nixcfg/hosts/slateport/raffauflabs.nix

311 lines
7.9 KiB
Nix
Raw Permalink Normal View History

{config, ...}: let
ip = "mauville";
domain = "raffauflabs.com";
in {
networking = {
2024-08-27 21:35:06 -04:00
hosts."127.0.0.1" = ["passwords.${domain}"];
firewall.allowedTCPPorts = [80 443 2379 2380 6443];
firewall.allowedUDPPorts = [8472];
};
security.acme = {
acceptTerms = true;
2024-08-26 19:17:27 -04:00
defaults.email = "alyraffauf@gmail.com";
};
services = {
ddclient = {
enable = true;
domains = [
"bt.${domain}"
"git.${domain}"
"music.${domain}"
"passwords.${domain}"
"pics.${domain}"
"plex.${domain}"
"podcasts.${domain}"
domain
];
interval = "10min";
passwordFile = config.age.secrets.cloudflare.path;
protocol = "cloudflare";
ssl = true;
upgrade 24.05 -> unstable; add pacifidlog (#114) * flake: update to nixos-unstable and master for hm,stylix * common/base: remove deprecated sound.enable * hwModules: remove deprecated driSupport * samba: disable extraConfig pending move to services/samba.settings * hwModules: migrate to new APIs * flake: update lock * aly: switch to new systemd.user.startServices syntax * nemo: migrate to new toplevel * tree-wide: move to new gnome/cinnamon app toplevels * mauville/samba: migrate to settings syntax * slateport/ddclient: migrate use -> usev4 * home/defaultApps: don't install webBrowser to temp fix build error * lavaridge: set $FLAKE to upgrade-to-2411 branch * lavaridge: don't force disable firefox media acceleration * flake: bump lock * flake: bump lock * mauville,lavaridge,petalburg: set FLAKE to 24.11 branch * flake: bump lock * defaultApps: fuse finalpackage from firefox as default * common/overlays: remove unnecessary unstable overlays * flake.lock: Update (#115) Flake lock file updates: • Updated input 'nur': 'github:nix-community/NUR/df48b722316f5a0eab0cd7d8403dd2c82848e3a2?narHash=sha256-TWYwZGe8WHQAnCb5exr23Ht9g3LDntj9qSi4Zk/8gCg%3D' (2024-10-05) → 'github:nix-community/NUR/7090c452983a90c066ce421bb75eaa0409f45910?narHash=sha256-OeJk7SbwTD7epbVxbxOQJrlAI4qPr518zjn/uD%2BaWFw%3D' (2024-10-05) Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com> * mauville: enable immich * flake.lock: Update * flake.lock: update * flake.lock: Update (#119) Flake lock file updates: • Updated input 'disko': 'github:nix-community/disko/d39ee334984fcdae6244f5a8e6ab857479cbaefe?narHash=sha256-CTKEKPzD/j8FK6H4DO3EjyixZd3HHvgAgfnCwpGFP5c%3D' (2024-10-07) → 'github:nix-community/disko/c7ef3964b6befa877e76316ae88f3ef251cae573?narHash=sha256-xipqQdXMZdSln1WChUWFqcrghOMYCmdRo7rgf/MtEkg%3D' (2024-10-11) • Updated input 'home-manager': 'github:nix-community/home-manager/038630363e7de57c36c417fd2f5d7c14773403e4?narHash=sha256-VdRTjJFyq4Q9U7Z/UoC2Q5jK8vSo6E86lHc2OanXtvc%3D' (2024-10-07) → 'github:nix-community/home-manager/65ae9c147349829d3df0222151f53f79821c5134?narHash=sha256-mGKzqdsRyLnGNl6WjEr7%2BsghGgBtYHhJQ4mjpgRTCsU%3D' (2024-10-11) • Updated input 'nixpkgs': 'github:nixos/nixpkgs/c31898adf5a8ed202ce5bea9f347b1c6871f32d1?narHash=sha256-yumd4fBc/hi8a9QgA9IT8vlQuLZ2oqhkJXHPKxH/tRw%3D' (2024-10-06) → 