Skip to content

Commit

Permalink
Update
Browse files Browse the repository at this point in the history
  • Loading branch information
averyanalex committed Jul 5, 2024
1 parent 6e5b082 commit e524035
Show file tree
Hide file tree
Showing 29 changed files with 470 additions and 632 deletions.
534 changes: 186 additions & 348 deletions flake.lock

Large diffs are not rendered by default.

50 changes: 25 additions & 25 deletions flake.nix
Original file line number Diff line number Diff line change
Expand Up @@ -227,38 +227,38 @@
modules = [
"${nixpkgs}/nixos/modules/installer/sd-card/sd-image-aarch64-new-kernel-no-zfs-installer.nix"
({
pkgs,
lib,
...
}: let
pkgs,
lib,
...
}:
# pkgsCross = import nixpkgs {
# system = "x86_64-linux";
# # hostPlatform.system = "aarch64-linux";
# # buildPlatform.system = "x86_64-linux";
# crossSystem = "x86_64-linux";
# };
in {
config = {
# nixpkgs.hostPlatform.system = "aarch64-linux";
# nixpkgs.buildPlatform.system = "x86_64-linux";
sdImage.compressImage = false;
system.stateVersion = "23.05";
boot.kernelPackages = lib.mkForce (pkgs.linuxPackagesFor (pkgs.linux_6_1.override {
argsOverride = {
src = pkgs.fetchFromGitHub {
owner = "orangepi-xunlong";
repo = "linux-orangepi";
rev = "3495b5ee0594566c9fed930b96b1cae90600412e";
hash = "sha256-MKlhbqORiwzFe84VEbcHbz4ZfRwNYxK5bZD5AKyopGw=";
{
config = {
# nixpkgs.hostPlatform.system = "aarch64-linux";
# nixpkgs.buildPlatform.system = "x86_64-linux";
sdImage.compressImage = false;
system.stateVersion = "23.05";
boot.kernelPackages = lib.mkForce (pkgs.linuxPackagesFor (pkgs.linux_6_1.override {
argsOverride = {
src = pkgs.fetchFromGitHub {
owner = "orangepi-xunlong";
repo = "linux-orangepi";
rev = "3495b5ee0594566c9fed930b96b1cae90600412e";
hash = "sha256-MKlhbqORiwzFe84VEbcHbz4ZfRwNYxK5bZD5AKyopGw=";
};
kernelPatches = [];
version = "6.1.31";
modDirVersion = "6.1.31";
};
kernelPatches = [];
version = "6.1.31";
modDirVersion = "6.1.31";
};
}));
# nixpkgs.config.allowBroken = true;
};
})
}));
# nixpkgs.config.allowBroken = true;
};
})
];
};
};
Expand Down
4 changes: 1 addition & 3 deletions hardware/gpu/amd.nix
Original file line number Diff line number Diff line change
@@ -1,8 +1,6 @@
{pkgs, ...}: {
hardware.opengl = {
hardware.graphics = {
enable = true;
driSupport = true;

extraPackages = with pkgs; [
rocmPackages.clr
rocmPackages.clr.icd
Expand Down
3 changes: 1 addition & 2 deletions hardware/gpu/intel.nix
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
{pkgs, ...}: {
hardware.opengl = {
hardware.graphics = {
enable = true;
driSupport = true;
# driSupport32Bit = true;

extraPackages = with pkgs; [
Expand Down
16 changes: 6 additions & 10 deletions machines/alligator/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -31,19 +31,15 @@
"40-wgav" = {
routes = [
{
routeConfig = {
Destination = "::/0";
Type = "unreachable";
Table = 700;
};
Destination = "::/0";
Type = "unreachable";
Table = 700;
}
];
routingPolicyRules = [
{
routingPolicyRuleConfig = {
FirewallMark = 700;
Table = 700;
};
FirewallMark = 700;
Table = 700;
}
# {
# routingPolicyRuleConfig = {
Expand All @@ -64,7 +60,7 @@
{
publicKey = "h+76esMcmPLakUN/1vDlvGGf2Ovmw/IDKKxFtqXCdm8=";
allowedIPs = ["0.0.0.0/0"];
endpoint = "hawk.averyan.ru:51820";
endpoint = "vpn.averyan.ru:51820";
persistentKeepalive = 25;
}
];
Expand Down
3 changes: 2 additions & 1 deletion machines/falcon/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -4,14 +4,15 @@
...
}: {
imports = [
inputs.self.nixosModules.roles.server
inputs.self.nixosModules.roles.minimal
inputs.self.nixosModules.hardware.aeza

inputs.self.nixosModules.profiles.remote-builder-client
inputs.self.nixosModules.profiles.server.aplusmuz

