-shell.drv
>>> /nix/store/vib2dz70yp62nxlxip8g809x2i978vf8-nix-shell.drv
No version or selection state changes.
Closure size: 2629 -> 2629 (0 paths added, 0 paths removed, delta +0, disk usage +0B).

```

Auto-generated by [update.yml][1] with the help of
[create-pull-request][2].

[1]: https://nayeonie.com/ahuston-0/nix-dotfiles/src/branch/main/.github/workflows/flake-update.yml
[2]: https://forgejo.stefka.eu/jiriks74/create-pull-request
2025-03-13 12:09:42 +00:00
35ece62b06 automated: Update flake.lock
All checks were successful
Check flake.lock / Check health of `flake.lock` (push) Successful in 9s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m55s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 6m40s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 35m19s
Update flakes / update_lockfile (push) Successful in 12m1s
- The following Nix Flake inputs were updated:

```
• Updated input 'firefox-addons':
    'gitlab:rycee/nur-expressions/093c063a23aa38f31082a554f03899127750aee3?dir=pkgs/firefox-addons&narHash=sha256-YbAnhXYYOjG8OHX7v4BGj/tDQiFgkwe4JsqCjbFYjB0%3D' (2025-03-03)
  → 'gitlab:rycee/nur-expressions/51bc10cdd5c2ea8f2cd5adcc587ba0479409312e?dir=pkgs/firefox-addons&narHash=sha256-1m1krwWuROjou56kuILpYZ3imlOgpW2hPqczObinQwQ%3D' (2025-03-12)
• Updated input 'flake-parts':
    'github:hercules-ci/flake-parts/3876f6b87db82f33775b1ef5ea343986105db764?narHash=sha256-ZaMw0pdoUKigLpv9HiNDH2Pjnosg7NBYMJlHTIsHEUo%3D' (2025-03-01)
  → 'github:hercules-ci/flake-parts/f4330d22f1c5d2ba72d3d22df5597d123fdb60a9?narHash=sha256-%2Bu2UunDA4Cl5Fci3m7S643HzKmIDAe%2BfiXrLqYsR2fs%3D' (2025-03-07)
• Updated input 'flake-parts/nixpkgs-lib':
    '6d37022434.tar.gz?narHash=sha256-3wHafybyRfpUCLoE8M%2BuPVZinImg3xX%2BNm6gEfN3G8I%3D' (2025-03-01)
  → 'github:nix-community/nixpkgs.lib/147dee35aab2193b174e4c0868bd80ead5ce755c?narHash=sha256-oiwv/ZK/2FhGxrCkQkB83i7GnWXPPLzoqFHpDD3uYpk%3D' (2025-03-02)
• Updated input 'home-manager':
    'github:nix-community/home-manager/fcac3d6d88302a5e64f6cb8014ac785e08874c8d?narHash=sha256-AXEgFj3C0YJhu9k1OhbRhiA6FnDr81dQZ65U3DhaWpw%3D' (2025-03-01)
  → 'github:nix-community/home-manager/18780912345970e5b546b1b085385789b6935a83?narHash=sha256-4Y427uj0eql4yRU5rely3EcOlB9q457UDbG9omPtXiA%3D' (2025-03-12)
• Updated input 'hyprland-contrib':
    'github:hyprwm/contrib/6f0d5e16c534aeda47d99b4d20bb2a22bfc60c23?narHash=sha256-iQNkVG0368H3kiwSYSs1N6sU7GhHSmx0b9y%2BZ%2BeO1%2Bc%3D' (2025-03-02)
  → 'github:hyprwm/contrib/e14d9c5e9aea4a84c3677e0a7c73268153b15327?narHash=sha256-SJrLVyoaQUg29fq3nNdRmYrLgiu9dtgcIVqpl8j/Teo%3D' (2025-03-11)
• Updated input 'nix-index-database':
    'github:Mic92/nix-index-database/26a0f969549cf4d56f6e9046b9e0418b3f3b94a5?narHash=sha256-jN6kJ41B6jUVDTebIWeebTvrKP6YiLd1/wMej4uq4Sk%3D' (2025-03-02)
  → 'github:Mic92/nix-index-database/66537fb185462ba9b07f4e6f2d54894a1b2d04ab?narHash=sha256-koZtlJRqi0/MD/AKd0KrXLA2NuBOVzlIyAJprjzpxZE%3D' (2025-03-10)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/009b764ac98a3602d41fc68072eeec5d24fc0e49?narHash=sha256-dMReDQobS3kqoiUCQIYI9c0imPXRZnBubX20yX/G5LE%3D' (2025-02-27)
  → 'github:NixOS/nixos-hardware/e1f12151258b12c567f456d8248e4694e9390613?narHash=sha256-f0BVt1/cvA0DQ/q3rB%2BHY4g4tKksd03ZkzI4xehC2Ew%3D' (2025-03-12)
• Updated input 'nixos-modules':
    'github:SuperSandro2000/nixos-modules/c7c9219eb6ff26c203d22ba733e9e988499290f0?narHash=sha256-2tscHztx6UxqeQTK0U1kLM74%2B6mSzROMNYJpKRDLMPM%3D' (2025-03-03)
  → 'github:SuperSandro2000/nixos-modules/1183c327ba81205158c95d5c40d37af23a10593e?narHash=sha256-04Uw2LyVWcsHiI1iesauJqJPufrRWsggM4TtVmo1b8w%3D' (2025-03-12)
• Updated input 'nixpkgs':
    'github:nixos/nixpkgs/1d2fe0135f360c970aee1d57a53f816f3c9bddae?narHash=sha256-Up7YlXIupmT7fEtC4Oj676M91INg0HAoamiswAsA3rc%3D' (2025-03-03)
  → 'github:nixos/nixpkgs/8c1f3147639f009f09d2bfffc64bcf8485bf3fd2?narHash=sha256-AOazEmkhbKnNQi0LqJdAcqPQx711L84a0Vkaos/ZW/A%3D' (2025-03-12)
• Updated input 'pre-commit-hooks':
    'github:cachix/git-hooks.nix/42b1ba089d2034d910566bf6b40830af6b8ec732?narHash=sha256-JvQvtaphZNmeeV%2BIpHgNdiNePsIpHD5U/7QN5AeY44A%3D' (2025-03-02)
  → 'github:cachix/git-hooks.nix/b5a62751225b2f62ff3147d0a334055ebadcd5cc?narHash=sha256-srpAbmJapkaqGRE3ytf3bj4XshspVR5964OX5LfjDWc%3D' (2025-03-07)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/20fdb02098fdda9a25a2939b975abdd7bc03f62d?narHash=sha256-BajboqzFnDhxVT0SXTDKVJCKtFP96lZXccBlT/43mao%3D' (2025-03-03)
  → 'github:oxalica/rust-overlay/f3cd1e0feb994188fe3ad9a5c3ab021ed433b8c8?narHash=sha256-HUtFcF4NLwvu7CAowWgqCHXVkNj0EOc/W6Ism4biV6I%3D' (2025-03-13)
• Updated input 'sops-nix':
    'github:Mic92/sops-nix/07af005bb7d60c7f118d9d9f5530485da5d1e975?narHash=sha256-7JAGezJ0Dn5qIyA2%2BT4Dt/xQgAbhCglh6lzCekTVMeU%3D' (2025-02-11)
  → 'github:Mic92/sops-nix/e653d71e82575a43fe9d228def8eddb73887b866?narHash=sha256-E0RrMykMtEv15V3QhpsFutgoSKhL1JBhidn%2BiZajOyg%3D' (2025-03-10)
• Updated input 'stylix':
    'github:danth/stylix/489833b201a84488c6b4371a261fdbcafa6abcb6?narHash=sha256-UtSKsLCWwA4wPFm7mgl33qeu8sj0on9Hyt3YhDWWkAM%3D' (2025-03-02)
  → 'github:danth/stylix/9e3ab4d208e2cc2aef5ab0f8e18932ebf8064fc5?narHash=sha256-ZN5xn3HmG5%2BRWBc3gGdRfkyt98Tc1IhsUK7txwAw46s%3D' (2025-03-12)
• Updated input 'stylix/firefox-gnome-theme':
    'github:rafaelmardojai/firefox-gnome-theme/a89108e6272426f4eddd93ba17d0ea101c34fb21?narHash=sha256-vAxN2f3rvl5q62gQQjZGVSvF93nAsOxntuFz%2Be/655w%3D' (2025-02-10)
  → 'github:rafaelmardojai/firefox-gnome-theme/5a81d390bb64afd4e81221749ec4bffcbeb5fa80?narHash=sha256-RsvHGNTmO2e/eVfgYK7g%2BeYEdwwh7SbZa%2BgZkT24MEA%3D' (2025-03-10)
• Updated input 'stylix/git-hooks':
    'github:cachix/git-hooks.nix/9364dc02281ce2d37a1f55b6e51f7c0f65a75f17?narHash=sha256-R10v2hoJRLq8jcL4syVFag7nIGE7m13qO48wRIukWNg%3D' (2025-01-21)
  → 'github:cachix/git-hooks.nix/b5a62751225b2f62ff3147d0a334055ebadcd5cc?narHash=sha256-srpAbmJapkaqGRE3ytf3bj4XshspVR5964OX5LfjDWc%3D' (2025-03-07)
• Updated input 'stylix/nur':
    'github:nix-community/NUR/496a4a11162bdffb9a7b258942de138873f019f7?narHash=sha256-2xECnhgF3MU9YjmvOkrRp8wRFo2OjjewgCtlfckhL5s%3D' (2025-02-24)
  → 'github:nix-community/NUR/5479646b2574837f1899da78bdf9a48b75a9fb27?narHash=sha256-emkxnsZstiJWmGACimyAYqIKz2Qz5We5h1oBVDyQjLw%3D' (2025-03-11)
• Updated input 'stylix/tinted-schemes':
    'github:tinted-theming/schemes/a1bc2bd89e693e7e3f5764cfe8114e2ae150e184?narHash=sha256-Hdk850xgAd3DL8KX0AbyU7tC834d3Lej1jOo3duWiOA%3D' (2025-02-23)
  → 'github:tinted-theming/schemes/47c8c7726e98069cade5827e5fb2bfee02ce6991?narHash=sha256-YKM1RJbL68Yp2vESBqeZQBjTETXo8mCTTzLZyckCfZk%3D' (2025-03-08)
• Updated input 'stylix/tinted-tmux':
    'github:tinted-theming/tinted-tmux/b6c7f46c8718cc484f2db8b485b06e2a98304cd0?narHash=sha256-/etfUV3HzAaLW3RSJVwUaW8ULbMn3v6wbTlXSKbcoWQ%3D' (2025-02-23)
  → 'github:tinted-theming/tinted-tmux/d48ee86394cbe45b112ba23ab63e33656090edb4?narHash=sha256-zWcCXgdC4/owfH/eEXx26y5BLzTrefjtSLFHWVD5KxU%3D' (2025-03-02)
```

```

```

Auto-generated by [update.yml][1] with the help of
[create-pull-request][2].

[1]: https://nayeonie.com/ahuston-0/nix-dotfiles/src/branch/main/.github/workflows/flake-update.yml
[2]: https://forgejo.stefka.eu/jiriks74/create-pull-request
2025-03-13 00:47:04 -04:00
038f76e99a Merge pull request 'fix missing dollar sign' (#40) from feature/remove-cache into main
Some checks failed
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Has been cancelled
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Has been cancelled
Check flake.lock / Check health of `flake.lock` (push) Successful in 23s
Check Nix formatting / Perform Nix format checks (push) Successful in 4m6s
2025-03-12 23:54:41 -04:00
81f97740f4 fix missing dollar sign
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 1m40s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Has been cancelled
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Has been cancelled
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 7m4s
2025-03-12 23:51:56 -04:00
d8d5a6dff9 update to github-file-reader-action-v2
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 13s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Has been cancelled
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Has been cancelled
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Has been cancelled
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Has been cancelled
Check flake.lock / Check health of `flake.lock` (push) Successful in 16s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m38s
Check Nix formatting / Perform Nix format checks (push) Successful in 3m3s
2025-03-12 23:30:36 -04:00
178705ef8c Merge pull request 'feature/remove-cache' (#38) from feature/remove-cache into main
All checks were successful
Check flake.lock / Check health of `flake.lock` (push) Successful in 9s
Check Nix formatting / Perform Nix format checks (push) Successful in 3m2s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 8m48s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 15m17s
2025-03-12 23:12:32 -04:00
ca607d235a remove createPullRequest
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-12 23:12:32 -04:00
859e31c290 heh get rid of that thank you 2025-03-12 23:12:32 -04:00
49bca82803 replace file reader
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-12 23:12:32 -04:00
ce32c3ed30 Merge pull request 'Remove build cache from gitea actions' (#37) from feature/remove-cache into main
All checks were successful
Check flake.lock / Check health of `flake.lock` (push) Successful in 9s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m41s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 8m49s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 15m55s
2025-03-12 21:24:53 -04:00
96f4f72ff0 add UWSM to hyprland
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 12s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m41s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 10m2s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 14m3s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-11 13:15:11 -04:00
5b1ff49a54 mount /nix in act runner by default
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 10s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m34s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 8m2s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 14m14s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-11 00:08:51 -04:00
0b4c86104d Revert "add build cache action"
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 21s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 3m0s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 9m26s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Has been cancelled
This reverts commit d53981c94b.
2025-03-10 23:57:20 -04:00
d8d84102ea Revert "remove dependencies for cache"
This reverts commit dcd8b60085.
2025-03-10 23:57:20 -04:00
0761442b77 Revert "fix os matrix?"
This reverts commit 2a0fe0b106.
2025-03-10 23:57:20 -04:00
ed44ba20d9 Revert "reorder oops"
This reverts commit 050b4c9b2f.
2025-03-10 23:57:20 -04:00
81fc9dfb75 Revert "add token to cache-merge"
This reverts commit ea16a83c2e.
2025-03-10 23:57:20 -04:00
588d9fe2c7 Revert "add token to cache-merge"
This reverts commit fd826be6da.
2025-03-10 23:57:20 -04:00
511335fda3 Revert "add sqlite for restores"
This reverts commit 474184baa7.
2025-03-10 23:57:20 -04:00
ff1da9803e add sqlite for restores
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-10 23:57:20 -04:00
ffa24818de Merge pull request 'feature/build-cache' (#36) from feature/build-cache into main
Some checks failed
Nix CI / Check a `common` cache is restored correctly (ubuntu-latest) (push) Has been skipped
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Failing after 1m26s
Check flake.lock / Check health of `flake.lock` (push) Successful in 9s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m19s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 5m47s
Update flakes / update_lockfile (push) Failing after 2m0s
Nix CI / Merge similar caches (ubuntu-latest) (push) Failing after 35s
2025-03-10 10:20:28 -04:00
7dec8a2034 add token to cache-merge
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 19s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m38s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 8m30s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 21m14s
2025-03-10 09:50:40 -04:00
2aeb416468 add token to cache-merge 2025-03-10 09:50:40 -04:00
4b263206dd Merge pull request 'feature/build-cache' (#35) from feature/build-cache into main
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 8m41s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 1h40m13s
Check flake.lock / Check health of `flake.lock` (push) Successful in 15s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m35s
Nix CI / Merge similar caches (ubuntu-latest) (push) Failing after 41s
Nix CI / Check a `common` cache is restored correctly (ubuntu-latest) (push) Has been skipped
Update flakes / update_lockfile (push) Failing after 9m54s
2025-03-10 01:24:01 -04:00
3cfdf94428 reorder oops 2025-03-10 01:24:01 -04:00
3bf4740ad3 remove cache max limit 2025-03-10 01:24:01 -04:00
b0d38221a3 Merge pull request 'fix os matrix?' (#34) from feature/build-cache into main
Some checks failed
Check flake.lock / Check health of `flake.lock` (push) Has been cancelled
Check Nix formatting / Perform Nix format checks (push) Has been cancelled
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 10m11s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 26m32s
Nix CI / Merge similar caches (ubuntu-latest) (push) Failing after 37s
Nix CI / Check a `common` cache is restored correctly (ubuntu-latest) (push) Has been skipped
2025-03-10 00:49:30 -04:00
5d0f7f91d3 fix os matrix?
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Has been cancelled
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Has been cancelled
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 13s
Check Nix formatting / Perform Nix format checks (pull_request) Has been cancelled
2025-03-10 00:49:19 -04:00
297479380a Merge pull request 'feature/build-cache' (#33) from feature/build-cache into main
Some checks failed
Check Nix formatting / Perform Nix format checks (push) Has been cancelled
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Has been cancelled
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Has been cancelled
Nix CI / Merge similar caches ([ubuntu-latest]) (push) Waiting to run
Nix CI / Check a `common` cache is restored correctly ([ubuntu-latest]) (push) Blocked by required conditions
Check flake.lock / Check health of `flake.lock` (push) Successful in 14s
2025-03-10 00:46:02 -04:00
dcd8b60085 remove dependencies for cache
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 11s
Check Nix formatting / Perform Nix format checks (pull_request) Has been cancelled
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Has been cancelled
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Has been cancelled
2025-03-10 00:44:03 -04:00
d53981c94b add build cache action
Some checks failed
Nix CI / Merge similar caches ([ubuntu-latest]) (pull_request) Has been cancelled
Nix CI / Check a `common` cache is restored correctly ([ubuntu-latest]) (pull_request) Has been cancelled
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Has been cancelled
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Has been cancelled
Check Nix formatting / Perform Nix format checks (pull_request) Has been cancelled
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 18s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-10 00:43:03 -04:00
97fad34d4d Merge pull request 'fix output to file' (#32) from feature/flake-eval into main
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 9m20s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 25m37s
Update flakes / createPullRequest (push) Failing after 1m5s
Check flake.lock / Check health of `flake.lock` (push) Successful in 18s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m34s
Update flakes / update_lockfile (push) Successful in 11m25s
2025-03-08 15:22:37 -05:00
8d01d66c5e fix output to file 2025-03-08 15:22:37 -05:00
d06a0edad4 Merge pull request 'move to new flake eval scripts' (#31) from feature/flake-eval into main
Some checks failed
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Has been cancelled
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Has been cancelled
Check Nix formatting / Perform Nix format checks (push) Successful in 3m3s
Check flake.lock / Check health of `flake.lock` (push) Successful in 21s
2025-03-08 14:52:34 -05:00
6e00ab2d85 move to new flake eval scripts
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 12s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Has been cancelled
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Has been cancelled
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m48s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-08 14:47:09 -05:00
d94d40a764 change CPR fork used
Some checks failed
Update flakes / createPullRequest (push) Failing after 1m51s
Update flakes / update_lockfile (push) Successful in 3m45s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 11s
Check flake.lock / Check health of `flake.lock` (push) Successful in 14s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m57s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m59s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 8m34s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 9m42s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 22m52s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 22m30s
2025-03-04 08:37:58 -05:00
d70aaa3952 expand docker network pool on palatine-hill
Some checks failed
Check flake.lock / Check health of `flake.lock` (push) Successful in 15s
Check Nix formatting / Perform Nix format checks (push) Successful in 3m23s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 9m17s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 16m34s
Update flakes / createPullRequest (push) Successful in 11m33s
Update flakes / update_lockfile (push) Failing after 3m8s
2025-03-04 01:48:46 -05:00
495605294d add continue-on-error to attic push
Some checks failed
Check flake.lock / Check health of `flake.lock` (push) Waiting to run
Check Nix formatting / Perform Nix format checks (push) Waiting to run
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Has been cancelled
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Has been cancelled
2025-03-04 01:48:39 -05:00
6d2c993a96 fix collabora secrets 2025-03-04 01:48:39 -05:00
c71a464b76 add build checks to flake-health-checks 2025-03-04 01:48:39 -05:00
39ab461de5 add format.signoff to git config, fix git-gone
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-04 01:48:39 -05:00
66febb81f6 remove redundant sops reference for non-existant service
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 5m42s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 20s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m54s
Check Nix formatting / Perform Nix format checks (push) Waiting to run
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Has been cancelled
Check flake.lock / Check health of `flake.lock` (push) Has been cancelled
2025-03-04 01:21:28 -05:00
a06ff919c4 remove misc zoom program
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m4s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 14s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m44s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-04 01:14:32 -05:00
172ee58b04 stylix with hyprland wallpaper
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-04 01:14:32 -05:00
994ea667b2 remove hydrajobs to fix IFD 2025-03-04 01:14:31 -05:00
46d4dc414c re-add stylix 2025-03-04 01:14:31 -05:00
64f28b82d2 add stylix to artemision config 2025-03-04 01:14:31 -05:00
3ac21fe70e add stylix
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-04 01:14:31 -05:00
2ae918ca42 add build data
All checks were successful
Check flake.lock / Check health of `flake.lock` (push) Successful in 13s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m48s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 8m28s
2025-03-03 17:35:43 -05:00
8cb4a4e940 bump emacs version
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 8s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m15s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m15s
Check flake.lock / Check health of `flake.lock` (push) Successful in 9s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m27s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 8m1s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-03 12:51:25 -05:00
02b70947cb automated: Update flake.lock
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 25s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m45s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Failing after 3m49s
- The following Nix Flake inputs were updated:

```
• Updated input 'firefox-addons':
    'gitlab:rycee/nur-expressions/1e46c2a53468ce23870a510123f5c4b4702f16b1?dir=pkgs/firefox-addons&narHash=sha256-1MU1oKjUuClivWTvJRIdWphLRoY8EByHgt2nr4IpwtA%3D' (2025-03-02)
  → 'gitlab:rycee/nur-expressions/093c063a23aa38f31082a554f03899127750aee3?dir=pkgs/firefox-addons&narHash=sha256-YbAnhXYYOjG8OHX7v4BGj/tDQiFgkwe4JsqCjbFYjB0%3D' (2025-03-03)
• Updated input 'hyprland-contrib':
    'github:hyprwm/contrib/3ecd35a13957021f2f37fd3b2702e241e1c56f61?narHash=sha256-/WoFPPdhciTcv2xS4Eo/7Uhh85LRia2V9h6Crecc1eM%3D' (2025-03-01)
  → 'github:hyprwm/contrib/6f0d5e16c534aeda47d99b4d20bb2a22bfc60c23?narHash=sha256-iQNkVG0368H3kiwSYSs1N6sU7GhHSmx0b9y%2BZ%2BeO1%2Bc%3D' (2025-03-02)
• Updated input 'nixos-generators':
    'github:nix-community/nixos-generators/d002ce9b6e7eb467cd1c6bb9aef9c35d191b5453?narHash=sha256-3Pe0yKlCc7EOeq1X/aJVDH0CtNL%2BtIBm49vpepwL1MQ%3D' (2025-01-16)
  → 'github:nix-community/nixos-generators/507911df8c35939050ae324caccc7cf4ffb76565?narHash=sha256-Co2kAD2SZalOm%2B5zoxmzEVZNvZ17TyafuFsD46BwSdY%3D' (2025-03-02)
• Updated input 'nixos-modules':
    'github:SuperSandro2000/nixos-modules/732ffa8e01e911428db96ff978d1e3876f649ef3?narHash=sha256-2zwtSnCI8QZfIOFOpjJ5w2bslQ5r/GYXZ1Pi7fMdrOo%3D' (2025-02-26)
  → 'github:SuperSandro2000/nixos-modules/c7c9219eb6ff26c203d22ba733e9e988499290f0?narHash=sha256-2tscHztx6UxqeQTK0U1kLM74%2B6mSzROMNYJpKRDLMPM%3D' (2025-03-03)
• Updated input 'nixpkgs':
    'github:nixos/nixpkgs/e9b0ff70ddc61c42548501b0fafb86bb49cca858?narHash=sha256-bYeI3FEs824X%2BMJYksKboNlmglehzplqzn%2BXvcojWMc%3D' (2025-03-01)
  → 'github:nixos/nixpkgs/1d2fe0135f360c970aee1d57a53f816f3c9bddae?narHash=sha256-Up7YlXIupmT7fEtC4Oj676M91INg0HAoamiswAsA3rc%3D' (2025-03-03)
• Updated input 'pre-commit-hooks':
    'github:cachix/git-hooks.nix/25d4946dfc2021584f5bde1fbd2aa97353384a95?narHash=sha256-LWDIJvKWMW0tiih1jTcAK0ncTi3S9IF3gOhpCT1ydik%3D' (2025-03-01)
  → 'github:cachix/git-hooks.nix/42b1ba089d2034d910566bf6b40830af6b8ec732?narHash=sha256-JvQvtaphZNmeeV%2BIpHgNdiNePsIpHD5U/7QN5AeY44A%3D' (2025-03-02)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/f4d5a693c18b389f0d58f55b6f7be6ef85af186f?narHash=sha256-VC%2B8GxWK4p08jjIbmsNfeFQajW2lsiOR/XQiOOvqgvs%3D' (2025-03-02)
  → 'github:oxalica/rust-overlay/20fdb02098fdda9a25a2939b975abdd7bc03f62d?narHash=sha256-BajboqzFnDhxVT0SXTDKVJCKtFP96lZXccBlT/43mao%3D' (2025-03-03)
```

Auto-generated by [update.yml][1] with the help of
[create-pull-request][2].

