mirror of
https://github.com/kmein/niveum
synced 2026-03-17 10:41:06 +01:00
Compare commits
10 Commits
update_fla
...
master
| Author | SHA1 | Date | |
|---|---|---|---|
| b9a222855e | |||
| f8bb3c04bf | |||
| dce42c7e80 | |||
| 5bedd897c9 | |||
| d952ecf17a | |||
| df36954fed | |||
| 697100f85f | |||
| 8eccb752dc | |||
| 6bb16ff6ed | |||
| 8fe9e80522 |
@@ -26,8 +26,6 @@
|
|||||||
})
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
services.getty.autologinOnce = lib.mkForce false;
|
|
||||||
|
|
||||||
# to run nspawn in nix sandbox
|
# to run nspawn in nix sandbox
|
||||||
nix.settings = {
|
nix.settings = {
|
||||||
auto-allocate-uids = true;
|
auto-allocate-uids = true;
|
||||||
|
|||||||
@@ -193,6 +193,8 @@ in
|
|||||||
|
|
||||||
#krebs
|
#krebs
|
||||||
pkgs.nur.repos.mic92.ircsink
|
pkgs.nur.repos.mic92.ircsink
|
||||||
|
cyberlocker-tools
|
||||||
|
kpaste
|
||||||
|
|
||||||
(haskellPackages.ghcWithHoogle (hs: [
|
(haskellPackages.ghcWithHoogle (hs: [
|
||||||
hs.text
|
hs.text
|
||||||
|
|||||||
72
flake.lock
generated
72
flake.lock
generated
@@ -464,6 +464,24 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"meteora": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": "nixpkgs_2"
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1772641269,
|
||||||
|
"narHash": "sha256-o8G09GrqHjZO9BYbsCvYds+baGxLC0PhhlGTllkHC54=",
|
||||||
|
"ref": "refs/heads/master",
|
||||||
|
"rev": "0b2255c2e4003b208f19153e6fb7e484544c4399",
|
||||||
|
"revCount": 1377,
|
||||||
|
"type": "git",
|
||||||
|
"url": "ssh://git@github.com/kmein/meteora.git"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"type": "git",
|
||||||
|
"url": "ssh://git@github.com/kmein/meteora.git"
|
||||||
|
}
|
||||||
|
},
|
||||||
"naersk": {
|
"naersk": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"fenix": [
|
"fenix": [
|
||||||
@@ -651,6 +669,22 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs_2": {
|
"nixpkgs_2": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1772479524,
|
||||||
|
"narHash": "sha256-u7nCaNiMjqvKpE+uZz9hE7pgXXTmm5yvdtFaqzSzUQI=",
|
||||||
|
"owner": "NixOS",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "4215e62dc2cd3bc705b0a423b9719ff6be378a43",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "NixOS",
|
||||||
|
"ref": "nixpkgs-unstable",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nixpkgs_3": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1769598131,
|
"lastModified": 1769598131,
|
||||||
"narHash": "sha256-e7VO/kGLgRMbWtpBqdWl0uFg8Y2XWFMdz0uUJvlML8o=",
|
"narHash": "sha256-e7VO/kGLgRMbWtpBqdWl0uFg8Y2XWFMdz0uUJvlML8o=",
|
||||||
@@ -666,6 +700,22 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"nixpkgs_4": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1771369470,
|
||||||
|
"narHash": "sha256-0NBlEBKkN3lufyvFegY4TYv5mCNHbi5OmBDrzihbBMQ=",
|
||||||
|
"owner": "NixOS",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "0182a361324364ae3f436a63005877674cf45efb",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "NixOS",
|
||||||
|
"ref": "nixos-unstable",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"nur": {
|
"nur": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"flake-parts": "flake-parts_2",
|
"flake-parts": "flake-parts_2",
|
||||||
@@ -735,6 +785,24 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"panoptikon": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": "nixpkgs_4"
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1771686951,
|
||||||
|
"narHash": "sha256-+s19xrH0kVVDT48TtpulmuWFMagi/ysjWL+PjKcmF/k=",
|
||||||
|
"ref": "refs/heads/main",
|
||||||
|
"rev": "8868eb8736c3395186fa410c040e0000abca56bd",
|
||||||
|
"revCount": 3,
|
||||||
|
"type": "git",
|
||||||
|
"url": "https://code.kmein.de/kfm/panoptikon"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"type": "git",
|
||||||
|
"url": "https://code.kmein.de/kfm/panoptikon"
|
||||||
|
}
|
||||||
|
},
|
||||||
"retiolum": {
|
"retiolum": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1756302470,
|
"lastModified": 1756302470,
|
||||||
@@ -759,16 +827,18 @@
|
|||||||
"llm-agents": "llm-agents",
|
"llm-agents": "llm-agents",
|
||||||
"menstruation-backend": "menstruation-backend",
|
"menstruation-backend": "menstruation-backend",
|
||||||
"menstruation-telegram": "menstruation-telegram",
|
"menstruation-telegram": "menstruation-telegram",
|
||||||
|
"meteora": "meteora",
|
||||||
"naersk": "naersk",
|
"naersk": "naersk",
|
||||||
"niphas": "niphas",
|
"niphas": "niphas",
|
||||||
"nix-index-database": "nix-index-database",
|
"nix-index-database": "nix-index-database",
|
||||||
"nix-topology": "nix-topology",
|
"nix-topology": "nix-topology",
|
||||||
"nixos-hardware": "nixos-hardware",
|
"nixos-hardware": "nixos-hardware",
|
||||||
"nixpkgs": "nixpkgs_2",
|
"nixpkgs": "nixpkgs_3",
|
||||||
"nixpkgs-old": "nixpkgs-old",
|
"nixpkgs-old": "nixpkgs-old",
|
||||||
"nixpkgs-unstable": "nixpkgs-unstable",
|
"nixpkgs-unstable": "nixpkgs-unstable",
|
||||||
"nur": "nur",
|
"nur": "nur",
|
||||||
"opencrow": "opencrow",
|
"opencrow": "opencrow",
|
||||||
|
"panoptikon": "panoptikon",
|
||||||
"retiolum": "retiolum",
|
"retiolum": "retiolum",
|
||||||
"scripts": "scripts",
|
"scripts": "scripts",
|
||||||
"stockholm": "stockholm",
|
"stockholm": "stockholm",
|
||||||
|
|||||||
@@ -28,6 +28,7 @@
|
|||||||
wrappers.url = "github:lassulus/wrappers";
|
wrappers.url = "github:lassulus/wrappers";
|
||||||
llm-agents.url = "github:numtide/llm-agents.nix";
|
llm-agents.url = "github:numtide/llm-agents.nix";
|
||||||
opencrow.url = "github:pinpox/opencrow";
|
opencrow.url = "github:pinpox/opencrow";
|
||||||
|
meteora.url = "git+ssh://git@github.com/kmein/meteora.git";
|
||||||
|
|
||||||
voidrice.flake = false;
|
voidrice.flake = false;
|
||||||
|
|
||||||
@@ -96,6 +97,7 @@
|
|||||||
stylix,
|
stylix,
|
||||||
voidrice,
|
voidrice,
|
||||||
wetter,
|
wetter,
|
||||||
|
meteora,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
@@ -302,6 +304,7 @@
|
|||||||
autorenkalender = autorenkalender.packages.${prev.stdenv.hostPlatform.system}.default;
|
autorenkalender = autorenkalender.packages.${prev.stdenv.hostPlatform.system}.default;
|
||||||
onomap = scripts.packages.${prev.stdenv.hostPlatform.system}.onomap;
|
onomap = scripts.packages.${prev.stdenv.hostPlatform.system}.onomap;
|
||||||
tinc-graph = tinc-graph.packages.${prev.stdenv.hostPlatform.system}.tinc-graph;
|
tinc-graph = tinc-graph.packages.${prev.stdenv.hostPlatform.system}.tinc-graph;
|
||||||
|
meteora-website = meteora.packages.${prev.stdenv.hostPlatform.system}.website;
|
||||||
|
|
||||||
# krebs
|
# krebs
|
||||||
brainmelter = prev.callPackage packages/brainmelter.nix { };
|
brainmelter = prev.callPackage packages/brainmelter.nix { };
|
||||||
@@ -513,7 +516,7 @@
|
|||||||
++ profiles.desktop
|
++ profiles.desktop
|
||||||
++ [
|
++ [
|
||||||
systems/manakish/configuration.nix
|
systems/manakish/configuration.nix
|
||||||
nixos-hardware.nixosModules.lenovo-thinkpad-x230
|
nixos-hardware.nixosModules.lenovo-thinkpad-x220
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
kabsa = nixpkgs.lib.nixosSystem {
|
kabsa = nixpkgs.lib.nixosSystem {
|
||||||
@@ -524,7 +527,7 @@
|
|||||||
++ profiles.desktop
|
++ profiles.desktop
|
||||||
++ [
|
++ [
|
||||||
systems/kabsa/configuration.nix
|
systems/kabsa/configuration.nix
|
||||||
nixos-hardware.nixosModules.lenovo-thinkpad-x220
|
nixos-hardware.nixosModules.lenovo-thinkpad-x230
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
fatteh = nixpkgs.lib.nixosSystem {
|
fatteh = nixpkgs.lib.nixosSystem {
|
||||||
|
|||||||
@@ -35,26 +35,6 @@ writers.writeBashBin "mp3player-write" ''
|
|||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
TOTAL_SIZE=0
|
|
||||||
for f in "''${FILES[@]}"; do
|
|
||||||
if [ ! -f "$f" ]; then
|
|
||||||
echo "Warning: File '$f' does not exist, skipping."
|
|
||||||
continue
|
|
||||||
fi
|
|
||||||
FILE_SIZE=$(${lib.getExe' coreutils "stat"} --printf="%s" "$f")
|
|
||||||
TOTAL_SIZE=$((TOTAL_SIZE + FILE_SIZE / 2))
|
|
||||||
done
|
|
||||||
|
|
||||||
AVAILABLE=$(${lib.getExe' coreutils "df"} --output=avail "$MOUNT_POINT" | ${lib.getExe' coreutils "tail"} -n 1)
|
|
||||||
AVAILABLE=$((AVAILABLE * 1024))
|
|
||||||
|
|
||||||
if [ "$TOTAL_SIZE" -gt "$AVAILABLE" ]; then
|
|
||||||
echo "Error: Not enough space. Required: $TOTAL_SIZE bytes, Available: $AVAILABLE bytes"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
echo "Enough space available. Starting conversion..."
|
|
||||||
|
|
||||||
sanitize_filename() {
|
sanitize_filename() {
|
||||||
local name
|
local name
|
||||||
name=$(${lib.getExe' coreutils "basename"} "$1")
|
name=$(${lib.getExe' coreutils "basename"} "$1")
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
{
|
{
|
||||||
lib,
|
lib,
|
||||||
writers,
|
writers,
|
||||||
poppler_utils,
|
poppler-utils,
|
||||||
tesseract,
|
tesseract,
|
||||||
coreutils,
|
coreutils,
|
||||||
}:
|
}:
|
||||||
@@ -21,7 +21,7 @@ writers.writeDashBin "pdf-ocr" ''
|
|||||||
|
|
||||||
cd "$tmpdir"
|
cd "$tmpdir"
|
||||||
|
|
||||||
${lib.getExe' poppler_utils "pdftoppm"} -png "$pdf_path" pdf-ocr
|
${lib.getExe' poppler-utils "pdftoppm"} -png "$pdf_path" pdf-ocr
|
||||||
for png in pdf-ocr*.png; do
|
for png in pdf-ocr*.png; do
|
||||||
${lib.getExe tesseract} "$png" "$png.txt" 2>/dev/null
|
${lib.getExe tesseract} "$png" "$png.txt" 2>/dev/null
|
||||||
done
|
done
|
||||||
|
|||||||
@@ -18,7 +18,7 @@ let
|
|||||||
];
|
];
|
||||||
outputHashMode = "recursive";
|
outputHashMode = "recursive";
|
||||||
outputHashAlgo = "sha256";
|
outputHashAlgo = "sha256";
|
||||||
outputHash = "sha256-YrrQ5m8XYKFNR2+dn97GYxKxcWPBndomPZsqKfwD6w0=";
|
outputHash = "sha256-+XaHU/Ale2YLQmdvfG73nG+tjRkWyb27bdLgI3JFLlU=";
|
||||||
impureEnvVars = [
|
impureEnvVars = [
|
||||||
"http_proxy"
|
"http_proxy"
|
||||||
"https_proxy"
|
"https_proxy"
|
||||||
|
|||||||
2
secrets
2
secrets
Submodule secrets updated: 4fa163a68e...0c10b2e8bb
@@ -1,4 +1,5 @@
|
|||||||
secrets/alertmanager-token-reporters.age
|
secrets/alertmanager-token-reporters.age
|
||||||
|
secrets/anthropic-api-key.age
|
||||||
secrets/brevo-key.age
|
secrets/brevo-key.age
|
||||||
secrets/cifs-credentials-zodiac.age
|
secrets/cifs-credentials-zodiac.age
|
||||||
secrets/copecart-ipn.age
|
secrets/copecart-ipn.age
|
||||||
@@ -54,6 +55,7 @@ secrets/matrix-token-lakai.age
|
|||||||
secrets/matrix-token-lakai-env.age
|
secrets/matrix-token-lakai-env.age
|
||||||
secrets/maxmind-license-key.age
|
secrets/maxmind-license-key.age
|
||||||
secrets/mega-password.age
|
secrets/mega-password.age
|
||||||
|
secrets/meteora-auth.age
|
||||||
secrets/miniflux-api-token.age
|
secrets/miniflux-api-token.age
|
||||||
secrets/miniflux-credentials.age
|
secrets/miniflux-credentials.age
|
||||||
secrets/nextcloud-password-admin.age
|
secrets/nextcloud-password-admin.age
|
||||||
@@ -61,7 +63,11 @@ secrets/nextcloud-password-database.age
|
|||||||
secrets/nextcloud-password-fysi.age
|
secrets/nextcloud-password-fysi.age
|
||||||
secrets/nextcloud-password-kieran.age
|
secrets/nextcloud-password-kieran.age
|
||||||
secrets/onlyoffice-jwt-key.age
|
secrets/onlyoffice-jwt-key.age
|
||||||
|
secrets/openclaw-gateway-token.age
|
||||||
|
secrets/openclaw-telegram-token.age
|
||||||
|
secrets/opencrow-gemini-key.age
|
||||||
secrets/opencrow-matrix-token.age
|
secrets/opencrow-matrix-token.age
|
||||||
|
secrets/opencrow-openrouter-key.age
|
||||||
secrets/opencrow-soul.age
|
secrets/opencrow-soul.age
|
||||||
secrets/openweathermap-api-key.age
|
secrets/openweathermap-api-key.age
|
||||||
secrets/restic.age
|
secrets/restic.age
|
||||||
|
|||||||
@@ -1,4 +1,3 @@
|
|||||||
{ pkgs, ... }:
|
|
||||||
{
|
{
|
||||||
nixpkgs.config = {
|
nixpkgs.config = {
|
||||||
allowUnfree = true;
|
allowUnfree = true;
|
||||||
@@ -22,14 +21,7 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.ollama = {
|
|
||||||
enable = true;
|
|
||||||
acceleration = "cuda"; # Force it to use the MX150
|
|
||||||
package = pkgs.ollama-cuda;
|
|
||||||
};
|
|
||||||
|
|
||||||
nix.settings.system-features = [ "cuda" ];
|
nix.settings.system-features = [ "cuda" ];
|
||||||
nixpkgs.config.cudaCapabilities = [ "6.1" ];
|
|
||||||
|
|
||||||
programs.nix-required-mounts = {
|
programs.nix-required-mounts = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|||||||
@@ -17,6 +17,7 @@
|
|||||||
./wallabag.nix
|
./wallabag.nix
|
||||||
./nethack.nix
|
./nethack.nix
|
||||||
./opencrow.nix
|
./opencrow.nix
|
||||||
|
./meteora.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
niveum.passport = {
|
niveum.passport = {
|
||||||
|
|||||||
18
systems/ful/meteora.nix
Normal file
18
systems/ful/meteora.nix
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
{ config, pkgs, ... }: {
|
||||||
|
age.secrets.meteora-auth = {
|
||||||
|
file = ../../secrets/meteora-auth.age;
|
||||||
|
owner = "nginx";
|
||||||
|
};
|
||||||
|
|
||||||
|
services.nginx = {
|
||||||
|
enable = true;
|
||||||
|
virtualHosts."meteora.xn--kiern-0qa.de" = {
|
||||||
|
forceSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
root = "${pkgs.meteora-website}";
|
||||||
|
locations."/" = {
|
||||||
|
basicAuthFile = config.age.secrets.meteora-auth.path;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user