nixfmt everything
This commit is contained in:
parent
dbf843d70f
commit
d92420451d
30 changed files with 383 additions and 330 deletions
|
|
@ -18,9 +18,7 @@
|
|||
tree
|
||||
wget
|
||||
# Package overrides
|
||||
(nnn.override {
|
||||
withNerdIcons = true;
|
||||
})
|
||||
(nnn.override { withNerdIcons = true; })
|
||||
];
|
||||
|
||||
programs = {
|
||||
|
|
|
|||
|
|
@ -5,13 +5,12 @@
|
|||
user = {
|
||||
isNormalUser = true;
|
||||
shell = pkgs.fish;
|
||||
extraGroups = [
|
||||
"networkmanager"
|
||||
"docker"
|
||||
"wheel"
|
||||
extraGroups = [ "networkmanager" "docker" "wheel" ];
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKcwF1yuWEfYGScNocEbs0AmGxyTIzGc4/IhpU587SJE"
|
||||
];
|
||||
openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKcwF1yuWEfYGScNocEbs0AmGxyTIzGc4/IhpU587SJE" ];
|
||||
hashedPassword = "$6$Pj7v/CpstyuWQQV0$cNujVDhfMBdwlGVEnnd8t71.kZPixbo0u25cd.874iaqLTH4V5fa1f98V5zGapjQCz5JyZmsR94xi00sUrntT0";
|
||||
hashedPassword =
|
||||
"$6$Pj7v/CpstyuWQQV0$cNujVDhfMBdwlGVEnnd8t71.kZPixbo0u25cd.874iaqLTH4V5fa1f98V5zGapjQCz5JyZmsR94xi00sUrntT0";
|
||||
};
|
||||
root = {
|
||||
shell = pkgs.fish;
|
||||
|
|
@ -22,7 +21,7 @@
|
|||
hashedPassword = "!";
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
home-manager = {
|
||||
useGlobalPkgs = true;
|
||||
useUserPackages = true;
|
||||
|
|
|
|||
|
|
@ -10,9 +10,7 @@
|
|||
extraModprobeConfig = ''
|
||||
options bluetooth disable_ertm=1
|
||||
'';
|
||||
kernel.sysctl = {
|
||||
"net.ipv4.tcp_mtu_probing" = 1;
|
||||
};
|
||||
kernel.sysctl = { "net.ipv4.tcp_mtu_probing" = 1; };
|
||||
kernelParams = [
|
||||
"quiet"
|
||||
"splash"
|
||||
|
|
|
|||
|
|
@ -11,5 +11,6 @@
|
|||
|
||||
sound.enable = true;
|
||||
|
||||
security.rtkit.enable = true; # Needed for pipewire to acquire realtime priority
|
||||
security.rtkit.enable =
|
||||
true; # Needed for pipewire to acquire realtime priority
|
||||
}
|
||||
|
|
|
|||
|
|
@ -19,10 +19,10 @@
|
|||
fzf
|
||||
gimp
|
||||
gocryptfs
|
||||
# helvum
|
||||
# helvum
|
||||
heroic
|
||||
inkscape
|
||||
# itch # Currently using unsafe electron version
|
||||
# itch # Currently using unsafe electron version
|
||||
jellyfin-media-player
|
||||
junction
|
||||
kolourpaint
|
||||
|
|
@ -42,7 +42,7 @@
|
|||
prismlauncher-qt5
|
||||
protontricks
|
||||
protonup
|
||||
# prusa-slicer
|
||||
# prusa-slicer
|
||||
qbittorrent
|
||||
quickemu
|
||||
qview
|
||||
|
|
@ -62,9 +62,7 @@
|
|||
wezterm
|
||||
yubikey-personalization-gui
|
||||
# Package overrides
|
||||
(appimage-run.override {
|
||||
extraPkgs = pkgs: [ libthai ];
|
||||
})
|
||||
(appimage-run.override { extraPkgs = pkgs: [ libthai ]; })
|
||||
# Packages from 3rd party overlays
|
||||
agenix
|
||||
chatterino7
|
||||
|
|
@ -95,11 +93,6 @@
|
|||
];
|
||||
};
|
||||
|
||||
environment.plasma5.excludePackages = ( with pkgs.plasma5Packages; [
|
||||
elisa
|
||||
gwenview
|
||||
oxygen
|
||||
khelpcenter
|
||||
konsole
|
||||
]);
|
||||
environment.plasma5.excludePackages =
|
||||
(with pkgs.plasma5Packages; [ elisa gwenview oxygen khelpcenter konsole ]);
|
||||
}
|
||||
|
|
|
|||
|
|
@ -4,9 +4,8 @@ let
|
|||
plasma = pkgs.writeScriptBin "plasma" ''
|
||||
${pkgs.plasma-workspace}/bin/startplasma-wayland &> /dev/null
|
||||
'';
|
||||
in
|
||||
|
||||
{
|
||||
in {
|
||||
services = {
|
||||
printing.enable = true;
|
||||
pipewire = {