'github:nixos/nixpkgs/5633bcff0c6162b9e4b5f1264264611e950c8ec7?narHash=sha256-9UTxR8eukdg%2BXZeHgxW5hQA9fIKHsKCdOIUycTryeVw%3D' (2024-10-09) • Updated input 'nixpkgs-unstable': 'github:nixos/nixpkgs/c31898adf5a8ed202ce5bea9f347b1c6871f32d1?narHash=sha256-yumd4fBc/hi8a9QgA9IT8vlQuLZ2oqhkJXHPKxH/tRw%3D' (2024-10-06) → 'github:nixos/nixpkgs/5633bcff0c6162b9e4b5f1264264611e950c8ec7?narHash=sha256-9UTxR8eukdg%2BXZeHgxW5hQA9fIKHsKCdOIUycTryeVw%3D' (2024-10-09) • Updated input 'nur': 'github:nix-community/NUR/ff3b3af88896deca3b69f519e6db8d2f725c82fa?narHash=sha256-bAUXaMfUU6ZxGT2GOmdy0A5FCgEpYMawPnBVN52kx6U%3D' (2024-10-08) → 'github:nix-community/NUR/80d65008a1f68533bdfb343fb53b543f4ce2305c?narHash=sha256-es6boz1HSERc5HwhSo0mWX7Bd7DMawYAH1LcBR9EvgE%3D' (2024-10-11) • Updated input 'stylix': 'github:danth/stylix/63426a59e714c4389c5a8e559dee05a0087a3043?narHash=sha256-z01cTK5VeLFOUekhAXrJHLDzE74uAxxMwE2p6%2BWp9Sg%3D' (2024-10-07) → 'github:danth/stylix/f95022bb6e74f726a87975aec982a5aa9fad8691?narHash=sha256-JH2%2BRXJNooFtZIN6ZhaGZWn2KChMrso4H7Fkp1Ujrdo%3D' (2024-10-11) • Updated input 'stylix/tinted-kitty': 'github:tinted-theming/tinted-kitty/06bb401fa9a0ffb84365905ffbb959ae5bf40805?narHash=sha256-aRaizTYPpuWEcvoYE9U%2BYRX%2BWsc8%2BiG0guQJbvxEdJY%3D' (2022-10-05) → 'github:tinted-theming/tinted-kitty/eb39e141db14baef052893285df9f266df041ff8?narHash=sha256-2xF3sH7UIwegn%2B2gKzMpFi3pk5DlIlM18%2Bvj17Uf82U%3D' (2024-05-23) Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com> * lavaridge: added monitor description * add pacifidlog (legion go) (#120) * flake: add jovian input * hosts/pacifidlog: add initial output and config * pacifidlog: set jovian desktopSession to gamescope-wayland * pacifidlog: use latest kernel * github: add pacifidlog build * pacifidlog: disable jovian * pacifidlog: remove swapfile * create pacifidlog hardware config * pacifidlog: enable jovian * secrets: add pacifidlog * pacifidlog: add monitor settings * pacifidlog/hyprland: map touch to screen transformation * pacifidlog: set desktopSession to hyprland * pacifidlog: fixup hyprland input settings * secrets: add aly@pacifidlog and rekey * pacifidlog: use lanzaboote * pacifidog: disable steam desktop due to conficts with jovian * pacifidlog: transform touch device in hyprland * pacifidlog: enable tabletmode * reformat * pacifidlog: add legion module * pacifidlog: set consoleMode to max * pacifidlog: enable amdgpu in initrd * lenovo/legion/go: disable legion module due to build failure * accidentally changed petalburg :\ * pacifidlog: try consoleMode 1 * pacifidlog: add hdd-decky * pacifidlog: disable missing plugins * pacifidlog: run decky loader as root * decky-loader: add python * pacifidlog: clean up dekcy oader * pacifidlog: set jovian has.amd.gpu = true * legion go: add acpi_call * add nix-gaming and jovian-nixos substituters * pacifidlog: add hdd adjustor * legion go: disable ppd * pacifidlog: add hdd-ui * pacifidlog: test systemd hhd-ui * pacifidlog: add README * cleanup before merge * create pkgs/ * adjustor,hhd-ui: update to latest versions * flake.lock: Update (#121) Flake lock file updates: • Updated input 'disko': 'github:nix-community/disko/c7ef3964b6befa877e76316ae88f3ef251cae573?narHash=sha256-xipqQdXMZdSln1WChUWFqcrghOMYCmdRo7rgf/MtEkg%3D' (2024-10-11) → 