mirror of
https://github.com/kmein/niveum
synced 2026-03-17 18:41:09 +01:00
Compare commits
18 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| d06d0a9de4 | |||
| d4e82500ae | |||
| 6aa9be6f70 | |||
| 4e362678ca | |||
| a2081dece4 | |||
| 98cf188a17 | |||
| 4932c7c08a | |||
| c8a6991f09 | |||
| 5d3c9a67ab | |||
|
|
659a888c3d | ||
| 26908b03a3 | |||
| feccea5234 | |||
| 8ffb0bd245 | |||
| c1b777b689 | |||
| e85a8f7634 | |||
| 25bc6f573c | |||
| 4b5915354b | |||
| 43ab6b3210 |
@@ -3,7 +3,9 @@
|
|||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}: let
|
||||||
|
inherit (import <niveum/lib>) tmpfilesConfig;
|
||||||
|
in {
|
||||||
imports = [
|
imports = [
|
||||||
<niveum/modules/dropbox.nix>
|
<niveum/modules/dropbox.nix>
|
||||||
];
|
];
|
||||||
@@ -12,13 +14,35 @@
|
|||||||
dropbox.enable = false;
|
dropbox.enable = false;
|
||||||
};
|
};
|
||||||
|
|
||||||
system.activationScripts.home-symlinks = ''
|
systemd.tmpfiles.rules = map tmpfilesConfig [
|
||||||
ln -sfn ${config.users.users.me.home}/cloud/syncthing/common/mahlzeit ${config.users.users.me.home}/mahlzeit
|
{
|
||||||
ln -sfn ${config.users.users.me.home}/cloud/Seafile/Wiki ${config.users.users.me.home}/notes
|
type = "L+";
|
||||||
ln -sfn ${config.users.users.me.home}/cloud/Seafile/Uni ${config.users.users.me.home}/uni
|
user = config.users.users.me.name;
|
||||||
'';
|
group = "users";
|
||||||
|
mode = "0755";
|
||||||
|
argument = "${config.users.users.me.home}/cloud/Seafile/Wiki";
|
||||||
|
path = "${config.users.users.me.home}/notes";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
type = "L+";
|
||||||
|
user = config.users.users.me.name;
|
||||||
|
group = "users";
|
||||||
|
mode = "0755";
|
||||||
|
argument = "${config.users.users.me.home}/cloud/Seafile/Uni";
|
||||||
|
path = "${config.users.users.me.home}/uni";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
type = "L+";
|
||||||
|
user = config.users.users.me.name;
|
||||||
|
group = "users";
|
||||||
|
mode = "0755";
|
||||||
|
argument = "${config.users.users.me.home}/cloud/syncthing/common/mahlzeit";
|
||||||
|
path = "${config.users.users.me.home}/mahlzeit";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
home-manager.users.me = {
|
home-manager.users.me = {
|
||||||
|
services.gnome-keyring.enable = true;
|
||||||
services.nextcloud-client = {
|
services.nextcloud-client = {
|
||||||
enable = true;
|
enable = true;
|
||||||
startInBackground = true;
|
startInBackground = true;
|
||||||
|
|||||||
@@ -262,5 +262,6 @@ in {
|
|||||||
./vscode.nix
|
./vscode.nix
|
||||||
./watson.nix
|
./watson.nix
|
||||||
./zsh.nix
|
./zsh.nix
|
||||||
|
./tor.nix
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,42 +1,53 @@
|
|||||||
{pkgs, ...}: {
|
{pkgs, ...}: {
|
||||||
nixpkgs.config.joypixels.acceptLicense = true;
|
nixpkgs.config.joypixels.acceptLicense = true;
|
||||||
|
|
||||||
fonts = {
|
fonts = {
|
||||||
enableDefaultFonts = true;
|
enableDefaultFonts = true;
|
||||||
fontDir.enable = true;
|
fontDir.enable = true;
|
||||||
fonts = with pkgs; [
|
fonts = with pkgs; [
|
||||||
alegreya
|
alegreya
|
||||||
alegreya-sans
|
alegreya-sans
|
||||||
|
amiri
|
||||||
|
cantarell-fonts
|
||||||
|
charis-sil
|
||||||
corefonts
|
corefonts
|
||||||
|
crimson
|
||||||
eb-garamond
|
eb-garamond
|
||||||
|
etBook
|
||||||
fira
|
fira
|
||||||