[1]: https://forgejo.stefka.eu/jiriks74/nix.nvim/src/branch/main/.github/workflows/update.yml
[2]: https://forgejo.stefka.eu/jiriks74/create-pull-request
2025-03-03 17:43:37 +00:00
eb6ff4adbc port fix
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 21s
Check flake.lock / Check health of `flake.lock` (push) Successful in 9s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m46s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m47s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 7m1s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 6m49s
2025-03-03 12:35:54 -05:00
ece3ede00f update flake lock action
Some checks are pending
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Waiting to run
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 17s
Check flake.lock / Check health of `flake.lock` (push) Successful in 10s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m37s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m33s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m15s
2025-03-03 12:31:26 -05:00
6ab1d1a3c6 remove keep-hydra
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 10s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m18s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m52s
Check flake.lock / Check health of `flake.lock` (push) Successful in 9s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m51s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 5m50s
2025-03-03 11:58:21 -05:00
96219eb175 remove port from 1 2025-03-03 11:44:13 -05:00
583071899f more runners 2025-03-03 11:35:05 -05:00
c2dfd86e59 fix evals
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 12s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m34s
Check flake.lock / Check health of `flake.lock` (push) Successful in 13s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m28s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 7m6s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m55s
2025-03-03 11:32:00 -05:00
2840665f21 remove limit on ref
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 6s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m13s
Check flake.lock / Check health of `flake.lock` (push) Successful in 7s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m14s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m1s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Has been cancelled
2025-03-03 11:25:12 -05:00
9630a1cee1 integrate flake-update-diff 2025-03-03 11:24:28 -05:00
fd7a8204c3 flake.lock: Update
All checks were successful
Check flake.lock / Check health of `flake.lock` (push) Successful in 9s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m34s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 6m48s
Flake lock file updates:

• Updated input 'firefox-addons':
    'gitlab:rycee/nur-expressions/9a8a0914000e4453c99a4c12e9862a0a40075851?dir=pkgs/firefox-addons' (2025-02-22)
  → 'gitlab:rycee/nur-expressions/1e46c2a53468ce23870a510123f5c4b4702f16b1?dir=pkgs/firefox-addons' (2025-03-02)
• Updated input 'flake-parts':
    'github:hercules-ci/flake-parts/32ea77a06711b758da0ad9bd6a844c5740a87abd' (2025-02-01)
  → 'github:hercules-ci/flake-parts/3876f6b87db82f33775b1ef5ea343986105db764' (2025-03-01)
• Updated input 'flake-parts/nixpkgs-lib':
    '072a6db25e.tar.gz?narHash=sha256-vJzFZGaCpnmo7I6i416HaBLpC%2BhvcURh/BQwROcGIp8%3D' (2025-02-01)
  → '6d37022434.tar.gz?narHash=sha256-3wHafybyRfpUCLoE8M%2BuPVZinImg3xX%2BNm6gEfN3G8I%3D' (2025-03-01)
• Updated input 'home-manager':
    'github:nix-community/home-manager/b8869e4ead721bbd4f0d6b927e8395705d4f16e6' (2025-02-27)
  → 'github:nix-community/home-manager/fcac3d6d88302a5e64f6cb8014ac785e08874c8d' (2025-03-01)
• Updated input 'hyprland-contrib':
    'github:hyprwm/contrib/59178a657b7e09ddf82b9e79681f482b6c2f378b' (2025-02-13)
  → 'github:hyprwm/contrib/3ecd35a13957021f2f37fd3b2702e241e1c56f61' (2025-03-01)
• Updated input 'nix-index-database':
    'github:Mic92/nix-index-database/465792533d03e6bb9dc849d58ab9d5e31fac9023' (2025-02-23)
  → 'github:Mic92/nix-index-database/26a0f969549cf4d56f6e9046b9e0418b3f3b94a5' (2025-03-02)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/d58f642ddb23320965b27beb0beba7236e9117b5' (2025-02-24)
  → 'github:NixOS/nixos-hardware/009b764ac98a3602d41fc68072eeec5d24fc0e49' (2025-02-27)
• Updated input 'nixpkgs':
    'github:nixos/nixpkgs/b89a821293c3872992137114d0db9a791243a41b' (2025-02-26)
  → 'github:nixos/nixpkgs/e9b0ff70ddc61c42548501b0fafb86bb49cca858' (2025-03-01)
• Updated input 'pre-commit-hooks':
    'github:cachix/git-hooks.nix/9364dc02281ce2d37a1f55b6e51f7c0f65a75f17' (2025-01-21)
  → 'github:cachix/git-hooks.nix/25d4946dfc2021584f5bde1fbd2aa97353384a95' (2025-03-01)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/d342e8b5fd88421ff982f383c853f0fc78a847ab' (2025-02-27)
  → 'github:oxalica/rust-overlay/f4d5a693c18b389f0d58f55b6f7be6ef85af186f' (2025-03-02)
2025-03-03 11:13:13 -05:00
59aaa7c8dc remove spotifyd
All checks were successful
Check flake.lock / Check health of `flake.lock` (push) Successful in 6s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m13s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 7m20s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-03 08:24:28 -05:00
0246c3030c git gone
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m2s
Check flake.lock / Check health of `flake.lock` (push) Waiting to run
Check Nix formatting / Perform Nix format checks (push) Waiting to run
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Has been cancelled
2025-03-02 20:33:44 -05:00
019263513d bump statix nix version
Some checks failed
Check flake.lock / Check health of `flake.lock` (push) Successful in 8s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m16s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 6m8s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 7s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m36s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m19s
Update flakes / createPullRequest (push) Failing after 5m49s
2025-03-02 20:20:02 -05:00
73406a8be3 final fix for collabora
All checks were successful
Check flake.lock / Check health of `flake.lock` (push) Successful in 11s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m30s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 6m52s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 6s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m11s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m7s
2025-03-02 19:53:42 -05:00
1f09a69856 fix string
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 9s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m18s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m7s
2025-03-02 18:20:48 -05:00
47d09c399e add server_name
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 9s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m36s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Failing after 4m18s
2025-03-02 18:19:46 -05:00
8afdc53a88 priv
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 8s
Check Nix formatting / Perform Nix format checks (pull_request) Failing after 1m12s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Failing after 1m21s
2025-03-02 18:01:29 -05:00
37a5856d40 aliasgroup expansion
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 11s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m23s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Failing after 5m43s
2025-03-02 17:57:13 -05:00
2501ca380c switch collabora to ssl termination
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 11s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m33s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m58s
2025-03-02 17:49:00 -05:00
372cf629ab add collabora firewall, gitea dependencies
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 10s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m26s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m46s
2025-03-02 17:33:07 -05:00
fc68e0fb59 fix nextcloud image
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 19s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m35s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Failing after 21m53s
2025-03-02 17:22:34 -05:00
7c2798228b add collabora, add hydraJobs back in
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 7s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m39s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Failing after 4m30s
2025-03-02 17:15:15 -05:00
bd7826071c update flake lock
Some checks failed
Check flake.lock / Check health of `flake.lock` (push) Successful in 8s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m28s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Failing after 6m0s
Update flakes / createPullRequest (push) Failing after 6m19s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-02-27 01:16:50 -05:00
b5f47c5638 move action cache to nayeonie.com
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 10s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m25s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m51s
Check flake.lock / Check health of `flake.lock` (push) Successful in 8s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Has been cancelled
Check Nix formatting / Perform Nix format checks (push) Has been cancelled
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-02-27 01:01:13 -05:00
1a553c8591 migrate lego to dnsimple
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-02-27 01:00:58 -05:00
6588d3fd0a lego
Some checks failed
Check flake.lock / Check health of `flake.lock` (push) Successful in 14s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m34s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Failing after 6m27s
Update flakes / createPullRequest (push) Failing after 7m10s
2025-02-14 01:15:15 -05:00
6a6eddb517 move minio and attic to nayeonie.com
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 21s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m37s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Failing after 11m13s
Check flake.lock / Check health of `flake.lock` (push) Successful in 18s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m48s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Failing after 11m35s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-02-13 23:57:16 -05:00
e2931be9af reduce attic to 500MB
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 10s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m30s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Failing after 14m18s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-02-02 14:03:23 -05:00
0bae399d47 increase NAR limit to 800MB
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 29s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m47s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Failing after 14m25s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-02-01 14:52:11 -05:00
8414f2da2a pin kernel
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-02-01 14:51:34 -05:00
cb91b05622 flake update
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 22s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 3m1s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 12m1s
Check flake.lock / Check health of `flake.lock` (push) Successful in 10s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m29s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 7m38s
Update flakes / createPullRequest (push) Failing after 11m14s
2025-01-30 14:09:47 -05:00
a1c331eb1f update flake lock, remove defunct plocate option, fix swap
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 10s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m26s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 7m52s
Check flake.lock / Check health of `flake.lock` (push) Successful in 10s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m26s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 7m13s
Update flakes / createPullRequest (push) Failing after 13m6s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 13:38:47 -05:00
1a0e9ed16b comment out ports
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 20s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m25s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 7m9s
Check flake.lock / Check health of `flake.lock` (push) Successful in 16s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m49s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 7m12s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 13:11:17 -05:00
70cbb2fdee add more action runners
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 7m11s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 7s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m18s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 12:43:05 -05:00
b794dbda7b increase batch size
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 17m33s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 7s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m19s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 12:27:30 -05:00
9263ddff59 fix attic array
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Has been cancelled
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 8s
Check Nix formatting / Perform Nix format checks (pull_request) Has been cancelled
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 12:19:08 -05:00
c7411635f7 add optional attic push
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Failing after 5m57s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 8s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m23s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 12:00:51 -05:00
400986b2e3 more cf
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m47s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 7s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m14s
2025-01-26 11:14:41 -05:00
bdc8c56d60 ugh
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m57s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 7s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m16s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 01:09:04 -05:00
aea6a9ed51 idk
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 5m51s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 7s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m26s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 01:05:55 -05:00
9e86dd5078 remove attic input
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 5m50s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 6s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m23s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 01:01:08 -05:00
edc355bde3 rotate
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 7m30s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 7s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m13s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 01:00:20 -05:00
2daa9fbc44 fix timeout
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m2s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 6s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m20s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 00:53:58 -05:00
de9ca058b6 oops disable rlcraft
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 5m53s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 7s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m15s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 00:46:53 -05:00
26d006991f add minecraft secrets
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 6m0s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 8s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m13s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 00:44:43 -05:00
5d86042624 add minecraft
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 7m12s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 16s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m20s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 00:39:51 -05:00
8d3ff73fdc fix api endpoint
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Failing after 7m7s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 7s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m20s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-26 00:27:09 -05:00
18e7779880 remove attic import
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 5m36s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 6s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m26s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-25 23:34:56 -05:00
eaf77103f2 add attic tokens
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Failing after 7m9s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 13s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m19s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-25 23:17:41 -05:00
9f4cca6f07 add attic back in
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-25 23:17:18 -05:00
f91129a848 attic firewall
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-25 23:06:20 -05:00
330abb3b7e accept cli args for attic token
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-25 22:37:10 -05:00
ac7806abe6 fix mode on attic token
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-25 22:32:19 -05:00
9de9cdeab3 add attic action, attic token script
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-25 22:31:01 -05:00
32190dec68 act cache ports
All checks were successful
Check flake.lock / Check health of `flake.lock` (push) Successful in 29s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m23s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 4m16s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-01-25 21:24:27 -05:00
f2397a0bac update flake lock, remove xboxdrv, format zsh.nix
Some checks failed
Check flake.lock / Check health of `flake.lock` (push) Successful in 18s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m1s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Failing after 1h2m9s
Update flakes / createPullRequest (push) Has started running
2025-01-25 18:15:18 -05:00
9948121e9c add pipewire utilities, file
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Failing after 5m37s
Check flake.lock / Check health of `flake.lock` (push) Failing after 40s
Check Nix formatting / Perform Nix format checks (push) Failing after 5m31s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-26 02:42:56 -05:00
13d95daaac add chromium to palatine-hill
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 2h39m16s
Check flake.lock / Check health of `flake.lock` (push) Successful in 9m25s
Check Nix formatting / Perform Nix format checks (push) Successful in 22m3s
Update flakes / createPullRequest (push) Failing after 2h40m12s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-18 23:29:59 -05:00
f7a8ea40df add chromedriver
Some checks failed
Check flake.lock / Check health of `flake.lock` (push) Waiting to run
Check Nix formatting / Perform Nix format checks (push) Waiting to run
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Has been cancelled
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-18 23:13:35 -05:00
b6bb9091f0 add sqlite
All checks were successful
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 2h39m18s
Check flake.lock / Check health of `flake.lock` (push) Successful in 9m27s
Check Nix formatting / Perform Nix format checks (push) Successful in 22m7s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-15 22:12:41 -05:00
edd5d27b21 temp disable archive team, add obsidian
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Failing after 5m35s
Check flake.lock / Check health of `flake.lock` (push) Successful in 9m42s
Check Nix formatting / Perform Nix format checks (push) Failing after 5m34s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-14 16:00:57 -05:00
05a2db4d39 add chromium, add yt-dlp
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Failing after 5m42s
Check flake.lock / Check health of `flake.lock` (push) Successful in 9m38s
Check Nix formatting / Perform Nix format checks (push) Failing after 5m44s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-08 23:16:23 -05:00
7de337ca58 finalize nayeonie.com ACME
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Failing after 5m55s
Check flake.lock / Check health of `flake.lock` (push) Successful in 9m43s
Check Nix formatting / Perform Nix format checks (push) Failing after 5m37s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-05 00:03:59 -05:00
59a7ce9fb4 default CA
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-04 21:39:24 -05:00
b929b406f3 oops fix quotes
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-04 21:37:53 -05:00
1206ad794a full path
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-04 21:36:35 -05:00
6f5f060ccb experimenting with custom lego bin again
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-04 21:33:01 -05:00
1b562a4092 disable cname lego
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-04 20:43:33 -05:00
ff7009722b remove custom acme binary
Some checks are pending
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Waiting to run
Check flake.lock / Check health of `flake.lock` (push) Waiting to run
Check Nix formatting / Perform Nix format checks (push) Waiting to run
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-04 19:28:56 -05:00
5a0593e92a fix default pull location
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-04 19:16:53 -05:00
d9a3d31b5b artemsion: samba, flakpak, palatine-hill: act-runner, samba, nextcloud
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Waiting to run
Check flake.lock / Check health of `flake.lock` (push) Waiting to run
Check Nix formatting / Perform Nix format checks (push) Waiting to run
Update flakes / createPullRequest (push) Failing after 3h11m57s
- adds happy 17th AO3 skin
- removes zen kernel from artemision
- adds flatpak to artemision
- adds samba client to artemision
- add samba import for palatine-hill
- fix formatting on act-runner
- fix nextcloud pre-generation script to use new image scheme

Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-04 18:56:39 -05:00
c8432ed61b add samba to palatine-hill
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-04 18:54:56 -05:00
24f792cfd5 haproxy compat for acme, add go major mode to doom
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-12-01 00:56:29 -05:00
c18e54fcdd gitea over ssh is working, https in progress
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Failing after 6m50s
Check flake.lock / Check health of `flake.lock` (push) Successful in 9m43s
Check Nix formatting / Perform Nix format checks (push) Failing after 5m36s
Update flakes / createPullRequest (push) Failing after 3h13m22s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-11-30 00:30:57 -05:00
8280d40eae migrate hyprland shadow config
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-11-29 17:55:47 -05:00
cc9300e523 flake updates
- remove deleted nixpkgs-stable pin for sops-nix
- remove kernel pin in global modules (defaults to LTS now)
- migrate nerdfonts to new pkgs.nerd-fonts namespace
- disable calibre-server on palatine-hill (for now)
- add SSH_PORT to gitea

Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-11-29 15:05:11 -05:00
e5ec8286d1 Merge branch 'main' into merge/docker
Some checks are pending
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Waiting to run
Check flake.lock / Check health of `flake.lock` (push) Waiting to run
Check Nix formatting / Perform Nix format checks (push) Waiting to run
2024-11-28 13:58:26 -05:00
82419348bd add capSysNice to Steam
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-11-28 13:16:45 -05:00
dde547c4cf more archiveteam and qbit changes
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-11-28 13:15:39 -05:00
ecbb096d07 artemision changes
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-11-28 13:15:28 -05:00
15abc35783 add wifi and vpn
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-11-28 13:14:20 -05:00
8598ddc1bf replace watchtower with custom script 2024-11-17 22:15:39 -05:00
7c6dfdad80 add new archiveteam containers 2024-11-17 21:08:33 -05:00
07af7d2cc2 add loki base 2024-11-16 21:55:50 -05:00
9d8164f28d update docker configs, upgrade postgres
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-11-02 23:59:38 -04:00
8de5a168ba remove attic watch for now 2024-10-26 15:51:06 -04:00
5b5d7cb305 add firewall oops 2024-10-26 15:51:05 -04:00
a2581fd84b add firewall for docker 2024-10-26 15:51:05 -04:00
bf854d315a disable registration on gitea
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-26 15:51:05 -04:00
dde3eab15b firewall issues on gitea
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-26 15:51:05 -04:00
f5479342a8 disable gitea createDatabase, fix nix gc
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-26 15:51:05 -04:00
ebd2756d3e add home-manager nix gc
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-26 15:51:05 -04:00
25449ac661 rename gitea, fix db
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-26 15:51:05 -04:00
ebcbdece4f remove sops and obsidian from servers
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-26 15:51:05 -04:00
bc09b0ca4a migrate back to nixos-unstable-small
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-26 15:51:05 -04:00
3d7e41f96e update flake, fix breaking changes 2024-10-26 15:51:05 -04:00
262d678d12 fix ordering on postResumeCommands
ZFS moved import from postDeviceCommands to postResumeCommands and now
my key import doesnt work :(

Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-26 15:51:05 -04:00
52883c56c8 add lock shortcut
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-26 15:51:05 -04:00
148dd73520 add gitea
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-26 15:51:00 -04:00
4428170e82 add hyprlock and hypridle
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-23 00:40:33 -04:00
1d540e873e enable ADB on artemision
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-23 00:40:33 -04:00
141ff73e6c update flake lock 2024-10-23 00:40:33 -04:00
6f8c87517c update flake lock 2024-10-23 00:40:33 -04:00
a0c6630d4e update flake lock 2024-10-23 00:40:33 -04:00
9b757dc676 flip back to unstable, fix kernel warning 2024-10-23 00:40:33 -04:00
d68cc1520b add gh 2024-10-23 00:40:33 -04:00
15b066f811 add zathura 2024-10-23 00:40:33 -04:00
0f062a1534 fix psk -> pskRaw 2024-10-23 00:40:33 -04:00
c10f8ecf6c test patch 2024-10-23 00:40:33 -04:00
7b7e19f076 update flake 2024-10-23 00:40:33 -04:00
31cc04875f add manual update script 2024-10-23 00:40:33 -04:00
1b142e25b2 remove bitwarden-rofi
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-23 00:40:25 -04:00
d15cface81 remove bitwarden-rofi 2024-10-23 00:40:03 -04:00
f676d96e23 fix inputs 2024-10-23 00:40:03 -04:00
a25c8350e8 update flake lock 2024-10-23 00:40:03 -04:00
a6fa13a811 update flake lock 2024-10-23 00:40:03 -04:00
56e1503c85 finish gpg rotation 2024-10-23 00:40:03 -04:00
f98bcc0295 update signing key in git 2024-10-23 00:40:03 -04:00
5f512d699e cycle gpg keys 2024-10-23 00:40:03 -04:00
6e0e9c669c revert previous update 2024-10-23 00:40:03 -04:00
e8721c2623 revert previous update 2024-10-23 00:40:03 -04:00
fd15cb553a add onefetch 2024-10-23 00:40:03 -04:00
c917c92707 fix networking warning on palatine-hill 2024-10-23 00:40:03 -04:00
47df7fb172 update flake, remove grapejuice, remove system_tools
also temporarily removes hydra jobs
2024-10-23 00:40:03 -04:00
b80a8cbc36 zsh changes, k8s, disable cache 2024-10-23 00:40:03 -04:00
8cee431c7e disable kub_net
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-23 00:40:02 -04:00
d3b89d665e update flake lock
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-23 00:40:02 -04:00
6325c5fc65 duplicate value cleanup
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-23 00:40:02 -04:00
76ff59ffae fix attic-watch-store (refactor)
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-23 00:40:02 -04:00
5d14f5a3bc refactoring woop
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-23 00:39:48 -04:00
e3d86b3375 fix ref to firewall
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-23 00:00:19 -04:00
23861ee03c little firewalls everywhere
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-23 00:00:19 -04:00
a6f7d0043f remove attic
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-23 00:00:19 -04:00
e2f32e1d3c import all the keys
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-23 00:00:19 -04:00
f106d649a4 and palatine-hill is booting!
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-23 00:00:17 -04:00
fbb3f49dfd remove richie machines 2024-10-23 00:00:04 -04:00
46b0f1c490 add bitwarden-rofi
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-23 00:00:00 -04:00
913ea98c12 lvm stage 1, bwmenu 2024-10-22 23:59:23 -04:00
e5b387d76b enable lvm in stage 1 2024-10-22 23:59:23 -04:00
9087dc6811 fix uuid 2024-10-22 23:59:23 -04:00
e44e09499a add bwm 2024-10-22 23:59:23 -04:00
12d50854e9 fix hardware 2024-10-22 23:59:22 -04:00
e00d40fa55 rove to luks
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-22 23:59:13 -04:00
bedef50435 sops rotation 2024-10-22 23:58:45 -04:00
12ebfe0354 palatine-hill revamp 2024-10-22 23:58:45 -04:00
f839a79e36 remove richie from palatine-hill 2024-10-22 23:58:45 -04:00
ee6500c748 reduce number of keys 2024-10-22 23:58:45 -04:00
e9cbf3b74b add wifi, remove richie pub key, disable auto-pull/update 2024-10-22 23:58:44 -04:00
c29764eb18 remove richie 2024-10-22 23:58:40 -04:00
9be33aae2b rotate
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-22 23:57:36 -04:00
7b940c1150 remove attic watch for now 2024-10-22 17:48:51 -04:00
d7a1969ad2 add firewall oops 2024-10-22 17:43:51 -04:00
73dee69fa6 add firewall for docker 2024-10-22 17:37:30 -04:00
f34b409f30 disable registration on gitea
Some checks failed
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Has been cancelled
Check flake.lock / Check health of `flake.lock` (push) Has been cancelled
Check Nix formatting / Perform Nix format checks (push) Has been cancelled
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-21 00:27:46 -04:00
81df9aed70 firewall issues on gitea
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-21 00:08:16 -04:00
2440f3afe1 fix password special chars
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-20 23:48:46 -04:00
5f52f21539 disable gitea createDatabase, fix nix gc
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-20 23:19:44 -04:00
ad5ac179d7 add home-manager nix gc
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-20 20:59:38 -04:00
535081b790 rename gitea, fix db
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-20 20:57:19 -04:00
8266fa23a1 remove sops and obsidian from servers
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-20 20:36:35 -04:00
084a869442 migrate back to nixos-unstable-small
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-20 19:54:09 -04:00
e2bc5a3235 update flake, fix breaking changes 2024-10-20 19:06:35 -04:00
e13ad85d0a fix ordering on postResumeCommands
ZFS moved import from postDeviceCommands to postResumeCommands and now
my key import doesnt work :(

Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-20 18:44:15 -04:00
3c3f7d0b5e add lock shortcut
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-20 18:43:55 -04:00
4bf03a22fd add gitea
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-20 18:41:49 -04:00
bfccadf416 add hyprlock and hypridle
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-20 01:26:35 -04:00
f024f7e49a enable ADB on artemision
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-10-19 16:17:31 -04:00
5a6975bfd8 update flake lock 2024-10-15 01:45:58 -04:00
cff3cd30dd update flake lock 2024-10-12 14:53:25 -04:00
8c1762a28d update flake lock 2024-10-10 13:57:03 -04:00
30291209bd flip back to unstable, fix kernel warning 2024-10-08 23:39:17 -04:00
a34e4e2485 add gh 2024-10-03 23:02:22 -04:00
588ea886ac add zathura 2024-10-03 23:02:22 -04:00
38b05e905c fix psk -> pskRaw 2024-09-20 14:11:45 -04:00
46fcbccdd8 test patch 2024-09-20 09:52:50 -04:00
b43144cc17 update flake 2024-09-15 15:11:04 -04:00
a575773145 add manual update script 2024-09-09 19:52:52 -04:00
3b48708e15 remove bitwarden-rofi 2024-09-09 19:52:30 -04:00
6bdb3fac83 remove bitwarden-rofi 2024-09-09 19:50:47 -04:00
8bfe103cc1 fix inputs 2024-09-09 19:49:56 -04:00
a86bec551a update flake lock 2024-09-09 19:49:33 -04:00
6e23a0b499 update flake lock 2024-09-06 12:06:42 -04:00
9ce801e144 finish gpg rotation 2024-09-05 02:11:06 -04:00
4e7ff1e02e update signing key in git 2024-09-05 02:04:28 -04:00
92c47c6f31 cycle gpg keys 2024-09-05 02:04:27 -04:00
6784cfe871 revert previous update 2024-09-05 02:03:52 -04:00
f2bc6ad584 revert previous update 2024-09-05 02:03:35 -04:00
0d9752b738 add onefetch 2024-09-05 01:30:33 -04:00
cda8f4abd4 fix networking warning on palatine-hill 2024-09-05 01:29:48 -04:00
945674b284 update flake, remove grapejuice, remove system_tools
also temporarily removes hydra jobs
2024-09-05 01:28:01 -04:00
81caeef4f0 zsh changes, k8s, disable cache 2024-09-05 01:19:07 -04:00
b62c64796f disable kub_net
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-24 01:56:58 -04:00
56c5deceb9 update flake lock
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-24 01:54:33 -04:00
ce7ced5b6e duplicate value cleanup
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-24 01:53:50 -04:00
d230b39dd3 fix attic-watch-store (refactor)
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-24 01:34:41 -04:00
94f0d55d85 refactoring woop
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-24 01:34:05 -04:00
df83fa864c fix ref to firewall
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-24 01:16:09 -04:00
72c617619c little firewalls everywhere
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-24 01:07:27 -04:00
d140f77246 remove attic
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-24 00:53:43 -04:00
164e86468d import all the keys
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-24 00:48:40 -04:00
12555ebc3a and palatine-hill is booting!
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-24 00:34:09 -04:00
f780780523 remove richie machines 2024-08-22 10:09:10 -04:00
6402e70d23 add bitwarden-rofi 2024-08-22 10:08:28 -04:00
384964759c lvm stage 1, bwmenu 2024-08-22 09:35:39 -04:00
0db3f9b6d1 enable lvm in stage 1 2024-08-22 03:04:31 -04:00
31542edb86 fix uuid 2024-08-22 02:41:08 -04:00
15b4ae0a39 add bwm 2024-08-22 02:40:56 -04:00
e3d18ef142 fix hardware 2024-08-22 01:37:20 -04:00
b43e9054fb move to luks 2024-08-22 01:21:49 -04:00
b03e1ea9c2 sops rotation 2024-08-22 00:54:52 -04:00
ab6af4eae3 palatine-hill revamp 2024-08-22 00:50:54 -04:00
83a4fa2e67 remove richie from palatine-hill 2024-08-22 00:48:36 -04:00
cadfdc62ab reduce number of keys 2024-08-22 00:47:02 -04:00
080a382242 add wifi, remove richie pub key, disable auto-pull/update 2024-08-21 18:59:20 -04:00
d07bc4ea19 remove richie 2024-08-20 20:13:59 -04:00
4e489a8145 rotate 2024-08-20 19:17:08 -04:00
ffa20df7d9 remove docker upgrades from CI
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:09 -04:00
b9fcd66953 nextcloud var
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:09 -04:00
79c891b81d archiveteam changes
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:09 -04:00
761275b42f vars isn't a module...
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:09 -04:00
269a9833c4 remove nextcloud-image, add haproxy to build
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:09 -04:00
b18438924b add ffdl, foundry, haproxy, glances, and zfs vars
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:09 -04:00
58906d95ea add deluge
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:09 -04:00
bc2639c272 add firefly,restic
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:08 -04:00
680b2b036d introduce lib.rad-dev.mapAttrsToString, fix mc-router
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:08 -04:00
3eb1b759fe add minecraft import
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:08 -04:00
0c31b2d753 add sops changes
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:08 -04:00
744742cb8b add mc-router, rlcraft
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:08 -04:00
6aa2d208df revert to stable apache instead of custom image
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:08 -04:00
7be48fca2a fix some issues in .gitconfig
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:08 -04:00
05e8a12e77 add new setting for VMs
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:08 -04:00
5987257fa4 buildimage 2024-08-17 22:17:08 -04:00
8360e05aa0 switch to buildLayeredImage
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:08 -04:00
824ef700b2 fix environments not being string
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:08 -04:00
9e14a1ebc1 add unifi containers
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:07 -04:00
89243d3374 add redis and go-vod containers
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:07 -04:00
f7023098ec remove dockerfile-style RUN commands
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:07 -04:00
839278ef88 refactor utils, nextcloud image, add fetch-docker script
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:07 -04:00
bff8bcd72c cleanup restarts
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:07 -04:00
337caba1f0 fix image generation
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:07 -04:00
898379ab13 fix restart optiosn
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:07 -04:00
dd8e8d2af5 fix docker nix
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:07 -04:00
55099d191b condense docker options, fix nextcloud
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:07 -04:00
f175dca0ce fix import
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:07 -04:00
b99dd1514b add nextcloud and postgres to docker
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:06 -04:00
bb3a853bbc fix templatedcontainer namespacing
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:06 -04:00
6e75e84e8b move container generation to its own file
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:06 -04:00
f6bda933ea allow all containers, add bind mounts
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:06 -04:00
4d352a0b52 temp disable most containers, remove timeout
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:06 -04:00
4d79ff8c01 add onefetch/hyfetch
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:06 -04:00
3b198ee4cb swap log-driver to local
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:06 -04:00
04d2830d8f add postnews container
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:05 -04:00
48ece89d9f adds documentation to the new rad-dev functions
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:05 -04:00
63931a6237 change all container names to include archiveteam so they dont get lost
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:05 -04:00
a5bbb110c4 dynamically generate archiveteam containers
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:05 -04:00
67a337dfaf I can't believe its not an integer parser
(now with more integer parsing)

on a serious note:
- adds integer to string parsing (because thats not dangerous at all)
- adds a container spec generator for OCI containers using a custom template

Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-17 22:17:05 -04:00
acbf9a6124 add latex to alice non-server
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2024-08-16 21:46:31 +00:00
183 changed files with 4588 additions and 4051 deletions

View File

@ -1,6 +1,11 @@
# run `grep -Pv "^#" .gitconfig >> .git/config` to append the merge config to your repo file :)
# run `git mergetool --tool=sops-mergetool <path to secret>/secrets.yaml` to use this once configured
# if for whatever reason the below doesn't work, try modifying the mergetool command as below
# find: $(git rev-parse --show-toplevel)/utils/sops-mergetool.sh
# replace: ./utils/sops-mergetool.sh
[mergetool "sops-mergetool"]
cmd = bash -c "$(git --exec-path)/sops-mergetool.sh \"$BASE\" \"$LOCAL\" \"$REMOTE\" \"$MERGED\""
cmd = bash -c "$(git rev-parse --show-toplevel)/utils/sops-mergetool.sh \"\$BASE\" \"\$LOCAL\" \"\$REMOTE\" \"\$MERGED\""
[merge]
tool = nvimdiff3
tool = nvimdiff
[mergetool "nvimdiff"]
layout = MERGED

331
.github/settings.yml vendored
View File

@ -1,204 +1,173 @@
# Have borrowed this config from nix-community/infra
repository:
# See https://developer.github.com/v3/repos/#edit for all available settings.
# See https://developer.github.com/v3/repos/#edit for all available settings.
# The name of the repository. Changing this will rename the repository
name: nix-dotfiles
# A short description of the repository that will show up on GitHub
description: RAD-Dev Infra
# A URL with more information about the repository
# homepage: "https://nix-community.org"
# A comma-separated list of topics to set on the repository
topics: "nixos"
# Either `true` to make the repository private, or `false` to make it public.
private: false
# Either `true` to enable issues for this repository, `false` to disable them.
has_issues: true
# Either `true` to enable projects for this repository, or `false` to disable them.
# If projects are disabled for the organization, passing `true` will cause an API error.
has_projects: true
# Either `true` to enable the wiki for this repository, `false` to disable it.
has_wiki: false
# Either `true` to enable downloads for this repository, `false` to disable them.
has_downloads: false
# Updates the default branch for this repository.
default_branch: main
# Either `true` to allow squash-merging pull requests, or `false` to prevent
# squash-merging.
allow_squash_merge: true
# Either `true` to allow merging pull requests with a merge commit, or `false`
# to prevent merging pull requests with merge commits.
allow_merge_commit: false
# Either `true` to allow rebase-merging pull requests, or `false` to prevent
# rebase-merging.
allow_rebase_merge: true
# Either `true` to enable automatic deletion of branches on merge, or `false` to disable
delete_branch_on_merge: true
# Either `true` to enable automated security fixes, or `false` to disable
# automated security fixes.
enable_automated_security_fixes: true
# Either `true` to enable vulnerability alerts, or `false` to disable
# vulnerability alerts.
enable_vulnerability_alerts: true
allow_auto_merge: true
# The name of the repository. Changing this will rename the repository
name: nix-dotfiles
# A short description of the repository that will show up on GitHub
description: RAD-Dev Infra
# A URL with more information about the repository
# homepage: "https://nix-community.org"
# A comma-separated list of topics to set on the repository
topics: "nixos"
# Either `true` to make the repository private, or `false` to make it public.
private: false
# Either `true` to enable issues for this repository, `false` to disable them.
has_issues: true
# Either `true` to enable projects for this repository, or `false` to disable them.
# If projects are disabled for the organization, passing `true` will cause an API error.
has_projects: true
# Either `true` to enable the wiki for this repository, `false` to disable it.
has_wiki: false
# Either `true` to enable downloads for this repository, `false` to disable them.
has_downloads: false
# Updates the default branch for this repository.
default_branch: main
# Either `true` to allow squash-merging pull requests, or `false` to prevent
# squash-merging.
allow_squash_merge: true
# Either `true` to allow merging pull requests with a merge commit, or `false`
# to prevent merging pull requests with merge commits.
allow_merge_commit: false
# Either `true` to allow rebase-merging pull requests, or `false` to prevent
# rebase-merging.
allow_rebase_merge: true
# Either `true` to enable automatic deletion of branches on merge, or `false` to disable
delete_branch_on_merge: true
# Either `true` to enable automated security fixes, or `false` to disable
# automated security fixes.
enable_automated_security_fixes: true
# Either `true` to enable vulnerability alerts, or `false` to disable
# vulnerability alerts.
enable_vulnerability_alerts: true
allow_auto_merge: true
# Labels: define labels for Issues and Pull Requests
#
labels:
- name: bug
color: '#d73a4a'
description: Something isn't working
- name: CI/CD
# If including a `#`, make sure to wrap it with quotes!
color: '#0e8a16'
description: Related to GH Actions or Hydra
- name: documentation
color: '#0075ca'
description: Improvements or additions to documentation
- name: duplicate
color: '#cfd3d7'
description: This issue or pull request already exists
- name: enhancement
color: '#a2eeef'
description: New feature or request
- name: good first issue
color: '#7057ff'
description: Good for newcomers
- name: help wanted
color: '#008672'
description: Extra attention is needed
- name: high priority
color: '#BF480A'
description: A major vurnability was detected
- name: invalid
color: '#e4e669'
description: This doesn't seem right
- name: new user
color: '#C302A1'
description: A new user was added to the Flake
- name: question
color: '#d876e3'
description: Further information is requested
- name: wontfix
color: '#ffffff'
description: This will not be worked on
- name: dependencies
color: '#cb4ed5'
description: Used for PR's related to flake.lock updates
- name: automated
color: '#42b528'
description: PR was automatically generated (through a bot or CI/CD)
- name: bug
color: '#d73a4a'
description: Something isn't working
- name: CI/CD
# If including a `#`, make sure to wrap it with quotes!
color: '#0e8a16'
description: Related to GH Actions or Hydra
- name: documentation
color: '#0075ca'
description: Improvements or additions to documentation
- name: duplicate
color: '#cfd3d7'
description: This issue or pull request already exists
- name: enhancement
color: '#a2eeef'
description: New feature or request
- name: good first issue
color: '#7057ff'
description: Good for newcomers
- name: help wanted
color: '#008672'
description: Extra attention is needed
- name: high priority
color: '#BF480A'
description: A major vurnability was detected
- name: invalid
color: '#e4e669'
description: This doesn't seem right
- name: new user
color: '#C302A1'
description: A new user was added to the Flake
- name: question
color: '#d876e3'
description: Further information is requested
- name: wontfix
color: '#ffffff'
description: This will not be worked on
- name: dependencies
color: '#cb4ed5'
description: Used for PR's related to flake.lock updates
- name: automated
color: '#42b528'
description: PR was automatically generated (through a bot or CI/CD)
# Milestones: define milestones for Issues and Pull Requests
milestones:
- title: Go-Live
description: >-
All requirements for official go-live:
- Automated testing via Hydra/Actions
- Automated deployments via Hydra/Actions
- 90+% testing coverage
- Functional formatter with custom rules
- palatine-hill is fully stable, enough so that jeeves can be migrated
# The state of the milestone. Either `open` or `closed`
state: open
- title: Jeeves Migration
description: >-
Test common use-cases for Jeeves
- Quadro GPU support
- Multi-GPU support
- Plex support
- Docker support
- ZFS support
- title: Go-Live
description: >-
All requirements for official go-live: - Automated testing via Hydra/Actions - Automated deployments via Hydra/Actions - 90+% testing coverage - Functional formatter with custom rules - palatine-hill is fully stable, enough so that jeeves can be migrated
# The state of the milestone. Either `open` or `closed`
state: open
- title: Jeeves Migration
description: >-
Test common use-cases for Jeeves - Quadro GPU support - Multi-GPU support - Plex support - Docker support - ZFS support
# Collaborators: give specific users access to this repository.
# See https://docs.github.com/en/rest/reference/repos#add-a-repository-collaborator for available options
collaborators:
# - username: numtide-bot
# Note: `permission` is only valid on organization-owned repositories.
# The permission to grant the collaborator. Can be one of:
# * `pull` - can pull, but not push to or administer this repository.
# * `push` - can pull and push, but not administer this repository.
# * `admin` - can pull, push and administer this repository.
# * `maintain` - Recommended for project managers who need to manage the repository without access to sensitive or destructive actions.
# * `triage` - Recommended for contributors who need to proactively manage issues and pull requests without write access.
# permission: push
# - username: numtide-bot
# Note: `permission` is only valid on organization-owned repositories.
# The permission to grant the collaborator. Can be one of:
# * `pull` - can pull, but not push to or administer this repository.
# * `push` - can pull and push, but not administer this repository.
# * `admin` - can pull, push and administer this repository.
# * `maintain` - Recommended for project managers who need to manage the repository without access to sensitive or destructive actions.
# * `triage` - Recommended for contributors who need to proactively manage issues and pull requests without write access.
# permission: push
# See https://docs.github.com/en/rest/reference/teams#add-or-update-team-repository-permissions for available options
teams:
# - name: admin
# The permission to grant the team. Can be one of:
# * `pull` - can pull, but not push to or administer this repository.
# * `push` - can pull and push, but not administer this repository.
# * `admin` - can pull, push and administer this repository.
# * `maintain` - Recommended for project managers who need to manage the repository without access to sensitive or destructive actions.
# * `triage` - Recommended for contributors who need to proactively manage issues and pull requests without write access.
# permission: admin
# - name: admin
# The permission to grant the team. Can be one of:
# * `pull` - can pull, but not push to or administer this repository.
# * `push` - can pull and push, but not administer this repository.
# * `admin` - can pull, push and administer this repository.
# * `maintain` - Recommended for project managers who need to manage the repository without access to sensitive or destructive actions.
# * `triage` - Recommended for contributors who need to proactively manage issues and pull requests without write access.
# permission: admin
branches:
# gh api -H "Accept: application/vnd.github+json" -H "X-GitHub-Api-Version: 2022-11-28" /repos/nix-community/infra/branches/master/protection
# gh api -H "Accept: application/vnd.github+json" -H "X-GitHub-Api-Version: 2022-11-28" /repos/nix-community/infra/branches/master/protection
# not available in the api yet
# `Require merge queue`: true
# `Merge method`: Rebase and merge
# `Maximum pull requests to build`: 1
# `Maximum pull requests to merge`: 1
# defaults:
# `Maximum pull requests to build`: 5
# `Minimum pull requests to merge`: 1 or 5 minutes
# `Maximum pull requests to merge`: 5
# `Only merge non-failing pull requests`: true
# `Consider check failed after`: 60 minutes
# not available in the api yet
# `Require merge queue`: true
# `Merge method`: Rebase and merge
# `Maximum pull requests to build`: 1
# `Maximum pull requests to merge`: 1
# defaults:
# `Maximum pull requests to build`: 5
# `Minimum pull requests to merge`: 1 or 5 minutes
# `Maximum pull requests to merge`: 5
# `Only merge non-failing pull requests`: true
# `Consider check failed after`: 60 minutes
- name: main
# https://docs.github.com/en/rest/reference/repos#update-branch-protection
# Branch Protection settings. Set to null to disable
protection:
# Required. Require at least one approving review on a pull request, before merging. Set to null to disable.
- name: main
# https://docs.github.com/en/rest/reference/repos#update-branch-protection
# Branch Protection settings. Set to null to disable
protection:
# Required. Require at least one approving review on a pull request, before merging. Set to null to disable.
# these settings are the same as manually enabling "Require a pull request before merging" but not setting any other restrictions
required_pull_request_reviews:
# # The number of approvals required. (1-6)
required_approving_review_count: 1
# # Dismiss approved reviews automatically when a new commit is pushed.
dismiss_stale_reviews: true
# # Blocks merge until code owners have reviewed.
require_code_owner_reviews: false
# # Specify which users and teams can dismiss pull request reviews. Pass an empty dismissal_restrictions object to disable. User and team dismissal_restrictions are only available for organization-owned repositories. Omit this parameter for personal repositories.
# dismissal_restrictions:
# users: []
# teams: []
require_last_push_approval: false
# Required. Require status checks to pass before merging. Set to null to disable
# required_status_checks:
# these settings are the same as manually enabling "Require a pull request before merging" but not setting any other restrictions
required_pull_request_reviews:
# # The number of approvals required. (1-6)
required_approving_review_count: 1
# # Dismiss approved reviews automatically when a new commit is pushed.
dismiss_stale_reviews: true
# # Blocks merge until code owners have reviewed.
require_code_owner_reviews: false
# # Specify which users and teams can dismiss pull request reviews. Pass an empty dismissal_restrictions object to disable. User and team dismissal_restrictions are only available for organization-owned repositories. Omit this parameter for personal repositories.
# dismissal_restrictions:
# users: []
# teams: []
require_last_push_approval: false
# Required. Require status checks to pass before merging. Set to null to disable
# required_status_checks:
# Required. Require branches to be up to date before merging.
# strict: false
# Required. The list of status checks to require in order to merge into this branch
# contexts:
# - buildbot/nix-eval
# Required. Enforce all configured restrictions for administrators. Set to true to enforce required status checks for repository administrators. Set to null to disable.
enforce_admins: true
# Disabled for bors to work
required_linear_history: true
# Required. Restrict who can push to this branch. Team and user restrictions are only available for organization-owned repositories. Set to null to disable.
restrictions:
apps: []
# TODO: make a buildbot instance
# users: ["nix-infra-bot"]
teams: []
# Required. Enforce all configured restrictions for administrators. Set to true to enforce required status checks for repository administrators. Set to null to disable.
enforce_admins: true
# Disabled for bors to work
required_linear_history: true
# Required. Restrict who can push to this branch. Team and user restrictions are only available for organization-owned repositories. Set to null to disable.
restrictions:
apps: []
# TODO: make a buildbot instance
# users: ["nix-infra-bot"]
teams: []

View File

@ -1,20 +1,47 @@
name: "Check Nix flake"
on:
push:
branches: ["main"]
pull_request:
branches: ["main"]
merge_group:
push:
branches: ["main"]
pull_request:
branches: ["main"]
merge_group:
jobs:
health-check:
name: "Perform Nix flake checks"
runs-on: ${{ matrix.os }}
strategy:
matrix:
os: [ubuntu-latest]
steps:
- uses: DeterminateSystems/nix-installer-action@main
- uses: DeterminateSystems/magic-nix-cache-action@main
- uses: actions/checkout@v4
- run: nix flake check --accept-flake-config
health-check:
name: "Perform Nix flake checks"
runs-on: ${{ matrix.os }}
strategy:
matrix:
os: [ubuntu-latest]
steps:
- uses: DeterminateSystems/nix-installer-action@main
- name: Setup Attic cache
uses: ryanccn/attic-action@v0
with:
endpoint: ${{ secrets.ATTIC_ENDPOINT }}
cache: ${{ secrets.ATTIC_CACHE }}
token: ${{ secrets.ATTIC_TOKEN }}
skip-push: "true"
- uses: actions/checkout@v4
- run: nix flake check --accept-flake-config
- run: nix ./utils/attic-push.bash
build-checks:
name: "Build nix outputs"
runs-on: ${{ matrix.os }}
strategy:
matrix:
os: [ubuntu-latest]
steps:
- uses: DeterminateSystems/nix-installer-action@main
- name: Setup Attic cache
uses: ryanccn/attic-action@v0
with:
endpoint: ${{ secrets.ATTIC_ENDPOINT }}
cache: ${{ secrets.ATTIC_CACHE }}
token: ${{ secrets.ATTIC_TOKEN }}
skip-push: "true"
- uses: actions/checkout@v4
- name: Build all outputs
run: nix run git+https://nayeonie.com/ahuston-0/flake-update-diff -- --build .
- name: Push to Attic
run: nix ./utils/attic-push.bash
continue-on-error: true

View File

@ -1,67 +1,112 @@
name: "Update flakes"
on:
repository_dispatch:
workflow_dispatch:
schedule:
- cron: "00 12 * * *"
repository_dispatch:
workflow_dispatch:
schedule:
- cron: "00 12 * * *"
jobs:
createPullRequest:
runs-on: ubuntu-latest
if: github.ref == 'refs/heads/main' # ensure workflow_dispatch only runs on main
steps:
- uses: actions/checkout@v4
- name: Login to Docker Hub
uses: docker/login-action@v3
with:
username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
- name: Install Nix
uses: cachix/install-nix-action@v24
with:
extra_nix_config: |
experimental-features = nix-command flakes
install_url: https://releases.nixos.org/nix/nix-2.19.0/install
- uses: DeterminateSystems/magic-nix-cache-action@main
- name: Calculate pre-drv
run: nix ./utils/eval-to-drv.sh pre
- name: Pull latest docker images
run: nix ./utils/fetch-docker.sh
- name: Update flake.lock (part 1)
run: nix flake update
- name: Calculate post-drv
run: nix ./utils/eval-to-drv.sh post
- name: Calculate diff
run: nix ./utils/diff-evals.sh
- name: Read diff into environment
run: |
delimiter="$(openssl rand -hex 8)"
{
echo "POSTDIFF<<${delimiter}"
cat post-diff
echo "${delimiter}"
} >> $GITHUB_ENV
update_lockfile:
runs-on: ubuntu-latest
#if: github.ref == 'refs/heads/main' # ensure workflow_dispatch only runs on main
steps:
- name: Checkout repository
uses: actions/checkout@v4
- name: Install nix
uses: https://github.com/DeterminateSystems/nix-installer-action@main
- name: Setup Attic cache
uses: ryanccn/attic-action@v0
with:
endpoint: ${{ secrets.ATTIC_ENDPOINT }}
cache: ${{ secrets.ATTIC_CACHE }}
token: ${{ secrets.ATTIC_TOKEN }}
skip-push: "true"
- name: Get pre-snapshot of evaluations
run: nix ./utils/eval-to-drv.sh pre
- name: Update flake.lock
id: update
run: |
nix flake update 2> >(tee /dev/stderr) | awk '
/^• Updated input/ {in_update = 1; print; next}
in_update && !/^warning:/ {print}
/^$/ {in_update = 0}
' > update.log
echo "UPDATE_LOG<<EOF" >> $GITHUB_ENV
cat update.log >> $GITHUB_ENV
echo "EOF" >> $GITHUB_ENV
- name: Restore flake.lock for next step
run: git restore flake.lock
- name: Update flake.lock
id: update
uses: DeterminateSystems/update-flake-lock@main
with:
token: ${{ secrets.GH_TOKEN_FOR_UPDATES }}
pr-body: |
Automated changes by the [update-flake-lock](https://github.com/DeterminateSystems/update-flake-lock) GitHub Action.
rm update.log
- name: Get post-snapshot of evaluations
run: nix ./utils/eval-to-drv.sh post
- name: Calculate diff
run: nix ./utils/diff-evals.sh
- name: Read file contents
id: read_file
uses: guibranco/github-file-reader-action-v2@latest
with:
path: "post-diff"
- name: Write PR body template
uses: https://github.com/DamianReeves/write-file-action@v1.3
with:
path: pr_body.template
contents: |
- The following Nix Flake inputs were updated:
```
{{ env.GIT_COMMIT_MESSAGE }}
```
```
${{ env.UPDATE_LOG }}
```
```
{{ env.POSTDIFF }}
```
pr-labels: | # Labels to be set on the PR
dependencies
automated
```
${{ steps.read_file.outputs.contents }}
```
Auto-generated by [update.yml][1] with the help of
[create-pull-request][2].
[1]: https://nayeonie.com/ahuston-0/nix-dotfiles/src/branch/main/.github/workflows/flake-update.yml
[2]: https://forgejo.stefka.eu/jiriks74/create-pull-request
- name: Generate PR body
uses: pedrolamas/handlebars-action@v2.4.0 # v2.4.0
with:
files: "pr_body.template"
output-filename: "pr_body.md"
- name: Save PR body
id: pr_body
uses: juliangruber/read-file-action@v1
with:
path: "pr_body.md"
- name: Remove temporary files
run: |
rm pr_body.template
rm pr_body.md
rm pre.json
rm post.json
rm post-diff
- name: Create Pull Request
id: create-pull-request
# uses: https://forgejo.stefka.eu/jiriks74/create-pull-request@7174d368c2e4450dea17b297819eb28ae93ee645
uses: https://nayeonie.com/ahuston-0/create-pull-request@main
with:
token: ${{ secrets.GH_TOKEN_FOR_UPDATES }}
body: ${{ steps.pr_body.outputs.content }}
author: '"github-actions[bot]" <github-actions[bot]@users.noreply.github.com>'
title: 'automated: Update `flake.lock`'
commit-message: |
automated: Update `flake.lock`
${{ steps.pr_body.outputs.content }}
branch: update-flake-lock
delete-branch: true
pr-labels: | # Labels to be set on the PR
dependencies
automated
- name: Push to Attic
run: nix ./utils/attic-push.bash
continue-on-error: true
- name: Print PR number
run: |
echo "Pull request number is ${{ steps.create-pull-request.outputs.pull-request-number }}."
echo "Pull Request URL - ${{ steps.cpr.outputs.pull-request-url }}"
permissions:
pull-requests: write
contents: write
pull-requests: write
contents: write

View File

@ -1,17 +1,16 @@
name: "Check flake.lock"
on:
push:
branches: ["main"]
pull_request:
branches: ["main"]
merge_group:
push:
branches: ["main"]
pull_request:
branches: ["main"]
merge_group:
jobs:
health-check:
name: "Check health of `flake.lock`"
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: DeterminateSystems/flake-checker-action@main
with:
fail-mode: true
health-check:
name: "Check health of `flake.lock`"
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: DeterminateSystems/flake-checker-action@main
with:
fail-mode: true

View File

@ -1,17 +1,25 @@
name: "Check Nix formatting"
on:
push:
branches: ["main"]
pull_request:
branches: ["main"]
merge_group:
push:
branches: ["main"]
pull_request:
branches: ["main"]
merge_group:
jobs:
health-check:
name: "Perform Nix format checks"
runs-on: ubuntu-latest
steps:
- uses: DeterminateSystems/nix-installer-action@main
- uses: DeterminateSystems/magic-nix-cache-action@main
- uses: actions/checkout@v4
- run: nix fmt -- --check .
health-check:
name: "Perform Nix format checks"
runs-on: ubuntu-latest
steps:
- uses: DeterminateSystems/nix-installer-action@main
- name: Setup Attic cache
uses: ryanccn/attic-action@v0
with:
endpoint: ${{ secrets.ATTIC_ENDPOINT }}
cache: ${{ secrets.ATTIC_CACHE }}
token: ${{ secrets.ATTIC_TOKEN }}
skip-push: "true"
- uses: actions/checkout@v4
- run: nix fmt -- --check .
- name: Push to Attic
run: nix ./utils/attic-push.bash
continue-on-error: true

View File

@ -1,85 +1,46 @@
keys:
# The PGP keys in keys/
- &admin_alice F63832C3080D6E1AC77EECF80B4245FFE305BC82
- &admin_richie 29F5017C95D9E60B1B1E8407072B0E0B8312DFE3
# Generate AGE keys from SSH keys with:
# ssh-keygen -A
# nix-shell -p ssh-to-age --run 'cat /etc/ssh/ssh_host_ed25519_key.pub | ssh-to-age'
# cspell:disable
- &artemision age1jd2dcpykagz20kpk2kkchte3augqncwfn6nywursx0dkfyze6feqdzxkq2
- &artemision-home age1t29a6z6cfy8m3cnc8uva0ey833vhcppue8psyumts7mtyf0zufcqvfshuc
- &bob age13jg97cvy63fzd2ccthcwvfyyxzw5vmwun8s0afq5l4xm0mhl6pjqhne063
- &jeeves age128ehc0ssgwnuv4r8ayfyu7r80e82xrkmv63g7h9y9q4mhk4w9dyqfymc2w
- &jeeves-jr age1lffr5f5nz0nrenv3ekgy27e8sztsx4gfp3hfymkz77mqaa5a4gts0ncrrh
- &palatine-hill age1z8q02wdp0a2ep5uuffgfeqlfam4ztl95frhw5qhnn6knn0rrmcnqk5evej
- &rhapsody-in-green age1c7adjulcrma0m7l5ur8efxdjzyskrqcwssfkt77a9rmma7gzss5q02pgmy
# cspell:enable
admins: &admins
- *admin_alice
- *admin_richie
# The PGP keys in keys/
- &admin_alice 5EFFB75F7C9B74EAA5C4637547940175096C1330
# Generate AGE keys from SSH keys with:
# ssh-keygen -A
# nix-shell -p ssh-to-age --run 'cat /etc/ssh/ssh_host_ed25519_key.pub | ssh-to-age'
# cspell:disable
- &artemision age1jd2dcpykagz20kpk2kkchte3augqncwfn6nywursx0dkfyze6feqdzxkq2
- &artemision-home age1t29a6z6cfy8m3cnc8uva0ey833vhcppue8psyumts7mtyf0zufcqvfshuc
#- &palatine-hill age1z8q02wdp0a2ep5uuffgfeqlfam4ztl95frhw5qhnn6knn0rrmcnqk5evej
- &palatine-hill age1qw5k8h72k3fjg5gmlxx8q8gwlc2k6n6u08d8hdzpm2pk9r0fnfxsmw33nh
# cspell:enable
servers: &servers
- *jeeves
- *jeeves-jr
- *palatine-hill
- *palatine-hill
# add new users by executing: sops users/<user>/secrets.yaml
# then have someone already in the repo run the below
#
# update keys by executing: sops updatekeys secrets.yaml
# note: add .* before \.yaml if you'd like to use the mergetool config
creation_rules:
- path_regex: systems/jeeves/secrets\.yaml$
key_groups:
- pgp: *admins
age:
- *jeeves
- path_regex: systems/jeeves-jr/secrets\.yaml$
key_groups:
- pgp: *admins
age:
- *jeeves-jr
- path_regex: users/alice/secrets.*\.yaml$
key_groups:
- pgp:
- *admin_alice
age:
- *palatine-hill
- *jeeves
- *jeeves-jr
- *artemision
- *artemision-home
- path_regex: systems/palatine-hill/secrets.*\.yaml$
key_groups:
- pgp: *admins
age:
- *palatine-hill
- path_regex: systems/palatine-hill/keys/zfs-.*-key$
key_groups:
- pgp: *admins
age:
- *palatine-hill
- path_regex: systems/artemision/secrets.*\.yaml$
key_groups:
- pgp:
- *admin_alice
age:
- *artemision
- path_regex: users/richie/secrets\.yaml$
key_groups:
- pgp:
- *admin_richie
age:
- *palatine-hill
- *jeeves
- *jeeves-jr
- *rhapsody-in-green
- *bob
- path_regex: users/alice/secrets.*\.yaml$
key_groups:
- pgp:
- *admin_alice
age:
- *palatine-hill
- *artemision
- *artemision-home
- path_regex: systems/palatine-hill/secrets.*\.yaml$
key_groups:
- pgp:
- *admin_alice
age:
- *palatine-hill
- path_regex: systems/artemision/secrets.*\.yaml$
key_groups:
- pgp:
- *admin_alice
age:
- *artemision
- path_regex: systems/palatine-hill/docker/wg/.*\.conf$
key_groups:
- pgp:
- *admin_alice
age:
- *palatine-hill

View File

@ -1,5 +1,7 @@
{
"cSpell.enableFiletypes": ["nix"],
"cSpell.enableFiletypes": [
"nix"
],
"cSpell.words": [
"aarch",
"abmlevel",
@ -39,6 +41,7 @@
"codezombiech",
"compactmode",
"Compat",
"concat",
"concatLists",
"contentblocking",
"cookiebanners",
@ -151,6 +154,7 @@
"networkd",
"networkmanager",
"newtabpage",
"nixfmt",
"nixos",
"nixpkgs",
"nmap",
@ -212,6 +216,8 @@
"rofi",
"rpool",
"rspace",
"rsyslog",
"rsyslogd",
"rtkit",
"safebrowsing",
"Sandro",
@ -253,6 +259,7 @@
"topstories",
"Toqozz",
"torrenting",
"treefmt",
"twimg",
"uaccess",
"ublock",

View File

@ -40,12 +40,12 @@ and will eventually trip a check when merging to main.
| Branch Name | Use Case |
|------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| main | protected branch which all machines pull from, do not try to push directly |
| feature/\<item\> | \<item\> is a new feature added to the repo, for personal or common use |
| fixup/\<item\> | \<item\> is a non-urgent bug, PRs merging from these branches should be merged when possible, but are not considered mission-critical |
| hotfix/\<item\> | \<item\> is a mission-critical bug, either affecting all users or a breaking change on a user's machines. These PRs should be reviewed ASAP. This is automatically subject to the [Critical Issues](#critical-issues) process |
| urgent/\<item\> | Accepted as an alias for the above, due to dev's coming from multiple standards and the criticality of these issues |
| exp/\<item\> | \<item\> is a non-critical experiment. This is used for shipping around potential new features or fixes to multiple branches |
| merge/\<item\> | \<item\> is a temporary branch and should never be merged directly to main. This is solely used for addressing merge conflicts which are too complex to be merged directly on branch |
| feature/\<item> | \<item> is a new feature added to the repo, for personal or common use |
| fixup/\<item> | \<item> is a non-urgent bug, PRs merging from these branches should be merged when possible, but are not considered mission-critical |
| hotfix/\<item> | \<item> is a mission-critical bug, either affecting all users or a breaking change on a user's machines. These PRs should be reviewed ASAP. This is automatically subject to the [Critical Issues](#critical-issues) process |
| urgent/\<item> | Accepted as an alias for the above, due to dev's coming from multiple standards and the criticality of these issues |
| exp/\<item> | \<item> is a non-critical experiment. This is used for shipping around potential new features or fixes to multiple branches |
| merge/\<item> | \<item> is a temporary branch and should never be merged directly to main. This is solely used for addressing merge conflicts which are too complex to be merged directly on branch |
### Review Process
@ -94,11 +94,11 @@ rules.
PR has been tested on at least one machine
- Issues which bypass the quorum process must have a second reviewer tagged
- All critical issues which bypass the approval process must have an RCA issue
opened and the RCA logged into the `inc/` folder
opened and the RCA logged into the `inc/` folder
- The second reviewer has 2 weeks to retroactively review and approve the PR
- If the retro does not happen in the given window, an issue shall be opened
to either re-review the PR or to revert and replace the fix with a
permanent solution
to either re-review the PR or to revert and replace the fix with a
permanent solution
- Critical issues must be tagged to `Nix Flake Features` project, and must have
a priority of `High` and an estimate tagged. Start and end date are not needed

View File

@ -1,9 +1,9 @@
#!/usr/bin/env nix
#! nix shell nixpkgs#bash nixpkgs#git --command bash
set -o errexit # abort on nonzero exitstatus
set -o nounset # abort on unbound variable
set -o pipefail # don't hide errors within pipes
set -o errexit # abort on nonzero exitstatus
set -o nounset # abort on unbound variable
set -o pipefail # don't hide errors within pipes
PROCEED="N"
@ -50,60 +50,58 @@ GITBASE="systems"
FEATUREBRANCH="feature/adding-$MACHINENAME"
if [ $PROCEED != "Y" ]; then
echo "PROCEED is not set correctly, please validate the below partitions and update the script accordingly"
lsblk -ao NAME,FSTYPE,FSSIZE,FSUSED,SIZE,MOUNTPOINT
echo "PROCEED is not set correctly, please validate the below partitions and update the script accordingly"
lsblk -ao NAME,FSTYPE,FSSIZE,FSUSED,SIZE,MOUNTPOINT
fi
if [ $CREATEPARTS = "Y" ]; then
# Create partition table
sudo parted "/dev/$DRIVE" -- mklabel gpt
# Create partition table
sudo parted "/dev/$DRIVE" -- mklabel gpt
# Create boot part
sudo parted "/dev/$DRIVE" -- mkpart ESP fat32 1MB 1024MB
sudo parted "/dev/$DRIVE" -- set 1 esp on
sudo mkfs.fat -F 32 -n NIXBOOT "/dev/${DRIVE}1"
# Create boot part
sudo parted "/dev/$DRIVE" -- mkpart ESP fat32 1MB 1024MB
sudo parted "/dev/$DRIVE" -- set 1 esp on
sudo mkfs.fat -F 32 -n NIXBOOT "/dev/${DRIVE}1"
# Create luks part
sudo parted "/dev/$DRIVE" -- mkpart primary ext4 1024MB 100%
sudo parted "/dev/$DRIVE" -- set 2 lvm on
LUKSPART="nixos-pv"
sudo cryptsetup luksFormat "/dev/${DRIVE}p2"
sudo cryptsetup luksOpen "/dev/${DRIVE}p2" "$LUKSPART"
# Create luks part
sudo parted "/dev/$DRIVE" -- mkpart primary ext4 1024MB 100%
sudo parted "/dev/$DRIVE" -- set 2 lvm on
# Create lvm part
sudo pvcreate "/dev/mapper/$LUKSPART"
sudo pvresize "/dev/mapper/$LUKSPART"
sudo pvdisplay
LUKSPART="nixos-pv"
sudo cryptsetup luksFormat "/dev/${DRIVE}p2"
sudo cryptsetup luksOpen "/dev/${DRIVE}p2" "$LUKSPART"
# Create volume group
sudo vgcreate "$VOLGROUP" "/dev/mapper/$LUKSPART"
sudo vgchange -a y "$VOLGROUP"
sudo vgdisplay
# Create lvm part
sudo pvcreate "/dev/mapper/$LUKSPART"
sudo pvresize "/dev/mapper/$LUKSPART"
sudo pvdisplay
# Create swap part on LVM
if [ $SWAPSIZE != 0 ]; then
sudo lvcreate -L "$SWAPSIZE" "$VOLGROUP" -n swap
sudo mkswap -L NIXSWAP -c "$SWAPPATH"
fi
# Create volume group
sudo vgcreate "$VOLGROUP" "/dev/mapper/$LUKSPART"
sudo vgchange -a y "$VOLGROUP"
sudo vgdisplay
# Create home part on LVM, leaving plenty of room for snapshots
sudo lvcreate -l 50%FREE "$VOLGROUP" -n home
sudo mkfs.ext4 -L NIXHOME -c "$HOMEPATH"
# Create swap part on LVM
if [ $SWAPSIZE != 0 ]; then
sudo lvcreate -L "$SWAPSIZE" "$VOLGROUP" -n swap
sudo mkswap -L NIXSWAP -c "$SWAPPATH"
fi
# Create root part on LVM, keeping in mind most data will be on /home or /nix
sudo lvcreate -L 5G "$VOLGROUP" -n root
sudo mkfs.ext4 -L NIXROOT -c "$ROOTPATH"
# Create home part on LVM, leaving plenty of room for snapshots
sudo lvcreate -l 50%FREE "$VOLGROUP" -n home
sudo mkfs.ext4 -L NIXHOME -c "$HOMEPATH"
# Create nix part on LVM
sudo lvcreate -L 100G "$VOLGROUP" -n nix-store
sudo mkfs.ext4 -L NIXSTORE -c "$NIXSTOREPATH"
# Create root part on LVM, keeping in mind most data will be on /home or /nix
sudo lvcreate -L 5G "$VOLGROUP" -n root
sudo mkfs.ext4 -L NIXROOT -c "$ROOTPATH"
sudo lvdisplay
# Create nix part on LVM
sudo lvcreate -L 100G "$VOLGROUP" -n nix-store
sudo mkfs.ext4 -L NIXSTORE -c "$NIXSTOREPATH"
lsblk -ao NAME,FSTYPE,FSSIZE,FSUSED,SIZE,MOUNTPOINT
sudo lvdisplay
lsblk -ao NAME,FSTYPE,FSSIZE,FSUSED,SIZE,MOUNTPOINT
fi
# Mount partitions
@ -116,7 +114,7 @@ sudo mount $BOOTPART /mnt/boot
# Enable swap if SWAPSIZE is non-zero
if [ $SWAPSIZE != 0 ]; then
sudo swapon "/dev/$VOLGROUP/swap"
sudo swapon "/dev/$VOLGROUP/swap"
fi
# Clone the repo
@ -135,31 +133,31 @@ read -r -p "get this into github so you can check everything in, then hit enter
cat "$DOTS/id_ed25519_ghdeploy.pub"
if [ $SOPS == "Y" ]; then
# Create ssh host-keys
sudo ssh-keygen -A
sudo mkdir -p /mnt/etc/ssh
sudo cp "/etc/ssh/ssh_host_*" /mnt/etc/ssh
# Create ssh host-keys
sudo ssh-keygen -A
sudo mkdir -p /mnt/etc/ssh
sudo cp "/etc/ssh/ssh_host_*" /mnt/etc/ssh
# Get line where AGE comment is and insert new AGE key two lines down
AGELINE=$(grep "Generate AGE keys from SSH keys with" "$DOTS/.sops.yaml" -n | awk -F ':' '{print ($1+2)}')
AGEKEY=$(nix-shell -p ssh-to-age --run 'cat /etc/ssh/ssh_host_ed25519_key.pub | ssh-to-age')
sudo sed -i "${AGELINE}i\\ - &${MACHINENAME} $AGEKEY\\" "$DOTS/.sops.yaml"
# Get line where AGE comment is and insert new AGE key two lines down
AGELINE=$(grep "Generate AGE keys from SSH keys with" "$DOTS/.sops.yaml" -n | awk -F ':' '{print ($1+2)}')
AGEKEY=$(nix-shell -p ssh-to-age --run 'cat /etc/ssh/ssh_host_ed25519_key.pub | ssh-to-age')
sudo sed -i "${AGELINE}i\\ - &${MACHINENAME} $AGEKEY\\" "$DOTS/.sops.yaml"
# Add server name
SERVERLINE=$(grep 'servers: &servers' "$DOTS/.sops.yaml" -n | awk -F ':' '{print ($1+1)}')
sudo sed -i "${SERVERLINE}i\\ - *${MACHINENAME}\\" "$DOTS/.sops.yaml"
# Add server name
SERVERLINE=$(grep 'servers: &servers' "$DOTS/.sops.yaml" -n | awk -F ':' '{print ($1+1)}')
sudo sed -i "${SERVERLINE}i\\ - *${MACHINENAME}\\" "$DOTS/.sops.yaml"
# Add creation rules
CREATIONLINE=$(grep 'creation_rules' "$DOTS/.sops.yaml" -n | awk -F ':' '{print ($1+1)}')
# TODO: below was not working when last attempted
read -r -d '' PATHRULE <<-EOF
# Add creation rules
CREATIONLINE=$(grep 'creation_rules' "$DOTS/.sops.yaml" -n | awk -F ':' '{print ($1+1)}')
# TODO: below was not working when last attempted
read -r -d '' PATHRULE <<-EOF
- path_regex: $GITBASE/$MACHINENAME/secrets\.yaml$
key_groups:
- pgp: *$OWNERORADMINS
age:
- *$MACHINENAME
EOF
sudo sed -i "${CREATIONLINE}i\\${PATHRULE}\\" "$DOTS/.sops.yaml"
sudo sed -i "${CREATIONLINE}i\\${PATHRULE}\\" "$DOTS/.sops.yaml"
fi
read -r -p "press enter to continue"

567
flake.lock generated
View File

@ -1,53 +1,69 @@
{
"nodes": {
"attic": {
"base16": {
"inputs": {
"crane": "crane",
"flake-compat": [
"flake-compat"
],
"flake-utils": [
"flake-utils"
],
"nixpkgs": [
"nixpkgs"
],
"nixpkgs-stable": [
"nixpkgs-stable"
]
"fromYaml": "fromYaml"
},
"locked": {
"lastModified": 1722472866,
"narHash": "sha256-GJIz4M5HDB948Ex/8cPvbkrNzl/eKUE7/c21JBu4lb8=",
"owner": "zhaofengli",
"repo": "attic",
