diff options
author | tdback <tyler@tdback.net> | 2025-01-23 21:22:42 -0500 |
---|---|---|
committer | tdback <tyler@tdback.net> | 2025-01-23 21:22:42 -0500 |
commit | 9d9d84699bc1bce6aac253cb70e97c100d1e4c84 (patch) | |
tree | 5532fb719100b19d236197967c4364554e9dc6d5 /modules/retired | |
parent | ebd0ac7a3aa6c681b6317da24b72d64962913f79 (diff) |
Retired modules have migrated to separate repo
Diffstat (limited to 'modules/retired')
-rw-r--r-- | modules/retired/blocky/default.nix | 97 | ||||
-rw-r--r-- | modules/retired/forgejo/default.nix | 72 | ||||
-rw-r--r-- | modules/retired/kavita/default.nix | 28 | ||||
-rw-r--r-- | modules/retired/mealie/default.nix | 22 | ||||
-rw-r--r-- | modules/retired/mumble/default.nix | 11 | ||||
-rw-r--r-- | modules/retired/navidrome/default.nix | 30 | ||||
-rw-r--r-- | modules/retired/pihole/default.nix | 56 | ||||
-rw-r--r-- | modules/retired/stirling-pdf/default.nix | 23 | ||||
-rw-r--r-- | modules/retired/x11/default.nix | 33 | ||||
-rw-r--r-- | modules/retired/xonotic/default.nix | 25 |
10 files changed, 0 insertions, 397 deletions
diff --git a/modules/retired/blocky/default.nix b/modules/retired/blocky/default.nix deleted file mode 100644 index 302ef8e..0000000 --- a/modules/retired/blocky/default.nix +++ /dev/null @@ -1,97 +0,0 @@ -{ lib, pkgs, ... }: -{ - services.blocky = { - enable = true; - package = pkgs.blocky; - settings = { - upstreams = { - init.strategy = "fast"; - groups.default = [ - "9.9.9.9" - "149.112.112.112" - ]; - }; - bootstrapDns = lib.singleton { - upstream = "https://dns.quad9.net/dns-query"; - ips = [ "9.9.9.9" ]; - }; - ports = { - dns = 53; - tls = 853; - https = 443; - }; - blocking = { - denylists = { - ads = [ - "https://adaway.org/hosts.txt" - "https://v.firebog.net/hosts/AdguardDNS.txt" - "https://v.firebog.net/hosts/Admiral.txt" - "https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt" - "https://v.firebog.net/hosts/Easylist.txt" - "https://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&showintro=0&mimetype=plaintext" - "https://raw.githubusercontent.com/FadeMind/hosts.extras/master/UncheckyAds/hosts" - "https://raw.githubusercontent.com/bigdargon/hostsVN/master/hosts" - ]; - malicious = [ - "https://osint.digitalside.it/Threat-Intel/lists/latestdomains.txt" - "https://v.firebog.net/hosts/Prigent-Crypto.txt" - "https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Risk/hosts" - "https://phishing.army/download/phishing_army_blocklist_extended.txt" - "https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-malware.txt" - "https://raw.githubusercontent.com/Spam404/lists/master/main-blacklist.txt" - "https://raw.githubusercontent.com/AssoEchap/stalkerware-indicators/master/generated/hosts" - "https://urlhaus.abuse.ch/downloads/hostfile/" - "https://v.firebog.net/hosts/Prigent-Malware.txt" - ]; - other = [ - "https://zerodot1.gitlab.io/CoinBlockerLists/hosts_browser" - ]; - suspicious = [ - "https://raw.githubusercontent.com/PolishFiltersTeam/KADhosts/master/KADhosts.txt" - "https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Spam/hosts" - "https://v.firebog.net/hosts/static/w3kbl.txt" - "https://raw.githubusercontent.com/matomo-org/referrer-spam-blacklist/master/spammers.txt" - "https://someonewhocares.org/hosts/zero/hosts" - "https://raw.githubusercontent.com/VeleSila/yhosts/master/hosts" - "https://winhelp2002.mvps.org/hosts.txt" - "https://v.firebog.net/hosts/neohostsbasic.txt" - "https://raw.githubusercontent.com/RooneyMcNibNug/pihole-stuff/master/SNAFU.txt" - "https://paulgb.github.io/BarbBlock/blacklists/hosts-file.txt" - ]; - tracking-telemetry = [ - "https://v.firebog.net/hosts/Easyprivacy.txt" - "https://v.firebog.net/hosts/Prigent-Ads.txt" - "https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.2o7Net/hosts" - "https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt" - "https://hostfiles.frogeye.fr/firstparty-trackers-hosts.txt" - "https://www.github.developerdan.com/hosts/lists/ads-and-tracking-extended.txt" - "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/android-tracking.txt" - "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/SmartTV.txt" - "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/AmazonFireTV.txt" - "https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-blocklist.txt" - ]; - }; - clientGroupsBlock.default = [ - "ads" - "malicious" - "other" - "suspicious" - "tracking-telemetry" - ]; - loading = { - concurrency = 16; - strategy = "failOnError"; - }; - }; - }; - }; - - networking.firewall = { - allowedTCPPorts = [ - 53 - 443 - 853 - ]; - allowedUDPPorts = [ 53 ]; - }; -} diff --git a/modules/retired/forgejo/default.nix b/modules/retired/forgejo/default.nix deleted file mode 100644 index cf4e101..0000000 --- a/modules/retired/forgejo/default.nix +++ /dev/null @@ -1,72 +0,0 @@ -{ - inputs, - config, - lib, - pkgs, - ... -}: -let - domain = "git.tdback.net"; - port = 3000; -in -{ - services.forgejo = { - enable = true; - package = pkgs.unstable.forgejo; - stateDir = "/tank/forgejo"; - database.type = "postgres"; - lfs.enable = true; - settings = { - server = { - DOMAIN = domain; - ROOT_URL = "https://${domain}/"; - HTTP_PORT = port; - }; - service.DISABLE_REGISTRATION = true; - actions = { - ENABLED = true; - DEFAULT_ACTIONS_URL = "https://${domain}"; - }; - }; - }; - - age.secrets.forgejoAdminPass = { - file = "${inputs.self}/secrets/forgejoAdminPass.age"; - mode = "770"; - owner = "forgejo"; - group = "forgejo"; - }; - - systemd.services.forgejo.preStart = - let - adminCmd = "${lib.getExe config.services.forgejo.package} admin user"; - password = config.age.secrets.forgejoAdminPass.path; - user = "tdback"; - email = "tyler@tdback.net"; - in - '' - ${adminCmd} create --admin --email ${email} --username ${user} --password "$(tr -d '\n' < ${password})" || true - ''; - - services.openssh.settings.AllowUsers = [ "forgejo" ]; - - services.caddy.virtualHosts.${domain}.extraConfig = '' - encode zstd gzip - reverse_proxy http://localhost:${builtins.toString port} - ''; - - age.secrets.forgejoRunnerToken.file = "${inputs.self}/secrets/forgejoRunnerToken.age"; - services.gitea-actions-runner = { - package = pkgs.unstable.forgejo-runner; - instances.default = { - enable = true; - name = "monolith"; - url = "https://${domain}"; - tokenFile = config.age.secrets.forgejoRunnerToken.path; - labels = [ - "ubuntu-latest:docker://node:20-bookworm" - "ubuntu-22.04:docker://node:20-bookworm" - ]; - }; - }; -} diff --git a/modules/retired/kavita/default.nix b/modules/retired/kavita/default.nix deleted file mode 100644 index 893eaef..0000000 --- a/modules/retired/kavita/default.nix +++ /dev/null @@ -1,28 +0,0 @@ -{ ... }: -let - directories = [ - "/opt/kavita" - ]; -in -{ - systemd.tmpfiles.rules = map (x: "d ${x} 0755 share share - -") directories; - virtualisation.oci-containers.containers.kavita = { - image = "jvmilazz0/kavita:latest"; - autoStart = true; - ports = [ - "5000:5000" - ]; - volumes = [ - "/opt/kavita/config:/kavita/config" - "/tank/media/library/Books:/books" - ]; - environment = { - TZ = "America/Detroit"; - }; - }; - - services.caddy.virtualHosts."library.tdback.net".extraConfig = '' - encode zstd gzip - reverse_proxy http://localhost:5000 - ''; -} diff --git a/modules/retired/mealie/default.nix b/modules/retired/mealie/default.nix deleted file mode 100644 index 2d869ce..0000000 --- a/modules/retired/mealie/default.nix +++ /dev/null @@ -1,22 +0,0 @@ -{ config, pkgs, ... }: -let - domain = "toasted.brownbread.net"; -in -{ - services.mealie = { - enable = true; - package = pkgs.unstable.mealie; - settings = { - BASE_URL = domain; - DB_ENGINE = "sqlite"; - ALLOW_SIGNUP = "false"; - SECURITY_MAX_LOGIN_ATTEMPTS = 3; - TZ = "America/Detroit"; - }; - }; - - services.caddy.virtualHosts.${domain}.extraConfig = '' - encode zstd gzip - reverse_proxy http://localhost:${builtins.toString config.services.mealie.port} - ''; -} diff --git a/modules/retired/mumble/default.nix b/modules/retired/mumble/default.nix deleted file mode 100644 index fa08d64..0000000 --- a/modules/retired/mumble/default.nix +++ /dev/null @@ -1,11 +0,0 @@ -{ pkgs, ... }: -{ - services.murmur = { - enable = true; - package = pkgs.murmur; - port = 64738; - openFirewall = true; - environmentFile = "/var/lib/murmur/murmurd.env"; - password = "$MURMURD_PASSWORD"; - }; -} diff --git a/modules/retired/navidrome/default.nix b/modules/retired/navidrome/default.nix