./mounts.nix
./tor.nix
./proxy.nix
];

system.stateVersion = "23.05";
Expand Down
8 changes: 8 additions & 0 deletions machines/falcon/proxy.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
{
services.microsocks = {
enable = true;
ip = "10.57.1.20";
};

networking.firewall.interfaces."nebula.averyan".allowedTCPPorts = [1080];
}
24 changes: 9 additions & 15 deletions machines/whale/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ in {
inputs.self.nixosModules.profiles.server.picsav
inputs.self.nixosModules.profiles.server.acme
inputs.self.nixosModules.profiles.server.blog
inputs.self.nixosModules.profiles.server.bvilove
# inputs.self.nixosModules.profiles.server.bvilove
# inputs.self.nixosModules.profiles.server.gitea
inputs.self.nixosModules.profiles.server.hass
# inputs.self.nixosModules.profiles.server.hydra
Expand Down Expand Up @@ -180,19 +180,15 @@ in {
"40-wgav" = {
routes = [
{
routeConfig = {
Destination = "::/0";
Type = "unreachable";
Table = 700;
};
Destination = "::/0";
Type = "unreachable";
Table = 700;
}
];
routingPolicyRules = [
{
routingPolicyRuleConfig = {
FirewallMark = 700;
Table = 700;
};
FirewallMark = 700;
Table = 700;
}
# {
# routingPolicyRuleConfig = {
Expand All @@ -210,10 +206,8 @@ in {
linkConfig.RequiredForOnline = false;
routingPolicyRules = [
{
routingPolicyRuleConfig = {
IncomingInterface = "wgavbr";
Table = 700;
};
IncomingInterface = "wgavbr";
Table = 700;
}
];
};
Expand All @@ -233,7 +227,7 @@ in {
{
publicKey = "h+76esMcmPLakUN/1vDlvGGf2Ovmw/IDKKxFtqXCdm8=";
allowedIPs = ["0.0.0.0/0"];
endpoint = "hawk.averyan.ru:51820";
endpoint = "vpn.averyan.ru:51820";
persistentKeepalive = 25;
}
];
Expand Down
9 changes: 5 additions & 4 deletions machines/whale/dns.nix
Original file line number Diff line number Diff line change
Expand Up @@ -20,10 +20,11 @@
${nullsProxy "clashofclans.com"}
${nullsProxy "brawlstars.com"}
${nullsProxy "brawlstarsgame.com"}
forward . tls://1.1.1.1 tls://1.0.0.1 {
tls_servername cloudflare-dns.com
health_check 15s
}
# forward . tls://1.1.1.1 tls://1.0.0.1 {
# tls_servername cloudflare-dns.com
# health_check 15s
# }
forward . tls://8.8.8.8
'';
certDir = config.security.acme.certs."neutrino.su".directory;
in ''
Expand Down
2 changes: 1 addition & 1 deletion machines/whale/firesquare.nix
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ in {
{
publicKey = "h+76esMcmPLakUN/1vDlvGGf2Ovmw/IDKKxFtqXCdm8=";
allowedIPs = ["0.0.0.0/0"];
endpoint = "hawk.averyan.ru:51820";
endpoint = "vpn.averyan.ru:51820";
persistentKeepalive = 25;
}
];
Expand Down
4 changes: 2 additions & 2 deletions machines/whale/photoprism.nix
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,8 @@
dockerImage = pkgs.dockerTools.pullImage {
imageName = "photoprism/photoprism";
finalImageTag = "latest";
imageDigest = "sha256:80b6bedef9dca00f4962c229cb7136df50d28d8ac51a4b7471fbde16b057ff8b";
sha256 = "nhMfI5jQjgYjZiadPbPSY4v6UhfbyKNTtoh2XfYNfok=";
imageDigest = "sha256:5db91badeec3f1e32a624f9e6c70541fe5d28ddfd5447d5d258046a5768c1c0b";
sha256 = "sha256-DgH5RWlYQSfSHHeRnRPFtzfFIW2CExMEk6Vu8tHJfBM=";
};
in {
age.secrets.photoprism.file = ../../secrets/intpass/photoprism.age;
Expand Down
4 changes: 2 additions & 2 deletions machines/whale/webtlo.nix
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
dockerImage = pkgs.dockerTools.pullImage {
imageName = "berkut174/webtlo";
finalImageTag = "latest";
imageDigest = "sha256:85b3fb3927072249b81ce0690247d1db0b7e8975ab06e8a2122a554c55c0de87";
sha256 = "cVglaqNAsNRNOPrwMRjfLUc0D5Dtf5jw6KrDaEjSUcc=";
imageDigest = "sha256:522ceaa41c39ff46825d5fcab9908c8b806d4b7bf5ce70c2f2a61305d8cff440";
sha256 = "sha256-UioNfJ1YfQMb12mQ5sRACxcZoNQ0CyxYtVzoM77Ikug=";
};
in {
virtualisation.oci-containers = {
Expand Down
5 changes: 5 additions & 0 deletions modules/nebula-averyan.nix
Original file line number Diff line number Diff line change
Expand Up @@ -79,12 +79,17 @@ in {
"10.57.1.10" = [
"95.165.105.90:4242"
];
"10.57.1.20" = [
# "5.42.84.150:4242"
"10.8.7.1:4242"
];
};

settings = {
lighthouse = {
remote_allow_list = {
"0200::/7" = false;
# "10.8.7.1/32" = true;
};
};
punchy = {
Expand Down
4 changes: 4 additions & 0 deletions profiles/apps/misc-a.nix
Original file line number Diff line number Diff line change
Expand Up @@ -58,6 +58,7 @@
kmplot
helvum
betaflight-configurator
brave
];

xdg.mimeApps = {
Expand All @@ -67,6 +68,8 @@
"image/jpeg" = "org.gnome.gThumb.desktop";
};
};

services.kdeconnect.enable = true;
};

nixpkgs.config.permittedInsecurePackages = [
Expand All @@ -93,5 +96,6 @@

".config/kicad"
".local/share/kicad"
".config/BraveSoftware"
];
}
Loading

0 comments on commit e524035

Please sign in to comment.