nix machine / user configurations

use tailscale for navidrome s3 mount

ptr.pet 682714c9 e5c43a87

verified
+40 -22
+4 -4
_sources/generated.json
··· 22 22 }, 23 23 "blog": { 24 24 "cargoLocks": null, 25 - "date": "2026-01-02", 25 + "date": "2026-01-13", 26 26 "extract": null, 27 27 "name": "blog", 28 28 "passthru": null, ··· 32 32 "fetchSubmodules": false, 33 33 "leaveDotGit": false, 34 34 "name": null, 35 - "rev": "ebcd9b9d5234d7b68cc280b1ed5fadf46148ac28", 36 - "sha256": "sha256-zI8oVPkBnUHw5ce15gM3hYLUpzOphaLIsp0Agb+Yg8g=", 35 + "rev": "61331b565e674acad615c98f11d1adca5e367b54", 36 + "sha256": "sha256-CllCqGh0dSdYCIKhLL4+qCMFbHVUgzL9mkPFL0MOBcY=", 37 37 "sparseCheckout": [], 38 38 "type": "git", 39 39 "url": "https://tangled.org/@ptr.pet/endpoint" 40 40 }, 41 - "version": "ebcd9b9d5234d7b68cc280b1ed5fadf46148ac28" 41 + "version": "61331b565e674acad615c98f11d1adca5e367b54" 42 42 }, 43 43 "clickee": { 44 44 "cargoLocks": null,
+4 -4
_sources/generated.nix
··· 15 15 }; 16 16 blog = { 17 17 pname = "blog"; 18 - version = "ebcd9b9d5234d7b68cc280b1ed5fadf46148ac28"; 18 + version = "61331b565e674acad615c98f11d1adca5e367b54"; 19 19 src = fetchgit { 20 20 url = "https://tangled.org/@ptr.pet/endpoint"; 21 - rev = "ebcd9b9d5234d7b68cc280b1ed5fadf46148ac28"; 21 + rev = "61331b565e674acad615c98f11d1adca5e367b54"; 22 22 fetchSubmodules = false; 23 23 deepClone = false; 24 24 leaveDotGit = false; 25 25 sparseCheckout = [ ]; 26 - sha256 = "sha256-zI8oVPkBnUHw5ce15gM3hYLUpzOphaLIsp0Agb+Yg8g="; 26 + sha256 = "sha256-CllCqGh0dSdYCIKhLL4+qCMFbHVUgzL9mkPFL0MOBcY="; 27 27 }; 28 - date = "2026-01-02"; 28 + date = "2026-01-13"; 29 29 }; 30 30 clickee = { 31 31 pname = "clickee";
+1 -1
dns/dnsconfig.js
··· 55 55 DnsProvider(DSP_PRIMARY), 56 56 TRIMOUNTS( 57 57 [ 58 - "@", "doc", "pmart", "dash", "id", 58 + "@", "pmart", "dash", "id", 59 59 "knot", "spindle", 60 60 "guestbook", 61 61 ],
hosts/trimounts/modules/hedgedoc.nix hosts/trimounts/modules/hedgedoc.disabled
+15 -11
hosts/trimounts/modules/navidrome.nix
··· 51 51 ExecStartPre = "${pkgs.coreutils}/bin/mkdir -p ${callieMount}"; 52 52 ExecStart = '' 53 53 ${pkgs.geesefs}/bin/geesefs \ 54 - --endpoint https://s3.nematodes.net \ 54 + --endpoint http://homura-v:9000 \ 55 55 --region us-east-1 \ 56 56 --shared-config ${config.age.secrets.callieMusic.path} \ 57 57 --cache %C/geesefs-callie \ 58 - --stat-cache-ttl 3600s \ 59 - --http-timeout 2m0s \ 60 - --read-retry-interval 30s \ 61 - --read-retry-max-interval 2m0s \ 62 - --read-ahead-large 20000 \ 63 - --max-parallel-parts 2 \ 64 - --max-parallel-copy 2 \ 65 - --ignore-fsync \ 66 - --disable-xattr \ 67 - --no-specials \ 58 + --stat-cache-ttl 1h \ 59 + --http-timeout 5m \ 60 + --read-retry-interval 2s \ 61 + --read-retry-max-interval 30s \ 62 + --read-retry-attempts 5 \ 63 + --read-ahead 10240 \ 64 + --read-ahead-small 512 \ 65 + --read-ahead-large 51200 \ 66 + --read-ahead-parallel 10240 \ 67 + --small-read-count 8 \ 68 + --read-merge 2048 \ 69 + --max-flushers 4 \ 70 + --max-parallel-parts 3 \ 71 + --max-parallel-copy 3 \ 68 72 -o allow_other \ 69 73 -o ro \ 70 74 musica ${callieMount}
+16 -2
users/modules/discord/service.nix
··· 1 - {pkgs, ...}: { 1 + {pkgs, ...}: 2 + let 3 + port = "1338"; 4 + proxychainsCfg = pkgs.writers.writeText "proxychains.conf" '' 5 + proxy_dns 6 + quiet_mode 7 + [ProxyList] 8 + socks5 127.0.0.1 ${port} 9 + ''; 10 + wrappedProxychains = pkgs.writers.writeBashBin "proxy" '' 11 + ${pkgs.proxychains-ng}/bin/proxychains4 -f "${proxychainsCfg}" $@ 12 + ''; 13 + in 14 + { 2 15 systemd.user.services.discord-socks-proxy = { 3 16 Unit = { 4 17 Description = "SSH SOCKS5 proxy for Discord"; ··· 8 21 9 22 Service = { 10 23 Type = "simple"; 11 - ExecStart = "${pkgs.openssh}/bin/ssh -N -D 127.0.0.1:1338 root@trimounts"; 24 + ExecStart = "${pkgs.openssh}/bin/ssh -N -D 127.0.0.1:${port} root@trimounts"; 12 25 Restart = "on-failure"; 13 26 RestartSec = "3s"; 14 27 }; ··· 17 30 WantedBy = [ "default.target" ]; 18 31 }; 19 32 }; 33 + home.packages = [wrappedProxychains]; 20 34 }