|
||||
|
|
@ -23,14 +22,15 @@ in
|
|||
layout = "us";
|
||||
xkbVariant = "altgr-intl";
|
||||
exportConfiguration = true;
|
||||
excludePackages = ( with pkgs; [ xterm ]);
|
||||
excludePackages = (with pkgs; [ xterm ]);
|
||||
displayManager.startx.enable = true;
|
||||
desktopManager.plasma5.enable = true;
|
||||
};
|
||||
greetd = {
|
||||
enable = true;
|
||||
settings = {
|
||||
default_session.command = "${pkgs.greetd.tuigreet}/bin/tuigreet --remember --user-menu --asterisks --time --greeting \"Welcome to NixOS\" --cmd ${plasma}/bin/plasma";
|
||||
default_session.command = ''
|
||||
${pkgs.greetd.tuigreet}/bin/tuigreet --remember --user-menu --asterisks --time --greeting "Welcome to NixOS" --cmd ${plasma}/bin/plasma'';
|
||||
initial_session = {
|
||||
command = "${plasma}/bin/plasma";
|
||||
user = "user";
|
||||
|
|
|
|||
|
|
@ -2,8 +2,10 @@
|
|||
|
||||
{
|
||||
environment.sessionVariables = rec {
|
||||
KDEHOME = "$XDG_CONFIG_HOME/kde4"; # Stops kde from placing a .kde4 folder in the home dir
|
||||
NIXOS_OZONE_WL = "1"; # Forces chromium and most electron apps to run in wayland
|
||||
KDEHOME =
|
||||
"$XDG_CONFIG_HOME/kde4"; # Stops kde from placing a .kde4 folder in the home dir
|
||||
NIXOS_OZONE_WL =
|
||||
"1"; # Forces chromium and most electron apps to run in wayland
|
||||
};
|
||||
|
||||
users.users.user = {
|
||||
|
|
|
|||
|
|
@ -20,11 +20,7 @@
|
|||
};
|
||||
|
||||
boot = {
|
||||
kernelParams = [
|
||||
"nosgx"
|
||||
"i915.fastboot=1"
|
||||
"mem_sleep_default=deep"
|
||||
];
|
||||
kernelParams = [ "nosgx" "i915.fastboot=1" "mem_sleep_default=deep" ];
|
||||
kernelModules = [
|
||||
"i2c-dev" # Required for arduino dev
|
||||
"i2c-piix4" # Required for arduino dev
|
||||
|
|
|
|||
|
|
@ -1,7 +1,5 @@
|
|||
{ ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
./hardware-configuration.nix
|
||||
];
|
||||
imports = [ ./hardware-configuration.nix ];
|
||||
}
|
||||
|
|
|
|||
|
|
@ -4,26 +4,26 @@
|
|||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usb_storage" "sd_mod" "sdhci_pci" ];
|
||||
boot.initrd.availableKernelModules =
|
||||
[ "xhci_pci" "ahci" "usb_storage" "sd_mod" "sdhci_pci" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-intel" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" =
|
||||
{ device = "/dev/disk/by-uuid/2321ee32-a952-4a4b-bba0-bb25f616a4a5";
|
||||
fsType = "ext4";
|
||||
};
|
||||
fileSystems."/" = {
|
||||
device = "/dev/disk/by-uuid/2321ee32-a952-4a4b-bba0-bb25f616a4a5";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
boot.initrd.luks.devices."luks-008bb7cb-917c-4dda-93fe-542c2285bafb".device = "/dev/disk/by-uuid/008bb7cb-917c-4dda-93fe-542c2285bafb";
|
||||
boot.initrd.luks.devices."luks-008bb7cb-917c-4dda-93fe-542c2285bafb".device =
|
||||
"/dev/disk/by-uuid/008bb7cb-917c-4dda-93fe-542c2285bafb";
|
||||
|
||||
fileSystems."/boot/efi" =
|
||||
{ device = "/dev/disk/by-uuid/36B4-C473";
|
||||
fsType = "vfat";
|
||||
};
|
||||
fileSystems."/boot/efi" = {
|
||||
device = "/dev/disk/by-uuid/36B4-C473";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
swapDevices = [ ];
|
||||
|
||||
|
|
@ -35,5 +35,6 @@
|
|||
# networking.interfaces.wlp0s20f3.useDHCP = lib.mkDefault true;
|
||||
|
||||
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
|
||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
hardware.cpu.intel.updateMicrocode =