'github:nix-community/disko/b6215392ec3bd05e9ebfbb2f7945c414096fce8f?narHash=sha256-KOp33tls7jRAhcmu77aVxKpSMou8QgK0BC%2BY3sYLuGo%3D' (2024-10-12) • Updated input 'home-manager': 'github:nix-community/home-manager/65ae9c147349829d3df0222151f53f79821c5134?narHash=sha256-mGKzqdsRyLnGNl6WjEr7%2BsghGgBtYHhJQ4mjpgRTCsU%3D' (2024-10-11) → 'github:nix-community/home-manager/64c6325b28ebd708653dd41d88f306023f296184?narHash=sha256-nr5QiXwQcZmf6/auC1UpX8iAtINMtdi2mH%2BOkqJQVmU%3D' (2024-10-13) • Updated input 'nur': 'github:nix-community/NUR/80d65008a1f68533bdfb343fb53b543f4ce2305c?narHash=sha256-es6boz1HSERc5HwhSo0mWX7Bd7DMawYAH1LcBR9EvgE%3D' (2024-10-11) → 'github:nix-community/NUR/8952169dd073e0cd2c482c346a088868f61cfb77?narHash=sha256-7zRl4QJD5iK1Y4jyyysUEHcsx%2Bv1jI1C3vP%2Bq3IKLps%3D' (2024-10-13) Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com> * pkgs/hhd-ui: simplify depends * pacifidlog: add mauville samba shares * pacifidlog/README: update and fmt * pacifidlog: disable laptopMode * p;acifidlog: add further steam optimizations; flake: add nix-gaming * pacifidlog: set jovian steam environment for native color management and refresh limits * pacifidlog: set zram to 100% * pacifidlog: disable steam WSI * pacifidlog: use steamOSConfig from jovian * pacifidlog: kernel optimizations + qol improvements (#122) * pacifidlog: use xanmod kernel * pacifidlog: add heroic and lutris * legion go: use zenpower * legion go: fix boot params * common/cpu/amd: remove redundant(?) amd_pstate=active param * hwModules: simplify device specific imports * pkgs: update hashes * hosts: remove FLAKE overrides * flake: remove nixpkgs-unstable --------- Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
2024-10-14 23:53:48 -04:00
usev4 = "web, web=dynamicdns.park-your-domain.com/getip, web-skip='Current IP Address: '";
username = "token";
zone = domain;
};
fail2ban = {
enable = true;
bantime = "24h";
bantime-increment.enable = true;
};
homepage-dashboard = {
enable = true;
environmentFile = config.age.secrets.homepage.path;
openFirewall = true;
bookmarks = [
# {
# Websites = [
# {
# "Aly Raffauf" = [
# {
# abbr = "AR";
# description = "Personal website and portfolio.";
# href = "https://aly.raffauflabs.com/";
# }
# ];
# }
# ];
# }
];
services = [
{
Websites = [
{
"Aly Raffauf" = {
abbr = "AR";
description = "Personal website and portfolio.";
href = "https://aly.raffauflabs.com/";
};
}
{
"Specular Anomalies" = {
abbr = "SA";
description = "Academic & tech blog.";
href = "https://distort.jp/";
};
}
];
}
{
Media = [
{
"Audiobookshelf" = {
description = "Audiobooks & podcasts.";
href = "https://podcasts.raffauflabs.com";
icon = "audiobookshelf";
widget = {
type = "audiobookshelf";
url = "http://mauville:13378";
key = "{{HOMEPAGE_VAR_ABS}}";
};
};
}
{
"Plex" = {
description = "TV Shows, movies & music.";
href = "https://plex.raffauflabs.com";
icon = "plex";
};
}
{
"Navidrome" = {
description = "Subsonic-compatible music streaming.";
href = "https://music.raffauflabs.com";
icon = "navidrome";
};
}
];
}
{
Tools = [
{
"Forĝejo" = {