deleted file mode 100644 index aeb8f18..0000000 --- a/modules/retired/navidrome/default.nix +++ /dev/null @@ -1,30 +0,0 @@ -{ ... }: -let - directory = "/opt/navidrome"; -in -{ - systemd.tmpfiles.rules = builtins.map (x: "d ${x} 0755 share share - -") [ directory ]; - - virtualisation.oci-containers.containers.navidrome = { - image = "deluan/navidrome:latest"; - autoStart = true; - ports = [ - "4533:4533" - ]; - volumes = [ - "${directory}/data:/data" - "/tank/media/music:/music:ro" - ]; - environment = { - ND_SCANSCHEDULE = "1h"; - ND_LOGLEVEL = "info"; - ND_SESSIONTIMEOUT = "24h"; - ND_ENABLEUSEREDITING = "false"; - }; - }; - - services.caddy.virtualHosts."radioactive.brownbread.net".extraConfig = '' - encode zstd gzip - reverse_proxy http://localhost:4533 - ''; -} diff --git a/modules/retired/pihole/default.nix b/modules/retired/pihole/default.nix deleted file mode 100644 index 3a95f8a..0000000 --- a/modules/retired/pihole/default.nix +++ /dev/null @@ -1,56 +0,0 @@ -{ - inputs, - config, - ... -}: -let - ip = "10.0.0.203"; - interface = "eno1"; - directory = "/opt/pihole"; -in -{ - systemd.tmpfiles.rules = builtins.map (x: "d ${x} 0755 share share - -") [ directory ]; - - virtualisation.oci-containers.containers.pihole = { - image = "pihole/pihole:latest"; - autoStart = true; - ports = [ - "53:53/udp" - "53:53/tcp" - "80:80/tcp" - ]; - volumes = [ - "${directory}/etc:/etc/pihole" - "${directory}/etc-dnsmasq.d:/etc/dnsmasq.d" - ]; - environment = { - TZ = "America/Detroit"; - FTLCONF_LOCAL_IPV4 = ip; - INTERFACE = interface; - }; - extraOptions = [ "--network=host" ]; - }; - - age.secrets.piholeAdminPass = { - file = "${inputs.self}/secrets/piholeAdminPass.age"; - mode = "770"; - owner = "share"; - group = "share"; - }; - - systemd.services.podman-pihole.postStart = - let - password = config.age.secrets.piholeAdminPass.path; - in - '' - podman exec -it pihole pihole -a -p "$(tr -d '\n' < ${password})" - ''; - - networking.firewall = { - allowedTCPPorts = [ - 53 - 80 - ]; - allowedUDPPorts = [ 53 ]; - }; -} diff --git a/modules/retired/stirling-pdf/default.nix b/modules/retired/stirling-pdf/default.nix deleted file mode 100644 index 904fd6d..0000000 --- a/modules/retired/stirling-pdf/default.nix +++ /dev/null @@ -1,23 +0,0 @@ -{ ... }: -let - directories = [ - "/opt/stirling" - ]; -in -{ - systemd.tmpfiles.rules = map (x: "d ${x} 0755 share share - -") directories; - virtualisation.oci-containers.containers.pdf-tools = { - image = "frooodle/s-pdf:latest"; - autoStart = true; - ports = [ - "8060:8080" - ]; - volumes = [ - "/opt/stirling/training-data:/usr/share/tesseract-ocr/4.00/tessdata" - "/opt/stirling/configs:/configs" - ]; - environment = { - DOCKER_ENABLE_SECURITY = "false"; - }; - }; -} diff --git a/modules/retired/x11/default.nix b/modules/retired/x11/default.nix deleted file mode 100644 index 52e7975..0000000 --- a/modules/retired/x11/default.nix +++ /dev/null @@ -1,33 +0,0 @@ -{ pkgs, ... }: -{ - services = { - xserver = { - enable = true; - xkb.layout = "us"; - displayManager.lightdm.enable = true; - windowManager.bspwm.enable = true; - }; - - displayManager.autoLogin = { - enable = true; - user = "tdback"; - }; - }; - - hardware.graphics.enable32Bit = true; - - environment.systemPackages = with pkgs.xorg; [ - libX11 - xset - ]; - - fonts.packages = with pkgs; [ - dejavu_fonts - dina-font - iosevka-comfy.comfy-motion-fixed - liberation_ttf - noto-fonts - noto-fonts-emoji - ubuntu_font_family - ]; -} diff --git a/modules/retired/xonotic/default.nix b/modules/retired/xonotic/default.nix deleted file mode 100644 index 7ae5442..0000000 --- a/modules/retired/xonotic/default.nix +++ /dev/null @@ -1,25 +0,0 @@ -{ pkgs, ... }: -{ - services.xonotic = { - enable = true; - package = pkgs.xonotic-dedicated; - openFirewall = true; - settings = { - hostname = "tdback's Xonotic Server"; - net_address = "0.0.0.0"; - port = 26000; - sv_motd = "GLHF! Please report any issues to @tdback on irc.libera.chat"; - - # Specify bots and player count. - maxplayers = 8; - minplayers = 4; - minplayers_per_team = 2; - - # Configure mutators. - g_instagib = 0; - g_grappling_hook = 1; - g_jetpack = 0; - g_vampire = 0; - }; - }; -} |