|
||||
lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -18,13 +18,9 @@
|
|||
|
||||
systemd.targets.hibernate.enable = false; # disable non-functional hibernate
|
||||
|
||||
nix.nixPath = [
|
||||
"nixos-config=${./rotterdam.nix}"
|
||||
];
|
||||
nix.nixPath = [ "nixos-config=${./rotterdam.nix}" ];
|
||||
|
||||
users.users.user.extraGroups = [
|
||||
"corectrl"
|
||||
];
|
||||
users.users.user.extraGroups = [ "corectrl" ];
|
||||
|
||||
boot.kernelParams = [
|
||||
"processor.max_cstate=1" # Fixes bug where ryzen cpus freeze when in highest C state
|
||||
|
|
@ -32,7 +28,8 @@
|
|||
];
|
||||
|
||||
environment.sessionVariables = rec {
|
||||
KWIN_DRM_NO_AMS = "1"; # RDNA2 colour/gamma modesetting bug workaround for kwin wayland
|
||||
KWIN_DRM_NO_AMS =
|
||||
"1"; # RDNA2 colour/gamma modesetting bug workaround for kwin wayland
|
||||
};
|
||||
|
||||
programs = {
|
||||
|
|
@ -45,17 +42,17 @@
|
|||
cemu
|
||||
retroarchFull
|
||||
rpcs3
|
||||
# yuzu-ea
|
||||
# yuzu-ea
|
||||
# Packages from 3rd party overlays
|
||||
emulationstation-de
|
||||
];
|
||||
|
||||
networking.firewall = {
|
||||
allowedTCPPorts =[
|
||||
allowedTCPPorts = [
|
||||
27036 # Steam remote play
|
||||
27037 # Steam remote play
|
||||
];
|
||||
allowedUDPPorts =[
|
||||
allowedUDPPorts = [
|
||||
27031 # Steam remote play
|
||||
27036 # Steam remote play
|
||||
];
|
||||
|
|
|
|||
|
|
@ -1,7 +1,5 @@
|
|||
{ ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
./hardware-configuration.nix
|
||||
];
|
||||
imports = [ ./hardware-configuration.nix ];
|
||||
}
|
||||
|
|
|
|||
|
|
@ -4,28 +4,26 @@
|
|||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
|
||||
boot.initrd.availableKernelModules =
|
||||
[ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-amd" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" =
|
||||
{ device = "/dev/disk/by-uuid/9ccbb9e3-addc-42a3-b5d8-1e81eed37548";
|
||||
fsType = "ext4";
|
||||
};
|
||||
fileSystems."/" = {
|
||||
device = "/dev/disk/by-uuid/9ccbb9e3-addc-42a3-b5d8-1e81eed37548";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
fileSystems."/boot/efi" =
|
||||
{ device = "/dev/disk/by-uuid/7707-0E25";
|
||||
fsType = "vfat";
|
||||
};
|
||||
fileSystems."/boot/efi" = {
|
||||
device = "/dev/disk/by-uuid/7707-0E25";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
swapDevices =
|
||||
[ { device = "/dev/disk/by-uuid/39005453-0ac9-4fee-bdd3-7ea9bb6f9ca6"; }
|
||||
];
|
||||
[{ device = "/dev/disk/by-uuid/39005453-0ac9-4fee-bdd3-7ea9bb6f9ca6"; }];
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||
|
|
@ -35,5 +33,6 @@
|
|||
# networking.interfaces.enp34s0.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.wlo1.useDHCP = lib.mkDefault true;
|
||||
|
||||
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
hardware.cpu.amd.updateMicrocode =
|
||||
lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -8,51 +8,27 @@
|
|||
containers = {
|
||||
"actual" = {
|
||||
image = "jlongster/actual-server:latest";
|
||||
ports = [
|
||||
"${config.ports.actual}:5006"
|
||||
];
|
||||
volumes = [
|
||||
"/data/actual:/data"
|
||||
];
|
||||
extraOptions = [
|
||||
"--pull=always"
|
||||
];
|
||||
ports = [ "${config.ports.actual}:5006" ];
|
||||
volumes = [ "/data/actual:/data" ];
|
||||
extraOptions = [ "--pull=always" ];
|
||||
};
|
||||
"cinny" = {
|
||||