"rev": "e127acbf9a71ebc0c26bc8e28346822e0a6e16ba",
"lastModified": 1732200724,
"narHash": "sha256-+R1BH5wHhfnycySb7Sy5KbYEaTJZWm1h+LW1OtyhiTs=",
"owner": "SenchoPens",
"repo": "base16.nix",
"rev": "153d52373b0fb2d343592871009a286ec8837aec",
"type": "github"
},
"original": {
"owner": "zhaofengli",
"repo": "attic",
"owner": "SenchoPens",
"repo": "base16.nix",
"type": "github"
}
},
"crane": {
"inputs": {
"nixpkgs": [
"attic",
"nixpkgs"
]
},
"base16-fish": {
"flake": false,
"locked": {
"lastModified": 1717025063,
"narHash": "sha256-dIubLa56W9sNNz0e8jGxrX3CAkPXsq7snuFA/Ie6dn8=",
"owner": "ipetkov",
"repo": "crane",
"rev": "480dff0be03dac0e51a8dfc26e882b0d123a450e",
"lastModified": 1622559957,
"narHash": "sha256-PebymhVYbL8trDVVXxCvZgc0S5VxI7I1Hv4RMSquTpA=",
"owner": "tomyun",
"repo": "base16-fish",
"rev": "2f6dd973a9075dabccd26f1cded09508180bf5fe",
"type": "github"
},
"original": {
"owner": "ipetkov",
"repo": "crane",
"owner": "tomyun",
"repo": "base16-fish",
"type": "github"
}
},
"base16-helix": {
"flake": false,
"locked": {
"lastModified": 1736852337,
"narHash": "sha256-esD42YdgLlEh7koBrSqcT7p2fsMctPAcGl/+2sYJa2o=",
"owner": "tinted-theming",
"repo": "base16-helix",
"rev": "03860521c40b0b9c04818f2218d9cc9efc21e7a5",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "base16-helix",
"type": "github"
}
},
"base16-vim": {
"flake": false,
"locked": {
"lastModified": 1732806396,
"narHash": "sha256-e0bpPySdJf0F68Ndanwm+KWHgQiZ0s7liLhvJSWDNsA=",
"owner": "tinted-theming",
"repo": "base16-vim",
"rev": "577fe8125d74ff456cf942c733a85d769afe58b7",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "base16-vim",
"rev": "577fe8125d74ff456cf942c733a85d769afe58b7",
"type": "github"
}
},
@ -62,11 +78,11 @@
},
"locked": {
"dir": "pkgs/firefox-addons",
"lastModified": 1722917006,
"narHash": "sha256-29qBs5HlcegrLP8oQe8T9hHx7u94TEz9ivPwZlorAJU=",
"lastModified": 1742449434,
"narHash": "sha256-UVz7NhPzbEWey6mMJU3Jwjqfbp0xH0iKZDuoRjhZEN0=",
"owner": "rycee",
"repo": "nur-expressions",
"rev": "8552abe55a4f364d94efb84502a550c2c9c3101c",
"rev": "1b0b14b56353040142e0ef5b0ab37743bbbf4ab4",
"type": "gitlab"
},
"original": {
@ -76,14 +92,30 @@
"type": "gitlab"
}
},
"firefox-gnome-theme": {
"flake": false,
"locked": {
"lastModified": 1741628778,
"narHash": "sha256-RsvHGNTmO2e/eVfgYK7g+eYEdwwh7SbZa+gZkT24MEA=",
"owner": "rafaelmardojai",
"repo": "firefox-gnome-theme",
"rev": "5a81d390bb64afd4e81221749ec4bffcbeb5fa80",
"type": "github"
},
"original": {
"owner": "rafaelmardojai",
"repo": "firefox-gnome-theme",
"type": "github"
}
},
"flake-compat": {
"locked": {
"lastModified": 1696426674,
"narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
"rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
"revCount": 57,
"lastModified": 1733328505,
"narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=",
"rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec",
"revCount": 69,
"type": "tarball",
"url": "https://api.flakehub.com/f/pinned/edolstra/flake-compat/1.0.1/018afb31-abd1-7bff-a5e4-cff7e18efb7a/source.tar.gz"
"url": "https://api.flakehub.com/f/pinned/edolstra/flake-compat/1.1.0/01948eb7-9cba-704f-bbf3-3fa956735b52/source.tar.gz"
},
"original": {
"type": "tarball",
@ -95,11 +127,33 @@
"nixpkgs-lib": "nixpkgs-lib"
},
"locked": {
"lastModified": 1722555600,
"narHash": "sha256-XOQkdLafnb/p9ij77byFQjDf5m5QYl9b2REiVClC+x4=",
"lastModified": 1741352980,
"narHash": "sha256-+u2UunDA4Cl5Fci3m7S643HzKmIDAe+fiXrLqYsR2fs=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "8471fe90ad337a8074e957b69ca4d0089218391d",
"rev": "f4330d22f1c5d2ba72d3d22df5597d123fdb60a9",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
"flake-parts_2": {
"inputs": {
"nixpkgs-lib": [
"stylix",
"nur",
"nixpkgs"
]
},
"locked": {
"lastModified": 1733312601,
"narHash": "sha256-4pDvzqnegAfRkPwO3wmwBhVi/Sye1mzps0zHWYnP88c=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "205b12d8b7cd4802fbcb8e8ef6a0f1408781a4f9",
"type": "github"
},
"original": {
@ -115,11 +169,11 @@
]
},
"locked": {
"lastModified": 1710146030,
"narHash": "sha256-SZ5L6eA7HJ/nmkzGG7/ISclqe6oZdOZTNoesiInkXPQ=",
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "b1d9ab70662946ef0850d488da1c9019f3a9752a",
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
@ -128,6 +182,69 @@
"type": "github"
}
},
"flake-utils_2": {
"inputs": {
"systems": [
"stylix",
"systems"
]
},
"locked": {
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"fromYaml": {
"flake": false,
"locked": {
"lastModified": 1731966426,
"narHash": "sha256-lq95WydhbUTWig/JpqiB7oViTcHFP8Lv41IGtayokA8=",
"owner": "SenchoPens",
"repo": "fromYaml",
"rev": "106af9e2f715e2d828df706c386a685698f3223b",
"type": "github"
},
"original": {
"owner": "SenchoPens",
"repo": "fromYaml",
"type": "github"
}
},
"git-hooks": {
"inputs": {
"flake-compat": [
"stylix",
"flake-compat"
],
"gitignore": "gitignore_2",
"nixpkgs": [
"stylix",
"nixpkgs"
]
},
"locked": {
"lastModified": 1741379162,
"narHash": "sha256-srpAbmJapkaqGRE3ytf3bj4XshspVR5964OX5LfjDWc=",
"owner": "cachix",
"repo": "git-hooks.nix",
"rev": "b5a62751225b2f62ff3147d0a334055ebadcd5cc",
"type": "github"
},
"original": {
"owner": "cachix",
"repo": "git-hooks.nix",
"type": "github"
}
},
"gitignore": {
"inputs": {
"nixpkgs": [
@ -149,6 +266,45 @@
"type": "github"
}
},
"gitignore_2": {
"inputs": {
"nixpkgs": [
"stylix",
"git-hooks",
"nixpkgs"
]
},
"locked": {
"lastModified": 1709087332,
"narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
"owner": "hercules-ci",
"repo": "gitignore.nix",
"rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "gitignore.nix",
"type": "github"
}
},
"gnome-shell": {
"flake": false,
"locked": {
"lastModified": 1732369855,
"narHash": "sha256-JhUWbcYPjHO3Xs3x9/Z9RuqXbcp5yhPluGjwsdE2GMg=",
"owner": "GNOME",
"repo": "gnome-shell",
"rev": "dadd58f630eeea41d645ee225a63f719390829dc",
"type": "github"
},
"original": {
"owner": "GNOME",
"ref": "47.2",
"repo": "gnome-shell",
"type": "github"
}
},
"home-manager": {
"inputs": {
"nixpkgs": [
@ -156,11 +312,11 @@
]
},
"locked": {
"lastModified": 1722936497,
"narHash": "sha256-UBst8PkhY0kqTgdKiR8MtTBt4c1XmjJoOV11efjsC/o=",
"lastModified": 1742447757,
"narHash": "sha256-Q0KXcHQmum8L6IzGhhkVhjFMKY6BvYa/rhmLP26Ws8o=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "a6c743980e23f4cef6c2a377f9ffab506568413a",
"rev": "94605dcadefeaff6b35c8931c9f38e4f4dc7ad0a",
"type": "github"
},
"original": {
@ -176,11 +332,11 @@
]
},
"locked": {
"lastModified": 1722636442,
"narHash": "sha256-+7IS0n3/F0I5j6ZbrVlLcIIPHY3o+/vLAqg/G48sG+w=",
"lastModified": 1742213523,
"narHash": "sha256-I8JVdQRu8eWvY5W8XWYZkdd5pojDHkxeqQV7mMIsbhs=",
"owner": "hyprwm",
"repo": "contrib",
"rev": "9d67858b437d4a1299be496d371b66fc0d3e01f6",
"rev": "bd81329944be53b0ffb99e05864804b95f1d7c65",
"type": "github"
},
"original": {
@ -189,28 +345,6 @@
"type": "github"
}
},
"nix-github-actions": {
"inputs": {
"nixpkgs": [
"system_tools",
"poetry2nix",
"nixpkgs"
]
},
"locked": {
"lastModified": 1703863825,
"narHash": "sha256-rXwqjtwiGKJheXB43ybM8NwWB8rO2dSRrEqes0S7F5Y=",
"owner": "nix-community",
"repo": "nix-github-actions",
"rev": "5163432afc817cf8bd1f031418d1869e4c9d5547",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "nix-github-actions",
"type": "github"
}
},
"nix-index-database": {
"inputs": {
"nixpkgs": [
@ -218,11 +352,11 @@
]
},
"locked": {
"lastModified": 1722740924,
"narHash": "sha256-UQPgA5d8azLZuDHZMPmvDszhuKF1Ek89SrTRtqsQ4Ss=",
"lastModified": 1742174123,
"narHash": "sha256-pDNzMoR6m1ZSJToZQ6XDTLVSdzIzmFl1b8Pc3f7iV6Y=",
"owner": "Mic92",
"repo": "nix-index-database",
"rev": "97ca0a0fca0391de835f57e44f369a283e37890f",
"rev": "2cfb4e1ca32f59dd2811d7a6dd5d4d1225f0955c",
"type": "github"
},
"original": {
@ -233,11 +367,11 @@
},
"nixlib": {
"locked": {
"lastModified": 1722732880,
"narHash": "sha256-do2Mfm3T6SR7a5A804RhjQ+JTsF5hk4JTPGjCTRM/m8=",
"lastModified": 1736643958,
"narHash": "sha256-tmpqTSWVRJVhpvfSN9KXBvKEXplrwKnSZNAoNPf/S/s=",
"owner": "nix-community",
"repo": "nixpkgs.lib",
"rev": "8bebd4c74f368aacb047f0141db09ec6b339733c",
"rev": "1418bc28a52126761c02dd3d89b2d8ca0f521181",
"type": "github"
},
"original": {
@ -254,11 +388,11 @@
]
},
"locked": {
"lastModified": 1722819251,
"narHash": "sha256-f99it92NQSZsrZ8AYbiwAUfrtb/ZpZRqUsl4q6rMA5s=",
"lastModified": 1742217219,
"narHash": "sha256-pLRjj0jTL1TloB0ptEwVF51IJJX8a17dSxg+gqiWb30=",
"owner": "nix-community",
"repo": "nixos-generators",
"rev": "c8c3a20b8191819219dba1af79388aa6d555f634",
"rev": "83900d5154d840dfae1e0367c5290f59b9dccf03",
"type": "github"
},
"original": {
@ -269,11 +403,11 @@
},
"nixos-hardware": {
"locked": {
"lastModified": 1722332872,
"narHash": "sha256-2xLM4sc5QBfi0U/AANJAW21Bj4ZX479MHPMPkB+eKBU=",
"lastModified": 1742376361,
"narHash": "sha256-VFMgJkp/COvkt5dnkZB4D2szVdmF6DGm5ZdVvTUy61c=",
"owner": "NixOS",
"repo": "nixos-hardware",
"rev": "14c333162ba53c02853add87a0000cbd7aa230c2",
"rev": "daaae13dff0ecc692509a1332ff9003d9952d7a9",
"type": "github"
},
"original": {
@ -289,15 +423,14 @@
],
"nixpkgs": [
"nixpkgs"
],
"search": "search"
]
},
"locked": {
"lastModified": 1722894082,
"narHash": "sha256-TEJNZ/8er454mMv+YyLjWpz3yTPuSi6Nq+Tg0N8E80M=",
"lastModified": 1742419596,
"narHash": "sha256-+Bw1HR4oX6vUbCMhwWbW+Nr20F+UesNdUd7b17s3ESE=",
"owner": "SuperSandro2000",
"repo": "nixos-modules",
"rev": "b871b68e76b092dfbc6fad38a8ebea99893be498",
"rev": "82491ff311152b87fe7cfbdaf545f727e0750aa9",
"type": "github"
},
"original": {
@ -308,73 +441,71 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1722813957,
"narHash": "sha256-IAoYyYnED7P8zrBFMnmp7ydaJfwTnwcnqxUElC1I26Y=",
"lastModified": 1742450798,
"narHash": "sha256-lfOAAaX68Ed7R6Iy2nbFAkGj6B8kHBp3nqZhgZjxR5c=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "cb9a96f23c491c081b38eab96d22fa958043c9fa",
"rev": "b64ec1944ea40d9f3920f938e17ed39a9978c6c7",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-unstable",
"ref": "nixos-unstable-small",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs-lib": {
"locked": {
"lastModified": 1722555339,
"narHash": "sha256-uFf2QeW7eAHlYXuDktm9c25OxOyCoUOQmh5SZ9amE5Q=",
"type": "tarball",
"url": "https://github.com/NixOS/nixpkgs/archive/a5d394176e64ab29c852d03346c1fc9b0b7d33eb.tar.gz"
"lastModified": 1740877520,
"narHash": "sha256-oiwv/ZK/2FhGxrCkQkB83i7GnWXPPLzoqFHpDD3uYpk=",
"owner": "nix-community",
"repo": "nixpkgs.lib",
"rev": "147dee35aab2193b174e4c0868bd80ead5ce755c",
"type": "github"
},
"original": {
"type": "tarball",
"url": "https://github.com/NixOS/nixpkgs/archive/a5d394176e64ab29c852d03346c1fc9b0b7d33eb.tar.gz"
"owner": "nix-community",
"repo": "nixpkgs.lib",
"type": "github"
}
},
"nixpkgs-stable": {
"locked": {
"lastModified": 1722869614,
"narHash": "sha256-7ojM1KSk3mzutD7SkrdSflHXEujPvW1u7QuqWoTLXQU=",
"lastModified": 1742268799,
"narHash": "sha256-IhnK4LhkBlf14/F8THvUy3xi/TxSQkp9hikfDZRD4Ic=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "883180e6550c1723395a3a342f830bfc5c371f6b",
"rev": "da044451c6a70518db5b730fe277b70f494188f1",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-24.05",
"ref": "nixos-24.11",
"repo": "nixpkgs",
"type": "github"
}
},
"poetry2nix": {
"nur": {
"inputs": {
"flake-utils": [
"system_tools",
"flake-utils"
],
"nix-github-actions": "nix-github-actions",
"flake-parts": "flake-parts_2",
"nixpkgs": [
"system_tools",
"stylix",
"nixpkgs"
],
"systems": "systems",
"treefmt-nix": "treefmt-nix"
},
"locked": {
"lastModified": 1723343306,
"narHash": "sha256-/6sRkPq7/5weX2y0V8sQ29Sz35nt8kyj+BsFtkhgbJE=",
"lastModified": 1741693509,
"narHash": "sha256-emkxnsZstiJWmGACimyAYqIKz2Qz5We5h1oBVDyQjLw=",
"owner": "nix-community",
"repo": "poetry2nix",
"rev": "4a1c112ff0c67f496573dc345bd0b2247818fc29",
"repo": "NUR",
"rev": "5479646b2574837f1899da78bdf9a48b75a9fb27",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "poetry2nix",
"repo": "NUR",
"type": "github"
}
},
@ -386,17 +517,14 @@
"gitignore": "gitignore",
"nixpkgs": [
"nixpkgs"
],
"nixpkgs-stable": [
"nixpkgs-stable"
]
},
"locked": {
"lastModified": 1722857853,
"narHash": "sha256-3Zx53oz/MSIyevuWO/SumxABkrIvojnB7g9cimxkhiE=",
"lastModified": 1742300892,
"narHash": "sha256-QmF0proyjXI9YyZO9GZmc7/uEu5KVwCtcdLsKSoxPAI=",
"owner": "cachix",
"repo": "git-hooks.nix",
"rev": "06939f6b7ec4d4f465bf3132a05367cccbbf64da",
"rev": "ea26a82dda75bee6783baca6894040c8e6599728",
"type": "github"
},
"original": {
@ -407,7 +535,6 @@
},
"root": {
"inputs": {
"attic": "attic",
"firefox-addons": "firefox-addons",
"flake-compat": "flake-compat",
"flake-parts": "flake-parts",
@ -423,7 +550,7 @@
"pre-commit-hooks": "pre-commit-hooks",
"rust-overlay": "rust-overlay",
"sops-nix": "sops-nix",
"system_tools": "system_tools",
"stylix": "stylix",
"systems": "systems_2",
"wired-notify": "wired-notify"
}
@ -435,11 +562,11 @@
]
},
"locked": {
"lastModified": 1722910815,
"narHash": "sha256-v6Vk/xlABhw2QzOa6xh3Jx/IvmlbKbOazFM+bDFQlWU=",
"lastModified": 1742437918,
"narHash": "sha256-Vflb6KJVDikFcM9E231mRN88uk4+jo7BWtaaQMifthI=",
"owner": "oxalica",
"repo": "rust-overlay",
"rev": "7df2ac544c203d21b63aac23bfaec7f9b919a733",
"rev": "f03085549609e49c7bcbbee86a1949057d087199",
"type": "github"
},
"original": {
@ -448,46 +575,18 @@
"type": "github"
}
},
"search": {
"inputs": {
"flake-utils": [
"nixos-modules",
"flake-utils"
],
"nixpkgs": [
"nixos-modules",
"nixpkgs"
]
},
"locked": {
"lastModified": 1722493084,
"narHash": "sha256-ktjl908zZKWcGdMyz6kX1kHSg7LFFGPYBvTi9FgQleM=",
"owner": "nuschtos",
"repo": "search",
"rev": "3f5abffa5f28b4ac3c9212c81c5e8d2d22876071",
"type": "github"
},
"original": {
"owner": "nuschtos",
"repo": "search",
"type": "github"
}
},
"sops-nix": {
"inputs": {
"nixpkgs": [
"nixpkgs"
],
"nixpkgs-stable": [
"nixpkgs-stable"
]
},
"locked": {
"lastModified": 1722897572,
"narHash": "sha256-3m/iyyjCdRBF8xyehf59QlckIcmShyTesymSb+N4Ap4=",
"lastModified": 1742406979,
"narHash": "sha256-r0aq70/3bmfjTP+JZs4+XV5SgmCtk1BLU4CQPWGtA7o=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "8ae477955dfd9cbf5fa4eb82a8db8ddbb94e79d9",
"rev": "1770be8ad89e41f1ed5a60ce628dd10877cb3609",
"type": "github"
},
"original": {
@ -496,27 +595,44 @@
"type": "github"
}
},
"system_tools": {
"stylix": {
"inputs": {
"flake-utils": [
"flake-utils"
"base16": "base16",
"base16-fish": "base16-fish",
"base16-helix": "base16-helix",
"base16-vim": "base16-vim",
"firefox-gnome-theme": "firefox-gnome-theme",
"flake-compat": [
"flake-compat"
],
"flake-utils": "flake-utils_2",
"git-hooks": "git-hooks",
"gnome-shell": "gnome-shell",
"home-manager": [
"home-manager"
],
"nixpkgs": [
"nixpkgs"
],
"poetry2nix": "poetry2nix"
"nur": "nur",
"systems": "systems",
"tinted-foot": "tinted-foot",
"tinted-kitty": "tinted-kitty",
"tinted-schemes": "tinted-schemes",
"tinted-tmux": "tinted-tmux",
"tinted-zed": "tinted-zed"
},
"locked": {
"lastModified": 1723392261,
"narHash": "sha256-Csa4yuYWcB3aLf7VP14v+Mp0lRzOOCCt9BdmAeeQcYU=",
"owner": "RAD-Development",
"repo": "system_tools",
"rev": "51bcc923b2b3cfb832b05687a01805c5a905b0c9",
"lastModified": 1742422444,
"narHash": "sha256-Djg5uMhIDPdFOZ7kTrqNlHaAqcx/4rp7BofZLsUHkLY=",
"owner": "danth",
"repo": "stylix",
"rev": "f122d70925ca44e5ee4216661769437ab36a6a3f",
"type": "github"
},
"original": {
"owner": "RAD-Development",
"repo": "system_tools",
"owner": "danth",
"repo": "stylix",
"type": "github"
}
},
@ -530,8 +646,9 @@
"type": "github"
},
"original": {
"id": "systems",
"type": "indirect"
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"systems_2": {
@ -549,20 +666,102 @@
"type": "github"
}
},
"tinted-foot": {
"flake": false,
"locked": {
"lastModified": 1726913040,
"narHash": "sha256-+eDZPkw7efMNUf3/Pv0EmsidqdwNJ1TaOum6k7lngDQ=",
"owner": "tinted-theming",
"repo": "tinted-foot",
"rev": "fd1b924b6c45c3e4465e8a849e67ea82933fcbe4",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "tinted-foot",
"rev": "fd1b924b6c45c3e4465e8a849e67ea82933fcbe4",
"type": "github"
}
},
"tinted-kitty": {
"flake": false,
"locked": {
"lastModified": 1716423189,
"narHash": "sha256-2xF3sH7UIwegn+2gKzMpFi3pk5DlIlM18+vj17Uf82U=",
"owner": "tinted-theming",
"repo": "tinted-kitty",
"rev": "eb39e141db14baef052893285df9f266df041ff8",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "tinted-kitty",
"rev": "eb39e141db14baef052893285df9f266df041ff8",
"type": "github"
}
},
"tinted-schemes": {
"flake": false,
"locked": {
"lastModified": 1741468895,
"narHash": "sha256-YKM1RJbL68Yp2vESBqeZQBjTETXo8mCTTzLZyckCfZk=",
"owner": "tinted-theming",
"repo": "schemes",
"rev": "47c8c7726e98069cade5827e5fb2bfee02ce6991",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "schemes",
"type": "github"
}
},
"tinted-tmux": {
"flake": false,
"locked": {
"lastModified": 1740877430,
"narHash": "sha256-zWcCXgdC4/owfH/eEXx26y5BLzTrefjtSLFHWVD5KxU=",
"owner": "tinted-theming",
"repo": "tinted-tmux",
"rev": "d48ee86394cbe45b112ba23ab63e33656090edb4",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "tinted-tmux",
"type": "github"
}
},
"tinted-zed": {
"flake": false,
"locked": {
"lastModified": 1725758778,
"narHash": "sha256-8P1b6mJWyYcu36WRlSVbuj575QWIFZALZMTg5ID/sM4=",
"owner": "tinted-theming",
"repo": "base16-zed",
"rev": "122c9e5c0e6f27211361a04fae92df97940eccf9",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "base16-zed",
"type": "github"
}
},
"treefmt-nix": {
"inputs": {
"nixpkgs": [
"system_tools",
"poetry2nix",
"stylix",
"nur",
"nixpkgs"
]
},
"locked": {
"lastModified": 1719749022,
"narHash": "sha256-ddPKHcqaKCIFSFc/cvxS14goUhCOAwsM1PbMr0ZtHMg=",
"lastModified": 1733222881,
"narHash": "sha256-JIPcz1PrpXUCbaccEnrcUS8jjEb/1vJbZz5KkobyFdM=",
"owner": "numtide",
"repo": "treefmt-nix",
"rev": "8df5ff62195d4e67e2264df0b7f5e8c9995fd0bd",
"rev": "49717b5af6f80172275d47a418c9719a31a78b53",
"type": "github"
},
"original": {
@ -584,11 +783,11 @@
]
},
"locked": {
"lastModified": 1721535277,
"narHash": "sha256-A6qIy2n3aomj5XooUmqz0s3G/A44Y3+GoFrGxIOolIM=",
"lastModified": 1730615238,
"narHash": "sha256-u/ZGtyEUvAkFOBgLo2YldOx0GKjE3/esWpWruRD376E=",
"owner": "Toqozz",
"repo": "wired-notify",
"rev": "d079126c43f22179650f3d4c59f580c5993b9217",
"rev": "1632418aa15889343028261663e81d8b5595860e",
"type": "github"
},
"original": {

View File

@ -1,22 +1,21 @@
{
description = "NixOS configuration for RAD-Development Servers";
description = "NixOS configuration for my machines";
nixConfig = {
substituters = [
"https://cache.nixos.org/?priority=1&want-mass-query=true"
"https://attic.alicehuston.xyz/cache-nix-dot?priority=4&want-mass-query=true"
"https://nix-community.cachix.org/?priority=10&want-mass-query=true"
"https://attic.nayeonie.com/nix-cache"
];
trusted-substituters = [
"https://cache.nixos.org"
"https://attic.alicehuston.xyz/cache-nix-dot"
"https://nix-community.cachix.org"
"https://attic.nayeonie.com/nix-cache"
];
trusted-public-keys = [
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
"cache.alicehuston.xyz:SJAm8HJVTWUjwcTTLAoi/5E1gUOJ0GWum2suPPv7CUo=%"
"cache-nix-dot:Od9KN34LXc6Lu7y1ozzV1kIXZa8coClozgth/SYE7dU="
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
"nix-cache:trR+y5nwpQHR4hystoogubFmp97cewkjWeqqbygRQRs="
];
trusted-users = [ "root" ];
};
@ -25,19 +24,21 @@
flake-compat.url = "https://flakehub.com/f/edolstra/flake-compat/1.tar.gz";
flake-parts.url = "github:hercules-ci/flake-parts";
nixos-hardware.url = "github:NixOS/nixos-hardware";
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
nixpkgs-stable.url = "github:nixos/nixpkgs/nixos-24.05";
#nixpkgs.url = "github:nuschtos/nuschtpkgs/nixos-unstable";
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable-small";
#nixpkgs.url = "github:nixos/nixpkgs/1d2fe0135f360c970aee1d57a53f816f3c9bddae?narHash=sha256-Up7YlXIupmT7fEtC4Oj676M91INg0HAoamiswAsA3rc%3D";
nixpkgs-stable.url = "github:nixos/nixpkgs/nixos-24.11";
systems.url = "github:nix-systems/default";
attic = {
url = "github:zhaofengli/attic";
inputs = {
nixpkgs.follows = "nixpkgs";
nixpkgs-stable.follows = "nixpkgs-stable";
flake-compat.follows = "flake-compat";
flake-utils.follows = "flake-utils";
};
};
# attic = {
# url = "github:zhaofengli/attic";
# inputs = {
# nixpkgs.follows = "nixpkgs";
# nixpkgs-stable.follows = "nixpkgs-stable";
# flake-compat.follows = "flake-compat";
# flake-parts.follows = "flake-parts";
# };
# };
firefox-addons = {
url = "gitlab:rycee/nur-expressions?dir=pkgs/firefox-addons";
@ -84,7 +85,6 @@
url = "github:cachix/git-hooks.nix";
inputs = {
nixpkgs.follows = "nixpkgs";
nixpkgs-stable.follows = "nixpkgs-stable";
flake-compat.follows = "flake-compat";
};
};
@ -100,15 +100,15 @@
url = "github:Mic92/sops-nix";
inputs = {
nixpkgs.follows = "nixpkgs";
nixpkgs-stable.follows = "nixpkgs-stable";
};
};
system_tools = {
url = "github:RAD-Development/system_tools";
stylix = {
url = "github:danth/stylix";
inputs = {
flake-compat.follows = "flake-compat";
home-manager.follows = "home-manager";
nixpkgs.follows = "nixpkgs";
flake-utils.follows = "flake-utils";
};
};
@ -150,17 +150,22 @@
rec {
inherit lib; # for allowing use of custom functions in nix repl
hydraJobs = import ./hydra/jobs.nix { inherit inputs outputs systems; };
#hydraJobs = import ./hydra/jobs.nix { inherit inputs outputs systems; };
formatter = forEachSystem (system: nixpkgs.legacyPackages.${system}.nixfmt-rfc-style);
nixosConfigurations = genSystems inputs src (src + "/systems");
nixosConfigurations = genSystems inputs outputs src (src + "/systems");
images = {
install-iso = getImages nixosConfigurations "install-iso";
iso = getImages nixosConfigurations "iso";
qcow = getImages nixosConfigurations "qcow";
};
packages.x86_64-linux.lego-latest =
nixpkgs.legacyPackages.x86_64-linux.callPackage ./pkgs/lego-latest/default.nix
{ };
checks = import ./checks.nix { inherit inputs forEachSystem formatter; };
devShells = import ./shell.nix { inherit inputs forEachSystem checks; };
};
}

View File

@ -1,67 +0,0 @@
-----BEGIN PGP PUBLIC KEY BLOCK-----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=in5n
-----END PGP PUBLIC KEY BLOCK-----

43
lib/container-utils.nix Normal file
View File

@ -0,0 +1,43 @@
{ lib, ... }:
{
# Given a attrset of images and a function which generates an image spec,
# generates a set of containers (although this could in theory be used for
# other things... I'd like to see people try)
#
# container set must be in the below format
# { container-name = {image = "image-uri"; scale = n;}; }
# where image-uri gets passed in to the container-spec function as a custom
# parameter, and scale is an integer that generates the containers
#
# container-spec must be a function which accepts two parameter (the
# container name and image name) and ideally returns an oci-compliant
# container.
#
# args:
# containers: an AttrSet which specifies the imageUri and scale of each
# container
# container-spec: a function which produces an oci-compliant container spec
#
# type:
# AttrSet -> (String -> AttrSet -> AttrSet) -> AttrSet
createTemplatedContainers =
containers: container-spec:
builtins.listToAttrs (
lib.flatten (
lib.mapAttrsToList (
name: value:
(map (
num:
let
container-name = "${name}-${toString num}";
in
{
name = container-name;
value = container-spec container-name value.image;
}
) (lib.lists.range 1 value.scale))
) containers
)
);
}

View File

@ -3,6 +3,7 @@
# create rad-dev namespace for lib
rad-dev = rec {
systems = import ./systems.nix { inherit lib; };
container-utils = import ./container-utils.nix { inherit lib; };
# any(), but checks if any value in the list is true
#
@ -56,5 +57,21 @@
# type:
# fileList :: Path -> String -> [Path]
fileList = dir: map (file: dir + "/${file}") (ls dir);
# reduce an attribute set to a string
#
# example:
# given attrset {host1 = "palatine-hill"; host2 = "jeeves";}
# and func (host: hostname: host + " is " + hostname + ", " )
# mapAttrsToString would return 'host1 is palatine-hill, host2 is jeeves, '
#
# args:
# func: an function to apply to attrSet to turn each entry into one string
# attrSet: an attribute set to reduce
#
# type:
# mapAttrsToString :: AttrSet -> (String -> Any -> String) -> String
mapAttrsToString =
func: attrSet: (lib.foldl' (cur: next: cur + next) "" (lib.mapAttrsToList func attrSet));
};
}

View File

@ -149,6 +149,7 @@ rec {
configPath,
hostname,
inputs,
outputs,
src,
users,
home ? true,
@ -160,7 +161,12 @@ rec {
lib.nixosSystem {
inherit system;
specialArgs = {
inherit inputs server system;
inherit
inputs
outputs
server
system
;
};
modules =
[
@ -194,7 +200,7 @@ rec {
# type:
# genSystems :: AttrSet -> Path -> Path -> AttrSet
genSystems =
inputs: src: path:
inputs: outputs: src: path:
builtins.listToAttrs (
map (
name:
@ -205,7 +211,12 @@ rec {
inherit name;
value = constructSystem (
{
inherit inputs src configPath;
inherit
inputs
outputs
src
configPath
;
hostname = name;
}
// import configPath { inherit inputs; }

View File

@ -1,6 +1,7 @@
{
lib,
inputs,
outputs,
server,
system,
...
@ -14,7 +15,7 @@
programs = {
zsh.enable = true;
fish.enable = true;
fish.enable = false;
};
users = {
@ -26,10 +27,12 @@
useUserPackages = true;
sharedModules = [ inputs.sops-nix.homeManagerModules.sops ];
extraSpecialArgs = {
inherit inputs;
inherit inputs outputs;
machineConfig = {
inherit server system;
};
};
};
networking.firewall.enable = lib.mkDefault true;
}

View File

@ -2,6 +2,7 @@
config,
lib,
libS,
pkgs,
...
}:
@ -34,7 +35,6 @@ in
config.boot = lib.mkIf cfg.default {
supportedFilesystems = [ cfg.filesystem ];
tmp.useTmpfs = true;
kernelPackages = config.boot.zfs.package.latestCompatibleLinuxPackages;
kernelParams =
[ "nordrand" ]
++ lib.optional (cfg.cpuType == "amd") "kvm-amd"

View File

@ -7,8 +7,13 @@
extraGroups = [ "docker" ];
uid = 600;
};
groups.docker-service = {
gid = 600;
groups = {
docker-service = {
gid = 600;
};
haproxy = {
gid = 99;
};
};
};

View File

@ -6,7 +6,7 @@ in
options = {
services.rad-dev.k3s-net = {
enable = lib.mkOption {
default = true;
default = false;
example = true;
description = "Whether to enable k3s-net.";
type = lib.types.bool;

View File

@ -13,19 +13,15 @@
connect-timeout = 20;
substituters = [
"https://cache.nixos.org/?priority=1&want-mass-query=true"
"https://attic.alicehuston.xyz/cache-nix-dot?priority=4&want-mass-query=true"
"https://nix-community.cachix.org/?priority=10&want-mass-query=true"
];
trusted-substituters = [
"https://cache.nixos.org"
"https://attic.alicehuston.xyz/cache-nix-dot"
"https://nix-community.cachix.org"
];
trusted-public-keys = [
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
"cache.alicehuston.xyz:SJAm8HJVTWUjwcTTLAoi/5E1gUOJ0GWum2suPPv7CUo=%"
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
"cache-nix-dot:Od9KN34LXc6Lu7y1ozzV1kIXZa8coClozgth/SYE7dU="
];
trusted-users = [
"root"

View File

@ -2,6 +2,7 @@
{
services.openssh = {
enable = lib.mkDefault true;
openFirewall = lib.mkDefault true;
fixPermissions = true;
extraConfig = "StreamLocalBindUnlink yes";

View File

@ -3,7 +3,7 @@
{
services.locate = {
enable = lib.mkDefault true;
localuser = lib.mkDefault null;
# localuser = lib.mkDefault null;
package = lib.mkDefault pkgs.plocate;
};
}

View File

@ -4,7 +4,7 @@
enable = lib.mkDefault true;
repo.dotfiles = {
enable = lib.mkDefault true;
ssh-key = lib.mkDefault "/root/.ssh/id_ed25519_ghdeploy";
ssh-key = lib.mkDefault "/root/.ssh/id_ed25519_giteadeploy";
path = lib.mkDefault /root/dotfiles;
};
};
@ -14,6 +14,6 @@
flags = [ "--accept-flake-config" ];
randomizedDelaySec = "1h";
persistent = true;
flake = "github:RAD-Development/nix-dotfiles";
flake = "git+ssh://nayeonie.com/ahuston-0/nix-dotfiles.git";
};
}

View File

@ -0,0 +1,70 @@
# source: https://github.com/kylesferrazza/nix/blob/288edcd1d34884b9b7083c6d718fbe10febe0623/overlay/bitwarden-rofi.nix
# TODO https://github.com/mattydebie/bitwarden-rofi/issues/34
{
stdenv,
lib,
fetchFromGitHub,
makeWrapper,
unixtools,
xsel,
xclip,
wl-clipboard,
xdotool,
ydotool,
bitwarden-cli,
rofi,
jq,
keyutils,
libnotify,
}:
let
bins = [
jq
bitwarden-cli
unixtools.getopt
rofi
xsel
xclip
wl-clipboard
xdotool
ydotool
keyutils
libnotify
];
in
stdenv.mkDerivation {
pname = "bitwarden-rofi";
version = "git-2024-08-22";
src = fetchFromGitHub {
owner = "mattydebie";
repo = "bitwarden-rofi";
rev = "8be76fdd647c2bdee064e52603331d8e6ed5e8e2";
sha256 = "1h5d21kv8g5g725chn3n0i1frvmsrk3pm67lfxqcg50kympg0wwd";
};
buildInputs = [ makeWrapper ];
installPhase = ''
mkdir -p "$out/bin"
install -Dm755 "bwmenu" "$out/bin/bwmenu"
install -Dm755 "lib-bwmenu" "$out/bin/lib-bwmenu" # TODO don't put this in bin
install -Dm755 -d "$out/usr/share/doc/bitwarden-rofi"
install -Dm755 -d "$out/usr/share/doc/bitwarden-rofi/img"
install -Dm644 "README.md" "$out/usr/share/doc/bitwarden-rofi/README.md"
install -Dm644 img/* "$out/usr/share/doc/bitwarden-rofi/img/"
wrapProgram "$out/bin/bwmenu" --prefix PATH : ${lib.makeBinPath bins}
'';
meta = with lib; {
description = "Wrapper for Bitwarden and Rofi";
homepage = "https://github.com/mattydebie/bitwarden-rofi";
license = licenses.gpl3;
platforms = platforms.linux;
};
}

View File

@ -0,0 +1,39 @@
{
lib,
fetchFromGitHub,
buildGoModule,
}:
buildGoModule rec {
pname = "lego";
version = "4.21.0";
src = fetchFromGitHub {
owner = "go-acme";
repo = pname;
rev = "v${version}";
hash = "sha256-3dSvQfkBNh8Bt10nv4xGplv4iY3gWvDu2EDN6UovSdc=";
};
vendorHash = "sha256-teA6fnKl4ATePOYL/zuemyiVy9jgsxikqmuQJwwA8wE=";
doCheck = false;
subPackages = [ "cmd/lego" ];
ldflags = [
"-s"
"-w"
"-X main.version=${version}"
];
meta = with lib; {
description = "Let's Encrypt client and ACME library written in Go";
license = licenses.mit;
homepage = "https://go-acme.github.io/lego/";
maintainers = teams.acme.members;
mainProgram = "lego";
};
#passthru.tests.lego = nixosTests.acme;
}

View File

@ -45,6 +45,10 @@ forEachSystem (
treefmt
statix
nixfmt-rfc-style
jsonfmt
mdformat
shfmt
yamlfmt
];
};
in

View File

@ -1,4 +1,4 @@
disabled = ["empty_pattern"]
nix_version = '2.23'
nix_version = '2.25'
ignore = ['.direnv']

View File

@ -0,0 +1,438 @@
#footer .group,
.post fieldset fieldset,
fieldset fieldset {
background: none;
}
#header {
background: #000 url('https://media.archiveofourown.org/news/milestones/2024-08-seventeen-years-otw/2024-08-seventeen-years-otw-pattern.jpg');
background-size: 350px;
}
#header .heading a,
#header .primary .dropdown a:focus,
#header .heading a:visited,
#main .pagination .current,
h2 {
color: #ffe8b4;
}
#header .clear,
#footer {
border-color: #191919;
}
#header .actions a[href="/menu/fandoms"],
#header .actions a[href="/menu/browse"],
#header .actions a[href="/menu/search"],
#header .actions a[href="/menu/about"] {
color: #fff;
}
#footer ul {
background: url('https://live.staticflickr.com/7284/9616997915_4194b6c6f7_h.jpg');
background-size: 350px;
}
#footer ul li:nth-child(1) ul,
#footer ul li:nth-child(2) ul,
#footer ul li:nth-child(3) ul,
#footer ul li:nth-child(4) ul {
background: rgba(0, 0, 0, 0.0);
}
#header .primary {
background: #8a1a10;
}
#footer {
background: #8a1a10;
}
input[type="text"],
textarea,
select {
background: #222;
color: #fff;
}
select:focus {
background: #2a2a2a;
}
option {
background: #555;
color: #fff;
}
#work form fieldset.work.meta dl dd.warning.required fieldset,
#main form fieldset.work.meta dl dd.warning.required fieldset {
color: #fff;
}
#bookmark-form form {
background: #2a2a2a;
color: #fff;
}
#error {
color: #191919;
}
fieldset,
.verbose fieldset {
border-color: #404040;
background: #191919;
border: 1px solid #595959;
}
.search [role=tooltip] {
background: #333;
border: 1px solid #666;
}
#main a:visited {
color: #ccc;
}
#main a.tag:visited:hover {
color: #111;
}
body,
.group,
.group .group,
.region,
.flash,
form dl,
#main .verbose legend,
.notice,
ul.notes,
table,
th,
td:hover,
tr:hover,
.symbol .question:hover,
#modal,
.ui-sortable li,
.required .autocomplete,
.autocomplete .notice,
.system .intro,
.comment_error,
.kudos_error,
div.dynamic,
.dynamic form,
#ui-datepicker-div,
.ui-datepicker table {
background: #191919;
color: #eee;
border-color: #222;
outline: #111;
box-shadow: none;
}
#header .actions a:hover,
#header .actions a:focus,
#header .dropdown:hover a,
#header .open a,
#header .menu,
#small_login,
.group.listbox,
fieldset fieldset.listbox,
.listbox,
form blockquote.userstuff,
input:focus,
textarea:focus,
li.relationships a,
.group.listbox .index,
.dashboard fieldset fieldset.listbox .index,
#dashboard a:hover,
th,
#dashboard .secondary,
.secondary,
.thread .even,
.system .tweet_list li,
.ui-datepicker tr:hover {
background: #2A2A2A;
}
a,
a.tag,
a:link,
#header a:visited,
#header .primary .open a,
#header .primary .dropdown:hover a,
#header #search input:focus,
#header #search input:hover,
.userstuff h2,
#dashboard a,
#dashboard span,
#dashboard .current,
.group .heading,
.filters dt a:hover {
color: #fff;
}
#header .dropdown .menu a:hover,
#header .dropdown .menu a:focus,
.splash .favorite li:nth-of-type(odd) a,
.ui-datepicker td:hover,
#tos_prompt .heading,
#tos_prompt [disabled] {
background: #111;
color: #ffe8b4;
}
#outer,
.javascript,
.statistics .index li:nth-of-type(even),
#tos_prompt,
.announcement input[type="submit"] {
background: #191919;
}
#dashboard ul,
dl.meta,
.group.listbox,
fieldset fieldset.listbox,
#main li.blurb,
form blockquote.userstuff,
div.comment,
li.comment,
.toggled form,
form dl dt,
form.single fieldset,
#inner .module .heading,
.bookmark .status span,
.splash .news li,
.filters .group dt.bookmarker {
border-color: #555;
}
.group.listbox,
fieldset fieldset.listbox,
#main li.blurb,
.wrapper,
#dashboard .secondary,
.secondary,
form blockquote.userstuff,
.thread .comment,
.toggled form {
box-shadow: 1px 1px 3px #000;
}
#dashboard .current,
.actions a:active,
a.current,
.current a:visited,
span.unread,
.replied,
span.claimed,
dl.index dd,
.own,
.draft,
.draft .unread,
.child,
.unwrangled,
.unreviewed,
.ui-sortable li:hover {
background: #000;
border-color: #555;
box-shadow: -1px -1px 3px #000;
}
input,
textarea {
box-shadow: inset 0 1px 2px #000;
}
li.blurb,
.blurb .blurb,
.listbox .index,
fieldset fieldset.listbox,
.dashboard .listbox .index {
box-shadow: inset 1px 1px 3px #000;
}
#footer a:hover,
#footer a:focus,
.autocomplete .dropdown ul li:hover,
.autocomplete .dropdown li.selected,
a.tag:hover,
.listbox .heading a.tag:visited:hover,
.symbol .question {
background: #ffedc5;
border-color: #988352;
color: #111;
}
#header #greeting img,
#header .user a:hover,
#header .user a:focus,
#header fieldset,
#header form,
#header p,
#dashboard a:hover,
.actions a:hover,
.actions input:hover,
.delete a,
span.delete,
span.unread,
.replied,
span.claimed,
.draggable,
.droppable,
span.requested,
a.work,
.blurb h4 a:link,
.blurb h4 img,
.splash .module h3,
.splash .browse li a:before,
.required,
.error,
.comment_error,
.kudos_error,
a.cloud7,
a.cloud8,
#tos_prompt .heading {
color: #ffe8b4;
}
#greeting .icon,
#dashboard,
#dashboard.own,
.error,
.comment_error,
.kudos_error,
.LV_invalid,
.LV_invalid_field,
input.LV_invalid_field:hover,
input.LV_invalid_field:active,
textarea.LV_invalid_field:hover,
textarea.LV_invalid_field:active,
.qtip-content {
border-color: #8a1a10;
}
.splash .favorite li:nth-of-type(odd) a:hover,
.splash .favorite li:nth-of-type(odd) a:focus .splash .favorite li:nth-of-type(odd) a:visited:hover,
.splash .favorite li:nth-of-type(odd) a:visited:focus {
background: #ffe8b4;
color: #111;
}
a:visited,
.actions a:visited,
.action a:link,
.action a:visited,
.listbox .heading a:visited,
span.series .divider {
color: #999;
}
.actions a,
.actions a:link,
.action,
.action:link,
.actions input,
input[type="submit"],
button,
.current,
.actions label,
#header .actions a,
#outer .current {
background: #555;
border-color: #222;
color: #eee;
box-shadow: inset 0 -8px 4px #232323, inset 0 8px 7px #555;
text-shadow: none;
}
.actions a:hover,
.actions input:hover,
#dashboard a:hover,
.actions a:focus,
.actions input:focus,
#dashboard a:focus,
.actions .disabled select {
color: #999;
border-color: #000;
box-shadow: inset 2px 2px 2px #000;
}
.actions a:active,
.current,
a.current,
.current a:visited {
color: #fff;
background: #555;
border-color: #fff;
box-shadow: inset 1px 1px 3px #191919;
}
.delete a,
span.delete {
box-shadow: -1px -1px 2px rgba(255,255,255.25);
}
.actions label.disabled {
background: #222;
box-shadow: none;
}
ul.required-tags,
.bookmark .status span,
.blurb .icon {
opacity: 0.9;
border: 0;
}
#outer .group .heading,
#header .actions a,
fieldset.listbox .heading,
.userstuff .heading {
text-shadow: none;
color: #fff;
background: none;
}
#header .actions a,
fieldset fieldset,
.mce-container button,
.filters .expander,
.actions .disabled select {
box-shadow: none;
}
fieldset fieldset.listbox {
outline: none;
}
form dd.required {
color: #eee;
}
.mce-container input:focus {
background: #F3EFEC;
}
.announcement .userstuff a,
.announcement .userstuff a:link,
.announcement .userstuff a:visited:hover {
color: #111;
}
.announcement .userstuff a:visited {
color: #666;
}
.announcement .userstuff a:hover,
.announcement .userstuff a:focus {
color: #999;
}
.event.announcement .userstuff a,
.filters .expander {
color: #eee;
}

View File

@ -6,17 +6,18 @@
}:
{
imports = [
./programs.nix
./desktop.nix
./wifi.nix
./zerotier.nix
./fonts.nix
./polkit.nix
./audio.nix
./desktop.nix
./fingerprint.nix
./steam.nix
./fonts.nix
./graphics.nix
./libvirt.nix
./polkit.nix
./programs.nix
./steam.nix
./stylix.nix
./wifi.nix
./zerotier.nix
];
time.timeZone = "America/New_York";
@ -31,7 +32,7 @@
};
boot = {
kernelPackages = lib.mkForce pkgs.linuxPackages_zen;
#kernelPackages = lib.mkForce pkgs.linuxPackages_6_6;
useSystemdBoot = true;
default = true;
};
@ -44,6 +45,7 @@
sops.age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
services = {
flatpak.enable = true;
calibre-web = {
enable = true;
listen = {
@ -70,20 +72,9 @@
}) { inherit (pkgs) system; }).fwupd;
};
fprintd.enable = true;
fprintd.enable = lib.mkForce false;
openssh.enable = lib.mkForce false;
spotifyd = {
enable = true;
settings = {
global = {
username = "snowinginwonderland@gmail.com";
password_cmd = "cat ${config.sops.secrets."apps/spotify".path}";
use_mpris = false;
};
};
#systemd.services.spotifyd.serviceConfig = systemd.services.spotifyd.
};
rad-dev.yubikey = {
enable = true;
enable-desktop-app = true;
@ -92,17 +83,22 @@
users.users.alice.extraGroups = [ "calibre-web" ];
system.autoUpgrade.enable = false;
system.stateVersion = "24.05";
programs.adb.enable = true;
environment.variables = {
"KWIN_DRM_NO_DIRECT_SCANOUT" = "1";
};
sops = {
defaultSopsFile = ./secrets.yaml;
secrets = {
"apps/spotify" = {
group = "audio";
restartUnits = [ "spotifyd.service" ];
mode = "0440";
};
};
#secrets = {
# "apps/spotify" = {
# group = "audio";
# restartUnits = [ "spotifyd.service" ];
# mode = "0440";
# };
#};
};
}

View File

@ -7,6 +7,7 @@
users = [ "alice" ];
modules = [
inputs.nixos-hardware.nixosModules.framework-16-7040-amd
inputs.stylix.nixosModules.stylix
{
environment.systemPackages = [
inputs.wired-notify.packages.x86_64-linux.default

View File

@ -3,9 +3,30 @@
{
# installs hyprland, and its dependencies
programs.hyprland = {
enable = true;
xwayland.enable = true;
programs = {
hyprland = {
enable = true;
xwayland.enable = true;
withUWSM = true;
};
hyprlock.enable = true;
gnupg.agent = {
enable = true;
#pinentryPackage = pkgs.pinentry-rofi;
pinentryPackage = pkgs.pinentry-gnome3;
#settings = {
# keyserver-options = "auto-key-retrieve";
# auto-key-locate = "hkps://keys.openpgp.org";
# keyserver = "hkps://keys.openpgp.org";
#keyserver = "hkp://pgp.mit.edu";
# "na.pool.sks-keyservers.net"
# "ipv4.pool.sks-keyservers.net"
# "p80.pool.sks-keyservers.net"
# ];
#};
};
ydotool.enable = true;
};
# Optional, hint electron apps to use wayland:
environment.sessionVariables.NIXOS_OZONE_WL = "1";
@ -35,20 +56,11 @@
};
};
programs.gnupg.agent = {
powerManagement = {
enable = true;
#pinentryPackage = pkgs.pinentry-rofi;
pinentryPackage = pkgs.pinentry-gnome3;
#settings = {
# keyserver-options = "auto-key-retrieve";
# auto-key-locate = "hkps://keys.openpgp.org";
# keyserver = "hkps://keys.openpgp.org";
#keyserver = "hkp://pgp.mit.edu";
# "na.pool.sks-keyservers.net"
# "ipv4.pool.sks-keyservers.net"
# "p80.pool.sks-keyservers.net"
# ];
#};
resumeCommands = ''
${pkgs.hyprlock}/bin/hyprlock -c /home/alice/.config/hypr/hyprlock.conf
'';
};
environment.systemPackages = with pkgs; [

View File

@ -3,17 +3,13 @@
fonts = {
fontconfig.enable = true;
enableDefaultPackages = true;
packages = with pkgs; [
(nerdfonts.override {
fonts = [
"FiraCode"
"DroidSansMono"
"Hack"
"DejaVuSansMono"
"Noto"
"OpenDyslexic"
];
})
packages = with pkgs.nerd-fonts; [
fira-code
droid-sans-mono
hack
dejavu-sans-mono
noto
open-dyslexic
];
};
}

View File

@ -20,6 +20,9 @@
"usb_storage"
"usbhid"
"sd_mod"
"ip_vs"
"ip_vs_rr"
"nf_conntrack"
];
initrd.kernelModules = [
"dm-snapshot"
@ -52,7 +55,6 @@
options = [
"noatime"
"nodiratime"
"discard"
];
};
@ -62,7 +64,6 @@
options = [
"noatime"
"nodiratime"
"discard"
];
};
@ -72,7 +73,6 @@
options = [
"noatime"
"nodiratime"
"discard"
];
};
@ -82,12 +82,11 @@
options = [
"noatime"
"nodiratime"
"discard"
];
};
};
swapDevices = [ { device = "/dev/disk/by-uuid/7f0dba0f-d04e-4c94-9fba-1d0811673df1"; } ];
swapDevices = [ { device = "/dev/disk/by-uuid/3ec276b5-9088-45b0-9cb4-60812f2d1a73"; } ];
boot.initrd.luks.devices = {
"nixos-pv" = {

View File

@ -3,6 +3,7 @@
environment.systemPackages = with pkgs; [
act
alacritty
attic-client
amdgpu_top
bat
bitwarden-cli
@ -12,12 +13,12 @@
calibre
# calibre dedrm?
candy-icons
nemo-with-extensions
chromium
chromedriver
croc
deadnix
direnv
discord
discord-canary
easyeffects
eza
fanficfare
ferium
@ -29,22 +30,29 @@
glances
gpu-viewer
grim
headsetcontrol
helvum
htop
hwloc
ipmiview
iperf3
ipscan
# ipscan
jp2a
jq
kdePackages.kdenlive
kitty
kubectl
kubernetes-helm
libreoffice-fresh
libtool
lsof
lynis
masterpdfeditor4
minikube
mons
mpv
# nbt explorer?
ncdu
nemo-with-extensions
neofetch
neovim
nix-init
@ -53,6 +61,8 @@
nix-tree
nixpkgs-fmt
nmap
obs-studio
obsidian
ocrmypdf
pciutils
#disabled until wxpython compat with python3.12
@ -60,16 +70,19 @@
prismlauncher
protonmail-bridge
protontricks
proxychains
qrencode
redshift
restic
ripgrep
rpi-imager
rofi-wayland
samba
signal-desktop
# signal in tray?
siji
simple-mtpfs
skaffold
slack
slurp
smartmontools
@ -84,17 +97,18 @@
tig
tokei
tree
unzip
unipicker
unzip
uutils-coreutils-noprefix
ventoy
vesktop
vscode
watchman
wget
wl-clipboard
xboxdrv
yq
yt-dlp
zoom-us
zoxide
zoom
];
}

View File

@ -1,17 +1,17 @@
hello: ENC[AES256_GCM,data:UJlsd5kvnhEv7eJeYwg+NHm9sgUAxYM5DoR0gDPLi9J7P+8FI8WPMkN1wEAHJA==,iv:NFSdZQ1OK4BT+EAGZz122NB7WrVCEzv4wwMxFIE/OKI=,tag:6YT7Vw8tFrw9iEFKxeKRFQ==,type:str]
example_key: ENC[AES256_GCM,data:KMXgMrqe7M101ZMJ2g==,iv:MJ3Iiu/0KIVhPFnqfovysqvPJAv1OsnxE4VIsuexFkE=,tag:X6KIKNGym8/9VglmG3SNRw==,type:str]
#ENC[AES256_GCM,data:QR3WNE/a1hZIXnTjFjK3kA==,iv:eXoZJ5rQaYqN7LjEp2M13OCMwuQ+80M5AXjV0uNc4C8=,tag:sCvL6pr9zAyWZziffVFMzg==,type:comment]
hello: ENC[AES256_GCM,data:BTCBuBxHFO8vwXU/bsAZryM5rXUOEi0brlvq6DtqfZbzxGz4LaW89VO75MERHQ==,iv:fwqI3arwtlZQ5DtvpVbh21ThuZP8zcqCHsmuJuCfCsY=,tag:tkkEO8/eEDCakdlT0NvajA==,type:str]
example_key: ENC[AES256_GCM,data:xzsymSb4oD70twtoKQ==,iv:9vBmAKET2VIuDSq7AOyvdYWLGlL6cYHTWxy/Z5bB1+c=,tag:NbV4eA2aaY4cQAKUy3QOpw==,type:str]
#ENC[AES256_GCM,data:zeOCzRd/nFRhbANHxPyyjw==,iv:9MmHl3OyhJHVU+cUFJ4QitHd4SeDe3ctaky+yfvk8Zs=,tag:uPGRJtgQj1vIdLt2+w0krg==,type:comment]
example_array:
- ENC[AES256_GCM,data:g8PulCLrXZYSEdZJELE=,iv:irGwciFn1zXBxFpGAJtD46EQLGUO5oqdCzRgv1204JE=,tag:2MuDdRYMjhtTY++lPuj1FQ==,type:str]
- ENC[AES256_GCM,data:qv7GvmoOX8VSdaiW/90=,iv:6NOWeWqHUV9ciKPmZF4C7ijuIPFr3YZi3Dh7xWnb07k=,tag:VHXdBhWmEpb7uavCPqGZ4w==,type:str]
example_number: ENC[AES256_GCM,data:g8BIEIcwKRLSbw==,iv:Ay4aiukAvXeDhzlpMPn++zR0Tt2lMqCx362uN37S+ac=,tag:NTtNaIu5u8YsIm0M4OgL0A==,type:float]
- ENC[AES256_GCM,data:Nwn96XJv8xZWRYv8qws=,iv:K30LBMC8e1vUS0XE+4EIYb3xUUyn6232YmhV2vI9Qnc=,tag:HRe3S88zwj/CjG6NTvjdRQ==,type:str]
- ENC[AES256_GCM,data:l2nuwoAbwaDFHpEWV1Y=,iv:7/2rTd8agUvx73eftpOgidV4XjDUv/JppLIIsiuycnU=,tag:Ohi4JULWDNXJPWZaeXHEdw==,type:str]
example_number: ENC[AES256_GCM,data:toi1e/biUd2Tng==,iv:MPCfhhX9DDaOSzx/L5LTf2VYffin8XvxVyhNDqZLsec=,tag:tE/lml3afP/NjRtpPraoRQ==,type:float]
example_booleans:
- ENC[AES256_GCM,data:94T9mg==,iv:qKGJke4SGhgN09Yebh5MPrRBDNnguJQ+1dl5XQffGZQ=,tag:0Pa3eujmSxDCnAHKHsx6yQ==,type:bool]
- ENC[AES256_GCM,data:gEvfi+Q=,iv:0DrXoZk8OkdUShc7WAKOL8xG26RFZp3M3qYFAb1hDAs=,tag:uemBrdF87nrfLpfnQ8bD8g==,type:bool]
- ENC[AES256_GCM,data:02CVNA==,iv:L9GmIm9ynm2cWTyd3iYo4fgIeneUyFpEzzzxicM/YNI=,tag:k2EIboiL+c4W1H2OpA2Rqw==,type:bool]
- ENC[AES256_GCM,data:6SJ0JKI=,iv:J0qSvWoOcDwSXCKyau+a0YcCGuH5WABHVh6Kdigac20=,tag:WQdNfjcubbzoHnQW4gua8g==,type:bool]
apps:
spotify: ENC[AES256_GCM,data:bp1pdOfS+VGWLtepUjg7KFWw8Fk=,iv:twGO3CjzRxAU81C93mX8qIEZ/FYIQRJnMd2HIuvP9q8=,tag:AJgs0QGFH30E8+ZpaB02TQ==,type:str]
wifi-env: ENC[AES256_GCM,data:NGI090aVGojJ7+lvcknJfZBQKb0b/tUrd2AqEl5IWQWCJdqqaO4pCrs3C+IW06/pz9FWgMxx9tPu32xmMZaPnnlLD+XyVJ71L2P22U6YufRPRfvyv6swOlihscOZ5tsFFYShjXpow0PfmYS+tP9mYLb2RYFLGQmvI4fa4LaVjuwPXAMg3RN/gVXR6bMEpd/7OIr+tIxC5sTE7V7fIbyzcn4=,iv:VbtgvwMHo1iLuTKCA7KjEXC1d1MY4aHfmXI6yuCGZVI=,tag:dGmw+icLKL9dJQExy83m1A==,type:str]
#ENC[AES256_GCM,data:pC2Kdy7wNc0=,iv:J7Ggfv6K3dCzL42j5MGd+BjQGseoAoYs4k6+yc3FSiA=,tag:9MriduP9SEIi+c1q4tfzlQ==,type:comment]
spotify: ENC[AES256_GCM,data:tIABPphA7Vr6VNvJpWTS9kDmidU=,iv:ciQzr8jyIcHYi797NKypPs7FhDgK5ToVZ0eZHHF8UtE=,tag:wUTL/x1p24cXyPUAL1dPfg==,type:str]
wifi-env: ENC[AES256_GCM,data:G+z+fURk4rT61I5BiFzEJJt35jywPNrGpn1QGNhjvxrqPQ/Sq/hIHmQo+bqe9yJeDgMX3RY4EaiZxFTJyxPfW1czjuMSj3vbTp0WcDmGvUJ7li2pX2pzolgly4qmgoOluGBeRZWVLLOZYFB2+kLRMJNNz/bP5k2Eq6O4+l4sljPM+abn9iz9Eh46rVOVRkmDzCltJrYiuBSiSPhTDRTP2+gUbgbaUJTkVrVLUBHg3QU6az6VPN8DPZxbx4LtdaIb93pI,iv:uUfJK/iPdyLP7LqZJolTGGTxaEzlJI59bUVNcB1etkU=,tag:tvXSXSW1MIhLJceEK1afuw==,type:str]
#ENC[AES256_GCM,data:G9ggYJ3YA+E=,iv:nZ5NgeyNKFXFIpquoY68Z2Jz9QROqvf5tv7/s1wSgKk=,tag:QAX555IsAMaWAlz9ywSzjQ==,type:comment]
sops:
kms: []
gcp_kms: []
@ -21,34 +21,26 @@ sops:
- recipient: age1jd2dcpykagz20kpk2kkchte3augqncwfn6nywursx0dkfyze6feqdzxkq2
enc: |
-----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBRZUNHeDdqaGt0QnFIejdM
MU5uaDNiN2xOeVlZNzQyZXZ0R2NYUU83ZWxrCmNDL3J6ZjNmejBuUXk3cldwZUEz
UWVqMTVPelN1MTJDNzc0UU9XNWkralUKLS0tIDU2b053Uk5VZGlWUk9XMXZ5Wllk
UlhhNzNjTHdVaXlPOFJhc0EyZGh3RDQK1c7nctmrorze4Kr0Grmcmx3N/UYXPwJc
FfClOoGxO+4ZDtxG61SDU1UdYae4loQ8roM8jDIPFMfoEum2bT8oXw==
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBWbElNRkxyZ2VjaitiTWx2
eThsY0h3a2NCZDloWG0rU1ZwVnhOY2VJTXlFCnp3UzNDR216L2R4cVdyWjFqbkRr
cFJGQjQ4Qk9zblYyckVFY3VNekNuajQKLS0tIEdRWldHMjlpTElxQWFVUlh4L1lz
d09aSXN0ZUh3VC9XeTZ4UWoxVDNVN0UKF1eU/IQJgJ8Fg+MrfqQuEZZ775hvtUJR
D/ZS4vj+sDLWq6gy2lIBhRSIAHWrz5gHxvOOGmRnpvkqh9TS6XjLIA==
-----END AGE ENCRYPTED FILE-----
lastmodified: "2024-08-03T02:45:15Z"
mac: ENC[AES256_GCM,data:PsEeb2leFb500YYHg+5YHwGVHKUPB7qVqaJY66hnkmCa5MKAZkHqSgtVvh+Ai4fN9E+WFtjlso2a4oasQMNwVXsmt54+q1/Mz5zF2D/1nvaNL76fEod2YXp2jlGxNniyPfRaZXDu+QQLhoz2PBoe6OQ9E5WRDV88j7gksy6GePw=,iv:H7Q9fbvdgh+NZNyyupByQETWsgpXVXn0blQV1Ww7eQM=,tag:cpWykzgH9/mWTKxmEDZ9PA==,type:str]
lastmodified: "2024-11-28T18:57:09Z"
mac: ENC[AES256_GCM,data:hKhAo7rDplLm19PlrKHQwxnDVXCMU/xpAxPALLDBa0M3yypy2QVD6c6Atn897tYRKf7oeLaUKqnUYdCcZ9gVgm37LS+GtRhf66zfvcKqhZF8wh3M0zTDPYpQDhex0N4BAJ/dcaYIbxqE9pEUxJOI5jip/hptaCJItTEe7oARcF4=,iv:EUayxLaOPcnWX+S9+RlHrxzJRLlSSLIwqbAq3fFI4yg=,tag:LiBsqIodTWamO+c8FqGBag==,type:str]
pgp:
- created_at: "2024-03-23T05:46:35Z"
- created_at: "2024-11-28T18:57:09Z"
enc: |-
-----BEGIN PGP MESSAGE-----
hQIMA84hNUGIgI/nAQ/+IwyPDjs/jDCBlnYFboHh6TXx8ulysESst4hz5crM4L0u
wylKyfEIBx0eLy0mLLA4DhcpYza0Nry5RLdwDNfimhATErfQxnwqlZ6RnYKnh3Hk
93L66+BEKPd3EZOH+RC/wb0qiTDmU0yna8jtVO0uU7s6//hm/g7bdmQAK0YIJLcb
sd83n99R4oHVrq7iFc74/AV5isW9GcfmvLI94eodFpaE1dpqm4KzNpLueDCOvA/1
vPo5Lgtp9WM4FhXUqMiplCNqMIt+Hyj3F+p+9jgQ2dLfHuVkI8pzd47gOHyMDYPy
fn6SVKZtOyfNDwhs7L5piiarSXISBGtx36ISDvtvtr/vgMydTdvILIOo9pkSGVtN
4W7+ywMaFjfAeShTVtUJNJqmp/8agt2WtaUX4kPPha4SxlNSOMpeTQ31bs89gBtc
g2325afL2WPK4NSAOmU8VMXqmFc2A10aFlx5nsfT4S1wkoNbitTWgoAcCa7kGRPW
xZca225cwLUzkggv74cfYT3YnQL40AMSOMqSRS8pbTFEENG1BtsB5A++Jji2i4tO
xoGIL8LRCEfiHpTC7eBwDDVmKb5StgKsXs6yYbQG5XW2W+/Jgum64Sb7+LviQ9Mq
WHNiu5MZPeKyHFu9jI9Ne1HpYJnb7/X9AxFw2e/vFwVn+kjaXcH/PhsYuPUyqkzS
XgG3tFbcgNtMWyoLU2EL1Qvwq1pHVrwmeNXHidESx23HeJtnIwoKkdopl4qqqNle
uQYP89bvb6zFWlqOSwLORZmj1W1wVTYV9eXplDbJob8agBKIcIuhtwri5e96gf4=
=XdJo
hF4DQWNzDMjrP2ISAQdALiZMzuQViM23hoFebCXYfQUIvCluWqAEeSJyE/LRHG8w
nQnIVPRIbzLzWfCf+48EW6f7zonHmNY7D9F9KohDmCTcJ5/WvXsJKjebuohR62TF
1GYBCQIQq7nEvwSfn+l5AevKIiodA4BLfM326JSx5hJ6XdrE0MzZo1uoMwKKuxig
mPbDP8Rx51v9f+9DzjBg6kQD5w411HADL8th+wSkpmasP8ozIeiNiIKzzoJc/fD6
AOsExCUt8FU=
=wRT+
-----END PGP MESSAGE-----
fp: F63832C3080D6E1AC77EECF80B4245FFE305BC82
fp: 5EFFB75F7C9B74EAA5C4637547940175096C1330
unencrypted_suffix: _unencrypted
version: 3.9.0
version: 3.9.1

View File

@ -4,7 +4,10 @@
environment.systemPackages = [ pkgs.steam-run ];
hardware.steam-hardware.enable = true;
programs = {
gamescope.enable = true;
gamescope = {
enable = true;
capSysNice = true;
};
steam = {
enable = true;
remotePlay.openFirewall = true;

View File

@ -0,0 +1,16 @@
{ pkgs, ... }:
# let
# randWallpaper = pkgs.runCommand "stylix-wallpaper" { } ''
# numWallpapers =
# $((1 + $RANDOM % 10))
# in
{
stylix = {
enable = true;
image = "${pkgs.hyprland}/share/hypr/wall2.png";
#image = "/home/alice/Pictures/Screenshots/screenshot_2024-12-04-2030.png";
polarity = "dark";
};
}

View File

@ -6,25 +6,27 @@ in
{
networking.wireless = {
enable = true;
environmentFile = config.sops.secrets."wifi-env".path;
secretsFile = config.sops.secrets."wifi-env".path;
userControlled.enable = true;
networks = {
"taetaethegae-2.0" = {
psk = "@PASS_taetaethegae_20@";
pskRaw = "ext:PASS_taetaethegae_20";
priority = home;
};
"k" = {
psk = "@PASS_k@";
pskRaw = "ext:PASS_k";
priority = always;
};
"Bloomfield".psk = "@PASS_bloomfield@";
"9872441500".psk = "@PASS_longboat_home@";
"9872441561".psk = "@PASS_longboat_home@";
"5HuFios".psk = "@PASS_longboat_home@";
"24HuFios".psk = "@PASS_longboat_home@";
"Verizon_ZLHQ3H".psk = "@PASS_angie@";
"Bloomfield".pskRaw = "ext:PASS_bloomfield";
"9872441500".pskRaw = "ext:PASS_longboat_home";
"9872441561".pskRaw = "ext:PASS_longboat_home";
"5HuFios".pskRaw = "ext:PASS_longboat_home";
"24HuFios".pskRaw = "ext:PASS_longboat_home";
"Verizon_ZLHQ3H".pskRaw = "ext:PASS_angie";
"Fios-Qn3RB".pskRaw = "ext:PASS_parkridge";
"optimumwifi" = { };
"CableWiFi" = { };
"JPMCVisitor" = { };
};
};

View File

@ -1,106 +0,0 @@
{
imports = [
../../users/richie/global/desktop.nix
../../users/richie/global/ssh.nix
../../users/richie/global/syncthing_base.nix
../../users/richie/global/zerotier.nix
./hardware.nix
./nvidia.nix
./steam.nix
];
boot = {
useSystemdBoot = true;
default = true;
};
networking = {
networkmanager.enable = true;
hostId = "9ab3b18e";
};
hardware = {
pulseaudio.enable = false;
bluetooth = {
enable = true;
powerOnBoot = true;
};
};
security.rtkit.enable = true;
services = {
autopull.enable = false;
displayManager.sddm.enable = true;
openssh.ports = [ 262 ];
printing.enable = true;
pipewire = {
enable = true;
alsa.enable = true;
alsa.support32Bit = true;
pulse.enable = true;
};
rad-dev.k3s-net.enable = false;
syncthing.settings.folders = {
"notes" = {
id = "l62ul-lpweo"; # cspell:disable-line
path = "/home/richie/notes";
devices = [
"phone"
"jeeves"
"rhapsody-in-green"
];
fsWatcherEnabled = true;
};
"books" = {
id = "6uppx-vadmy"; # cspell:disable-line
path = "/home/richie/books";
devices = [
"phone"
"jeeves"
"rhapsody-in-green"
];
fsWatcherEnabled = true;
};
"important" = {
id = "4ckma-gtshs"; # cspell:disable-line
path = "/home/richie/important";
devices = [
"phone"
"jeeves"
"rhapsody-in-green"
];
fsWatcherEnabled = true;
};
"music" = {
id = "vprc5-3azqc"; # cspell:disable-line
path = "/home/richie/music";
devices = [
"phone"
"jeeves"
"rhapsody-in-green"
];
fsWatcherEnabled = true;
};
"projects" = {
id = "vyma6-lqqrz"; # cspell:disable-line
path = "/home/richie/projects";
devices = [
"jeeves"
"rhapsody-in-green"
];
fsWatcherEnabled = true;
};
};
};
system.autoUpgrade.enable = false;
system.stateVersion = "23.11";
}

View File

@ -1,8 +0,0 @@
{ ... }:
{
users = [ "richie" ];
system = "x86_64-linux";
home = true;
sops = true;
server = false;
}

View File

@ -1,66 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{
config,
lib,
modulesPath,
...
}:
{
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
boot = {
initrd = {
availableKernelModules = [
"nvme"
"xhci_pci"
"ahci"
"usb_storage"
"sd_mod"
];
kernelModules = [ ];
luks.devices = {
"luks-rpool-nvme-Samsung_SSD_970_EVO_Plus_1TB_S6S1NS0T617615W-part2".device = "/dev/disk/by-id/nvme-Samsung_SSD_970_EVO_Plus_1TB_S6S1NS0T617615W-part2";
};
};
kernelModules = [ "kvm-amd" ];
extraModulePackages = [ ];
};
fileSystems = {
"/" = lib.mkDefault {
device = "rpool/root";
fsType = "zfs";
};
"/home" = {
device = "rpool/home";
fsType = "zfs";
};
"/boot" = {
device = "/dev/disk/by-uuid/8AE6-270D";
fsType = "vfat";
options = [
"fmask=0077"
"dmask=0077"
];
};
};
swapDevices = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.eno1.useDHCP = lib.mkDefault true;
# networking.interfaces.enp5s0.useDHCP = lib.mkDefault true;
# networking.interfaces.wlp11s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}

View File

@ -1,13 +0,0 @@
{ config, ... }:
{
services.xserver.videoDrivers = [ "nvidia" ];
hardware = {
nvidia = {
modesetting.enable = true;
powerManagement.enable = true;
package = config.boot.kernelPackages.nvidiaPackages.production;
nvidiaSettings = true;
};
nvidia-container-toolkit.enable = true;
};
}

View File

@ -1,15 +0,0 @@
{ pkgs, ... }:
{
environment.systemPackages = [ pkgs.steam-run ];
hardware.steam-hardware.enable = true;
programs = {
steam = {
enable = true;
remotePlay.openFirewall = true;
localNetworkGameTransfers.openFirewall = true;
extraCompatPackages = with pkgs; [ proton-ge-bin ];
extest.enable = true;
};
};
}

View File

@ -1,28 +0,0 @@
{ inputs, pkgs, ... }:
let
vars = import ./vars.nix;
in
{
virtualisation.oci-containers.containers.arch_mirror = {
image = "ubuntu/apache2:latest";
volumes = [
"${../../users/richie/global/docker_templates}/file_server/sites/:/etc/apache2/sites-enabled/"
"${vars.main_mirror}:/data"
];
extraOptions = [ "--network=web" ];
autoStart = true;
};
systemd.services.sync_mirror = {
requires = [ "network-online.target" ];
after = [ "network-online.target" ];
wantedBy = [ "multi-user.target" ];
description = "validates startup";
path = [ pkgs.rsync ];
serviceConfig = {
Environment = "MIRROR_DIR=${vars.main_mirror}/archlinux/";
Type = "simple";
ExecStart = "${inputs.system_tools.packages.x86_64-linux.default}/bin/sync_mirror";
};
};
}

View File

@ -1,47 +0,0 @@
{ pkgs, ... }:
{
imports = [
../../users/richie/global/ssh.nix
./arch_mirror.nix
./docker
./home_assistant.nix
./networking.nix
./services.nix
];
boot = {
zfs.extraPools = [ "Main" ];
filesystem = "zfs";
useSystemdBoot = true;
};
environment.systemPackages = with pkgs; [ docker-compose ];
services = {
openssh = {
ports = [ 352 ];
listenAddresses = [
{ addr = "192.168.95.35"; }
{ addr = "192.168.90.35"; }
];
};
smartd.enable = true;
sysstat.enable = true;
usbguard = {
enable = true;
rules = ''
allow id 1532:0241
'';
};
zfs = {
trim.enable = true;
autoScrub.enable = true;
};
};
system.stateVersion = "23.05";
}

View File

@ -1,7 +0,0 @@
{ ... }:
{
users = [
"alice"
"richie"
];
}

View File

@ -1,11 +0,0 @@
{ lib, ... }:
{
imports =
let
files = builtins.attrNames (builtins.readDir ./.);
nixFiles = builtins.filter (name: lib.hasSuffix ".nix" name && name != "default.nix") files;
in
map (file: ./. + "/${file}") nixFiles;
virtualisation.oci-containers.backend = "docker";
}

View File

@ -1,46 +0,0 @@
global
log stdout format raw local0
defaults
log global
mode http
retries 3
maxconn 2000
timeout connect 5s
timeout client 50s
timeout server 50s
timeout http-request 10s
timeout http-keep-alive 2s
timeout queue 5s
timeout tunnel 2m
timeout client-fin 1s
timeout server-fin 1s
#Application Setup
frontend ContentSwitching
bind *:80
bind *:443 ssl crt /etc/ssl/certs/cloudflare.pem
mode http
# tmmworkshop.com
acl host_mirror hdr(host) -i mirror.tmmworkshop.com jeeves
acl host_uptime_kuma hdr(host) -i uptimekuma-jeevesjr.tmmworkshop.com
acl host_homeassistant hdr(host) -i homeassistant.tmmworkshop.com
use_backend mirror_nodes if host_mirror
use_backend uptime_kuma_nodes if host_uptime_kuma
use_backend home_asistant_nodes if host_homeassistant
# tmmworkshop.com
backend mirror_nodes
mode http
server server arch_mirror:80
backend uptime_kuma_nodes
mode http
server server uptime_kuma:3001
backend home_asistant_nodes
mode http
server server 192.168.95.35:8123

View File

@ -1,16 +0,0 @@
let
vars = import ../vars.nix;
in
{
virtualisation.oci-containers.containers = {
uptime_kuma = {
image = "louislam/uptime-kuma:latest";
volumes = [
"${vars.main_docker_configs}/uptime_kuma:/app/data"
"/var/run/docker.sock:/var/run/docker.sock"
];
extraOptions = [ "--network=web" ];
autoStart = true;
};
};
}

View File

@ -1,41 +0,0 @@
{ config, ... }:
{
virtualisation.oci-containers.containers = {
haproxy = {
image = "haproxy:latest";
user = "600:600";
environment = {
TZ = "Etc/EST";
};
volumes = [
"${config.sops.secrets."docker/haproxy_cert".path}:/etc/ssl/certs/cloudflare.pem"
"${./haproxy.cfg}:/usr/local/etc/haproxy/haproxy.cfg"
];
dependsOn = [
"arch_mirror"
"uptime_kuma"
];
extraOptions = [ "--network=web" ];
autoStart = true;
};
cloud_flare_tunnel = {
image = "cloudflare/cloudflared:latest";
cmd = [
"tunnel"
"run"
];
environmentFiles = [ config.sops.secrets."docker/cloud_flare_tunnel".path ];
dependsOn = [ "haproxy" ];
extraOptions = [ "--network=web" ];
autoStart = true;
};
};
sops = {
defaultSopsFile = ../secrets.yaml;
secrets = {
"docker/cloud_flare_tunnel".owner = "docker-service";
"docker/haproxy_cert".owner = "docker-service";
};
};
}

View File

@ -1,40 +0,0 @@
{
config,
lib,
modulesPath,
...
}:
{
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
swapDevices = [ { device = "/dev/disk/by-uuid/9d4ef549-d426-489d-8332-0a49589c6aed"; } ];
boot = {
kernelModules = [ "kvm-amd" ];
extraModulePackages = [ ];
initrd = {
kernelModules = [ ];
availableKernelModules = [
"xhci_pci"
"ahci"
"nvme"
"usbhid"
"usb_storage"
"sd_mod"
];
};
};
fileSystems = {
"/" = lib.mkDefault {
device = "/dev/disk/by-uuid/c59f7261-ebab-4cc9-8f1d-3f4c2e4b1971";
fsType = "ext4";
};
"/boot" = {
device = "/dev/disk/by-uuid/7295-A442";
fsType = "vfat";
};
};
}

View File

@ -1,49 +0,0 @@
{
services.home-assistant = {
enable = true;
openFirewall = true;
config = {
http = {
server_port = 8123;
server_host = [
"192.168.95.35"
"192.168.90.35"
"192.168.98.4"
];
use_x_forwarded_for = true;
trusted_proxies = "172.100.0.4";
};
homeassistant = {
time_zone = "America/New_York";
unit_system = "imperial";
temperature_unit = "F";
};
assist_pipeline = { };
backup = { };
bluetooth = { };
config = { };
dhcp = { };
energy = { };
history = { };
homeassistant_alerts = { };
image_upload = { };
logbook = { };
media_source = { };
mobile_app = { };
ssdp = { };
sun = { };
webhook = { };
zeroconf = { };
};
extraPackages =
python3Packages: with python3Packages; [
psycopg2
gtts
aioesphomeapi
esphome-dashboard-api
bleak-esphome
pymetno
];
extraComponents = [ "isal" ];
};
}

View File

@ -1,43 +0,0 @@
{
networking = {
hostId = "1beb3026";
firewall.enable = false;
};
systemd.network = {
enable = true;
netdevs = {
"20-ioit-vlan" = {
netdevConfig = {
Kind = "vlan";
Name = "ioit-vlan";
};
vlanConfig.Id = 20;
};
};
networks = {
"10-lan" = {
matchConfig.Name = "enp4s0";
DHCP = "yes";
vlan = [ "ioit-vlan" ];
linkConfig.RequiredForOnline = "routable";
};
"40-ioit-vlan" = {
matchConfig.Name = "ioit-vlan";
DHCP = "yes";
};
};
};
services.zerotierone = {
enable = true;
joinNetworks = [ "e4da7455b2ae64ca" ];
};
}
# 22/tcp open ssh
# 800/tcp open mdbs_daemon
# 5355/tcp open llmnr
# 8123/tcp open polipo
# 9993/tcp open palace-2

View File

@ -1,65 +0,0 @@
docker:
cloud_flare_tunnel: ENC[AES256_GCM,data:E+XYu5AxS8Ew9OVIfbH5gLkMk+rZ4yT96tSGAwL4smedkddoevRnqil78LtFNYKV8Zo3MpuA8q/c4Me0KrrlSAvwJz1T2cev0dKnuTei3MHZxK7RwWYo9UMJH+aV+l343OY9nvGBj6ryTM3wKyUIoqSmOnRCAbYmhkkqN0wFO+Mxxqjw6nf5UEeeKb36k2NwlhjjnscOKe+wo3sXhjjzVXrE3IOUQJM3hWWukMElcYewVgJmstRidKiNCRMi1/UYMk/Nfhk=,iv:yFJ5SbHB3wZ0FEF0k9KrWye55ref7OqbQPd8oMLTmH4=,tag:p3K4yGR6X2+uKIj4H6rZ+g==,type:str]
haproxy_cert: ENC[AES256_GCM,data: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,iv:3FuXEQxbTvbdnBnwPxF+T8QZvQoWX/WXx3lpDBXML1k=,tag:g1Y4qY+XoSA6K/LCKbllOw==,type:str]
server-validation:
webhook: ENC[AES256_GCM,data:/6QI+KKKJkbVO7YsxcU/gnjgp9scNzqzq56wnqAU88YdYYNU7FaRifzH00RlEb9VYvNBlT0FggnZSSX1rNN5W63tLaiYFn/GVfjlUSnwrgueTVG8Sor6HtYTIfMOdPm9B7jflpECk7ByguoDlimH0J1QrcWd+Kqx772sH63bKV1GbCaYSkRHQp9QbvbO,iv:p5W/xniUe75RqJA9PtMcNRnsY4kUBeD0p6iQDLbkSSc=,tag:dh2a8/Doyznjd1hswmXMuQ==,type:str]
sops:
kms: []
gcp_kms: []
azure_kv: []
hc_vault: []
age:
- recipient: age1lffr5f5nz0nrenv3ekgy27e8sztsx4gfp3hfymkz77mqaa5a4gts0ncrrh
enc: |
-----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSA2NXJJMjBjeU9XQS9YZGxQ
V1h5RlNUVTA5Mkx3M3ZobGs5WFA0NXFGakR3CnIxVk9nYU1aWkNoZ0F0WGd0ck5Q
VWpSU0ZRdENTWnFVOVNQY0Z4ems4MEUKLS0tIFVqcGJtZWRxSTZwZWhjYm56bnkr
QmcxMmhaaGZXU1VFN0pvT1VDN3hpcGsKXUlVytBrz8sUorTSHXZaOMYA5U6qUpas
ZJiHtVGxRVwCpraHWLmQTRkO6pT36cEVsfsMnFH6NLOMOvA3vLX8/g==
-----END AGE ENCRYPTED FILE-----
lastmodified: "2024-07-07T23:09:51Z"
mac: ENC[AES256_GCM,data:nZPpOrOSKc+7dcbpBdZRH5FLih6o5Ii5bLWgzZ7xP/BZ36vp7ypdncE/jS0/Rz2AiOOrK0G9ovEOoL7jOMrqaUBAJNPzXTX/IdOcFrsxPL47saZKWQHqXkGXrX49nafeea7VtEvoM4qK2AiyYl2ogir+Mw304mhDIUqHhPNNvQs=,iv:ykOg2Pxpp+Sap648UZaiaRVMutWTdUXvP+Pi2cWy86g=,tag:AARw0YmjcesHLdS31i+B3g==,type:str]
pgp:
- created_at: "2024-03-23T05:49:12Z"
enc: |-
-----BEGIN PGP MESSAGE-----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=XWl7
-----END PGP MESSAGE-----
fp: F63832C3080D6E1AC77EECF80B4245FFE305BC82
- created_at: "2024-03-23T05:49:12Z"
enc: |-
-----BEGIN PGP MESSAGE-----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=jkZ+
-----END PGP MESSAGE-----
fp: 29F5017C95D9E60B1B1E8407072B0E0B8312DFE3
unencrypted_suffix: _unencrypted
version: 3.8.1

View File

@ -1,33 +0,0 @@
{
config,
inputs,
pkgs,
...
}:
{
systemd = {
services.startup_validation = {
requires = [ "network-online.target" ];
after = [ "network-online.target" ];
wantedBy = [ "multi-user.target" ];
description = "validates startup";
path = [ pkgs.zfs ];
serviceConfig = {
Type = "oneshot";
EnvironmentFile = config.sops.secrets."server-validation/webhook".path;
ExecStart = "${inputs.system_tools.packages.x86_64-linux.default}/bin/validate_jeevesjr";
};
};
timers.startup_validation = {
wantedBy = [ "timers.target" ];
timerConfig = {
OnBootSec = "10min";
Unit = "startup_validation.service";
};
};
};
sops = {
defaultSopsFile = ./secrets.yaml;
secrets."server-validation/webhook".owner = "root";
};
}

View File

@ -1,10 +0,0 @@
let
zfs_main = "/ZFS/Main";
in
{
inherit zfs_main;
# main
main_docker = "${zfs_main}/Docker";
main_docker_configs = "${zfs_main}/Docker/configs";
main_mirror = "${zfs_main}/Mirror";
}

View File

@ -1,29 +0,0 @@
{ inputs, pkgs, ... }:
let
vars = import ./vars.nix;
in
{
virtualisation.oci-containers.containers.arch_mirror = {
image = "ubuntu/apache2:latest";
volumes = [
"${../../users/richie/global/docker_templates}/file_server/sites/:/etc/apache2/sites-enabled/"
"${vars.media_mirror}:/data"
];
ports = [ "800:80" ];
extraOptions = [ "--network=web" ];
autoStart = true;
};
systemd.services.sync_mirror = {
requires = [ "network-online.target" ];
after = [ "network-online.target" ];
wantedBy = [ "multi-user.target" ];
description = "validates startup";
path = [ pkgs.rsync ];
serviceConfig = {
Environment = "MIRROR_DIR=${vars.media_mirror}/archlinux/";
Type = "simple";
ExecStart = "${inputs.system_tools.packages.x86_64-linux.default}/bin/sync_mirror";
};
};
}

View File

@ -1,165 +0,0 @@
{ pkgs, ... }:
let
vars = import ./vars.nix;
in
{
imports = [
../../users/richie/global/ssh.nix
../../users/richie/global/syncthing_base.nix
./arch_mirror.nix
./docker
./networking.nix
./programs.nix
./services.nix
];
boot = {
zfs.extraPools = [
"media"
"storage"
"torrenting"
];
filesystem = "zfs";
useSystemdBoot = true;
};
environment = {
systemPackages = with pkgs; [ docker-compose ];
etc = {
# Creates /etc/lynis/custom.prf
"lynis/custom.prf" = {
text = ''
skip-test=BANN-7126
skip-test=BANN-7130
skip-test=DEB-0520
skip-test=DEB-0810
skip-test=FIRE-4513
skip-test=HRDN-7222
skip-test=KRNL-5820
skip-test=LOGG-2190
skip-test=LYNIS
skip-test=TOOL-5002
'';
mode = "0440";
};
};
};
services = {
nfs.server.enable = true;
openssh.ports = [ 629 ];
plex = {
enable = true;
dataDir = vars.media_plex;
};
smartd.enable = true;
sysstat.enable = true;
syncthing.guiAddress = "192.168.90.40:8384";
syncthing.settings.folders = {
"notes" = {
id = "l62ul-lpweo"; # cspell:disable-line
path = vars.media_notes;
devices = [
"bob"
"phone"
"rhapsody-in-green"
];
fsWatcherEnabled = true;
};
"books" = {
id = "6uppx-vadmy"; # cspell:disable-line
path = "${vars.storage_syncthing}/books";
devices = [
"bob"
"phone"
"rhapsody-in-green"
];
fsWatcherEnabled = true;
};
"important" = {
id = "4ckma-gtshs"; # cspell:disable-line
path = "${vars.storage_syncthing}/important";
devices = [
"bob"
"phone"
"rhapsody-in-green"
];
fsWatcherEnabled = true;
};
"music" = {
id = "vprc5-3azqc"; # cspell:disable-line
path = "${vars.storage_syncthing}/music";
devices = [
"bob"
"phone"
"rhapsody-in-green"
];
fsWatcherEnabled = true;
};
"projects" = {
id = "vyma6-lqqrz"; # cspell:disable-line
path = "${vars.storage_syncthing}/projects";
devices = [
"bob"
"rhapsody-in-green"
];
fsWatcherEnabled = true;
};
};
usbguard = {
enable = false;
rules = ''
allow id 1532:0241
'';
};
zfs = {
trim.enable = true;
autoScrub.enable = true;
};
};
systemd = {
services."snapshot_manager" = {
description = "ZFS Snapshot Manager";
requires = [ "zfs-import.target" ];
after = [ "zfs-import.target" ];
serviceConfig = {
Environment = "ZFS_BIN=${pkgs.zfs}/bin/zfs";
Type = "oneshot";
ExecStart = "${pkgs.python3}/bin/python3 ${vars.media_scripts}/ZFS/snapshot_manager.py --config-file='${./snapshot_config.toml}'";
};
};
timers."snapshot_manager" = {
wantedBy = [ "timers.target" ];
timerConfig = {
OnBootSec = "15m";
OnUnitActiveSec = "15m";
Unit = "snapshot_manager.service";
};
};
};
sops = {
defaultSopsFile = ./secrets.yaml;
secrets = {
"zfs/backup_key".path = "/root/zfs/backup_key";
"zfs/docker_key".path = "/root/zfs/docker_key";
"zfs/main_key".path = "/root/zfs/main_key";
"zfs/notes_key".path = "/root/zfs/notes_key";
"zfs/plex_key".path = "/root/zfs/plex_key";
"zfs/postgres_key".path = "/root/zfs/postgres_key";
"zfs/qbit_key".path = "/root/zfs/qbit_key";
"zfs/scripts_key".path = "/root/zfs/scripts_key";
"zfs/syncthing_key".path = "/root/zfs/syncthing_key";
"zfs/vault_key".path = "/root/zfs/vault_key";
};
};
system.stateVersion = "23.11";
}

View File

@ -1,7 +0,0 @@
{ ... }:
{
users = [
"alice"
"richie"
];
}

View File

@ -1,11 +0,0 @@
{ lib, ... }:
{
imports =
let
files = builtins.attrNames (builtins.readDir ./.);
nixFiles = builtins.filter (name: lib.hasSuffix ".nix" name && name != "default.nix") files;
in
map (file: ./. + "/${file}") nixFiles;
virtualisation.oci-containers.backend = "docker";
}

View File

@ -1,15 +0,0 @@
let
vars = import ../vars.nix;
in
{
virtualisation.oci-containers.containers.filebrowser = {
image = "hurlenko/filebrowser:latest";
extraOptions = [ "--network=web" ];
volumes = [
"/zfs:/data"
"${vars.media_docker_configs}/filebrowser:/config"
];
autoStart = true;
user = "1000:users";
};
}

View File

@ -1,68 +0,0 @@
global
log stdout format raw local0
# stats socket /run/haproxy/admin.sock mode 660 level admin expose-fd listeners
stats timeout 30s
defaults
log global
mode http
retries 3
maxconn 2000
timeout connect 5s
timeout client 50s
timeout server 50s
timeout http-request 10s
timeout http-keep-alive 2s
timeout queue 5s
timeout tunnel 2m
timeout client-fin 1s
timeout server-fin 1s
#Application Setup
frontend ContentSwitching
bind *:80
bind *:443 ssl crt /etc/ssl/certs/cloudflare.pem
mode http
# tmmworkshop.com
acl host_mirror hdr(host) -i mirror.tmmworkshop.com
acl host_dndrules hdr(host) -i dndrules.tmmworkshop.com
acl host_grafana hdr(host) -i grafana.tmmworkshop.com
acl host_filebrowser hdr(host) -i filebrowser.tmmworkshop.com
acl host_uptime_kuma hdr(host) -i uptimekuma-jeeves.tmmworkshop.com
acl host_overseerr hdr(host) -i overseerr.tmmworkshop.com
use_backend mirror_nodes if host_mirror
use_backend dndrules_nodes if host_dndrules
use_backend grafana_nodes if host_grafana
use_backend filebrowser_nodes if host_filebrowser
use_backend uptime_kuma_nodes if host_uptime_kuma
use_backend overseerr_nodes if host_overseerr
backend mirror_nodes
mode http
server server arch_mirror:80
backend mirror_rsync
mode http
server server arch_mirror:873
backend grafana_nodes
mode http
server server grafana:3000
backend dndrules_nodes
mode http
server server dnd_file_server:80
backend filebrowser_nodes
mode http
server server filebrowser:8080
backend uptime_kuma_nodes
mode http
server server uptime_kuma:3001
backend overseerr_nodes
mode http
server server overseerr:5055

View File

@ -1,161 +0,0 @@
{ config, ... }:
let
vars = import ../vars.nix;
in
{
virtualisation.oci-containers.containers = {
qbit = {
image = "ghcr.io/linuxserver/qbittorrent:latest";
ports = [
"6881:6881"
"6881:6881/udp"
"8082:8082"
"29432:29432"
];
volumes = [
"${vars.media_docker_configs}/qbit:/config"
"${vars.torrenting_qbit}:/data"
];
environment = {
PUID = "600";
PGID = "100";
TZ = "America/New_York";
WEBUI_PORT = "8082";
};
autoStart = true;
};
qbitvpn = {
image = "binhex/arch-qbittorrentvpn:latest";
extraOptions = [ "--cap-add=NET_ADMIN" ];
ports = [
"6882:6881"
"6882:6881/udp"
"8081:8081"
"8118:8118"
];
volumes = [
"${vars.media_docker_configs}/qbitvpn:/config"
"${vars.torrenting_qbitvpn}:/data"
"/etc/localtime:/etc/localtime:ro"
];
environment = {
WEBUI_PORT = "8081";
PUID = "600";
PGID = "100";
VPN_ENABLED = "yes";
VPN_CLIENT = "openvpn";
STRICT_PORT_FORWARD = "yes";
ENABLE_PRIVOXY = "yes";
LAN_NETWORK = "192.168.90.0/24";
NAME_SERVERS = "1.1.1.1,1.0.0.1";
UMASK = "000";
DEBUG = "false";
DELUGE_DAEMON_LOG_LEVEL = "debug";
DELUGE_WEB_LOG_LEVEL = "debug";
};
environmentFiles = [ config.sops.secrets."docker/qbit_vpn".path ];
autoStart = true;
};
bazarr = {
image = "ghcr.io/linuxserver/bazarr:latest";
ports = [ "6767:6767" ];
environment = {
PUID = "600";
PGID = "100";
TZ = "America/New_York";
};
volumes = [
"${vars.media_docker_configs}/bazarr:/config"
"${vars.storage_plex}/movies:/movies"
"${vars.storage_plex}/tv:/tv"
];
autoStart = true;
};
prowlarr = {
image = "ghcr.io/linuxserver/prowlarr:latest";
ports = [ "9696:9696" ];
environment = {
PUID = "600";
PGID = "100";
TZ = "America/New_York";
};
volumes = [ "${vars.media_docker_configs}/prowlarr:/config" ];
autoStart = true;
};
radarr = {
image = "ghcr.io/linuxserver/radarr:latest";
ports = [ "7878:7878" ];
environment = {
PUID = "600";
PGID = "100";
TZ = "America/New_York";
};
volumes = [
"${vars.media_docker_configs}/radarr:/config"
"${vars.storage_plex}/movies:/movies"
"${vars.torrenting_qbitvpn}:/data"
];
autoStart = true;
};
sonarr = {
image = "ghcr.io/linuxserver/sonarr:latest";
ports = [ "8989:8989" ];
environment = {
PUID = "600";
PGID = "100";
TZ = "America/New_York";
};
volumes = [
"${vars.media_docker_configs}/sonarr:/config"
"${vars.storage_plex}/tv:/tv"
"${vars.torrenting_qbitvpn}:/data"
];
autoStart = true;
};
overseerr = {
image = "ghcr.io/linuxserver/overseerr:latest";
environment = {
PUID = "600";
PGID = "100";
TZ = "America/New_York";
};
volumes = [ "${vars.media_docker_configs}/overseerr:/config" ];
dependsOn = [
"radarr"
"sonarr"
];
extraOptions = [ "--network=web" ];
autoStart = true;
};
unpackerr = {
image = "golift/unpackerr:latest";
user = "600:100";
environment = {
TZ = "America/New_York";
};
volumes = [
"${vars.torrenting_qbit}:/data"
"${config.sops.secrets.unpackerr_conf}:/etc/unpackerr/unpackerr.conf"
];
autoStart = true;
};
whisper = {
image = "ghcr.io/linuxserver/faster-whisper:latest";
ports = [ "10300:10300" ];
environment = {
PUID = "600";
PGID = "100";
TZ = "America/New_York";
WHISPER_MODEL = "tiny-int8";
WHISPER_LANG = "en";
WHISPER_BEAM = "1";
};
volumes = [ "${vars.media_docker_configs}/whisper:/config" ];
autoStart = true;
};
};
sops = {
defaultSopsFile = ../secrets.yaml;
secrets."docker/qbit_vpn".owner = "docker-service";
};
}

View File

@ -1,37 +0,0 @@
{ config, ... }:
let
vars = import ../vars.nix;
in
{
users = {
users.postgres = {
isSystemUser = true;
group = "postgres";
uid = 999;
};
groups.postgres = {
gid = 999;
};
};
virtualisation.oci-containers.containers = {
postgres = {
image = "postgres:16";
ports = [ "5432:5432" ];
volumes = [ "${vars.media_database}/postgres:/var/lib/postgresql/data" ];
environment = {
POSTGRES_USER = "admin";
POSTGRES_DB = "archive";
POSTGRES_INITDB_ARGS = "--auth-host=scram-sha-256";
};
environmentFiles = [ config.sops.secrets."docker/postgres".path ];
autoStart = true;
user = "postgres:postgres";
};
};
sops = {
defaultSopsFile = ../secrets.yaml;
secrets."docker/postgres".owner = "postgres";
};
}

View File

@ -1,16 +0,0 @@
let
vars = import ../vars.nix;
in
{
virtualisation.oci-containers.containers = {
uptime_kuma = {
image = "louislam/uptime-kuma:latest";
volumes = [
"${vars.media_docker_configs}/uptime_kuma:/app/data"
"/var/run/docker.sock:/var/run/docker.sock"
];
extraOptions = [ "--network=web" ];
autoStart = true;
};
};
}

View File

@ -1,65 +0,0 @@
{ config, ... }:
let
vars = import ../vars.nix;
in
{
virtualisation.oci-containers.containers = {
grafana = {
image = "grafana/grafana-enterprise:latest";
volumes = [ "${vars.media_docker_configs}/grafana:/var/lib/grafana" ];
user = "600:600";
extraOptions = [ "--network=web" ];
autoStart = true;
};
dnd_file_server = {
image = "ubuntu/apache2:latest";
volumes = [
"${../../../users/richie/global/docker_templates}/file_server/sites/:/etc/apache2/sites-enabled/"
"${vars.storage_main}/Table_Top/:/data"
];
extraOptions = [ "--network=web" ];
autoStart = true;
};
haproxy = {
image = "haproxy:latest";
user = "600:600";
environment = {
TZ = "Etc/EST";
};
volumes = [
"${config.sops.secrets."docker/haproxy_cert".path}:/etc/ssl/certs/cloudflare.pem"
"${./haproxy.cfg}:/usr/local/etc/haproxy/haproxy.cfg"
];
dependsOn = [
"arch_mirror"
"dnd_file_server"
"filebrowser"
"grafana"
"overseerr"
"uptime_kuma"
];
extraOptions = [ "--network=web" ];
autoStart = true;
};
cloud_flare_tunnel = {
image = "cloudflare/cloudflared:latest";
user = "600:600";
cmd = [
"tunnel"
"run"
];
environmentFiles = [ config.sops.secrets."docker/cloud_flare_tunnel".path ];
dependsOn = [ "haproxy" ];
extraOptions = [ "--network=web" ];
autoStart = true;
};
};
sops = {
defaultSopsFile = ../secrets.yaml;
secrets = {
"docker/cloud_flare_tunnel".owner = "docker-service";
"docker/haproxy_cert".owner = "docker-service";
};
};
}

View File

@ -1,45 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{
config,
lib,
modulesPath,
...
}:
{
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
boot = {
initrd.availableKernelModules = [
"mpt3sas"
"nvme"
"xhci_pci"
"ahci"
"uas"
"usb_storage"
"usbhid"
"sd_mod"
"sr_mod"
];
initrd.kernelModules = [ "dm-snapshot" ];
kernelModules = [ "kvm-amd" ];
extraModulePackages = [ ];
};
fileSystems."/" = lib.mkDefault {
device = "/dev/disk/by-uuid/0f78fa87-30be-4173-b0fa-eaa956cf83aa";
fsType = "ext4";
};
fileSystems."/boot" = {
device = "/dev/disk/by-uuid/BB77-2647";
fsType = "vfat";
};
swapDevices = [ { device = "/dev/disk/by-uuid/4c797a94-be32-43d3-89ac-7f02912c7cf5"; } ];
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}

View File

@ -1,40 +0,0 @@
{
networking = {
hostId = "1beb3027";
firewall.enable = false;
};
systemd.network = {
enable = true;
networks = {
"10-1GB_Primary" = {
matchConfig.Name = "enp98s0f0";
DHCP = "yes";
};
};
networks = {
"10-1GB_Secondary" = {
matchConfig.Name = "enp98s0f1";
DHCP = "yes";
};
};
networks = {
"10-10GB_Primary" = {
matchConfig.Name = "enp97s0f0np0";
DHCP = "yes";
linkConfig.RequiredForOnline = "routable";
};
};
networks = {
"10-10GB_Secondary" = {
matchConfig.Name = "enp97s0f1np1";
DHCP = "yes";
};
};
};
services.zerotierone = {
enable = true;
joinNetworks = [ "e4da7455b2ae64ca" ];
};
}

View File

@ -1,4 +0,0 @@
{ pkgs, ... }:
{
environment.systemPackages = with pkgs; [ filebot ];
}

View File

@ -1,7 +0,0 @@
#!/bin/bash
plex_dir="/zfs/storage/plex/"
chown docker-service:users -R "$plex_dir"
find "$plex_dir" -type f -exec chmod 664 {} \;
find "$plex_dir" -type d -exec chmod 775 {} \;

View File

@ -1,78 +0,0 @@
docker:
postgres: ENC[AES256_GCM,data:IpXIrRDzyGFjDz908w1NNb0GBna/ce9lCtOkXrpUfyllsTWca6AeqaRo23bL4jfFGfHn0Zf9okLO,iv:IwO7vJJHFfm0SGcJETpWtdhr41jPddN9nuVAH/Ooa7Y=,tag:xstwPvpvkNOZucxvzq2+ag==,type:str]
cloud_flare_tunnel: ENC[AES256_GCM,data:Qx7g0tNSfVs9VnkuYw47XJjfF+RS9B5gvpBliGL93X8K/7iiyt0NxwWyAkmmaLat5h/Yu7C71rwBIIZsKf7Ke3YS0PfEpga76ftKt3h7VKMQNT7yAcU3LY4v2h3Molnzw2fnAhxfHkogJuAsZeJW9dIjo9H2QpSh/tn9kpC+PGb/T9dcqMm4fJPqP+rIcFCfhJl9iDOKOMQ9+xVNnKZ2HQlAwPMCz29BgGCxh0cYYk9ftXPK7ZnhjwUj4bfnaKfByIPpAtk=,iv:8yz2vXanGZfOkZF/D0RP2LPqHebbOM/XBPg2eCCGs8g=,tag:67da31iZTQaMURKf9dfiJw==,type:str]
qbit_vpn: ENC[AES256_GCM,data:SRkcWb2wTTfWlgkbDSN6j5+dXnG670qFGtG2x4fajkE8eK4U30DTxrlbzta5ZMtm0Y9bquy3DcaSMF/u9CBrLbBS8mhcJw==,iv:LpkS7O+eutPUDpY5NlYjgafK6UuFsS+18yNpB+JmzcM=,tag:0Y+vj80MAbh2U+UsyH3MEA==,type:str]
haproxy_cert: ENC[AES256_GCM,data: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,iv:PUp78PWvy+lmcLiR295BGiVTLnAPX+du4lcw/Pvq/KE=,tag:k/3H2+jF9no751mvO5S5WQ==,type:str]
zfs:
backup_key: ENC[AES256_GCM,data:sJzR/DfM6+tmmcewZT+NAJk0gj8wmU43QfFCRCj9+2GITOS8suRL7E5rHTherCZgRe79T90ikM97bYf9RbZdtQ==,iv:j8F3BG/hh7UK3kC+pB6WO0OHlSSHn0jo90AgaTdpyNY=,tag:5hraDn8YqS/q57y26AXwjw==,type:str]
docker_key: ENC[AES256_GCM,data:HiW+3IYJCgqg9HJmPYQinhb6kWJouORABKniryY5e35tf8BQGKn1ldgj4Dw+79SYmvIUbf4ZSja0Ziz1isKTWA==,iv:6vBtbIlTHC+PUgyXYb92SnMTuWd8jCaEzZ3Vmv2QHhA=,tag:izKWtAQWRfn5tAYKyOO+ZQ==,type:str]
main_key: ENC[AES256_GCM,data:6ZZQc7TSAuK4PrxQxegPrFMjT1SZlRGgg5VgVg1e6ZM1RO9ZDjhcmpFRd1pkbm5DEJKq1VpUxTvxXGQDrMYO9A==,iv:Yp2jTtBd8gjB8Sdfb06ZBLpVd/KCjs/pfnBRT2ll/0c=,tag:F0HSbkZ8Z45WkUY/VNwvHg==,type:str]
notes_key: ENC[AES256_GCM,data:y3fTl3aNl8RaZwBR2thy7qfxilw+wGEj8+tTuRr+z+A6ol9N6droFNBHQcK3yWDWP8MhMKe1efWhgbZ0Raz17A==,iv:BbBjMtsb2ZDJjgbgkXP3SYl3xklI5xWmW3X9mlLlvdI=,tag:Ic3rLP30wApmOeLGFEYgVA==,type:str]
plex_key: ENC[AES256_GCM,data:fWzTSKkVCkWmZ9ZDv1/OYYZPsQKV54Ib98Bq4A+4ibT9mk28Zp7XeczOJVj6+K4+04EQgQj8RyP2x70tuFp3Xg==,iv:pyHzIo4ws4Lyd5zVflUa7yjNVefTTpEdkjCVmXDuucE=,tag:msn0NFXuq3zKGY5vE1nR1Q==,type:str]
postgres_key: ENC[AES256_GCM,data:mLa0A6pJXZ7BX9bYat9mQ30Dx/KWU9KHjiApuapBUbRtH+gtAJRGwLeXJPyMTOirFwuWWTdOts8dTMESWp7eOg==,iv:MFyo2LbdsYeoUyhWEv0EWKXNFhxoLjNs5M7ar6dlrjw=,tag:KpaatId8TdVzAEelD1tlzQ==,type:str]
qbit_key: ENC[AES256_GCM,data:19XIzi4waSOLdfgKo8z6NMX9Ee4Xw1/JqbjQEvKwWh+ar2r5P3sFJMHI394ebx4vITO0lOzl/EwcUiWt7LB6uw==,iv:s+TWyb5SzeCFZAZdKs28o7s8So++eLqR1Qc9ZWjUGwY=,tag:teHdPEhWkzDWizJD/czA6w==,type:str]
scripts_key: ENC[AES256_GCM,data:2htMEDCByUbCQ1loPEDCVNtXXqffCRHMpiobEDHI506hdEk6d/N7lmlUIqLa5YCNB6ozt0y6EEKBxnbouEHIWQ==,iv:eUYmsliDF49BNSpF+KSiT1rlPtzQpmhNC8Cy2tahMX8=,tag:8xCvm1LwDPArJ/woIO23Bg==,type:str]
syncthing_key: ENC[AES256_GCM,data:36zfmVuCEHFED3ODeoGuAxJvySY1SxWT9ml+DFvb01KdUqIGZDZj1cKoZCH+GsgYJMsQF6t+uqZJOGeyNmzMlg==,iv:17tLW4ytRpUmmltA4UIZGhsrNAGRjvucxxt9zLM3C54=,tag:YWirDB0fYSpu1evqVaoa+Q==,type:str]
vault_key: ENC[AES256_GCM,data:kFZa5oRVXuSp7W7311i0d8b7I0Y3P8bZbBoaaICuH1IlMLBVd6SUhL8cfFU66yj91W6uUJU/Oy7NpP3rM9mhGw==,iv:neRhOqW/b2DpUqoA5JJxLS4fSqj8ZGxRXv4pEPm7Wtc=,tag:bfAD3GAO6F2hBCZy7P7KUA==,type:str]
server-validation:
webhook: ENC[AES256_GCM,data:54MQzwEOf6uS6cgnPeJizRXMvGTGxLf6q1N3tGDxxpXKmSJedW+kpY2GoV91SxeeTWUyDKQcWp2fs5SwrdfDFHID9JN4wWJM0JjADggZ6u+BMEH01nnXpCJlhGq6cxDkI6gNSVgNVQW/eYNHDhnVmwwGpse4q62G1TmKlziBCv1Qahn4c3O+bOOEssio,iv:2Rcg7XSCmQeFd2oaX4GxSGXwgE3Ep1WsoPRRYo0dvH0=,tag:rPjDghxdcpME5SwoPKWv2w==,type:str]
sops:
kms: []
gcp_kms: []
azure_kv: []
hc_vault: []
age:
- recipient: age128ehc0ssgwnuv4r8ayfyu7r80e82xrkmv63g7h9y9q4mhk4w9dyqfymc2w
enc: |
-----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBTREhIRUd1K3JCM29mVHVv
d2Q4eFBLWnRUTGEzelZOMS9ScXNyV3ZGbHpNCjNCSEhmTDQ4VUtta0RXdXJUY0da
Vld5WDlJS3oyWkk5KzUzam9PYXZSa1kKLS0tIHJuaktpU3hnUWEwZzc4eHNjSitI
bVhXamJyMWMvODUvajk2aDZnQ1k1blEKoNIYxUA+k+DA+1WYq5BSa0iXuQ2Lctuy
9W7OO2m+QGzjdLLM0uS7WWGXWP2cDDgUGcqozTqM0Oqi2/OY0Bo3Jg==
-----END AGE ENCRYPTED FILE-----
lastmodified: "2024-07-07T23:09:43Z"
mac: ENC[AES256_GCM,data:36CZLl3+VSFTSTj9jDT9972XZMXjaY5jo9FZ7I7L0sOSBRH8vQ+tFww7hVHe5M2w/+YA0SRGH3r8WCbie6GeRjmY+BZu42H656K0WrpRN8ERFv+io8geACdqUsLo1VLjhDrfXaGnNOHLpmMC5dqyPXlOphiolt+ArKOBLuqtrnY=,iv:jaL/l1zwYusThKeR9C62fEGHwiv4fEvCarSiavjxQ0U=,tag:xgygx6KM/J4w55CzdLeCUg==,type:str]
pgp:
- created_at: "2024-03-02T20:52:17Z"
enc: |-
-----BEGIN PGP MESSAGE-----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=
=JbRX
-----END PGP MESSAGE-----
fp: F63832C3080D6E1AC77EECF80B4245FFE305BC82
- created_at: "2024-03-02T20:52:17Z"
enc: |-
-----BEGIN PGP MESSAGE-----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=
=wX5X
-----END PGP MESSAGE-----
fp: 29F5017C95D9E60B1B1E8407072B0E0B8312DFE3
unencrypted_suffix: _unencrypted
version: 3.8.1

View File

@ -1,52 +0,0 @@
{
config,
inputs,
pkgs,
...
}:
{
systemd = {
services = {
plex_permission = {
description = "maintains /zfs/storage/plex permissions";
serviceConfig = {
Type = "oneshot";
ExecStart = "${pkgs.bash}/bin/bash ${./scripts/plex_permission.sh}";
};
};
startup_validation = {
requires = [ "network-online.target" ];
after = [ "network-online.target" ];
wantedBy = [ "multi-user.target" ];
description = "validates startup";
path = [ pkgs.zfs ];
serviceConfig = {
EnvironmentFile = config.sops.secrets."server-validation/webhook".path;
Type = "oneshot";
ExecStart = "${inputs.system_tools.packages.x86_64-linux.default}/bin/validate_jeeves";
};
};
};
timers = {
plex_permission = {
wantedBy = [ "timers.target" ];
timerConfig = {
OnBootSec = "1h";
OnCalendar = "daily 03:00";
Unit = "plex_permission.service";
};
};
startup_validation = {
wantedBy = [ "timers.target" ];
timerConfig = {
OnBootSec = "10min";
Unit = "startup_validation.service";
};
};
};
};
sops = {
defaultSopsFile = ./secrets.yaml;
secrets."server-validation/webhook".owner = "root";
};
}

View File

@ -1,29 +0,0 @@
["media/Notes"]
15_min = 8
hourly = 24
daily = 30
monthly = 12
["storage/plex"]
15_min = 6
hourly = 2
daily = 1
monthly = 0
["media/plex"]
15_min = 6
hourly = 2
daily = 1
monthly = 0
["media/notes"]
15_min = 8
hourly = 24
daily = 30
monthly = 12
["media/docker"]
15_min = 3
hourly = 12
daily = 14
monthly = 2

View File

@ -1,23 +0,0 @@
let
zfs_media = "/zfs/media";
zfs_storage = "/zfs/storage";
zfs_torrenting = "/zfs/torrenting";
in
{
inherit zfs_media zfs_storage zfs_torrenting;
# media
media_database = "${zfs_media}/syncthing/database";
media_docker = "${zfs_media}/docker";
media_docker_configs = "${zfs_media}/docker/configs";
media_mirror = "${zfs_media}/mirror";
media_notes = "${zfs_media}/notes";
media_plex = "${zfs_media}/plex/";
media_scripts = "${zfs_media}/scripts";
# storage
storage_main = "${zfs_storage}/main";
storage_plex = "${zfs_storage}/plex";
storage_syncthing = "${zfs_storage}/syncthing";
# torrenting
torrenting_qbit = "${zfs_torrenting}/qbit";
torrenting_qbitvpn = "${zfs_torrenting}/qbitvpn";
}

View File

@ -0,0 +1,43 @@
{
config,
lib,
pkgs,
outputs,
...
}:
{
security.acme = {
acceptTerms = true;
defaults.email = "aliceghuston@gmail.com";
certs."nayeonie.com" = {
dnsProvider = "dnsimple";
environmentFile = config.sops.secrets."acme/dnsimple".path;
dnsPropagationCheck = false;
group = "haproxy";
extraDomainNames = [
"*.nayeonie.com"
# "alicehuston.xyz"
# "*.alicehuston.xyz"
];
};
};
systemd.services."acme-nayeonie.com.service".path = lib.mkForce (
with pkgs;
[
coreutils
diffutils
openssl
]
++ [
outputs.packages.x86_64-linux.lego-latest
]
);
sops.secrets = {
"acme/dnsimple" = {
owner = "root";
};
};
}

View File

@ -8,34 +8,18 @@
{
environment.systemPackages = with pkgs; [
attic-client
attic
];
services = {
postgresql = {
enable = true;
ensureDatabases = [ "atticd" ];
ensureUsers = [
{
name = "atticd";
ensureDBOwnership = true;
}
];
upgrade = {
enable = true;
stopServices = [ "atticd" ];
};
};
atticd = {
enable = true;
credentialsFile = config.sops.secrets."attic/secret-key".path;
environmentFile = config.sops.secrets."attic/secret-key".path;
settings = {
listen = "[::]:8183";
allowed-hosts = [ "attic.alicehuston.xyz" ];
api-endpoint = "https://attic.alicehuston.xyz";
allowed-hosts = [ "attic.nayeonie.com" ];
api-endpoint = "https://attic.nayeonie.com/";
compression.type = "none"; # let ZFS do the compressing
database = {
url = "postgres://atticd?host=/run/postgresql";
@ -48,7 +32,7 @@
type = "s3";
region = "us-east-1";
bucket = "cache-nix-dot";
endpoint = "https://minio.alicehuston.xyz";
endpoint = "https://minio.nayeonie.com";
};
# Warning: If you change any of the values here, it will be
@ -78,61 +62,60 @@
# borrowing from https://github.com/Shawn8901/nix-configuration/blob/4b8d1d44f47aec60feb58ca7b7ab5ed000506e90/modules/nixos/private/hydra.nix
# configured default webstore for this on root user separately
systemd = {
services = {
attic-watch-store = {
wantedBy = [ "multi-user.target" ];
after = [
"network-online.target"
"docker.service"
"atticd.service"
];
requires = [
"network-online.target"
"docker.service"
"atticd.service"
];
description = "Upload all store content to binary cache";
serviceConfig = {
User = "root";
Restart = "always";
ExecStart = "${pkgs.attic}/bin/attic watch-store cache-nix-dot";
};
};
attic-sync-hydra = {
after = [
"network-online.target"
"docker.service"
"atticd.service"
];
requires = [
"network-online.target"
"docker.service"
"atticd.service"
];
description = "Force resync of hydra derivations with attic";
serviceConfig = {
Type = "oneshot";
User = "root";
ExecStart = "${config.nix.package}/bin/nix ${./attic/sync-attic.bash}";
};
};
};
# systemd = {
# services = {
# attic-watch-store = {
# wantedBy = [ "multi-user.target" ];
# after = [
# "network-online.target"
# "docker.service"
# "atticd.service"
# ];
# requires = [
# "network-online.target"
# "docker.service"
# "atticd.service"
# ];
# description = "Upload all store content to binary cache";
# serviceConfig = {
# User = "root";
# Restart = "always";
# ExecStart = "${pkgs.attic-client}/bin/attic watch-store cache-nix-dot";
# };
# };
# attic-sync-hydra = {
# after = [
# "network-online.target"
# "docker.service"
# "atticd.service"
# ];
# requires = [
# "network-online.target"
# "docker.service"
# "atticd.service"
# ];
# description = "Force resync of hydra derivations with attic";
# serviceConfig = {
# Type = "oneshot";
# User = "root";
# ExecStart = "${config.nix.package}/bin/nix ${./sync-attic.bash}";
# };
# };
# };
timers = {
attic-sync-hydra = {
wantedBy = [ "timers.target" ];
timerConfig = {
OnBootSec = 600;
OnUnitActiveSec = 86400;
Unit = "attic-sync-hydra.service";
};
};
};
};
# timers = {
# attic-sync-hydra = {
# wantedBy = [ "timers.target" ];
# timerConfig = {
# OnBootSec = 600;
# OnUnitActiveSec = 86400;
# Unit = "attic-sync-hydra.service";
# };
# };
# };
# };
sops = {
defaultSopsFile = ./secrets.yaml;
secrets = {
"attic/secret-key".owner = "root";
"attic/database-url".owner = "root";

View File

@ -2,9 +2,9 @@
#! nix shell nixpkgs#bash nixpkgs#findutils nixpkgs#attic-client --command bash
sync_directories=(
/ZFS/ZFS-primary/hydra
/ZFS/ZFS-primary/hydra
)
for dir in "${sync_directories[@]}"; do
find "$dir" -regex ".*\.drv$" -exec attic push cache-nix-dot '{}' \;
find "$dir" -regex ".*\.drv$" -exec attic push cache-nix-dot '{}' \;
done

View File

@ -6,13 +6,19 @@
}:
{
imports = [
./attic.nix
./docker.nix
./acme.nix
./attic
./docker
./gitea.nix
./firewall.nix
./haproxy
./hardware-changes.nix
./hydra.nix
./minio.nix
./networking.nix
./nextcloud.nix
./services.nix
./samba.nix
./postgresql.nix
./zfs.nix
];
@ -52,10 +58,14 @@
};
environment.systemPackages = with pkgs; [
chromedriver
chromium
docker-compose
intel-gpu-tools
jellyfin-ffmpeg
jq
yt-dlp
yq
];
services = {
@ -63,32 +73,8 @@
nfs.server.enable = true;
openssh.ports = [ 666 ];
smartd.enable = true;
calibre-server.enable = false;
postgresql = {
enable = true;
enableJIT = true;
identMap = ''
# ArbitraryMapName systemUser DBUser
superuser_map root postgres
superuser_map alice postgres
# Let other names login as themselves
superuser_map /^(.*)$ \1
'';
# initialScript = config.sops.secrets."postgres/init".path;
upgrade = {
enable = true;
stopServices = [
"hydra-evaluator"
"hydra-init"
"hydra-notify"
"hydra-queue-runner"
"hydra-send-stats"
"hydra-server"
];
};
};
};
nix.gc.options = "--delete-older-than 150d";

View File

@ -1,8 +1,7 @@
{ inputs, ... }:
{
users = [
"alice"
"richie"
users = [ "alice" ];
modules = [
# inputs.attic.nixosModules.atticd
];
modules = [ inputs.attic.nixosModules.atticd ];
}

View File

@ -1,5 +0,0 @@
{ ... }:
{
virtualisation.docker.daemon.settings.data-root = "/var/lib/docker2";
}

View File

@ -0,0 +1,181 @@
{
config,
...
}:
let
vars = import ../vars.nix;
act_path = vars.primary_act;
in
{
virtualisation.oci-containers.containers = {
act-stable-latest-main = {
image = "gitea/act_runner:latest";
extraOptions = [
"--stop-signal=SIGINT"
];
labels = {
"com.centurylinklabs.watchtower.enable" = "true";
"com.centurylinklabs.watchtower.scope" = "act-runner";
};
ports = [ "8088:8088" ];
volumes = [
"${act_path}/stable-latest-main/config.yaml:/config.yaml"
"${act_path}/stable-latest-main/data:/data"
"/var/run/docker.sock:/var/run/docker.sock"
"/nix:/nix"
];
environment = {
CONFIG_FILE = "/config.yaml";
GITEA_RUNNER_NAME = "stable-latest-main";
};
environmentFiles = [ config.sops.secrets."docker/act-runner".path ];
log-driver = "local";
};
act-stable-latest-1 = {
image = "gitea/act_runner:latest";
extraOptions = [
"--stop-signal=SIGINT"
];
labels = {
"com.centurylinklabs.watchtower.enable" = "true";
"com.centurylinklabs.watchtower.scope" = "act-runner";
};
volumes = [
"${act_path}/stable-latest-1/config.yaml:/config.yaml"
"${act_path}/stable-latest-1/data:/data"
"/var/run/docker.sock:/var/run/docker.sock"
"/nix:/nix"
];
environment = {
CONFIG_FILE = "/config.yaml";
GITEA_RUNNER_NAME = "stable-latest-1";
};
environmentFiles = [ config.sops.secrets."docker/act-runner".path ];
log-driver = "local";
};
act-stable-latest-2 = {
image = "gitea/act_runner:latest";
extraOptions = [
"--stop-signal=SIGINT"
];
labels = {
"com.centurylinklabs.watchtower.enable" = "true";
"com.centurylinklabs.watchtower.scope" = "act-runner";
};
volumes = [
"${act_path}/stable-latest-2/config.yaml:/config.yaml"
"${act_path}/stable-latest-2/data:/data"
"/var/run/docker.sock:/var/run/docker.sock"
"/nix:/nix"
];
environment = {
CONFIG_FILE = "/config.yaml";
GITEA_RUNNER_NAME = "stable-latest-2";
};
environmentFiles = [ config.sops.secrets."docker/act-runner".path ];
log-driver = "local";
};
act-stable-latest-3 = {
image = "gitea/act_runner:latest";
extraOptions = [
"--stop-signal=SIGINT"
];
labels = {
"com.centurylinklabs.watchtower.enable" = "true";
"com.centurylinklabs.watchtower.scope" = "act-runner";
};
volumes = [
"${act_path}/stable-latest-3/config.yaml:/config.yaml"
"${act_path}/stable-latest-3/data:/data"
"/var/run/docker.sock:/var/run/docker.sock"
"/nix:/nix"
];
environment = {
CONFIG_FILE = "/config.yaml";
GITEA_RUNNER_NAME = "stable-latest-3";
};
environmentFiles = [ config.sops.secrets."docker/act-runner".path ];
log-driver = "local";
};
act-stable-latest-4 = {
image = "gitea/act_runner:latest";
extraOptions = [
"--stop-signal=SIGINT"
];
labels = {
"com.centurylinklabs.watchtower.enable" = "true";
"com.centurylinklabs.watchtower.scope" = "act-runner";
};
volumes = [
"${act_path}/stable-latest-4/config.yaml:/config.yaml"
"${act_path}/stable-latest-4/data:/data"
"/var/run/docker.sock:/var/run/docker.sock"
"/nix:/nix"
];
environment = {
CONFIG_FILE = "/config.yaml";
GITEA_RUNNER_NAME = "stable-latest-4";
};
environmentFiles = [ config.sops.secrets."docker/act-runner".path ];
log-driver = "local";
};
act-stable-latest-5 = {
image = "gitea/act_runner:latest";
extraOptions = [
"--stop-signal=SIGINT"
];
labels = {
"com.centurylinklabs.watchtower.enable" = "true";
"com.centurylinklabs.watchtower.scope" = "act-runner";
};
volumes = [
"${act_path}/stable-latest-5/config.yaml:/config.yaml"
"${act_path}/stable-latest-5/data:/data"
"/var/run/docker.sock:/var/run/docker.sock"
"/nix:/nix"
];
environment = {
CONFIG_FILE = "/config.yaml";
GITEA_RUNNER_NAME = "stable-latest-5";
};
environmentFiles = [ config.sops.secrets."docker/act-runner".path ];
log-driver = "local";
};
};
systemd = {
timers."custom-watchtower@act-runner" = {
wantedBy = [ "timers.target" ];
timerConfig = {
OnBootSec = "20m";
OnUnitActiveSec = "5m";
Unit = "custom-watchtower@act-runner.service";
};
};
services."custom-watchtower@act-runner" = {
bindsTo = [ "docker.service" ];
after = [ "docker.service" ];
description = "a watchtower-esque script for systemd-based oci-containers";
serviceConfig = {
Type = "oneshot";
User = "root";
ExecStart = "${config.nix.package}/bin/nix ${./watchtower.bash} 'com.centurylinklabs.watchtower.scope' 'act-runner'";
};
};
};
sops.secrets = {
"docker/act-runner" = {
owner = "root";
restartUnits = [
"docker-act-stable-latest-1.service"
];
};
};
}

View File

@ -0,0 +1,152 @@
{
config,
lib,
pkgs,
...
}:
let
containers = {
archiveteam-imgur = {
image = "imgur-grab";
scale = 1;
};
archiveteam-telegram = {
image = "telegram-grab";
scale = 3;
};
archiveteam-reddit = {
image = "reddit-grab";
scale = 0;
};
archiveteam-dpreview = {
image = "dpreview-grab";
scale = 0;
};
archiveteam-issuu = {
image = "issuu-grab";
scale = 0;
};
archiveteam-urls = {
image = "urls-grab";
scale = 2;
};
archiveteam-urlteam = {
image = "terroroftinytown-client-grab";
scale = 2;
};
archiveteam-mediafire = {
image = "mediafire-grab";
scale = 1;
};
archiveteam-github = {
image = "github-grab";
scale = 1;
};
archiveteam-lineblog = {
image = "lineblog-grab";
scale = 0;
};
archiveteam-banciyuan = {
image = "banciyuan-grab";
scale = 0;
};
archiveteam-wysp = {
image = "wysp-grab";
scale = 0;
};
archiveteam-xuite = {
image = "xuite-grab";
scale = 0;
};
archiveteam-gfycat = {
image = "gfycat-grab";
scale = 0;
};
archiveteam-skyblog = {
image = "skyblog-grab";
scale = 0;
};
archiveteam-zowa = {
image = "zowa-grab";
scale = 0;
};
archiveteam-blogger = {
image = "blogger-grab";
scale = 1;
};
archiveteam-vbox7 = {
image = "vbox7-grab";
scale = 0;
};
archiveteam-pastebin = {
image = "pastebin-grab";
scale = 1;
};
archiveteam-youtube = {
image = "youtube-grab";
scale = 0;
};
archiveteam-deviantart = {
image = "deviantart-grab";
scale = 0;
};
archiveteam-postnews = {
image = "postnews-grab";
scale = 0;
};
archiveteam-askfm = {
image = "askfm-grab";
scale = 1;
};
archiveteam-mangz = {
image = "mangaz-grab";
scale = 1;
};
archiveteam-cohost = {
image = "cohost-grab";
scale = 1;
};
};
container-spec = container-name: container: {
image = "atdr.meo.ws/archiveteam/${container}:latest";
extraOptions = [
"--stop-signal=SIGINT"
];
labels = {
"com.centurylinklabs.watchtower.enable" = "true";
"com.centurylinklabs.watchtower.scope" = "archiveteam";
};
volumes = [ "${at_path}/${container-name}:/grab/data" ];
log-driver = "local";
cmd = lib.splitString " " "--concurrent 6 AmAnd0";
};
inherit (lib.rad-dev.container-utils) createTemplatedContainers;
vars = import ../vars.nix;
at_path = vars.primary_archiveteam;
in
{
virtualisation.oci-containers.containers = createTemplatedContainers containers container-spec;
systemd = {
timers."custom-watchtower@archiveteam" = {
wantedBy = [ "timers.target" ];
timerConfig = {
OnBootSec = "20m";
OnUnitActiveSec = "5m";
Unit = "custom-watchtower@archiveteam.service";
};
};
services."custom-watchtower@archiveteam" = {
bindsTo = [ "docker.service" ];
after = [ "docker.service" ];
description = "a watchtower-esque script for systemd-based oci-containers";
serviceConfig = {
Type = "oneshot";
User = "root";
ExecStart = "${config.nix.package}/bin/nix ${./watchtower.bash} 'com.centurylinklabs.watchtower.scope' 'archiveteam'";
};
};
};
}

View File

@ -0,0 +1,32 @@
{ ... }:
let
vars = import ../vars.nix;
docker_path = vars.primary_docker;
calibre_path = vars.primary_calibre;
in
{
virtualisation.oci-containers.containers = {
automated-ffdl-alice = {
image = "mrtyton/automated-ffdl:latest";
user = "600:100";
extraOptions = [ "--restart=unless-stopped" ];
environment = {
PUID = "600";
PGID = "100";
};
volumes = [
"${docker_path}/auto-fic/config:/config"
"${calibre_path}/ffdl-alice:/var/lib/calibre-server"
];
};
};
services.autopull = {
enable = true;
repo.FanFicFare-alice = {
enable = true;
path = /ZFS/ZFS-primary/calibre/ffdl-alice/config/FanFicFare;
};
};
}

View File

@ -0,0 +1,79 @@
{
config,
lib,
pkgs,
...
