tangled
alpha
login
or
join now
encode42.dev
/
nixos
0
fork
atom
Personal-use NixOS configuration
0
fork
atom
overview
issues
pulls
pipelines
Move software and package configurations to `config`
encode42.dev
1 week ago
e163a950
7559e91c
+82
-72
114 changed files
expand all
collapse all
unified
split
config
common
boot
common.nix
secureboot.nix
systemd-boot.nix
default.nix
filesystem
nfs.nix
fish.nix
git.nix
home-manager.nix
locale
en_US.nix
network
dns.nix
firewall.nix
ssh.nix
nix.nix
system
coreutils.nix
firmware.nix
sudo.nix
virtualization.nix
yubikey.nix
desktop
boot
splash.nix
default.nix
dolphin.nix
environments
common.nix
gnome.nix
filesystem
nfs.nix
gnome
localsend.nix
home-manager.nix
obs.nix
printing.nix
steam.nix
system
gamemode.nix
winboat.nix
server
atmosphere
bluesky-pds.nix
tangled-knot.nix
tangled-spindle.nix
caddy
default.nix
modules
compression.nix
ssl.nix
databases
mysql.nix
postgresql.nix
redis.nix
filesystem
nfs.nix
ulimit.nix
zfs.nix
groupware
autoconfig.nix
cells.nix
collabora.nix
maddy.nix
mta-sts.nix
radicale.nix
rspamd.nix
iperf.nix
language
languagetool.nix
libretranslate.nix
omnipoly.nix
media
audiobookshelf.nix
emby.nix
immich.nix
navidrome.nix
netdata-agent.nix
openssh.nix
sharing
byparr.nix
flood.nix
prowlarr.nix
rtorrent.nix
soulseek.nix
web
forgejo.nix
linkwarden.nix
miniflux.nix
network-optimizer.nix
vaultwarden.nix
wakapi.nix
zipline.nix
hosts
decryption
default.nix
users
default.nix
encode42.nix
encryption
default.nix
users
default.nix
encode42.nix
index
config
atmosphere
bluesky-pds.nix
tangled-knot.nix
tangled-spindle.nix
databases
mysql.nix
postgresql.nix
groupware
cells.nix
maddy.nix
language
omnipoly.nix
media
audiobookshelf.nix
emby.nix
immich.nix
navidrome.nix
netdata-agent.nix
nfs.nix
sharing
prowlarr.nix
rtorrent.nix
soulseek.nix
web
caddy.nix
forgejo.nix
linkwarden.nix
miniflux.nix
network-optimizer.nix
vaultwarden.nix
wakapi.nix
zipline
default.nix
zfs.nix
default.nix
users
default.nix
prospect
default.nix
users
config
games.nix
default.nix
encode42.nix
lib
mkProxies.nix
users
career
common
default.nix
desktop
winboat.nix
encode42
common
default.nix
+3
-3
hosts/decryption/default.nix
···
17
17
(flakeRoot + /hardware/network/wifi.nix)
18
18
(flakeRoot + /hardware/network/bluetooth.nix)
19
19
20
20
-
(flakeRoot + /software/common)
21
21
-
(flakeRoot + /software/common/boot/secureboot.nix)
20
20
+
(flakeRoot + /config/common)
21
21
+
(flakeRoot + /config/common/boot/secureboot.nix)
22
22
23
23
-
(flakeRoot + /software/desktop/environments/gnome.nix)
23
23
+
(flakeRoot + /config/desktop/environments/gnome.nix)
24
24
25
25
./users
26
26
];
+1
-1
hosts/decryption/users/default.nix
···
2
2
3
3
{
4
4
imports = [
5
5
-
(flakeRoot + /software/desktop/home-manager.nix)
5
5
+
(flakeRoot + /config/desktop/home-manager.nix)
6
6
7
7
./career.nix
8
8
./encode42.nix
+4
-4
hosts/decryption/users/encode42.nix
···
8
8
(flakeRoot + /users/encode42/common)
9
9
(flakeRoot + /users/encode42/desktop/environments/gnome.nix)
10
10
11
11
-
(flakeRoot + /packages/common/yubikey.nix)
11
11
+
(flakeRoot + /config/common/yubikey.nix)
12
12
13
13
-
(flakeRoot + /packages/desktop/gnome/localsend.nix)
13
13
+
(flakeRoot + /config/desktop/gnome/localsend.nix)
14
14
15
15
-