image = "ghcr.io/cinnyapp/cinny:latest";
|
||||
ports = [
|
||||
"${config.ports.cinny}:80"
|
||||
];
|
||||
volumes = [
|
||||
"/data/matrix/cinny-config.json:/app/config.json"
|
||||
];
|
||||
extraOptions = [
|
||||
"--pull=always"
|
||||
];
|
||||
ports = [ "${config.ports.cinny}:80" ];
|
||||
volumes = [ "/data/matrix/cinny-config.json:/app/config.json" ];
|
||||
extraOptions = [ "--pull=always" ];
|
||||
};
|
||||
"cinny2" = {
|
||||
image = "ghcr.io/cinnyapp/cinny:latest";
|
||||
ports = [
|
||||
"${config.ports.cinny2}:80"
|
||||
];
|
||||
volumes = [
|
||||
"/data/matrix/cinny-config.json:/app/config.json"
|
||||
];
|
||||
extraOptions = [
|
||||
"--pull=always"
|
||||
];
|
||||
ports = [ "${config.ports.cinny2}:80" ];
|
||||
volumes = [ "/data/matrix/cinny-config.json:/app/config.json" ];
|
||||
extraOptions = [ "--pull=always" ];
|
||||
};
|
||||
"librespeed" = {
|
||||
image = "lscr.io/linuxserver/librespeed:latest";
|
||||
environment = {
|
||||
TZ = "America/Bahia";
|
||||
};
|
||||
ports = [
|
||||
"${config.ports.librespeed}:80"
|
||||
];
|
||||
extraOptions = [
|
||||
"--pull=always"
|
||||
];
|
||||
environment = { TZ = "America/Bahia"; };
|
||||
ports = [ "${config.ports.librespeed}:80" ];
|
||||
extraOptions = [ "--pull=always" ];
|
||||
};
|
||||
"whoogle" = {
|
||||
image = "benbusby/whoogle-search:latest";
|
||||
|
|
@ -63,12 +39,8 @@
|
|||
WHOOGLE_CONFIG_VIEW_IMAGE = "1";
|
||||
WHOOGLE_CONFIG_GET_ONLY = "1";
|
||||
};
|
||||
ports = [
|
||||
"${config.ports.whoogle}:5000"
|
||||
];
|
||||
extraOptions = [
|
||||
"--pull=always"
|
||||
];
|
||||
ports = [ "${config.ports.whoogle}:5000" ];
|
||||
extraOptions = [ "--pull=always" ];
|
||||
};
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -4,24 +4,23 @@
|
|||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
|
||||
boot.initrd.availableKernelModules =
|
||||
[ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-intel" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" =
|
||||
{ device = "/dev/disk/by-uuid/31289617-1d84-4432-a833-680b52e88525";
|
||||
fsType = "ext4";
|
||||
};
|
||||
fileSystems."/" = {
|
||||
device = "/dev/disk/by-uuid/31289617-1d84-4432-a833-680b52e88525";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
fileSystems."/boot" =
|
||||
{ device = "/dev/disk/by-uuid/4130-BE54";
|
||||
fsType = "vfat";
|
||||
};
|
||||
fileSystems."/boot" = {
|
||||
device = "/dev/disk/by-uuid/4130-BE54";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
swapDevices = [ ];
|
||||
|
||||
|
|
@ -33,7 +32,8 @@
|
|||
# networking.interfaces.enp1s0.useDHCP = lib.mkDefault true;
|
||||
|
||||
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
|
||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
hardware.cpu.intel.updateMicrocode =
|
||||
lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
# high-resolution display
|
||||
hardware.video.hidpi.enable = lib.mkDefault true;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -3,9 +3,7 @@
|
|||
{
|
||||
services.matrix-conduit = {
|
||||
enable = true;
|
||||
extraEnvironment = {
|
||||
RUST_MIN_STACK = "16777216";
|
||||
};
|
||||
extraEnvironment = { RUST_MIN_STACK = "16777216"; };
|
||||
package = pkgs.unstable.matrix-conduit;
|
||||
settings.global = {
|
||||
server_name = "baduhai.me";
|
||||
|
|
|
|||
|
|
@ -15,9 +15,7 @@
|
|||
dnsProvider = "cloudflare";
|
||||