description = "Git forge for open source projects.";
href = "https://git.raffauflabs.com";
icon = "forgejo";
};
}
{
"Transmission (Tailnet only)" = {
description = "Torrent client with web UI.";
href = "http://mauville:9091";
icon = "transmission";
widget = {
type = "transmission";
url = "http://mauville:9091";
username = "transmission";
password = "{{HOMEPAGE_VAR_TRANSMISSION}}";
rpcUrl = "/transmission/";
};
};
}
{
"Vaultwarden" = {
description = "Secure password manager.";
href = "https://passwords.raffauflabs.com";
icon = "vaultwarden";
};
}
];
}
];
settings = {
color = "sky";
target = "_self";
title = "RaffaufLabs.com";
};
widgets = [
{
glances = {
url = "http:/mauville:61208/";
cpu = true;
mem = true;
disk = "/mnt/Media";
};
}
{
search = {
provider = "brave";
showSearchSuggestions = true;
};
}
{
datetime = {
text_size = "xl";
format.timeStyle = "short";
};
}
];
};
# k3s = {
# enable = true;
# clusterInit = true;
# role = "server";
# tokenFile = config.age.secrets.k3s.path;
# };
nginx = {
enable = true;
recommendedGzipSettings = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
virtualHosts = {
"${domain}" = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://localhost:${toString config.services.homepage-dashboard.listenPort}";
extraConfig = ''
client_max_body_size 512M;
'';
};
};
"git.${domain}" = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://${ip}:${toString 3000}";
extraConfig = ''
client_max_body_size 512M;
'';
};
};
"music.${domain}" = {
enableACME = true;
forceSSL = true;
locations."/" = {
2024-08-26 19:58:13 -04:00
proxyPass = "http://${ip}:${toString 4533}";
proxyWebsockets = true;
extraConfig = ''
proxy_buffering off;
'';
};
};
"passwords.${domain}" = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://127.0.0.1:${toString config.services.vaultwarden.config.ROCKET_PORT}";
};
};
"pics.${domain}" = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://${ip}:${toString 3001}";
extraConfig = ''
client_max_body_size 5000M;
proxy_buffering off;
proxy_redirect http:// https://;
proxy_set_header Host $host;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header Connection "upgrade";
proxy_set_header Upgrade $http_upgrade;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
'';
};
};
"plex.${domain}" = {
enableACME = true;
forceSSL = true;
locations."/" = {
2024-08-26 19:58:13 -04:00
proxyPass = "http://${ip}:${toString 32400}";
proxyWebsockets = true;
extraConfig = ''
proxy_buffering off;
'';
};
};
"podcasts.${domain}" = {
enableACME = true;
forceSSL = true;
locations."/" = {
2024-08-26 19:58:13 -04:00
proxyPass = "http://${ip}:${toString 13378}";
extraConfig = ''
client_max_body_size 500M;
proxy_buffering off;
proxy_redirect http:// https://;
proxy_set_header Host $host;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header Connection "upgrade";
proxy_set_header Upgrade $http_upgrade;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
'';
};
};
};
};
vaultwarden = {
enable = true;
config = {
2024-08-27 22:44:23 -04:00
DOMAIN = "https://passwords.raffauflabs.com";
ROCKET_ADDRESS = "127.0.0.1";
ROCKET_LOG = "critical";
ROCKET_PORT = 8222;
SIGNUPS_ALLOWED = false;
};
};
};
}