font-awesome-ttf
|
font-awesome-ttf
|
||||||
|
gentium
|
||||||
|
gfs-fonts
|
||||||
|
gyre-fonts
|
||||||
|
ia-writer-duospace
|
||||||
ibm-plex
|
ibm-plex
|
||||||
inconsolata
|
jetbrains-mono
|
||||||
iosevka
|
joypixels
|
||||||
libertine
|
libertinus
|
||||||
|
libre-bodoni
|
||||||
lmodern
|
lmodern
|
||||||
|
merriweather
|
||||||
noto-fonts
|
noto-fonts
|
||||||
noto-fonts-cjk
|
ocr-a
|
||||||
noto-fonts-emoji
|
|
||||||
roboto
|
roboto
|
||||||
roboto-mono
|
roboto-mono
|
||||||
roboto-slab
|
roboto-slab
|
||||||
|
scheherazade-new
|
||||||
source-code-pro
|
source-code-pro
|
||||||
source-serif-pro
|
|
||||||
source-sans-pro
|
source-sans-pro
|
||||||
ubuntu_font_family
|
source-serif-pro
|
||||||
gfs-fonts
|
theano
|
||||||
jetbrains-mono
|
|
||||||
twemoji-color-font
|
|
||||||
joypixels
|
|
||||||
tocharian-font
|
tocharian-font
|
||||||
];
|
vistafonts
|
||||||
fontconfig.defaultFonts = {
|
vollkorn
|
||||||
monospace = ["JetBrains Mono" "JoyPixels"];
|
zilla-slab
|
||||||
serif = ["Roboto Slab"];
|
]; # google-fonts league-of-moveable-type
|
||||||
sansSerif = ["Roboto" "Noto Sans"];
|
fontconfig.defaultFonts = let
|
||||||
emoji = ["JoyPixels"];
|
emojiFont = "JoyPixels";
|
||||||
|
in {
|
||||||
|
monospace = ["JetBrains Mono" emojiFont];
|
||||||
|
serif = ["Merriweather"];
|
||||||
|
sansSerif = ["Cantarell" emojiFont];
|
||||||
|
emoji = [emojiFont];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -18,6 +18,7 @@ in {
|
|||||||
programs.mpv = {
|
programs.mpv = {
|
||||||
enable = true;
|
enable = true;
|
||||||
config = {
|
config = {
|
||||||
|
ytdl-format = "bestvideo[height<=?720][fps<=?30][vcodec!=?vp9]+bestaudio/best";
|
||||||
ytdl-raw-options = lib.concatStringsSep "," [''sub-lang="de,en"'' "write-sub=" "write-auto-sub="];
|
ytdl-raw-options = lib.concatStringsSep "," [''sub-lang="de,en"'' "write-sub=" "write-auto-sub="];
|
||||||
screenshot-template = "%F-%wH%wM%wS-%#04n";
|
screenshot-template = "%F-%wH%wM%wS-%#04n";
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -161,7 +161,7 @@ in {
|
|||||||
scripts.vimv
|
scripts.vimv
|
||||||
scripts.swallow # window swallowing
|
scripts.swallow # window swallowing
|
||||||
scripts.literature-quote
|
scripts.literature-quote
|
||||||
scripts.nav # json navigation
|
jless # less(1) for json
|
||||||
scripts.notetags
|
scripts.notetags
|
||||||
scripts.booksplit
|
scripts.booksplit
|
||||||
scripts.dmenurandr
|
scripts.dmenurandr
|
||||||
|
|||||||
@@ -42,7 +42,7 @@
|
|||||||
'';
|
'';
|
||||||
in {
|
in {
|
||||||
niveum.telegramBots.transits = {
|
niveum.telegramBots.transits = {
|
||||||
enable = true;
|
enable = false;
|
||||||
time = "*:0/1";
|
time = "*:0/1";
|
||||||
token = lib.strings.fileContents <system-secrets/telegram/kmein.token>;
|
token = lib.strings.fileContents <system-secrets/telegram/kmein.token>;
|
||||||
chatIds = ["-1001796440545"];
|
chatIds = ["-1001796440545"];
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
{
|
{pkgs, ...}: {
|
||||||
services.tor.enable = true;
|
services.tor.enable = true;
|
||||||
services.tor.torsocks.enable = true;
|
environment.systemPackages = [pkgs.tor];
|
||||||
}
|
}
|
||||||
|
|||||||
38
flake.lock
generated
38
flake.lock
generated
@@ -22,11 +22,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1647175256,
|
"lastModified": 1648834319,
|
||||||
"narHash": "sha256-7H+veXPM7IwdN1DoZqliwb9sghlN56koV5dnCu1kpsc=",
|
"narHash": "sha256-i5Aj4Aw64D/A0X6XW5LxSS4XBnYj7gMz+kN4dpsbdk8=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "a8d00f5c038cf7ec54e7dac9c57b171c1217f008",
|
"rev": "0bdbdea2e26c984b096f4f7d10e3c88536a980b0",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -62,11 +62,11 @@
|
|||||||
"menstruation-backend": {
|
"menstruation-backend": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1634573652,
|
"lastModified": 1649545504,
|
||||||
"narHash": "sha256-FIj8oCOJO+Wqxr2o5MMqIShvzMJud4iUq3o8y4NIRvw=",
|
"narHash": "sha256-TVm3246ML7gWPeGm+bdb+Qo8o/7nve7sQ2hBdCZm3z8=",
|
||||||
"owner": "kmein",
|
"owner": "kmein",
|
||||||
"repo": "menstruation.rs",
|
"repo": "menstruation.rs",
|
||||||
"rev": "dd405fe2acf32441e8ac56e488e689bb1c4bea82",
|
"rev": "d9f3c6d53542fd7c7ed191e37cf4e342d4a47bcb",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -109,11 +109,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1647992509,
|
"lastModified": 1649490789,
|
||||||
"narHash": "sha256-AG40Nt5OWz0LBs5p457emOuwLKOvTtcv/2fUdnEN3Ws=",
|
"narHash": "sha256-YrhVxwoofZSx/wLZ4GYET//8vS+uqWX572zvdmP/Etg=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "d2caa9377539e3b5ff1272ac3aa2d15f3081069f",
|
"rev": "c86185d20d708013caf97a6adaa8dc6d72313c75",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -125,11 +125,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs-unstable": {
|
"nixpkgs-unstable": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1648337267,
|
"lastModified": 1649541735,
|
||||||
"narHash": "sha256-8DRg8UDvs63iaIaHEbWG7/lnD9ImQlMNsTZMY3PvFLc=",
|
"narHash": "sha256-JdOywA2jcdGCxNgu0dJA7ZNtaV7sS0HwuZg9YaXd94c=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "6de161729c81dc98e844793cc9c8fda29d5ef62a",
|
"rev": "c2b6e029cd1efa0efd37daab89264ef040ae5669",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -194,11 +194,11 @@
|
|||||||
"scripts": {
|
"scripts": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1648314795,
|
"lastModified": 1648400983,
|
||||||
"narHash": "sha256-hGIXkAcGiJnVXnl8kigZpI3VFrLmAr2+yr85hi5JwP0=",
|
"narHash": "sha256-I9ADWgUN1orbnXPBW4kulHpv8wkx6C8zsQcg9wphpPg=",
|
||||||
"owner": "kmein",
|
"owner": "kmein",
|
||||||
"repo": "scripts",
|
"repo": "scripts",
|
||||||
"rev": "d1d525b92a34e55b1ad886807c284106e58716b2",
|
"rev": "f5df67a2416d8f05a7dbfea269c44668854c7887",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -210,11 +210,11 @@
|
|||||||
"stockholm": {
|
"stockholm": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1648214990,
|
"lastModified": 1649089964,
|
||||||
"narHash": "sha256-rptATGq+jcpL+P+Cr6d3OajV6zYkbHPWlt3aQNZI2TY=",
|
"narHash": "sha256-ybuVI8rnpMyBUoyoIXJ1e3QBMBIOoEgKTiFzIPfzy8A=",
|
||||||
"ref": "master",
|
"ref": "master",
|
||||||
"rev": "ae9c0b12710b5361d0d45510eb401eebfc1b3fb0",
|
"rev": "b3833baee96d7bce2c54295110b40c646468a1ff",
|
||||||
"revCount": 10497,
|
"revCount": 10500,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "https://cgit.lassul.us/stockholm"
|
"url": "https://cgit.lassul.us/stockholm"
|
||||||
},
|
},
|
||||||
|
|||||||
350
lib/streams.nix
350
lib/streams.nix
File diff suppressed because it is too large
Load Diff
@@ -7,9 +7,8 @@
|
|||||||
stateLocation = "/var/lib/codimd/state.sqlite";
|
stateLocation = "/var/lib/codimd/state.sqlite";
|
||||||
nixpkgs-unstable = import <nixpkgs-unstable> {};
|
nixpkgs-unstable = import <nixpkgs-unstable> {};
|
||||||
domain = "pad.kmein.de";
|
domain = "pad.kmein.de";
|
||||||
|
inherit (import <niveum/lib>) tmpfilesConfig;
|
||||||
in {
|
in {
|
||||||
imports = [<stockholm/krebs/3modules/permown.nix>];
|
|
||||||
|
|
||||||
services.nginx.virtualHosts.${domain} = {
|
services.nginx.virtualHosts.${domain} = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
@@ -49,11 +48,15 @@ in {
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
krebs.permown.${backupLocation} = {
|
systemd.tmpfiles.rules = [
|
||||||
owner = "codimd";
|
(tmpfilesConfig {
|
||||||
group = "codimd";
|
user = "codimd";
|
||||||
umask = "0002";
|
group = "codimd";
|
||||||
};
|
mode = "0755";
|
||||||
|
type = "d";
|
||||||
|
path = backupLocation;
|
||||||
|
})
|
||||||
|
];
|
||||||
|
|
||||||
systemd.services.hedgedoc-backup = {
|
systemd.services.hedgedoc-backup = {
|
||||||
description = "Hedgedoc backup service";
|
description = "Hedgedoc backup service";
|
||||||
|
|||||||
@@ -238,16 +238,6 @@ in {
|
|||||||
}
|
}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
{
|
|
||||||
job_name = "tahina";
|
|
||||||
static_configs = [
|
|
||||||
{
|
|
||||||
targets = [
|
|
||||||
"tahina.r:${toString config.services.prometheus.exporters.node.port}"
|
|
||||||
];
|
|
||||||
}
|
|
||||||
];
|
|
||||||
}
|
|
||||||
];
|
];
|
||||||
|
|
||||||
services.prometheus.exporters.blackbox = {
|
services.prometheus.exporters.blackbox = {
|
||||||
|
|||||||
@@ -143,6 +143,11 @@ in {
|
|||||||
tags = ["nick_gitlab"];
|
tags = ["nick_gitlab"];
|
||||||
regex = "*";
|
regex = "*";
|
||||||
};
|
};
|
||||||
|
people = {
|
||||||
|
buffer = "irc.*.*";
|
||||||
|
tags = map (name: "nick_${name}") ["mod_p[matrix-fli"];
|
||||||
|
regex = "*";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
extraCommands = ''/matrix connect nibbana'';
|
extraCommands = ''/matrix connect nibbana'';
|
||||||
|
|||||||
@@ -11,23 +11,22 @@ in {
|
|||||||
<niveum/configs/spacetime.nix>
|
<niveum/configs/spacetime.nix>
|
||||||
<niveum/modules/retiolum.nix>
|
<niveum/modules/retiolum.nix>
|
||||||
<niveum/configs/sshd.nix>
|
<niveum/configs/sshd.nix>
|
||||||
{
|
|
||||||
console.keyMap = "de";
|
|
||||||
i18n.defaultLocale = "de_DE.UTF-8";
|
|
||||||
services.xserver = {
|
|
||||||
layout = "de";
|
|
||||||
libinput.enable = true;
|
|
||||||
};
|
|
||||||
}
|
|
||||||
{
|
|
||||||
nix.nixPath = ["/var/src"];
|
|
||||||
}
|
|
||||||
];
|
];
|
||||||
|
|
||||||
|
nix.nixPath = ["/var/src"];
|
||||||
|
|
||||||
|
console.keyMap = "de";
|
||||||
|
i18n.defaultLocale = "de_DE.UTF-8";
|
||||||
|
services.xserver = {
|
||||||
|
layout = "de";
|
||||||
|
libinput.enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
users.users.xenos = {
|
users.users.xenos = {
|
||||||
name = "xenos";
|
name = "xenos";
|
||||||
password = "xenos";
|
password = "xenos";
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
|
extraGroups = ["networkmanager"];
|
||||||
};
|
};
|
||||||
|
|
||||||
services.xserver = {
|
services.xserver = {
|
||||||
|
|||||||
@@ -26,17 +26,23 @@
|
|||||||
extraModulePackages = [];
|
extraModulePackages = [];
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/" = {
|
fileSystems = {
|
||||||
device = "/dev/disk/by-uuid/e9a8bd34-61eb-4317-888d-bd7d6248a906";
|
"/" = {
|
||||||
fsType = "xfs";
|
device = "/dev/disk/by-uuid/e9a8bd34-61eb-4317-888d-bd7d6248a906";
|
||||||
|
fsType = "xfs";
|
||||||
|
};
|
||||||
|
"/boot" = {
|
||||||
|
device = "/dev/disk/by-uuid/9B2F-31E1";
|
||||||
|
fsType = "vfat";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/boot" = {
|
swapDevices = [
|
||||||
device = "/dev/disk/by-uuid/9B2F-31E1";
|
{
|
||||||
fsType = "vfat";
|
device = "/swapfile";
|
||||||
};
|
size = 2048;
|
||||||
|
}
|
||||||
swapDevices = [];
|
];
|
||||||
|
|
||||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -15,6 +15,7 @@ in {
|
|||||||
./pulseaudio.nix
|
./pulseaudio.nix
|
||||||
./home-assistant.nix
|
./home-assistant.nix
|
||||||
./tuna.nix
|
./tuna.nix
|
||||||
|
./mympd.nix
|
||||||
./grocy.nix
|
./grocy.nix
|
||||||
./spotifyd.nix
|
./spotifyd.nix
|
||||||
<home-manager/nixos>
|
<home-manager/nixos>
|
||||||
|
|||||||
57
systems/zaatar/mympd.nix
Normal file
57
systems/zaatar/mympd.nix
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
{pkgs, ...}: let
|
||||||
|
inherit (import <niveum/lib>) tmpfilesConfig;
|
||||||
|
in {
|
||||||
|
systemd.tmpfiles.rules = [
|
||||||
|
(tmpfilesConfig {
|
||||||
|
type = "d";
|
||||||
|
mode = "0755";
|
||||||
|
user = "mympd";
|
||||||
|
group = "mympd";
|
||||||
|
path = "/var/lib/mympd";
|
||||||
|
})
|
||||||
|
(tmpfilesConfig {
|
||||||
|
type = "d";
|
||||||
|
mode = "0755";
|
||||||
|
user = "mympd";
|
||||||
|
group = "mympd";
|
||||||
|
age = "1d";
|
||||||
|
path = "/var/cache/mympd";
|
||||||
|
})
|
||||||
|
(tmpfilesConfig {
|
||||||
|
type = "L+";
|
||||||
|
mode = "0644";
|
||||||
|
user = "mympd";
|
||||||
|
group = "mympd";
|
||||||
|
path = "/var/lib/mympd/config/http_port";
|
||||||
|
argument = pkgs.writeText "port" "8764";
|
||||||
|
})
|
||||||
|
(tmpfilesConfig {
|
||||||
|
type = "L+";
|
||||||
|
mode = "0644";
|
||||||
|
user = "mympd";
|
||||||
|
group = "mympd";
|
||||||
|
path = "/var/lib/mympd/config/ssl";
|
||||||
|
argument = pkgs.writeText "ssl" "false";
|
||||||
|
})
|
||||||
|
];
|
||||||
|
|
||||||
|
users.users.mympd = {
|
||||||
|
isSystemUser = true;
|
||||||
|
group = "mympd";
|
||||||
|
};
|
||||||
|
users.groups.mympd = {};
|
||||||
|
|
||||||
|
systemd.services.mympd = {
|
||||||
|
wantedBy = ["multi-user.target"];
|
||||||
|
after = ["mpd.service"];
|
||||||
|
script = "${pkgs.mympd}/bin/mympd";
|
||||||
|
environment = {
|
||||||
|
MYMPD_HTTP_PORT = "8764";
|
||||||
|
};
|
||||||
|
serviceConfig = {
|
||||||
|
Restart = "always";
|
||||||
|
User = "mympd";
|
||||||
|
Group = "mympd";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -5,6 +5,7 @@
|
|||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
firewall = (import <niveum/lib>).firewall lib;
|
firewall = (import <niveum/lib>).firewall lib;
|
||||||
|
inherit (import <niveum/lib>) tmpfilesConfig;
|
||||||
|
|
||||||
streams = import <niveum/lib/streams.nix> {
|
streams = import <niveum/lib/streams.nix> {
|
||||||
di-fm-key = lib.strings.fileContents <secrets/di.fm/key>;
|
di-fm-key = lib.strings.fileContents <secrets/di.fm/key>;
|
||||||
@@ -71,13 +72,31 @@ in {
|
|||||||
extraStopCommands = firewall.removeRules rules;
|
extraStopCommands = firewall.removeRules rules;
|
||||||
};
|
};
|
||||||
|
|
||||||
system.activationScripts.mpd-playlists = let
|
systemd.tmpfiles.rules = let
|
||||||
playlistFile = pkgs.writeText "radio.m3u" (lib.concatMapStringsSep "\n" (lib.getAttr "stream") streams);
|
tags = lib.lists.unique (lib.concatMap ({tags ? [], ...}: tags) streams);
|
||||||
in ''
|
tagStreams = tag: lib.filter ({tags ? [], ...}: lib.elem tag tags) streams;
|
||||||
rm -rf /var/lib/mpd/playlists
|
makePlaylist = name: streams: pkgs.writeText "${name}.m3u" (lib.concatMapStringsSep "\n" (lib.getAttr "stream") streams);
|
||||||
install -d /var/lib/mpd/playlists
|
in
|
||||||
ln -sfn "${toString playlistFile}" "/var/lib/mpd/playlists/radio.m3u"
|
map (tag:
|
||||||
'';
|
tmpfilesConfig {
|
||||||
|
type = "L+";
|
||||||
|
path = "/var/lib/mpd/playlists/${tag}.m3u";
|
||||||
|
mode = "0644";
|
||||||
|
user = "mpd";
|
||||||
|
group = "mpd";
|
||||||
|
argument = makePlaylist tag (tagStreams tag);
|
||||||
|
})
|
||||||
|
tags
|
||||||
|
++ [
|
||||||
|
(tmpfilesConfig {
|
||||||
|
type = "L+";
|
||||||
|
mode = "0644";
|
||||||
|
user = "mpd";
|
||||||
|
group = "mpd";
|
||||||
|
path = "/var/lib/mpd/playlist/all.m3u";
|
||||||
|
argument = makePlaylist "all" streams;
|
||||||
|
})
|
||||||
|
];
|
||||||
|
|
||||||
services.tuna = {
|
services.tuna = {
|
||||||
enable = true;
|
enable = true;
|
||||||
@@ -87,33 +106,15 @@ in {
|
|||||||
logo ? "https://picsum.photos/seed/${builtins.hashString "md5" stream}/300",
|
logo ? "https://picsum.photos/seed/${builtins.hashString "md5" stream}/300",
|
||||||
stream,
|
stream,
|
||||||
station,
|
station,
|
||||||
|
...
|
||||||
}: {inherit id desc logo stream station;})
|
}: {inherit id desc logo stream station;})
|
||||||
streams;
|
streams;
|
||||||
webPort = 8080;
|
webPort = 7044;
|
||||||
};
|
};
|
||||||
|
|
||||||
systemd.services.tuna-stations = let
|
services.ympd = {
|
||||||
stations = lib.lists.imap0 (id: {
|
enable = true;
|
||||||
desc ? "",
|
mpd.port = config.services.mpd.network.port;
|
||||||
logo ? "https://picsum.photos/seed/${builtins.hashString "md5" stream}/300",
|
|
||||||
stream,
|
|
||||||
station,
|
|
||||||
}: {inherit id desc logo stream station;})
|
|
||||||
streams;
|
|
||||||
stationsJson = (pkgs.formats.json {}).generate "stations.json" stations;
|
|
||||||
in {
|
|
||||||
enable = false;
|
|
||||||
wantedBy = ["tuna.service"];
|
|
||||||
startAt = "hourly";
|
|
||||||
script = ''
|
|
||||||
mkdir -p /etc/tuna
|
|
||||||
antenne_asb_url=$(
|
|
||||||
${pkgs.curl}/bin/curl -sS 'https://www.caster.fm/widgets/em_player.php?jsinit=true&uid=529295&t=blue&c=' \
|
|
||||||
| grep streamUrl \
|
|
||||||
| sed ${lib.escapeShellArg "s/^.*'\\([^']*\\)'.*/\\1/"}
|
|
||||||
)
|
|
||||||
${pkgs.jq}/bin/jq "map(if .station == \"Antenne ASB\" then .stream |= \"$antenne_asb_url\" else . end)" < ${stationsJson} > /etc/tuna/stations.json
|
|
||||||
'';
|
|
||||||
};
|
};
|
||||||
|
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
@@ -125,7 +126,7 @@ in {
|
|||||||
virtualHosts."radio.kmein.r" = {
|
virtualHosts."radio.kmein.r" = {
|
||||||
basicAuth.dj = password;
|
basicAuth.dj = password;
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://127.0.0.1:${toString config.services.tuna.webPort}";
|
proxyPass = "http://127.0.0.1:${config.services.ympd.webPort}";
|
||||||
proxyWebsockets = true;
|
proxyWebsockets = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
Reference in New Issue
Block a user