credentialsFile = config.age.secrets.cloudflare-creds.path;
|
||||
};
|
||||
certs."baduhai.me" = {
|
||||
extraDomainNames = [ "*.baduhai.me" ];
|
||||
};
|
||||
certs."baduhai.me" = { extraDomainNames = [ "*.baduhai.me" ]; };
|
||||
};
|
||||
|
||||
boot.kernel.sysctl = {
|
||||
|
|
|
|||
|
|
@ -64,22 +64,108 @@
|
|||
kTLS = true;
|
||||
root = inputs.homepage;
|
||||
};
|
||||
"bazarr.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.bazaar}"; };
|
||||
"bitwarden.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.vaultwarden}"; };
|
||||
"cinny.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.cinny}"; };
|
||||
"detect.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.changedetection-io}"; };
|
||||
"jackett.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.jackett}"; };
|
||||
"jellyfin.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.jellyfin}"; };
|
||||
"actual.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.actual}"; };
|
||||
"librespeed.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.librespeed}"; };
|
||||
"n8n.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.n8n}"; };
|
||||
"paperless.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.paperless}"; };
|
||||
"qbittorrent.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.qbittorrent}"; };
|
||||
"radarr.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.radarr}"; };
|
||||
"shiori.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.shiori}"; };
|
||||
"sonarr.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.sonarr}"; };
|
||||
"sync.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.syncthing}"; };
|
||||
"whoogle.baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:${config.ports.whoogle}"; };
|
||||
"bazarr.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.bazaar}";
|
||||
};
|
||||
"bitwarden.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass =
|
||||
"http://127.0.0.1:${config.ports.vaultwarden}";
|
||||
};
|
||||
"cinny.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.cinny}";
|
||||
};
|
||||
"detect.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass =
|
||||
"http://127.0.0.1:${config.ports.changedetection-io}";
|
||||
};
|
||||
"jackett.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.jackett}";
|
||||
};
|
||||
"jellyfin.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.jellyfin}";
|
||||
};
|
||||
"actual.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.actual}";
|
||||
};
|
||||
"librespeed.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass =
|
||||
"http://127.0.0.1:${config.ports.librespeed}";
|
||||
};
|
||||
"n8n.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.n8n}";
|
||||
};
|
||||
"paperless.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass =
|
||||
"http://127.0.0.1:${config.ports.paperless}";
|
||||
};
|
||||
"qbittorrent.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass =
|
||||
"http://127.0.0.1:${config.ports.qbittorrent}";
|
||||
};
|
||||
"radarr.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.radarr}";
|
||||
};
|
||||
"shiori.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.shiori}";
|
||||
};
|
||||
"sonarr.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.sonarr}";
|
||||
};
|
||||
"sync.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass =
|
||||
"http://127.0.0.1:${config.ports.syncthing}";