(flakeRoot + /packages/desktop/dolphin.nix)
16
16
-
(flakeRoot + /packages/desktop/steam.nix)
15
15
+
(flakeRoot + /config/desktop/dolphin.nix)
16
16
+
(flakeRoot + /config/desktop/steam.nix)
17
17
];
18
18
19
19
security.pam.services.login.unixAuth = false;
+6
-6
hosts/encryption/default.nix
···
16
16
(flakeRoot + /hardware/audio/noise-cancellation.nix)
17
17
(flakeRoot + /hardware/peripherals/xr1.nix)
18
18
19
19
-
(flakeRoot + /software/common)
20
20
-
(flakeRoot + /software/common/boot/secureboot.nix)
21
21
-
(flakeRoot + /software/common/virtualization.nix)
19
19
+
(flakeRoot + /config/common)
20
20
+
(flakeRoot + /config/common/boot/secureboot.nix)
21
21
+
(flakeRoot + /config/common/virtualization.nix)
22
22
23
23
-
(flakeRoot + /software/desktop)
24
24
-
(flakeRoot + /software/desktop/environments/gnome.nix)
25
25
-
(flakeRoot + /software/desktop/system/gamemode.nix)
23
23
+
(flakeRoot + /config/desktop)
24
24
+
(flakeRoot + /config/desktop/environments/gnome.nix)
25
25
+
(flakeRoot + /config/desktop/system/gamemode.nix)
26
26
27
27
./users
28
28
];
+1
-1
hosts/encryption/users/default.nix
···
2
2
3
3
{
4
4
imports = [
5
5
-
(flakeRoot + /software/desktop/home-manager.nix)
5
5
+
(flakeRoot + /config/desktop/home-manager.nix)
6
6
7
7
./career.nix
8
8
./encode42.nix
+4
-4
hosts/encryption/users/encode42.nix
···
8
8
(flakeRoot + /users/encode42/common)
9
9
(flakeRoot + /users/encode42/desktop/environments/gnome.nix)
10
10
11
11
-
(flakeRoot + /packages/common/yubikey.nix)
11
11
+
(flakeRoot + /config/common/yubikey.nix)
12
12
13
13
-
(flakeRoot + /packages/desktop/gnome/localsend.nix)
13
13
+
(flakeRoot + /config/desktop/gnome/localsend.nix)
14
14
15
15
-
(flakeRoot + /packages/desktop/obs.nix)
16
16
-
(flakeRoot + /packages/desktop/steam.nix)
15
15
+
(flakeRoot + /config/desktop/obs.nix)
16
16
+
(flakeRoot + /config/desktop/steam.nix)
17
17
];
18
18
19
19
services.displayManager.autoLogin = {
+1
-1
hosts/index/config/atmosphere/bluesky-pds.nix
···
3
3
let
4
4
host = "encrypted.group";
5
5
6
6
-
blueskyPdsModule = import (flakeRoot + /packages/server/atmosphere/bluesky-pds.nix) {
6
6
+
blueskyPdsModule = import (flakeRoot + /config/server/atmosphere/bluesky-pds.nix) {
7
7
hosts = [
8
8
{
9
9
name = host;
+1
-1
hosts/index/config/atmosphere/tangled-knot.nix
···
3
3
let
4
4
host = "knot.encrypted.group";
5
5
6
6
-
tangledKnotModule = import (flakeRoot + /packages/server/atmosphere/tangled-knot.nix) {
6
6
+
tangledKnotModule = import (flakeRoot + /config/server/atmosphere/tangled-knot.nix) {
7
7
hosts = [
8
8
{
9
9
name = host;
+1
-1
hosts/index/config/atmosphere/tangled-spindle.nix
···
3
3
let
4
4
host = "spindle.encrypted.group";
5
5
6
6
-
tangledSpindleModule = import (flakeRoot + /packages/server/atmosphere/tangled-spindle.nix) {
6
6
+
tangledSpindleModule = import (flakeRoot + /config/server/atmosphere/tangled-spindle.nix) {
7
7
hosts = [
8
8
{
9
9
name = host;
+1
-1
hosts/index/config/databases/mysql.nix
···
2
2
3
3
{
4
4
imports = [
5
5
-
(flakeRoot + /packages/server/databases/mysql.nix)
5
5
+
(flakeRoot + /config/server/databases/mysql.nix)
6
6
];
7
7
8
8
services.mysql = {
+1
-1
hosts/index/config/databases/postgresql.nix
···
2
2
3
3
{
4
4
imports = [
5
5
-
(flakeRoot + /packages/server/databases/postgresql.nix)
