Remove unused code

This commit is contained in:
Jakob Lechner 2025-04-09 22:44:36 +02:00
parent af5a07ca19
commit 48e71f75f8
104 changed files with 151 additions and 229 deletions

View file

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, ... }:
{
imports = [

View file

@ -1,7 +1,7 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{ config, lib, modulesPath, ... }:
{
imports =

View file

@ -1,4 +1,4 @@
{ lib, custom-utils, ... }:
{ custom-utils, ... }:
custom-utils.validatePortAttrset {
asterisk-rtp = { udp.range = [ 10000 10200 ]; };

View file

@ -1,4 +1,4 @@
args@{ config, lib, pkgs, custom-utils, ... }:
args@{ config, lib, pkgs, ... }:
let
ports = import ../../ports.nix args;

View file

@ -1,4 +1,4 @@
{ lib, stdenvNoCC }:
{ stdenvNoCC }:
stdenvNoCC.mkDerivation {
name = "voicemail-sounds";

View file

@ -1,8 +1,5 @@
{ lib, pkgs, ... }:
let
stateDir = "/var/lib/dnsmasq";
in
{
services.dnsmasq = {
enable = true;
@ -54,7 +51,7 @@ in
"voice"
]
(
interface: {
_: {
allowedUDPPorts = [ 53 67 ];
allowedTCPPorts = [ 53 ];
}

View file

@ -1,4 +1,4 @@
args@{ config, lib, pkgs, custom-utils, ... }:
args@{ config, ... }:
let
ports = import ../ports.nix args;

View file

@ -1,7 +1,6 @@
args@{ lib, pkgs, config, custom-utils, ... }:
args@{ lib, pkgs, config, ... }:
let
ports = import ../../ports.nix args;
cfg = config.services.esphome;
cfgdir = pkgs.stdenvNoCC.mkDerivation {
name = "esphome-config";
src = ./devices;
@ -11,10 +10,6 @@ let
cp -r * $out
'';
};
esphomeParams =
if cfg.enableUnixSocket
then "--socket /run/esphome/esphome.sock"
else "--address ${cfg.address} --port ${toString cfg.port}";
in
{
sops.secrets.esphome = {

View file

@ -1,4 +1,4 @@
args@{ lib, pkgs, config, custom-utils, ... }:
args@{ pkgs, config, ... }:
let
ports = import ../ports.nix args;
in

View file

@ -1,4 +1,4 @@
args@{ pkgs, custom-utils, ... }:
args:
let
ports = import ../ports.nix args;

View file

@ -1,4 +1,3 @@
{ lib, pkgs, ... }:
{
services.chrony = {
enable = true;

View file

@ -1,4 +1,4 @@
args@{ pkgs, custom-utils, ... }:
args@{ pkgs, ... }:
let
ports = import ../ports.nix args;

View file

@ -1,4 +1,4 @@
{ config, pkgs, ... }:
{ pkgs, ... }:
{
imports = [

View file

@ -1,4 +1,3 @@
{ pkgs, lib, ... }:
{
sops.secrets.ntfy_shiftphone = {
sopsFile = ../secrets.yaml;

View file

@ -1,4 +1,4 @@
{ inputs, config, pkgs, lib, ... }:
{ config, pkgs, lib, ... }:
let
interfaces = import ./interfaces.nix;
disks = {
@ -119,13 +119,11 @@ with lib; {
jalr.luksUsbUnlock = {
enable = true;
devices = builtins.mapAttrs
(name: dev:
{
keyPath = "iron.key";
usbDevice = "by-label/RAM_USB";
waitForDevice = 10;
}
)
(_: _: {
keyPath = "iron.key";
usbDevice = "by-label/RAM_USB";
waitForDevice = 10;
})
disks;
};
@ -144,12 +142,10 @@ with lib; {
];
systemd.enable = true;
luks.devices = builtins.mapAttrs
(name: dev:
{
device = "${devNodes}${dev}${partitionScheme.luksDev}";
allowDiscards = true;
}
)
(_: dev: {
device = "${devNodes}${dev}${partitionScheme.luksDev}";
allowDiscards = true;
})
disks;
};
supportedFilesystems = [ "zfs" ];