|
||||
};
|
||||
"whoogle.baduhai.me" = {
|
||||
useACMEHost = "baduhai.me";
|
||||
forceSSL = true;
|
||||
kTLS = true;
|
||||
locations."/".proxyPass = "http://127.0.0.1:${config.ports.whoogle}";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
|
|
@ -90,9 +176,7 @@
|
|||
passwordFile = config.age.secrets.paperless-pass.path;
|
||||
port = lib.toInt "${config.ports.paperless}";
|
||||
consumptionDirIsPublic = true;
|
||||
extraConfig = {
|
||||
PAPERLESS_OCR_LANGUAGE = "eng+por+deu";
|
||||
};
|
||||
extraConfig = { PAPERLESS_OCR_LANGUAGE = "eng+por+deu"; };
|
||||
};
|
||||
|
||||
postgresql.enable = true;
|
||||
|
|
@ -132,5 +216,6 @@
|
|||
};
|
||||
};
|
||||
|
||||
systemd.services.NetworkManager-wait-online.enable = false; # Workaround for upstream bug in NetworkManager-wait-online.service
|
||||
systemd.services.NetworkManager-wait-online.enable =
|
||||
false; # Workaround for upstream bug in NetworkManager-wait-online.service
|
||||
}
|
||||
|
|
|
|||
|
|
@ -9,13 +9,7 @@
|
|||
groups = {
|
||||
hosted = {
|
||||
gid = 1005;
|
||||
members = [
|
||||
"user"
|
||||
"shiori"
|
||||
"minecraft"
|
||||
"paperless"
|
||||
"vaultwarden"
|
||||
];
|
||||
members = [ "user" "shiori" "minecraft" "paperless" "vaultwarden" ];
|
||||
};
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -1,30 +1,30 @@
|
|||
{ specialArgs, inputs, config, pkgs, lib, ... }:
|
||||
|
||||
let
|
||||
mkStringOption = default: lib.mkOption {
|
||||
inherit default;
|
||||
type = lib.types.str;
|
||||
};
|
||||
in
|
||||
mkStringOption = default:
|
||||
lib.mkOption {
|
||||
inherit default;
|
||||
type = lib.types.str;
|
||||
};
|
||||
|
||||
{
|
||||
in {
|
||||
options.ports = {
|
||||
n8n = mkStringOption "5678";
|
||||
bazaar = mkStringOption "6767";
|
||||
radarr = mkStringOption "7878";
|
||||
vaultwarden = mkStringOption "8000";
|
||||
changedetection-io = mkStringOption "8001";
|
||||
cinny = mkStringOption "8002";
|
||||
librespeed = mkStringOption "8003";
|
||||
paperless = mkStringOption "8004";
|
||||
shiori = mkStringOption "8005";
|
||||
syncthing = mkStringOption "8006";
|
||||
jellyfin = mkStringOption "8096";
|
||||
whoogle = mkStringOption "8007";
|
||||
qbittorrent = mkStringOption "8008";
|
||||
actual = mkStringOption "8009";
|
||||
cinny2 = mkStringOption "8010";
|
||||
sonarr = mkStringOption "8989";
|
||||
jackett = mkStringOption "9117";
|
||||
n8n = mkStringOption "5678";
|
||||
bazaar = mkStringOption "6767";
|
||||
radarr = mkStringOption "7878";
|
||||
vaultwarden = mkStringOption "8000";
|
||||
changedetection-io = mkStringOption "8001";
|
||||
cinny = mkStringOption "8002";
|
||||
librespeed = mkStringOption "8003";
|
||||
paperless = mkStringOption "8004";
|
||||
shiori = mkStringOption "8005";
|
||||
syncthing = mkStringOption "8006";
|
||||
jellyfin = mkStringOption "8096";
|
||||
whoogle = mkStringOption "8007";
|
||||
qbittorrent = mkStringOption "8008";
|
||||
actual = mkStringOption "8009";
|
||||
cinny2 = mkStringOption "8010";
|
||||
sonarr = mkStringOption "8989";
|
||||
jackett = mkStringOption "9117";
|
||||
};
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,8 +1,5 @@
|
|||
{ ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
./boot.nix
|
||||
./nix.nix
|
||||
];
|
||||
imports = [ ./boot.nix ./nix.nix ];
|
||||
}
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue