From 9d9d84699bc1bce6aac253cb70e97c100d1e4c84 Mon Sep 17 00:00:00 2001
From: tdback <tyler@tdback.net>
Date: Thu, 23 Jan 2025 21:22:42 -0500
Subject: Retired modules have migrated to separate repo

---
 modules/retired/blocky/default.nix       | 97 --------------------------------
 modules/retired/forgejo/default.nix      | 72 ------------------------
 modules/retired/kavita/default.nix       | 28 ---------
 modules/retired/mealie/default.nix       | 22 --------
 modules/retired/mumble/default.nix       | 11 ----
 modules/retired/navidrome/default.nix    | 30 ----------
 modules/retired/pihole/default.nix       | 56 ------------------
 modules/retired/stirling-pdf/default.nix | 23 --------
 modules/retired/x11/default.nix          | 33 -----------
 modules/retired/xonotic/default.nix      | 25 --------
 10 files changed, 397 deletions(-)
 delete mode 100644 modules/retired/blocky/default.nix
 delete mode 100644 modules/retired/forgejo/default.nix
 delete mode 100644 modules/retired/kavita/default.nix
 delete mode 100644 modules/retired/mealie/default.nix
 delete mode 100644 modules/retired/mumble/default.nix
 delete mode 100644 modules/retired/navidrome/default.nix
 delete mode 100644 modules/retired/pihole/default.nix
 delete mode 100644 modules/retired/stirling-pdf/default.nix
 delete mode 100644 modules/retired/x11/default.nix
 delete mode 100644 modules/retired/xonotic/default.nix

(limited to 'modules')

diff --git a/modules/retired/blocky/default.nix b/modules/retired/blocky/default.nix
deleted file mode 100644
index 302ef8e..0000000
--- a/modules/retired/blocky/default.nix
+++ /dev/null
@@ -1,97 +0,0 @@
-{ lib, pkgs, ... }:
-{
-  services.blocky = {
-    enable = true;
-    package = pkgs.blocky;
-    settings = {
-      upstreams = {
-        init.strategy = "fast";
-        groups.default = [
-          "9.9.9.9"
-          "149.112.112.112"
-        ];
-      };
-      bootstrapDns = lib.singleton {
-        upstream = "https://dns.quad9.net/dns-query";
-        ips = [ "9.9.9.9" ];
-      };
-      ports = {
-        dns = 53;
-        tls = 853;
-        https = 443;
-      };
-      blocking = {
-        denylists = {
-          ads = [
-            "https://adaway.org/hosts.txt"
-            "https://v.firebog.net/hosts/AdguardDNS.txt"
-            "https://v.firebog.net/hosts/Admiral.txt"
-            "https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt"
-            "https://v.firebog.net/hosts/Easylist.txt"
-            "https://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&showintro=0&mimetype=plaintext"
-            "https://raw.githubusercontent.com/FadeMind/hosts.extras/master/UncheckyAds/hosts"
-            "https://raw.githubusercontent.com/bigdargon/hostsVN/master/hosts"
-          ];
-          malicious = [
-            "https://osint.digitalside.it/Threat-Intel/lists/latestdomains.txt"
-            "https://v.firebog.net/hosts/Prigent-Crypto.txt"
-            "https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Risk/hosts"
-            "https://phishing.army/download/phishing_army_blocklist_extended.txt"
-            "https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-malware.txt"
-            "https://raw.githubusercontent.com/Spam404/lists/master/main-blacklist.txt"
-            "https://raw.githubusercontent.com/AssoEchap/stalkerware-indicators/master/generated/hosts"
-            "https://urlhaus.abuse.ch/downloads/hostfile/"
-            "https://v.firebog.net/hosts/Prigent-Malware.txt"
-          ];
-          other = [
-            "https://zerodot1.gitlab.io/CoinBlockerLists/hosts_browser"
-          ];
-          suspicious = [
-            "https://raw.githubusercontent.com/PolishFiltersTeam/KADhosts/master/KADhosts.txt"
-            "https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Spam/hosts"
-            "https://v.firebog.net/hosts/static/w3kbl.txt"
-            "https://raw.githubusercontent.com/matomo-org/referrer-spam-blacklist/master/spammers.txt"
-            "https://someonewhocares.org/hosts/zero/hosts"
-            "https://raw.githubusercontent.com/VeleSila/yhosts/master/hosts"
-            "https://winhelp2002.mvps.org/hosts.txt"
-            "https://v.firebog.net/hosts/neohostsbasic.txt"
-            "https://raw.githubusercontent.com/RooneyMcNibNug/pihole-stuff/master/SNAFU.txt"
-            "https://paulgb.github.io/BarbBlock/blacklists/hosts-file.txt"
-          ];
-          tracking-telemetry = [
-            "https://v.firebog.net/hosts/Easyprivacy.txt"
-            "https://v.firebog.net/hosts/Prigent-Ads.txt"
-            "https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.2o7Net/hosts"
-            "https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt"
-            "https://hostfiles.frogeye.fr/firstparty-trackers-hosts.txt"
-            "https://www.github.developerdan.com/hosts/lists/ads-and-tracking-extended.txt"
-            "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/android-tracking.txt"
-            "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/SmartTV.txt"
-            "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/AmazonFireTV.txt"
-            "https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-blocklist.txt"
-          ];
-        };
-        clientGroupsBlock.default = [
-          "ads"
-          "malicious"
-          "other"
-          "suspicious"
-          "tracking-telemetry"
-        ];
-        loading = {
-          concurrency = 16;
-          strategy = "failOnError";
-        };
-      };
-    };
-  };
-
-  networking.firewall = {
-    allowedTCPPorts = [
-      53
-      443
-      853
-    ];
-    allowedUDPPorts = [ 53 ];
-  };
-}
diff --git a/modules/retired/forgejo/default.nix b/modules/retired/forgejo/default.nix
deleted file mode 100644
index cf4e101..0000000
--- a/modules/retired/forgejo/default.nix
+++ /dev/null
@@ -1,72 +0,0 @@
-{
-  inputs,
-  config,
-  lib,
-  pkgs,
-  ...
-}:
-let
-  domain = "git.tdback.net";
-  port = 3000;
-in
-{
-  services.forgejo = {
-    enable = true;
-    package = pkgs.unstable.forgejo;
-    stateDir = "/tank/forgejo";
-    database.type = "postgres";
-    lfs.enable = true;
-    settings = {
-      server = {
-        DOMAIN = domain;
-        ROOT_URL = "https://${domain}/";
-        HTTP_PORT = port;
-      };
-      service.DISABLE_REGISTRATION = true;
-      actions = {
-        ENABLED = true;
-        DEFAULT_ACTIONS_URL = "https://${domain}";
-      };
-    };
-  };
-
-  age.secrets.forgejoAdminPass = {
-    file = "${inputs.self}/secrets/forgejoAdminPass.age";
-    mode = "770";
-    owner = "forgejo";
-    group = "forgejo";
-  };
-
-  systemd.services.forgejo.preStart =
-    let
-      adminCmd = "${lib.getExe config.services.forgejo.package} admin user";
-      password = config.age.secrets.forgejoAdminPass.path;
-      user = "tdback";
-      email = "tyler@tdback.net";
-    in
-    ''
-      ${adminCmd} create --admin --email ${email} --username ${user} --password "$(tr -d '\n' < ${password})" || true
-    '';
-
-  services.openssh.settings.AllowUsers = [ "forgejo" ];
-
-  services.caddy.virtualHosts.${domain}.extraConfig = ''
-    encode zstd gzip
-    reverse_proxy http://localhost:${builtins.toString port}
-  '';
-
-  age.secrets.forgejoRunnerToken.file = "${inputs.self}/secrets/forgejoRunnerToken.age";
-  services.gitea-actions-runner = {
-    package = pkgs.unstable.forgejo-runner;
-    instances.default = {
-      enable = true;
-      name = "monolith";
-      url = "https://${domain}";
-      tokenFile = config.age.secrets.forgejoRunnerToken.path;
-      labels = [
-        "ubuntu-latest:docker://node:20-bookworm"
-        "ubuntu-22.04:docker://node:20-bookworm"
-      ];
-    };
-  };
-}
diff --git a/modules/retired/kavita/default.nix b/modules/retired/kavita/default.nix
deleted file mode 100644
index 893eaef..0000000
--- a/modules/retired/kavita/default.nix
+++ /dev/null
@@ -1,28 +0,0 @@
-{ ... }:
-let
-  directories = [
-    "/opt/kavita"
-  ];
-in
-{
-  systemd.tmpfiles.rules = map (x: "d ${x} 0755 share share - -") directories;
-  virtualisation.oci-containers.containers.kavita = {
-    image = "jvmilazz0/kavita:latest";
-    autoStart = true;
-    ports = [
-      "5000:5000"
-    ];
-    volumes = [
-      "/opt/kavita/config:/kavita/config"
-      "/tank/media/library/Books:/books"
-    ];
-    environment = {
-      TZ = "America/Detroit";
-    };
-  };
-
-  services.caddy.virtualHosts."library.tdback.net".extraConfig = ''
-    encode zstd gzip
-    reverse_proxy http://localhost:5000
-  '';
-}
diff --git a/modules/retired/mealie/default.nix b/modules/retired/mealie/default.nix
deleted file mode 100644
index 2d869ce..0000000
--- a/modules/retired/mealie/default.nix
+++ /dev/null
@@ -1,22 +0,0 @@
-{ config, pkgs, ... }:
-let
-  domain = "toasted.brownbread.net";
-in
-{
-  services.mealie = {
-    enable = true;
-    package = pkgs.unstable.mealie;
-    settings = {
-      BASE_URL = domain;
-      DB_ENGINE = "sqlite";
-      ALLOW_SIGNUP = "false";
-      SECURITY_MAX_LOGIN_ATTEMPTS = 3;
-      TZ = "America/Detroit";
-    };
-  };
-
-  services.caddy.virtualHosts.${domain}.extraConfig = ''
-    encode zstd gzip
-    reverse_proxy http://localhost:${builtins.toString config.services.mealie.port}
-  '';
-}
diff --git a/modules/retired/mumble/default.nix b/modules/retired/mumble/default.nix
deleted file mode 100644
index fa08d64..0000000
--- a/modules/retired/mumble/default.nix
+++ /dev/null
@@ -1,11 +0,0 @@
-{ pkgs, ... }:
-{
-  services.murmur = {
-    enable = true;
-    package = pkgs.murmur;
-    port = 64738;
-    openFirewall = true;
-    environmentFile = "/var/lib/murmur/murmurd.env";
-    password = "$MURMURD_PASSWORD";
-  };
-}
diff --git a/modules/retired/navidrome/default.nix b/modules/retired/navidrome/default.nix
deleted file mode 100644
index aeb8f18..0000000
--- a/modules/retired/navidrome/default.nix
+++ /dev/null
@@ -1,30 +0,0 @@
-{ ... }:
-let
-  directory = "/opt/navidrome";
-in
-{
-  systemd.tmpfiles.rules = builtins.map (x: "d ${x} 0755 share share - -") [ directory ];
-
-  virtualisation.oci-containers.containers.navidrome = {
-    image = "deluan/navidrome:latest";
-    autoStart = true;
-    ports = [
-      "4533:4533"
-    ];
-    volumes = [
-      "${directory}/data:/data"
-      "/tank/media/music:/music:ro"
-    ];
-    environment = {
-      ND_SCANSCHEDULE = "1h";
-      ND_LOGLEVEL = "info";
-      ND_SESSIONTIMEOUT = "24h";
-      ND_ENABLEUSEREDITING = "false";
-    };
-  };
-
-  services.caddy.virtualHosts."radioactive.brownbread.net".extraConfig = ''
-    encode zstd gzip
-    reverse_proxy http://localhost:4533
-  '';
-}
diff --git a/modules/retired/pihole/default.nix b/modules/retired/pihole/default.nix
deleted file mode 100644
index 3a95f8a..0000000
--- a/modules/retired/pihole/default.nix
+++ /dev/null
@@ -1,56 +0,0 @@
-{
-  inputs,
-  config,
-  ...
-}:
-let
-  ip = "10.0.0.203";
-  interface = "eno1";
-  directory = "/opt/pihole";
-in
-{
-  systemd.tmpfiles.rules = builtins.map (x: "d ${x} 0755 share share - -") [ directory ];
-
-  virtualisation.oci-containers.containers.pihole = {
-    image = "pihole/pihole:latest";
-    autoStart = true;
-    ports = [
-      "53:53/udp"
-      "53:53/tcp"
-      "80:80/tcp"
-    ];
-    volumes = [
-      "${directory}/etc:/etc/pihole"
-      "${directory}/etc-dnsmasq.d:/etc/dnsmasq.d"
-    ];
-    environment = {
-      TZ = "America/Detroit";
-      FTLCONF_LOCAL_IPV4 = ip;
-      INTERFACE = interface;
-    };
-    extraOptions = [ "--network=host" ];
-  };
-
-  age.secrets.piholeAdminPass = {
-    file = "${inputs.self}/secrets/piholeAdminPass.age";
-    mode = "770";
-    owner = "share";
-    group = "share";
-  };
-
-  systemd.services.podman-pihole.postStart =
-    let
-      password = config.age.secrets.piholeAdminPass.path;
-    in
-    ''
-      podman exec -it pihole pihole -a -p "$(tr -d '\n' < ${password})"
-    '';
-
-  networking.firewall = {
-    allowedTCPPorts = [
-      53
-      80
-    ];
-    allowedUDPPorts = [ 53 ];
-  };
-}
diff --git a/modules/retired/stirling-pdf/default.nix b/modules/retired/stirling-pdf/default.nix
deleted file mode 100644
index 904fd6d..0000000
--- a/modules/retired/stirling-pdf/default.nix
+++ /dev/null
@@ -1,23 +0,0 @@
-{ ... }:
-let
-  directories = [
-    "/opt/stirling"
-  ];
-in
-{
-  systemd.tmpfiles.rules = map (x: "d ${x} 0755 share share - -") directories;
-  virtualisation.oci-containers.containers.pdf-tools = {
-    image = "frooodle/s-pdf:latest";
-    autoStart = true;
-    ports = [
-      "8060:8080"
-    ];
-    volumes = [
-      "/opt/stirling/training-data:/usr/share/tesseract-ocr/4.00/tessdata"
-      "/opt/stirling/configs:/configs"
-    ];
-    environment = {
-      DOCKER_ENABLE_SECURITY = "false";
-    };
-  };
-}
diff --git a/modules/retired/x11/default.nix b/modules/retired/x11/default.nix
deleted file mode 100644
index 52e7975..0000000
--- a/modules/retired/x11/default.nix
+++ /dev/null
@@ -1,33 +0,0 @@
-{ pkgs, ... }:
-{
-  services = {
-    xserver = {
-      enable = true;
-      xkb.layout = "us";
-      displayManager.lightdm.enable = true;
-      windowManager.bspwm.enable = true;
-    };
-
-    displayManager.autoLogin = {
-      enable = true;
-      user = "tdback";
-    };
-  };
-
-  hardware.graphics.enable32Bit = true;
-
-  environment.systemPackages = with pkgs.xorg; [
-    libX11
-    xset
-  ];
-
-  fonts.packages = with pkgs; [
-    dejavu_fonts
-    dina-font
-    iosevka-comfy.comfy-motion-fixed
-    liberation_ttf
-    noto-fonts
-    noto-fonts-emoji
-    ubuntu_font_family
-  ];
-}
diff --git a/modules/retired/xonotic/default.nix b/modules/retired/xonotic/default.nix
deleted file mode 100644
index 7ae5442..0000000
--- a/modules/retired/xonotic/default.nix
+++ /dev/null
@@ -1,25 +0,0 @@
-{ pkgs, ... }:
-{
-  services.xonotic = {
-    enable = true;
-    package = pkgs.xonotic-dedicated;
-    openFirewall = true;
-    settings = {
-      hostname = "tdback's Xonotic Server";
-      net_address = "0.0.0.0";
-      port = 26000;
-      sv_motd = "GLHF! Please report any issues to @tdback on irc.libera.chat";
-
-      # Specify bots and player count.
-      maxplayers = 8;
-      minplayers = 4;
-      minplayers_per_team = 2;
-
-      # Configure mutators.
-      g_instagib = 0;
-      g_grappling_hook = 1;
-      g_jetpack = 0;
-      g_vampire = 0;
-    };
-  };
-}
-- 
cgit v1.2.3