5
5
+
(flakeRoot + /config/server/databases/postgresql.nix)
6
6
];
7
7
8
8
services.postgresql = {
+5
-2
hosts/index/config/groupware/cells.nix
···
4
4
hostname = "drive.encrypted.group";
5
5
localHostname = "drive.local.encrypted.group"; # TODO: this can change
6
6
7
7
-
cellsModule = import (flakeRoot + /packages/server/groupware/cells.nix) {
7
7
+
cellsModule = import (flakeRoot + /config/server/groupware/cells.nix) {
8
8
hosts = [
9
9
{
10
10
name = "cells.lan";
···
41
41
];
42
42
43
43
services.collabora-online = {
44
44
-
aliasGroups = [ { host = "https://${hostname}:443"; } { host = "https://${localHostname}:443"; } ]; # TODO: messy
44
44
+
aliasGroups = [
45
45
+
{ host = "https://${hostname}:443"; }
46
46
+
{ host = "https://${localHostname}:443"; }
47
47
+
]; # TODO: messy
45
48
};
46
49
}
+1
-1
hosts/index/config/groupware/maddy.nix
···
3
3
let
4
4
domain = "encrypted.group";
5
5
6
6
-
maddyModule = import (flakeRoot + /packages/server/groupware/maddy.nix) {
6
6
+
maddyModule = import (flakeRoot + /config/server/groupware/maddy.nix) {
7
7
inherit domain;
8
8
9
9
email = "postmaster@${domain}";
+1
-1
hosts/index/config/language/omnipoly.nix
···
1
1
{ flakeRoot, ... }:
2
2
3
3
let
4
4
-
omnipolyModule = import (flakeRoot + /packages/server/language/omnipoly.nix) {
4
4
+
omnipolyModule = import (flakeRoot + /config/server/language/omnipoly.nix) {
5
5
hosts = [
6
6
{
7
7
name = "omnipoly.lan";
+1
-1
hosts/index/config/media/audiobookshelf.nix
···
6
6
}:
7
7
8
8
let
9
9
-
audiobookshelfModule = import (flakeRoot + /packages/server/media/audiobookshelf.nix) {
9
9
+
audiobookshelfModule = import (flakeRoot + /config/server/media/audiobookshelf.nix) {
10
10
hosts = [
11
11
{
12
12
name = "audiobookshelf.lan";
+1
-1
hosts/index/config/media/emby.nix
···
1
1
{ flakeRoot, config, ... }:
2
2
3
3
let
4
4
-
embyModule = import (flakeRoot + /packages/server/media/emby.nix) {
4
4
+
embyModule = import (flakeRoot + /config/server/media/emby.nix) {
5
5
hosts = [
6
6
{
7
7
name = "emby.lan";
+1
-1
hosts/index/config/media/immich.nix
···
3
3
let
4
4
host = "photos.encrypted.group";
5
5
6
6
-
immichModule = import (flakeRoot + /packages/server/media/immich.nix) {
6
6
+
immichModule = import (flakeRoot + /config/server/media/immich.nix) {
7
7
hosts = [
8
8
{
9
9
name = "immich.lan";
+1
-1
hosts/index/config/media/navidrome.nix
···
3
3
let
4
4
host = "hear.encrypted.group";
5
5
6
6
-
navidromeModule = import (flakeRoot + /packages/server/media/navidrome.nix) {
6
6
+
navidromeModule = import (flakeRoot + /config/server/media/navidrome.nix) {
7
7
hosts = [
8
8
{
9
9
name = "navidrome.lan";
+1
-1
hosts/index/config/netdata-agent.nix
···
2
2
3
3
{
4
4
imports = [
5
5
-
(flakeRoot + /packages/server/netdata-agent.nix)
5
5
+
(flakeRoot + /config/server/netdata-agent.nix)
6
6
];
7
7
8
8
services.netdata = {
+1
-1
hosts/index/config/nfs.nix
···
59
59
in
60
60
{
61
61
imports = [
62
62
-
(flakeRoot + /software/server/filesystem/nfs.nix)
62
62
+
(flakeRoot + /config/server/filesystem/nfs.nix)
63
63
64
64
(flakeLib.mkShares shares)
65
65
];
+1
-1
hosts/index/config/sharing/prowlarr.nix
···
1
1
{ flakeRoot, ... }:
2
2
3
3
let
4
4
-
prowlarrModule = import (flakeRoot + /packages/server/sharing/prowlarr.nix) {
4
4
+
prowlarrModule = import (flakeRoot + /config/server/sharing/prowlarr.nix) {
5
5
hosts = [
6
6
{
7
7
name = "prowlarr.lan";
+2
-2
hosts/index/config/sharing/rtorrent.nix
···
18
18
protocol = "both";
19
19
}) (lib.range listenFromPort listenToPort);
20
20
21
21
-
rtorrentModule = import (flakeRoot + /packages/server/sharing/rtorrent.nix) {
21
21
+
rtorrentModule = import (flakeRoot + /config/server/sharing/rtorrent.nix) {
22
22
inherit dhtPort;
23
23
24
24
listenPortRange = {
···
27
27
};
28
28
};
29
29
30
30
-
floodModule = import (flakeRoot + /packages/server/sharing/flood.nix) {
30
30
+
floodModule = import (flakeRoot + /config/server/sharing/flood.nix) {
31
31
hosts = [
32
32
{
33
33
name = "rtorrent.lan";
+1
-1
hosts/index/config/sharing/soulseek.nix
···
5
5
6
6
port = 50220;
7
7
8
8
-
soulseekModule = import (flakeRoot + /packages/server/sharing/soulseek.nix) {
8
8
+
soulseekModule = import (flakeRoot + /config/server/sharing/soulseek.nix) {
9
9
hosts = [
10
10
{
11
11
name = "soulseek.lan";
+1
-1
hosts/index/config/web/caddy.nix
···
1
1
{ flakeRoot, ... }:
2
2
3
3
let
4
4
-
caddyModule = import (flakeRoot + /packages/server/caddy) {
4
4
+
caddyModule = import (flakeRoot + /config/server/caddy) {
5
5
email = "postmaster@encrypted.group";
6
6
};
7
7
in
+1
-1
hosts/index/config/web/forgejo.nix
···
3
3
let
4
4
host = "forge.encrypted.group";
5
5
6
6
-
forgejoModule = import (flakeRoot + /packages/server/web/forgejo.nix) {
6
6
+
forgejoModule = import (flakeRoot + /config/server/web/forgejo.nix) {
7
7
hosts = [
8
8
{
9
9
name = "forgejo.lan";
+1
-1
hosts/index/config/web/linkwarden.nix
···
1
1
{ flakeRoot, ... }:
2
2
3
3
let
4
4
-
linkwardenModule = import (flakeRoot + /packages/server/web/linkwarden.nix) {
4
4
+
linkwardenModule = import (flakeRoot + /config/server/web/linkwarden.nix) {
5
5
hosts = [
6
6
{
7
7
name = "linkwarden.lan";
+1
-1
hosts/index/config/web/miniflux.nix
···
1
1
{ flakeRoot, ... }:
2
2
3
3
let
4
4
-
minifluxModule = import (flakeRoot + /packages/server/web/miniflux.nix) {
4
4
+
minifluxModule = import (flakeRoot + /config/server/web/miniflux.nix) {
5
5
hosts = [
6
6
{
7
7
name = "miniflux.lan";
+1
-1
hosts/index/config/web/network-optimizer.nix
···
3
3
let
4
4
host = "network-optimizer.lan";
5
5
6
6
-
networkOptimizerModule = import (flakeRoot + /packages/server/web/network-optimizer.nix) {
6
6
+
networkOptimizerModule = import (flakeRoot + /config/server/web/network-optimizer.nix) {
7
7
hosts = [
8
8
{
9
9
name = host;
+1
-1
hosts/index/config/web/vaultwarden.nix
···
3
3
let
4
4
host = "vault.encrypted.group";
5
5
6
6
-
vaultwardenModule = import (flakeRoot + /packages/server/web/vaultwarden.nix) {
6
6
+
vaultwardenModule = import (flakeRoot + /config/server/web/vaultwarden.nix) {
7
7
hosts = [
8
8
{
9
9
name = "vaultwarden.lan";
+1
-1
hosts/index/config/web/wakapi.nix
···
1
1
{ flakeRoot, ... }:
2
2
3
3
let
4
4
-
wakapiModule = import (flakeRoot + /packages/server/web/wakapi.nix) {
4
4
+
wakapiModule = import (flakeRoot + /config/server/web/wakapi.nix) {
5
5
hosts = [
6
6
{
7
7
name = "wakapi.lan";
+12
-5
hosts/index/config/web/zipline/default.nix
···
1
1
-
{ flakeRoot, pkgs, lib, ... }:
1
1
+
{
2
2
+
flakeRoot,
3
3
+
pkgs,
4
4
+
lib,
5
5
+
...
6
6
+
}:
2
7
3
8
let
4
9
title = "deerzip";
···
17
22
'';
18
23
});
19
24
20
20
-
ziplineModule = import (flakeRoot + /packages/server/web/zipline.nix) {
25
25
+
ziplineModule = import (flakeRoot + /config/server/web/zipline.nix) {
21
26
hosts = [
22
27
{
23
28
name = host;
···
47
52
WEBSITE_TITLE = title;
48
53
WEBSITE_TITLE_LOGO = "https://${host}/favicon.png";
49
54
50
50
-
WEBSITE_TOS = toString (pkgs.writeText "tos.md" ''
51
51
-
be gay, don't do crimes
52
52
-
'');
55
55
+
WEBSITE_TOS = toString (
56
56
+
pkgs.writeText "tos.md" ''
57
57
+
be gay, don't do crimes
58
58
+
''
59
59
+
);
53
60
54
61
WEBSITE_EXTERNAL_LINKS = "[]";
55
62
+1
-1
hosts/index/config/zfs.nix
···
2
2
3
3
{
4
4
imports = [
5
5
-
(flakeRoot + /software/server/filesystem/zfs.nix)
5
5
+
(flakeRoot + /config/server/filesystem/zfs.nix)
6
6
];
7
7
8
8
networking.hostId = "c864ff4e";
+6
-6
hosts/index/default.nix
···
13
13
(flakeRoot + /hardware/gpu/amd.nix)
14
14
(flakeRoot + /hardware/peripherals/optical.nix)
15
15
16
16
-
(flakeRoot + /software/common)
17
17
-
(flakeRoot + /software/common/boot/systemd-boot.nix)
18
18
-
(flakeRoot + /software/common/network/dns.nix)
16
16
+
(flakeRoot + /config/common)
17
17
+
(flakeRoot + /config/common/boot/systemd-boot.nix)
18
18
+
(flakeRoot + /config/common/network/dns.nix)
19
19
20
20
-
(flakeRoot + /software/server/filesystem/ulimit.nix)
21
21
-
(flakeRoot + /software/server/openssh.nix)
20
20
+
(flakeRoot + /config/server/filesystem/ulimit.nix)
21
21
+
(flakeRoot + /config/server/openssh.nix)
22
22
23
23
-
(flakeRoot + /packages/server/iperf.nix)
23
23
+
(flakeRoot + /config/server/iperf.nix)
24
24
25
25
./config/netdata-agent.nix
26
26
./config/nfs.nix
+1
-1
hosts/index/users/default.nix
···
2
2
3
3
{
4
4
imports = [
5
5
-
(flakeRoot + /software/desktop/home-manager.nix)
5
5
+
(flakeRoot + /config/desktop/home-manager.nix)
6
6
7
7
./encode42.nix
8
8
];
+5
-5
hosts/prospect/default.nix
···
16
16
(flakeRoot + /hardware/network/bluetooth.nix)
17
17
(flakeRoot + /hardware/peripherals/rgb.nix)
18
18
19
19
-
(flakeRoot + /software/common)
20
20
-
(flakeRoot + /software/common/boot/systemd-boot.nix)
19
19
+
(flakeRoot + /config/common)
20
20
+
(flakeRoot + /config/common/boot/systemd-boot.nix)
21
21
22
22
-
(flakeRoot + /software/desktop)
23
23
-
(flakeRoot + /software/desktop/environments/gnome.nix)
24
24
-
(flakeRoot + /software/desktop/system/gamemode.nix)
22
22
+
(flakeRoot + /config/desktop)
23
23
+
(flakeRoot + /config/desktop/environments/gnome.nix)
24
24
+
(flakeRoot + /config/desktop/system/gamemode.nix)
25
25
26
26
./users
27
27
];
+2
-2
hosts/prospect/users/config/games.nix
···
2
2
3
3
{
4
4
imports = [
5
5
-
(flakeRoot + /packages/desktop/steam.nix)
6
6
-
(flakeRoot + /packages/desktop/dolphin.nix)
5
5
+
(flakeRoot + /config/desktop/steam.nix)
6
6
+
(flakeRoot + /config/desktop/dolphin.nix)
7
7
];
8
8
}
+1
-1
hosts/prospect/users/default.nix
···
2
2
3
3
{
4
4
imports = [
5
5
-
(flakeRoot + /software/desktop/home-manager.nix)
5
5
+
(flakeRoot + /config/desktop/home-manager.nix)
6
6
7
7
./encode42.nix
8
8
./guest.nix
+1
-1
hosts/prospect/users/encode42.nix
···
10
10
(flakeRoot + /users/encode42/common)
11
11
(flakeRoot + /users/encode42/desktop/environments/gnome.nix)
12
12
13
13
-
(flakeRoot + /packages/desktop/gnome/localsend.nix)
13
13
+
(flakeRoot + /config/desktop/gnome/localsend.nix)
14
14
];
15
15
16
16
home-manager.users.encode42 = {
+1
-1
lib/mkProxies.nix
···
5
5
hosts: proxy:
6
6
7
7
let
8
8
-
caddyModulesPath = ../packages/server/caddy/modules;
8
8
+
caddyModulesPath = ../config/server/caddy/modules;
9
9
10
10
compressionModules = import (caddyModulesPath + /compression.nix);
11
11
sslModules = import (caddyModulesPath + /ssl.nix);
packages/common/fish.nix
config/common/fish.nix
packages/common/git.nix
config/common/git.nix
packages/common/yubikey.nix
config/common/yubikey.nix
packages/desktop/dolphin.nix
config/desktop/dolphin.nix
packages/desktop/gnome/localsend.nix
config/desktop/gnome/localsend.nix
packages/desktop/obs.nix
config/desktop/obs.nix
packages/desktop/steam.nix
config/desktop/steam.nix
packages/desktop/winboat.nix
config/desktop/winboat.nix
packages/server/atmosphere/bluesky-pds.nix
config/server/atmosphere/bluesky-pds.nix
packages/server/atmosphere/tangled-knot.nix
config/server/atmosphere/tangled-knot.nix
packages/server/atmosphere/tangled-spindle.nix
config/server/atmosphere/tangled-spindle.nix
packages/server/caddy/default.nix
config/server/caddy/default.nix
packages/server/caddy/modules/compression.nix
config/server/caddy/modules/compression.nix
packages/server/caddy/modules/ssl.nix
config/server/caddy/modules/ssl.nix
packages/server/databases/mysql.nix
config/server/databases/mysql.nix
packages/server/databases/postgresql.nix
config/server/databases/postgresql.nix
packages/server/databases/redis.nix
config/server/databases/redis.nix
packages/server/groupware/autoconfig.nix
config/server/groupware/autoconfig.nix
packages/server/groupware/cells.nix
config/server/groupware/cells.nix
packages/server/groupware/collabora.nix
config/server/groupware/collabora.nix
packages/server/groupware/maddy.nix
config/server/groupware/maddy.nix
packages/server/groupware/mta-sts.nix
config/server/groupware/mta-sts.nix
packages/server/groupware/radicale.nix
config/server/groupware/radicale.nix
packages/server/groupware/rspamd.nix
config/server/groupware/rspamd.nix
packages/server/iperf.nix
config/server/iperf.nix
packages/server/language/languagetool.nix
config/server/language/languagetool.nix
packages/server/language/libretranslate.nix
config/server/language/libretranslate.nix
packages/server/language/omnipoly.nix
config/server/language/omnipoly.nix
packages/server/media/audiobookshelf.nix
config/server/media/audiobookshelf.nix
packages/server/media/emby.nix
config/server/media/emby.nix
packages/server/media/immich.nix
config/server/media/immich.nix
packages/server/media/navidrome.nix
config/server/media/navidrome.nix
packages/server/netdata-agent.nix
config/server/netdata-agent.nix
packages/server/sharing/byparr.nix
config/server/sharing/byparr.nix
packages/server/sharing/flood.nix
config/server/sharing/flood.nix
packages/server/sharing/prowlarr.nix
config/server/sharing/prowlarr.nix
packages/server/sharing/rtorrent.nix
config/server/sharing/rtorrent.nix
packages/server/sharing/soulseek.nix
config/server/sharing/soulseek.nix
packages/server/web/forgejo.nix
config/server/web/forgejo.nix
packages/server/web/linkwarden.nix
config/server/web/linkwarden.nix
packages/server/web/miniflux.nix
config/server/web/miniflux.nix
packages/server/web/network-optimizer.nix
config/server/web/network-optimizer.nix
packages/server/web/vaultwarden.nix
config/server/web/vaultwarden.nix
packages/server/web/wakapi.nix
config/server/web/wakapi.nix
packages/server/web/zipline.nix
config/server/web/zipline.nix
software/common/boot/common.nix
config/common/boot/common.nix
software/common/boot/secureboot.nix
config/common/boot/secureboot.nix
software/common/boot/systemd-boot.nix
config/common/boot/systemd-boot.nix
software/common/default.nix
config/common/default.nix
software/common/filesystem/nfs.nix
config/common/filesystem/nfs.nix
software/common/home-manager.nix
config/common/home-manager.nix
software/common/locale/en_US.nix
config/common/locale/en_US.nix
software/common/network/dns.nix
config/common/network/dns.nix
software/common/network/firewall.nix
config/common/network/firewall.nix
software/common/network/ssh.nix
config/common/network/ssh.nix
software/common/nix.nix
config/common/nix.nix
software/common/system/coreutils.nix
config/common/system/coreutils.nix
software/common/system/firmware.nix
config/common/system/firmware.nix
software/common/system/sudo.nix
config/common/system/sudo.nix
software/common/virtualization.nix
config/common/virtualization.nix
software/desktop/boot/splash.nix
config/desktop/boot/splash.nix
software/desktop/default.nix
config/desktop/default.nix
software/desktop/environments/common.nix
config/desktop/environments/common.nix
software/desktop/environments/gnome.nix
config/desktop/environments/gnome.nix
software/desktop/filesystem/nfs.nix
config/desktop/filesystem/nfs.nix
software/desktop/home-manager.nix
config/desktop/home-manager.nix
software/desktop/printing.nix
config/desktop/printing.nix
software/desktop/system/gamemode.nix
config/desktop/system/gamemode.nix
software/server/filesystem/nfs.nix
config/server/filesystem/nfs.nix
software/server/filesystem/ulimit.nix
config/server/filesystem/ulimit.nix
software/server/filesystem/zfs.nix
config/server/filesystem/zfs.nix
software/server/openssh.nix
config/server/openssh.nix
+1
-1
users/career/common/default.nix
···
7
7
imports = [
8
8
./user.nix
9
9
10
10
-
(flakeRoot + /packages/common/fish.nix)
10
10
+
(flakeRoot + /config/common/fish.nix)
11
11
];
12
12
}
+1
-1
users/career/desktop/winboat.nix
···
2
2
3
3
{
4
4
imports = [
5
5
-
(flakeRoot + /packages/desktop/winboat.nix)
5
5
+
(flakeRoot + /config/desktop/winboat.nix)
6
6
];
7
7
8
8
users.users.career.extraGroups = [
+2
-2
users/encode42/common/default.nix
···
7
7
imports = [
8
8
./user.nix
9
9
10
10
-
(flakeRoot + /packages/common/fish.nix)
11
11
-
(flakeRoot + /packages/common/git.nix)
10
10
+
(flakeRoot + /config/common/fish.nix)
11
11
+
(flakeRoot + /config/common/git.nix)
12
12
];
13
13
}