Compare commits

..

No commits in common. "281f567843bb07b4d0f6b5503607e482e5916d4b" and "7dec0745a6a16db7c7f454a326cd225128978108" have entirely different histories.

13 changed files with 72 additions and 131 deletions

View file

@ -21,7 +21,6 @@
"minioRootCredentials" = { }; "minioRootCredentials" = { };
"atticdEnvironment" = { }; "atticdEnvironment" = { };
"nextcloudPassword" = { }; "nextcloudPassword" = { };
"gluetunEnvironment" = { };
"matrixRegistrationSecret" = { "matrixRegistrationSecret" = {
owner = "matrix-synapse"; owner = "matrix-synapse";
}; };

View file

@ -261,8 +261,7 @@
"$mainMod, Q, killactive," "$mainMod, Q, killactive,"
"$mainMod, F, fullscreen, 0" # set 1 to 0 to set full screen without waybar "$mainMod, F, fullscreen, 0" # set 1 to 0 to set full screen without waybar
"$mainMod, Space, togglefloating," "$mainMod, Space, togglefloating,"
# "$mainMod, D, exec, bemenu-run -l 5 --ignorecase" "$mainMod, D, exec, bemenu-run -l 5 --ignorecase"
"$mainMod, D, exec, vicinae toggle"
"SUPER SHIFT, L, exec, swaylock --image /home/${username}/.local/share/bg.png" "SUPER SHIFT, L, exec, swaylock --image /home/${username}/.local/share/bg.png"
"SUPER, L, exec, swaylock --image /home/${username}/.local/share/bg.png" "SUPER, L, exec, swaylock --image /home/${username}/.local/share/bg.png"
"$mainMod, E, exec, nautilus" "$mainMod, E, exec, nautilus"

View file

@ -13,7 +13,6 @@
nwg-dock-hyprland nwg-dock-hyprland
hyprland-monitor-attached hyprland-monitor-attached
hypridle hypridle
vicinae
]; ];
# systemd.user.targets.hyprland-session.Unit.Wants = [ "xdg-desktop-autostart.target" ]; # systemd.user.targets.hyprland-session.Unit.Wants = [ "xdg-desktop-autostart.target" ];
wayland.windowManager.hyprland = { wayland.windowManager.hyprland = {

View file

@ -1,12 +1,12 @@
{ config, lib, ... }: { config, lib, ... }:
{ {
# users.users.nginx.extraGroups = [ config.users.groups.anubis.name ]; users.users.nginx.extraGroups = [ config.users.groups.anubis.name ];
#services.anubis = { services.anubis = {
# defaultOptions = { defaultOptions = {
# enable = true; enable = true;
# settings = { settings = {
# SERVE_ROBOTS_TXT = true; SERVE_ROBOTS_TXT = true;
# }; };
# }; };
#}; };
} }

View file

@ -32,20 +32,19 @@
}; };
}; };
}; };
#anubis.instances.atticd = { anubis.instances.atticd = {
# settings = { settings = {
# TARGET = "http://localhost:8060"; TARGET = "http://localhost:8060";
# BIND = "/run/anubis/anubis-atticd/anubis.sock"; BIND = ":8061";
# METRICS_BIND = "/run/anubis/anubis-atticd/anubis.sock"; BIND_NETWORK = "tcp";
# }; };
#}; };
nginx.virtualHosts."cache.liv.town" = { nginx.virtualHosts."cache.liv.town" = {
forceSSL = true; forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem"; sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem"; sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = { locations."/" = {
# proxyPass = "http://unix:${toString config.services.anubis.instances.atticd.settings.BIND}"; proxyPass = "http://localhost${toString config.services.anubis.instances.atticd.settings.BIND}";
proxyPass = "http://localhost:8060";
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };

View file

@ -1,23 +1,19 @@
{ config, ... }: { config, ... }:
let
target = "http://localhost:8081";
in
{ {
services = { services = {
#anubis.instances.binternet = { anubis.instances.binternet = {
# settings = { settings = {
# TARGET = target; TARGET = "http://localhost:8081";
# BIND = "/run/anubis/anubis-binternet/anubis.sock"; BIND = ":8082";
# METRICS_BIND = "/run/anubis/anubis-binternet/anubis.sock"; BIND_NETWORK = "tcp";
# }; };
#}; };
nginx.virtualHosts."curate.liv.town" = { nginx.virtualHosts."curate.liv.town" = {
forceSSL = true; forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem"; sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem"; sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = { locations."/" = {
# proxyPass = "http://unix:${toString config.services.anubis.instances.binternet.settings.BIND}"; proxyPass = "http://localhost${toString config.services.anubis.instances.binternet.settings.BIND}";
proxyPass = target;
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };

View file

@ -68,20 +68,19 @@ in
# }; # };
# }; # };
# }; # };
#anubis.instances.forgejo = { anubis.instances.forgejo = {
# settings = { settings = {
# TARGET = "http://localhost:3050"; TARGET = "http://localhost:3050";
# BIND = "/run/anubis/anubis-forgejo/anubis.sock"; BIND = ":3051";
# METRICS_BIND = "/run/anubis/anubis-forgejo/anubis.sock"; BIND_NETWORK = "tcp";
# }; };
#}; };
nginx.virtualHosts."code.liv.town" = { nginx.virtualHosts."code.liv.town" = {
forceSSL = true; forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem"; sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem"; sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = { locations."/" = {
# proxyPass = "http://unix:${toString config.services.anubis.instances.forgejo.settings.BIND}"; proxyPass = "http://localhost${toString config.services.anubis.instances.forgejo.settings.BIND}";
proxyPass = "http://localhost:3050";
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };

View file

@ -17,20 +17,19 @@
guacd-hostname = "localhost"; guacd-hostname = "localhost";
}; };
}; };
#anubis.instances.guacamole = { anubis.instances.guacamole = {
# settings = { settings = {
# TARGET = "http://localhost:4822"; TARGET = "http://localhost:4822";
# BIND = "/run/anubis/anubis-guacamole/anubis.sock"; BIND = ":4883";
# METRICS_BIND = "/run/anubis/anubis-guacamole/anubis.sock"; BIND_NETWORK = "tcp";
# }; };
#}; };
nginx.virtualHosts."remote.liv.town" = { nginx.virtualHosts."remote.liv.town" = {
forceSSL = true; forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem"; sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem"; sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = { locations."/" = {
# proxyPass = "http://unix:${toString config.services.anubis.instances.guacamole.settings.BIND}"; proxyPass = "http://localhost${toString config.services.anubis.instances.guacamole.settings.BIND}";
proxyPass = "http://${toString config.services.guacamole-server.host}:${toString config.services.guacamole-server.port}";
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };

View file

@ -1,23 +1,19 @@
{ config, ... }: { config, ... }:
let
target = "http://localhost:8078";
in
{ {
services = { services = {
#anubis.instances.librey = { anubis.instances.librey = {
# settings = { settings = {
# TARGET = target; TARGET = "http://localhost:8078";
# BIND = "/run/anubis/anubis-librey/anubis.sock"; BIND = ":8079";
# METRICS_BIND = "/run/anubis/anubis-librey/anubis.sock"; BIND_NETWORK = "tcp";
# }; };
#}; };
nginx.virtualHosts."search.liv.town" = { nginx.virtualHosts."search.liv.town" = {
forceSSL = true; forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem"; sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem"; sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = { locations."/" = {
# proxyPass = "http://unix:${toString config.services.anubis.instances.librey.settings.BIND}"; proxyPass = "http://localhost${toString config.services.anubis.instances.librey.settings.BIND}";
proxyPass = target;
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };

View file

@ -1,33 +1,19 @@
{ config, pkgs, ... }: { ... }:
{ {
services.nextcloud = { services.nextcloud = {
enable = true; enable = false;
package = pkgs.nextcloud32; config.dbtype = "sqlite";
hostName = "cloud.liv.town";
# appstoreEnable = true;
https = true;
maxUploadSize = "10G";
extraApps = {
inherit (config.services.nextcloud.package.packages.apps)
news
contacts
calendar
groupfolders
notify_push
;
};
config = {
adminuser = "root";
adminpassFile = config.sops.secrets.nextcloudPassword.path;
dbtype = "sqlite";
};
configureRedis = true; configureRedis = true;
home = "/home/liv/nextcloud";
config.adminpassFile = "/run/nextcloud/adminpassFile";
maxUploadSize = "25G";
https = true;
hostName = "dandelion.srv.liv.town";
settings = { settings = {
mail_smtphost = "smtp.migadu.com"; trusted_domains = [
mail_smtpport = 465; "dandelion.srv.liv.town"
mail_smtpname = "notifications@liv.town"; "files.dandelion.srv.liv.town"
mail_smtpauth = true; ];
trusted_domains = [ "cloud.liv.town" ];
enabledPreviewProviders = [ enabledPreviewProviders = [
"OC\\Preview\\BMP" "OC\\Preview\\BMP"
"OC\\Preview\\GIF" "OC\\Preview\\GIF"
@ -43,25 +29,4 @@
]; ];
}; };
}; };
services.nginx.virtualHosts.${config.services.nextcloud.hostName} = {
forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
};
systemd.services.nextcloud-custom-config = {
path = [
config.services.nextcloud.occ
];
script = ''
nextcloud-occ theming:config name "livnet"
# nextcloud-occ theming:config description "liv to your fullest"
nextcloud-occ theming:config url "https://cloud.liv.town";
# nextcloud-occ theming:config privacyUrl "https://liv.town/privacy";
nextcloud-occ theming:config color "#3253a5";
'';
# nextcloud-occ theming:config logo ${./logo.png}
after = [ "nextcloud-setup.service" ];
wantedBy = [ "multi-user.target" ];
};
} }

View file

@ -24,14 +24,6 @@
environmentFile = "/home/liv/desec.env"; # location of your DESEC_TOKEN=[value] environmentFile = "/home/liv/desec.env"; # location of your DESEC_TOKEN=[value]
webroot = null; webroot = null;
}; };
"ahwx.org" = {
domain = "*.ahwx.org";
extraDomainNames = [ "ahwx.org" ];
group = config.services.nginx.group;
dnsProvider = "desec";
environmentFile = "/home/liv/desec.env"; # location of your DESEC_TOKEN=[value]
webroot = null;
};
"quack.social" = { "quack.social" = {
domain = "*.quack.social"; domain = "*.quack.social";
extraDomainNames = [ "quack.social" ]; extraDomainNames = [ "quack.social" ];

View file

@ -5,20 +5,19 @@
enable = true; enable = true;
settings.PORT = "4800"; settings.PORT = "4800";
}; };
#anubis.instances.uptime-kuma = { anubis.instances.uptime-kuma = {
# settings = { settings = {
# TARGET = "http://localhost:4800"; TARGET = "http://localhost:4800";
# BIND = "/run/anubis/anubis-uptime-kuma/anubis.sock"; BIND = ":4801";
# METRICS_BIND = "/run/anubis/anubis-uptime-kuma/anubis.sock"; BIND_NETWORK = "tcp";
# }; };
#}; };
nginx.virtualHosts."uptime.liv.town" = { nginx.virtualHosts."uptime.liv.town" = {
forceSSL = true; forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem"; sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem"; sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = { locations."/" = {
# proxyPass = "http://unix:${toString config.services.anubis.instances.uptime-kuma.settings.BIND}"; proxyPass = "http://localhost${toString config.services.anubis.instances.uptime-kuma.settings.BIND}";
proxyPass = "http://localhost:4800";
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };

File diff suppressed because one or more lines are too long