}:
{
imports = [
./act-runner.nix
# temp disable archiveteam for tiktok archiving
#./archiveteam.nix
# ./books.nix
#./firefly.nix
#./foundry.nix
./glances.nix
# ./haproxy.nix
./minecraft.nix
./nextcloud.nix
# ./postgres.nix
# ./restic.nix
./torr.nix
# ./unifi.nix
];
virtualisation.oci-containers.backend = "docker";
virtualisation.docker.daemon.settings = {
data-root = "/var/lib/docker2";
bip = "169.254.253.254/23";
fixed-cidr = "169.254.252.0/23";
default-address-pools = [
{
base = "169.254.2.0/23";
size = 28;
}
{
base = "169.254.4.0/22";
size = 28;
}
{
base = "169.254.8.0/21";
size = 28;
}
{
base = "169.254.16.0/20";
size = 28;
}
{
base = "169.254.32.0/19";
size = 28;
}
{
base = "169.254.64.0/18";
size = 28;
}
{
base = "169.254.128.0/18";
size = 28;
}
{
base = "169.254.192.0/19";
size = 28;
}
{
base = "169.254.224.0/20";
size = 28;
}
{
base = "169.254.240.0/21";
size = 28;
}
{
base = "169.254.248.0/22";
size = 28;
}
];
mtu = 9000;
};
}

View File

@ -0,0 +1,25 @@
{ ... }:
let
vars = import ../vars.nix;
ffiii_path = "${vars.primary_docker}/firefly-iii";
in
{
virtualisation.oci-containers.containers = {
firefly = {
image = "fireflyiii/core:latest";
extraOptions = [
"--network=firefly-iii_default"
"--network=postgres-net"
];
environmentFiles = [ "${ffiii_path}/.env" ];
ports = [ "4188:8080" ];
volumes = [ "${ffiii_path}/app/upload:/var/www/html/storage/upload" ];
};
fidi = {
image = "fireflyiii/data-importer:latest";
environmentFiles = [ "${ffiii_path}/.fidi.env" ];
ports = [ "4187:8080" ];
dependsOn = [ "firefly" ];
};
};
}

View File

@ -0,0 +1,28 @@
{ config, ... }:
let
vars = import ../vars.nix;
fvtt_path = "${vars.primary_games}/foundryvtt";
in
{
virtualisation.oci-containers.containers = {
foundryvtt = {
image = "felddy/foundryvtt:11";
hostname = "foundryvtt";
environment = {
#CONTAINER_PRESERVE_CONFIG= "true";
TIMEZONE = "America/New_York";
FOUNDRY_MINIFY_STATIC_FILES = "true";
};
environmentFiles = [ config.sops.secrets."docker/foundry".path ];
volumes = [ "${fvtt_path}:/data" ];
extraOptions = [
"--network=haproxy-net"
];
};
};
sops.secrets."docker/foundry" = {
owner = "docker-service";
restartUnits = [ "docker-foundryvtt.service" ];
};
}

View File

@ -0,0 +1,24 @@
{ ... }:
let
vars = import ../vars.nix;
glances_path = "${vars.primary_docker}/glances";
in
{
virtualisation.oci-containers.containers = {
glances = {
image = "nicolargo/glances:latest-full";
extraOptions = [
"--pid=host"
"--network=haproxy-net"
];
volumes = [
"/var/run/docker.sock:/var/run/docker.sock"
"${glances_path}/glances.conf:/glances/conf/glances.conf"
];
environment = {
GLANCES_OPT = "-C /glances/conf/glances.conf -w";
};
};
};
}

View File

@ -0,0 +1,207 @@
global
# stats socket /var/run/api.sock user haproxy group haproxy mode 660 level admin expose-fd listeners
# log stdout format raw local0 info
log stdout format raw local0
crt-base /etc/ssl/certs/
maxconn 120000
defaults
log global
mode http
timeout client 2000m
timeout connect 200s
timeout server 2000m
timeout http-request 2000m
frontend stats # you can call this whatever you want
mode http
bind *:9000 # default port, but you can pick any port
stats enable # turns on stats module
stats refresh 10s # set auto-refresh rate
#Application Setup
frontend ContentSwitching
bind *:80
# bind *:443 ssl crt /etc/ssl/certs/cloudflare.pem
bind *:443 ssl crt /etc/ssl/certs/origin_ca_ecc_root_new.pem crt /var/lib/acme/nayeonie.com/full.pem strict-sni
mode http
option httplog
# max-age is mandatory
# 16000000 seconds is a bit more than 6 months
http-response set-header Strict-Transport-Security "max-age=16000000; includeSubDomains; preload;"
# Front-end acess control list
http-request return status 200 content-type text/plain lf-string "%[path,field(-1,/)].${ACCOUNT_THUMBPRINT}\n" if { path_beg '/.well-known/acme-challenge/' }
# Front-end acess control list
acl host_www hdr(host) -i www.alicehuston.xyz
acl host_www hdr(host) -i alicehuston.xyz
# acl host_ldapui hdr(host) -i authui.alicehuston.xyz
acl host_glances hdr(host) -i monit.alicehuston.xyz
acl host_glances hdr(host) -i glances.alicehuston.xyz
# acl host_foundry hdr(host) -i dnd.alicehuston.xyz
# acl host_netdata hdr(host) -i netdata.alicehuston.xyz
#acl host_terraria hdr(host) -i terraria.alicehuston.xyz
acl host_nextcloud hdr(host) -i nextcloud.alicehuston.xyz
acl host_nextcloud hdr(host) -i nayeonie.com
acl host_hydra hdr(host) -i hydra.alicehuston.xyz
acl host_attic hdr(host) -i attic.alicehuston.xyz
acl host_minio hdr(host) -i minio.alicehuston.xyz
acl host_minio_console hdr(host) -i minio-console.alicehuston.xyz
acl host_attic hdr(host) -i attic.nayeonie.com
acl host_minio hdr(host) -i minio.nayeonie.com
acl host_minio_console hdr(host) -i minio-console.nayeonie.com
#acl host_nextcloud_vol hdr(host) -i nextcloud-vol.alicehuston.xyz
# acl host_collabora hdr(host) -i collabora.alicehuston.xyz
acl host_prometheus hdr(host) -i prom.alicehuston.xyz
acl host_gitea hdr(host) -i git.alicehuston.xyz
acl host_gitea hdr(host) -i nayeonie.com
# Backend-forwarding
use_backend www_nodes if host_www
# use_backend ldapui_nodes if host_ldapui
use_backend glances_nodes if host_glances
use_backend foundry_nodes if host_foundry
# use_backend netdata_nodes if host_netdata
# use_backend terraria_nodes if host_terraria
use_backend nextcloud_nodes if host_nextcloud
use_backend hydra_nodes if host_hydra
use_backend attic_nodes if host_attic
#use_backend nextcloud_vol_nodes if host_nextcloud_vol
# use_backend collabora_nodes if host_collabora
use_backend prometheus_nodes if host_prometheus
use_backend minio_nodes if host_minio
use_backend minio_console_nodes if host_minio_console
use_backend gitea_nodes if host_gitea
#frontend ldap
# bind *:389
# bind *:636 ssl crt /etc/ssl/certs/cloudflare.pem
# mode tcp
# option tcplog
# acl host_ldap hdr(host) -i auth.alicehuston.xyz
# use_backend ldap_nodes if host_ldap
backend nextcloud_nodes
mode http
server server nextcloud:80
acl url_discovery path /.well-known/caldav /.well-known/carddav
http-request redirect location /remote.php/dav/ code 301 if url_discovery
acl h_xfh_exists req.hdr(X-Forwarded-Host) -m found
http-request set-header X-Forwarded-Host %[req.hdr(host)] unless h_xfh_exists
acl h_xfport_exists req.hdr(X-Forwarded-Port) -m found
http-request set-header X-Forwarded-Port %[dst_port] unless h_xfport_exists
acl h_xfproto_exists req.hdr(X-Forwarded-Proto) -m found
http-request set-header X-Forwarded-Proto http if !{ ssl_fc } !h_xfproto_exists
http-request set-header X-Forwarded-Proto https if { ssl_fc } !h_xfproto_exists
#backend nextcloud_nodes
# mode http
# server nxserver nextcloud:80
# acl url_discovery path /.well-known/caldav /.well-known/carddav
# http-request redirect location /remote.php/dav/ code 301 if url_discovery
# http-request set-header X-Forwarded-Host %[req.hdr(Host)]
#backend nextcloud_vol_nodes
# mode http
# server server nextcloud-vol:80
# acl url_discovery path /.well-known/caldav /.well-known/carddav
# http-request redirect location /remote.php/dav/ code 301 if url_discovery
# acl h_xfh_exists req.hdr(X-Forwarded-Host) -m found
# http-request set-header X-Forwarded-Host %[req.hdr(host)] unless h_xfh_exists
# acl h_xfport_exists req.hdr(X-Forwarded-Port) -m found
# http-request set-header X-Forwarded-Port %[dst_port] unless h_xfport_exists
# acl h_xfproto_exists req.hdr(X-Forwarded-Proto) -m found
# http-request set-header X-Forwarded-Proto http if !{ ssl_fc } !h_xfproto_exists
# http-request set-header X-Forwarded-Proto https if { ssl_fc } !h_xfproto_exists
#backend terraria_nodes
# mode http
# server server terraria:6526
#backend collabora_nodes
# mode http
# server server collabora:9980
backend www_nodes
mode http
server server grafana:3000
backend minio_nodes
mode http
server server 192.168.76.2:8500
# acl h_xfh_exists req.hdr(X-Forwarded-Host) -m found
# http-request set-header X-Forwarded-Host %[req.hdr(host)] unless h_xfh_exists
# acl h_xfport_exists req.hdr(X-Forwarded-Port) -m found
# http-request set-header X-Forwarded-Port %[dst_port] unless h_xfport_exists
# acl h_xfproto_exists req.hdr(X-Forwarded-Proto) -m found
# http-request set-header X-Forwarded-Proto http if !{ ssl_fc } !h_xfproto_exists
# http-request set-header X-Forwarded-Proto https if { ssl_fc } !h_xfproto_exists
backend minio_console_nodes
mode http
server server 192.168.76.2:8501
# backend foundry_nodes
# timeout tunnel 50s
# mode http
# server server foundryvtt:30000
#backend ldap_nodes
# mode tcp
# balance roundrobin
# option ldap-check
# server ldap1 192.168.76.2:1636 ssl ca-file /etc/ssl/certs/origin_ca_rsa_root.pem
#
#backend ldapui_nodes
# mode http
# server server 192.168.76.2:18081
backend glances_nodes
mode http
server server glances:61208
backend hydra_nodes
mode http
server server 192.168.76.2:3000
backend attic_nodes
mode http
server server 192.168.76.2:8183
backend prometheus_nodes
mode http
server server 192.168.76.2:9001
backend gitea_nodes
mode http
server server 192.168.76.2:6443
#backend netdata_nodes
# mode http
# server server 192.168.76.2:19999
# backend dnd_nodes
# mode http
# server server foundry:30000
# acl host_www hdr(host) -i www.tmmworkshop.com
frontend giteassh
mode tcp
bind :2222
default_backend giteassh_nodes
backend giteassh_nodes
mode tcp
server s1 192.168.76.2:2223
frontend minecraft
mode tcp
bind :25565
default_backend router_nodes
backend router_nodes
mode tcp
server s1 mc-router:25565

View File

@ -0,0 +1,33 @@
{ ... }:
{
virtualisation.oci-containers.containers = {
haproxy = {
image = "haproxy:latest";
extraOptions = [
"--restart=always"
"--network=haproxy-net"
];
volumes = [
"${./haproxy.cfg}:/usr/local/etc/haproxy/haproxy.cfg:ro"
"/ZFS/ZFS-primary/docker/haproxy/certs:/etc/ssl/certs:ro"
];
ports = [
"80:80"
"443:443"
"25565:25565"
];
environment = {
PUID = "600";
PGID = "600";
};
dependsOn = [
"nextcloud"
"grafana"
"foundryvtt"
"glances"
"mc-router"
];
};
};
}

View File

@ -0,0 +1,96 @@
{ config, lib, ... }:
let
servers = {
atm6 = "atm6.alicehuston.xyz";
stoneblock3 = "sb3.alicehuston.xyz";
RAD2 = "rad.alicehuston.xyz";
skyfactory = "sf.alicehuston.xyz";
divinejourney = "dj.alicehuston.xyz";
rlcraft = "rlcraft.alicehuston.xyz";
arcanum-institute = "arcanum.alicehuston.xyz";
bcg-plus = "bcg.alicehuston.xyz";
};
defaultServer = "rlcraft";
defaultEnv = {
EULA = "true";
TYPE = "AUTO_CURSEFORGE";
STOP_SERVER_ANNOUNCE_DELAY = "120";
STOP_DURATION = "600";
SYNC_CHUNK_WRITES = "false";
USE_AIKAR_FLAGS = "true";
MEMORY = "8GB";
ALLOW_FLIGHT = "true";
MAX_TICK_TIME = "-1";
};
defaultOptions = [
"--stop-signal=SIGTERM"
"--stop-timeout=1800"
"--network=minecraft-net"
];
vars = import ../vars.nix;
minecraft_path = "${vars.primary_games}/minecraft";
in
{
virtualisation.oci-containers.containers = {
mc-router = {
image = "itzg/mc-router:latest";
extraOptions = [
"--network=haproxy-net"
"--network=minecraft-net"
];
cmd = [
(
"--mapping=mc.alicehuston.xyz=${defaultServer}:25565"
+ (lib.rad-dev.mapAttrsToString (hostname: url: "," + url + "=" + hostname + ":25565") servers)
)
];
};
# rlcraft = {
# image = "itzg/minecraft-server:java8";
# volumes = [
# "${minecraft_path}/rlcraft/modpacks:/modpacks:ro"
# "${minecraft_path}/rlcraft/data:/data"
# ];
# hostname = "rlcraft";
# environment = defaultEnv // {
# VERSION = "1.12.2";
# CF_SLUG = "rlcraft";
# DIFFICULTY = "hard";
# ENABLE_COMMAND_BLOCK = "true";
# };
# extraOptions = defaultOptions;
# log-driver = "local";
# environmentFiles = [ config.sops.secrets."docker/minecraft".path ];
# };
bcg-plus = {
image = "itzg/minecraft-server:java17";
volumes = [
"${minecraft_path}/bcg-plus/modpacks:/modpacks:ro"
"${minecraft_path}/bcg-plus/data:/data"
];
hostname = "bcg-plus";
environment = defaultEnv // {
VERSION = "1.17";
CF_SLUG = "bcg";
DIFFICULTY = "normal";
DEBUG = "true";
# ENABLE_COMMAND_BLOCK = "true";
};
extraOptions = defaultOptions;
log-driver = "local";
environmentFiles = [ config.sops.secrets."docker/minecraft".path ];
};
};
sops = {
defaultSopsFile = ../secrets.yaml;
secrets = {
"docker/minecraft".owner = "docker-service";
};
};
}

View File

@ -1,7 +0,0 @@
{
imageName = "nextcloud";
imageDigest = "sha256:fe7f941cc514fe01e343a515c7b33e6b12707c718157f6e25a67119e9918a061";
sha256 = "07w9rvmr2qy037ljdmk6w1n2dmwwa31ig7gzfb084wiv18hjfrg4";
finalImageName = "nextcloud";
finalImageTag = "apache";
}

View File

@ -0,0 +1,107 @@
{ config, ... }:
let
vars = import ../vars.nix;
nextcloud_path = vars.primary_nextcloud;
redis_path = vars.primary_redis;
# nextcloud-image = import ./nextcloud-image { inherit pkgs; };
nextcloud-base = {
# image comes from running docker compose build in nextcloud-docker/.examples/full/apache
image = "nextcloud-nextcloud";
hostname = "nextcloud";
volumes = [
"${nextcloud_path}/nc_data:/var/www/html:z"
"${nextcloud_path}/nc_php:/usr/local/etc/php"
"${nextcloud_path}/nc_prehooks:/docker-entrypoint-hooks.d/before-starting"
#"${nextcloud_path}/remoteip.conf:/etc/apache2/conf-enabled/remoteip.conf:ro"
];
extraOptions = [
"--network=haproxy-net"
"--network=postgres-net"
"--network=nextcloud_default"
];
dependsOn = [ "redis" ];
environmentFiles = [ config.sops.secrets."docker/nextcloud".path ];
};
in
{
virtualisation.oci-containers.containers = {
nextcloud = nextcloud-base // {
ports = [ "9999:80" ];
};
redis = {
image = "redis:latest";
user = "600:600";
volumes = [
"${config.sops.secrets."docker/redis".path}:/usr/local/etc/redis/redis.conf"
"${redis_path}:/data"
];
extraOptions = [
"--network=nextcloud_default"
];
cmd = [
"redis-server"
"/usr/local/etc/redis/redis.conf"
];
};
go-vod = {
image = "radialapps/go-vod:latest";
dependsOn = [ "nextcloud" ];
environment = {
NEXTCLOUD_HOST = "https://nextcloud.alicehuston.xyz";
};
volumes = [ "${nextcloud_path}/nc_data:/var/www/html:ro" ];
extraOptions = [
"--device=/dev/dri:/dev/dri"
];
};
collabora-code = {
image = "collabora/code:latest";
dependsOn = [ "nextcloud" ];
environment = {
aliasgroup1 = "https://collabora.nayenoie.com:443";
aliasgroup2 = "https://nextcloud.alicehuston.xyz:443";
aliasgroup3 = "https://.*:443";
extra_params = "--o:ssl.enable=false --o:ssl.termination=true";
};
environmentFiles = [
config.sops.secrets."docker/collabora".path
];
extraOptions = [
"--network=haproxy-net"
"--privileged"
];
ports = [ "9980:9980" ];
};
};
users.users.www-data = {
uid = 33;
isSystemUser = true;
group = "www-data";
};
users.groups.www-data = {
gid = 33;
members = [ "www-data" ];
};
sops = {
defaultSopsFile = ../secrets.yaml;
secrets = {
"docker/redis" = {
owner = "docker-service";
restartUnits = [ "docker-redis.service" ];
};
"docker/nextcloud" = {
owner = "www-data";
restartUnits = [ "docker-nextcloud.service" ];
};
"docker/collabora" = {
owner = "www-data";
restartUnits = [ "docker-collabora-code.service" ];
};
};
};
}

View File

@ -0,0 +1,67 @@
{ config, ... }:
let
vars = import ../vars.nix;
psql_path = "${vars.primary_db}/postgresql";
in
{
virtualisation.oci-containers.containers = {
postgres = {
image = "postgres:16";
user = "600:600";
volumes = [
"${psql_path}/primary_new:/var/lib/postgresql/data"
"${psql_path}/pg_archives:/opt/pg_archives"
];
log-driver = "local";
extraOptions = [
"--network=postgres-net"
"--health-cmd='pg_isready -U firefly'"
"--health-interval=1s"
"--health-timeout=5s"
"--health-retries=15"
"--shm-size=1gb"
"--restart=always"
];
environmentFiles = [ config.sops.secrets."docker/pg".path ];
};
postgres-secondary = {
image = "postgres:16";
user = "600:600";
volumes = [
"${psql_path}/secondary_new:/var/lib/postgresql/data"
"${psql_path}/pg_archives:/opt/pg_archives"
];
log-driver = "local";
extraOptions = [
"--network=postgres-net"
"--health-cmd='pg_isready -U firefly'"
"--health-interval=1s"
"--health-timeout=5s"
"--health-retries=15"
"--shm-size=1gb"
"--restart=always"
];
environmentFiles = [ config.sops.secrets."docker/pg".path ];
};
postgres-adminer = {
image = "adminer/latest";
user = "600:600";
ports = [ "4191:8080" ];
dependsOn = [ "postgres" ];
extraOptions = [
"--restart=always"
"--network=postgres-net"
];
};
};
sops = {
defaultSopsFile = ../secrets.yaml;
secrets = {
"docker/pg".owner = "docker-service";
};
};
}

View File

@ -0,0 +1,38 @@
{ ... }:
let
vars = import ../vars.nix;
restic_path = "${vars.primary_backups}/restic";
in
{
virtualisation.oci-containers.containers = {
restic = {
image = "restic/rest-server:latest";
volumes = [ "${restic_path}:/data" ];
environment = {
OPTIONS = "--prometheus --htpasswd-file /data/.htpasswd";
};
ports = [ "8010:8000" ];
extraOptions = [
"--restart=always"
"--network=restic_restic"
];
};
grafana = {
image = "grafana/grafana:latest";
extraOptions = [
"--restart=always"
"--network=haproxy-net"
];
volumes = [
"grafanadata:/var/lib/grafana"
"${restic_path}/dashboards:/dashboards"
"${restic_path}/grafana.ini:/etc/grafana/grafana.ini"
];
environment = {
GF_USERS_DEFAULT_THEME = "dark";
};
};
};
}

View File

@ -0,0 +1,103 @@
{ pkgs, ... }:
let
delugeBase = {
environment = {
PUID = "600";
PGID = "100";
TZ = "America/New_York";
UMASK = "000";
DEBUG = "true";
DELUGE_DAEMON_LOG_LEVEL = "debug";
DELUGE_WEB_LOG_LEVEL = "debug";
};
};
vars = import ../vars.nix;
#docker_path = vars.primary_docker;
torr_path = vars.primary_torr;
deluge_path = "${torr_path}/deluge";
delugevpn_path = "${torr_path}/delugevpn";
genSopsConf = file: {
"${file}" = {
format = "binary";
sopsFile = ./wg/${file};
path = "${delugevpn_path}/config/wireguard/configs/${file}";
owner = "docker-service";
group = "users";
restartUnits = [ "docker-delugeVPN.service" ];
};
};
in
{
virtualisation.oci-containers.containers = {
deluge = delugeBase // {
image = "binhex/arch-deluge";
volumes = [
"${deluge_path}/config:/config"
"${deluge_path}/data/:/data"
"/etc/localtime:/etc/localtime:ro"
];
ports = [
"8084:8112"
"29433:29433"
];
};
delugeVPN = delugeBase // {
image = "binhex/arch-delugevpn";
extraOptions = [
"--privileged=true"
"--sysctl"
"net.ipv4.conf.all.src_valid_mark=1"
];
environment = delugeBase.environment // {
VPN_ENABLED = "yes";
VPN_CLIENT = "wireguard";
VPN_PROV = "custom";
ENABLE_PRIVOXY = "yes";
LAN_NETWORK = "192.168.0.0/16";
NAME_SERVERS = "194.242.2.9";
# note, delete /config/perms.txt to force a bulk permissions update
};
volumes = [
"${delugevpn_path}/config:/config"
"${delugevpn_path}/data:/data"
"/etc/localtime:/etc/localtime:ro"
];
ports = [
"8085:8112"
"8119:8118"
"39275:39275"
"39275:39275/udp"
];
};
};
systemd.services.docker-delugeVPN = {
serviceConfig = {
ExecStartPre = [
(
"${pkgs.bash}/bin/bash -c \"${pkgs.findutils}/bin/find ${delugevpn_path}/config/wireguard/configs "
+ "-type l -not -name wg0.conf "
+ "| ${pkgs.coreutils}/bin/shuf -n 1 "
+ "| ${pkgs.findutils}/bin/xargs -I {} cp -L {} ${delugevpn_path}/config/wireguard/wg0.conf &&"
+ "${pkgs.coreutils}/bin/chown docker-service:users ${delugevpn_path}/config/wireguard/wg0.conf &&"
+ "${pkgs.coreutils}/bin/chmod 440 ${delugevpn_path}/config/wireguard/wg0.conf\""
)
];
ExecStopPost = [ "${pkgs.coreutils}/bin/rm ${delugevpn_path}/config/wireguard/wg0.conf" ];
};
};
sops.secrets =
(genSopsConf "se-mma-wg-001.conf")
// (genSopsConf "se-mma-wg-002.conf")
// (genSopsConf "se-mma-wg-003.conf")
// (genSopsConf "se-mma-wg-004.conf")
// (genSopsConf "se-mma-wg-005.conf")
// (genSopsConf "se-mma-wg-101.conf")
// (genSopsConf "se-mma-wg-102.conf")
// (genSopsConf "se-mma-wg-103.conf");
}

View File

@ -0,0 +1,61 @@
{ config, ... }:
let
vars = import ../vars.nix;
unifi_path = "${vars.primary_docker}/unifi-2.0";
mongo_path = "${vars.primary_db}/mongo";
in
{
virtualisation.oci-containers.containers = {
unifi-controller = {
image = "lscr.io/linuxserver/unifi-network-application:latest";
volumes = [ "${unifi_path}/config:/config" ];
log-driver = "local";
dependsOn = [ "mongodb" ];
extraOptions = [ "--restart=unless-stopped" ];
ports = [
"8443:8443"
"3478:3478/udp"
"10001:10001/udp"
"8080:8080"
"1900:1900/udp" # optional
"8843:8843" # optional
"8880:8880" # optional
"6789:6789" # optional
"5514:5514/udp" # optional
];
environment = {
PUID = "1000";
PGID = "100";
TZ = "America/New_York";
MEM_LIMIT = "1024"; # optional
MEM_STARTUP = "1024"; # optional
MONGO_USER = "unifi";
MONGO_HOST = "mongodb";
MONGO_PORT = "27017";
MONGO_DBNAME = "unifi";
};
environmentFiles = [ config.sops.secrets."docker/unifi".path ];
};
mongodb = {
image = "docker.io/mongo:7.0";
environment = {
PUID = "1000";
PGID = "100";
TZ = "America/New_York";
};
extraOptions = [ "--restart=unless-stopped" ];
volumes = [
"${mongo_path}/unifi:/data/db"
"${unifi_path}/init-mongo.js:/docker-entrypoint-initdb.d/init-mongo.js:ro"
];
};
};
sops = {
defaultSopsFile = ../secrets.yaml;
secrets = {
"docker/unifi".owner = "docker-service";
};
};
}

View File

@ -0,0 +1,26 @@
#! /usr/bin/env nix
#! nix shell nixpkgs#docker nixpkgs#bash nixpkgs#gawk --command bash
outdated_msg="Project code is out of date and needs to be upgraded. To remedy this problem immediately, you may reboot your warrior."
label="$1"
label_val="$2"
if (($# != 2)); then
echo "usage: $0 label label_value"
fi
containers=$(docker ps --format '{{.Names}}' -f "label=${label}=${label_val}")
for container in ${containers[@]}; do
echo "checking ${container}"
last_msg=$(docker logs -n 1 "${container}")
if [[ $last_msg =~ $outdated_msg ]]; then
echo "${container} is outdated, restarting"
imageTag=$(docker ps --format '{{.Names}}\t{{.Image}}' -f "name=$container" | grep -w "$container" | awk '{print $NF}')
docker pull "$imageTag"
systemctl restart "docker-${container}"
fi
done

View File

@ -0,0 +1,26 @@
{
"data": "ENC[AES256_GCM,data:PytLIf5ceSyhxNs3p4N89GKxh7zTvTTbzKhw6SqEPrWSgRo+ntOZQgkUWBwFRGmWjFjMoMmkxaHkyrBLo/lYb6MAKuPNCb4Ss2ArSHk1qOl9u39lXYSs4NNaZYx6r5vs9IspYsIzfbkz2mad5ZaeEuDjiGCethaw9SthXNyjOOEIo/zYB/9Qju963kPXCpexu2/nbhwr/ilXzP8zzhzl712CMULV2GwISrKQcnJYyhqwzAuLmmsG50J3It3BZBUwTbyiIRK4ka0wrycqVmVDKyasUX71LYlq9MifttFCjQCN8xE7FmDl8nSBBaub9Vss5IAF+DcIRNRIQ7f6INuo,iv:CbvR5AEtENWTKP7UPqjYl7qNvyZvPZRFawrU8xoYdL4=,tag:9C5KmHeZkt62Ujkg2Wzt3A==,type:str]",
"sops": {
"kms": null,
"gcp_kms": null,
"azure_kv": null,
"hc_vault": null,
"age": [
{
"recipient": "age1qw5k8h72k3fjg5gmlxx8q8gwlc2k6n6u08d8hdzpm2pk9r0fnfxsmw33nh",
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBkNTh3RHN5bGVDZ29YS0pD\nbXpoL3E1emlJeEJMUWo3SzM2ODQ4c2FndWxNCnZUN3dIaTM3bXpOWDcxSzhROHlM\nQlJTTGl2WEs1NlczUlhhMEcvWWlXaGsKLS0tIENlY3dvNEF4UEllQnR2aDJFbSs2\nVE05RnRDSVphNHcrR3paQ3BFOU8vNkUKOtItYEU8P0Wu6TDzPylTTGhwlAiSgDEq\nJnRYAH6kE+qAnpK2xQyG4n0xbhNiASUVQgNJJyN+5BZi0dDf7k9CQA==\n-----END AGE ENCRYPTED FILE-----\n"
}
],
"lastmodified": "2024-11-18T06:49:09Z",
"mac": "ENC[AES256_GCM,data:g/ba90H1dGisB71/MWXkJDCQEXphWu0tOv04ScmEjKPm58TRM0W1oUVDPa7QWHrcdozz0LnQndhs4enW+SqRF39YBmL8OziddStVgTWC4chBazAPHBcGCgLApP9RAjNhiyosTIypLqppY08UIGU1Q1qEzcoHendu6hSMX09jG+A=,iv:6UPwNmUbjt+z7Vr7yuQ3fdsmTwBwE5AUQw3IzonqXZ4=,tag:nmloGiYkKXNGcbn8aBmNAQ==,type:str]",
"pgp": [
{
"created_at": "2024-11-18T06:49:09Z",
"enc": "-----BEGIN PGP MESSAGE-----\n\nhF4DQWNzDMjrP2ISAQdAtZwfBH7XpTMkoZMd7QojukRfwU1Z7O/ZHcBzW0rYiTgw\nuYKmkKxSPqY9E/zzNpO0C52NwyAUerM851DaOHkZvcNBkMGdFLKvLf53wgPZKlkc\n1GgBCQIQNLHtkosd/X7cb8VScXNk8CVsckRQJWiHFkPtbYcyz9O55hJOdg0TGmbQ\nf4v9yNrVG6OFQTfV8IXbIJ7fANPNDTu/gDE/XB4W8GzgmLReAsaUnxJWd7a2LSFn\nCkiJsF+JY3QsYg==\n=55xj\n-----END PGP MESSAGE-----",
"fp": "5EFFB75F7C9B74EAA5C4637547940175096C1330"
}
],
"unencrypted_suffix": "_unencrypted",
"version": "3.9.1"
}
}

View File

@ -0,0 +1,26 @@
{
"data": "ENC[AES256_GCM,data:ULynEBONpLJNPcSGjnFTLkrc4PNDNVqvpQ7LWqsMC0mW6SaDFn1e8MJkK4SSLjx2UCajMOyuvzNYzLd5AxMKBgsH/P1KAAednunOEU0ADKIzsrmEqr/zrX709yXPQY2783Os29jFFpCeQra8z3YR2vfU/PcOtqzoOuipRo0p1yUtehBLN40ogP9aLc+zxkoQxts20sU2EOe7rivU9WsBGQ2m3/Eg8ucH0aNdiN1BF/pIwyXbwMxcXtUCs0jVINJqsgFx2Ntmuz24dgZnTr8Hibz0v3F1LXcFbIIiH8OaCb3S4X2Zd/nCJqxRFz+cmzvcMplQHyE1XOYqP0OTA6s=,iv:skT932uptVD/zmbm/nxtzciD9dlYbJU4HzgHZtuathY=,tag:a/x3/an0q8hhexm4dpsVYA==,type:str]",
"sops": {
"kms": null,
"gcp_kms": null,
"azure_kv": null,
"hc_vault": null,
"age": [
{
"recipient": "age1qw5k8h72k3fjg5gmlxx8q8gwlc2k6n6u08d8hdzpm2pk9r0fnfxsmw33nh",
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSA4T0p1alJDd05KOTBjTVhL\nMVlPZno5YVlWRG0xUWZoUkJyVVZWRitLUTFZCmJmWXdzZHlGdG5GWWI2QWZXRUhY\nVVV1WUxaNWtVcmVtakI2dHpheS9HcTAKLS0tIDFsK0ZIR040dEdQQXV1NUpCQnVB\nOU9YU0NQSkwxMEtPdnRQeUYwc2hiczAKSynE6XsoUXyoLbUuuzqXbIbGoSeZR0S/\npMhZwI2fzh3vuLO0GpREkQRJ0azEvbbFPYdhJAFIBu/eRYd70IySlA==\n-----END AGE ENCRYPTED FILE-----\n"
}
],
"lastmodified": "2024-11-18T06:49:09Z",
"mac": "ENC[AES256_GCM,data:pk7jtod+BCMqF6Hwgkd2AReDqkLGZvnBsDBJIipi/PNQQnq04BgT3TKDL3aQD4sKREjc0dyubQtvq4pAE3Fs+fOLgfhW6uYgvkreSg7Q7aSx299l2OaIc+pI47Emt0s+QIjFz2hd3KHxBkKr9xg5m3aITVex+96VqPUO5DPusqs=,iv:nsv3uPIz8iwrXAlQ0sd7J7T7jg3Yif4DsJV9g9aAAXY=,tag:xAIvz4KPTlpIuDZZfv3qkw==,type:str]",
"pgp": [
{
"created_at": "2024-11-18T06:49:09Z",
"enc": "-----BEGIN PGP MESSAGE-----\n\nhF4DQWNzDMjrP2ISAQdAGNsLJiDmbwfugWEdArQwUDMm6yL6bHbRhQsniyz6RFYw\nbmOG9HElDZGrQor2N+OmjRJzBnmrC3H00PBuM1dx6L9pHZpf8/CT477ZE66IDxOw\n1GgBCQIQUtKFTM34FXDEV4sTfawGatyVDoqFq+gxtI6iJA+1YgrJkZzV/5yAlINb\nsiiO0h1dvUS7uMZT/EPEBDvprXwDXrk6GHTtxAQTP3XQzO3bz0x6RhMJOEj+7hEB\nrkne981/Q2FiDg==\n=kGYU\n-----END PGP MESSAGE-----",
"fp": "5EFFB75F7C9B74EAA5C4637547940175096C1330"
}
],
"unencrypted_suffix": "_unencrypted",
"version": "3.9.1"
}
}

Some files were not shown because too many files have changed in this diff Show More