View file

@ -1,4 +1,4 @@
{ lib, custom-utils, ... }:
{ custom-utils, ... }:
custom-utils.validatePortAttrset {
calibre-server.tcp = 8081;

View file

@ -1,4 +1,3 @@
args@{ lib, pkgs, config, custom-utils, ... }:
let
interfaces = import ../interfaces.nix;
in

View file

@ -1,4 +1,4 @@
args@{ lib, config, pkgs, custom-utils, ... }:
args@{ lib, config, ... }:
let
ports = import ../ports.nix args;
in

View file

@ -2,7 +2,6 @@
let
interfaces = import ../interfaces.nix;
stateDir = "/var/lib/dnsmasq";
in
{
services.dnsmasq = {
@ -47,7 +46,7 @@ in
"iot"
]
(
interface: {
_: {
allowedUDPPorts = [ 53 67 ];
allowedTCPPorts = [ 53 ];
}

View file

@ -1,7 +1,6 @@
args@{ lib, pkgs, config, custom-utils, ... }:
args@{ lib, pkgs, config, ... }:
let
ports = import ../../ports.nix args;
cfg = config.services.esphome;
cfgdir = pkgs.stdenvNoCC.mkDerivation {
name = "esphome-config";
src = ./devices;
@ -11,10 +10,6 @@ let
cp -r * $out
'';
};
esphomeParams =
if cfg.enableUnixSocket
then "--socket /run/esphome/esphome.sock"
else "--address ${cfg.address} --port ${toString cfg.port}";
in
{
sops.secrets.esphome = {

View file

@ -1,4 +1,4 @@
args@{ lib, pkgs, config, custom-utils, ... }:
args@{ lib, pkgs, config, ... }:
let
ports = import ../ports.nix args;
interfaces = import ../interfaces.nix;

View file

@ -1,4 +1,4 @@
args@{ lib, pkgs, custom-utils, ... }:
args@{ lib, ... }:
let
ports = import ../ports.nix args;
in

View file

@ -1,4 +1,4 @@
args@{ config, pkgs, custom-utils, ... }:
args:
let
ports = import ../ports.nix args;

View file

@ -1,4 +1,4 @@
args@{ config, pkgs, custom-utils, ... }:
args@{ config, pkgs, ... }:
let
ports = import ../ports.nix args;

View file

@ -1,4 +1,4 @@
args@{ config, lib, pkgs, utils, custom-utils, ... }:
args@{ config, lib, pkgs, ... }:
let
ports = import ../ports.nix args;

View file

@ -1,4 +1,4 @@
args@{ pkgs, custom-utils, ... }:
args:
let
ports = import ../ports.nix args;

View file

@ -1,4 +1,3 @@
{ lib, pkgs, ... }:
{
services.chrony = {
enable = true;

View file

@ -1,4 +1,4 @@
args@{ config, lib, pkgs, custom-utils, ... }:
args@{ config, lib, pkgs, ... }:
let
ports = import ../ports.nix args;

View file

@ -1,4 +1,4 @@
args@{ config, lib, pkgs, custom-utils, ... }:
args@{ config, ... }:
let
ports = import ../ports.nix args;

View file

@ -1,4 +1,4 @@
args@{ lib, config, pkgs, custom-utils, ... }:
args@{ lib, config, pkgs, ... }:
let
ports = import ../ports.nix args;
domain = "rmfakecloud.jalr.de";

View file

@ -1,4 +1,4 @@
args@{ lib, pkgs, config, custom-utils, ... }:
{ pkgs, ... }:
let
interfaces = import ../../interfaces.nix;
in

View file

@ -1,4 +1,4 @@
args@{ lib, pkgs, config, custom-utils, ... }:
{ lib, pkgs, config, ... }:
let
interfaces = import ../../interfaces.nix;
mopidyConfig = {

View file

@ -1,19 +1,6 @@
{ lib, pkgs, ... }:
{ pkgs, ... }:
let hostId = "Wohnzimmer";
in
{
#services.pipewire = {
# enable = true;
# pulse.enable = true;
# alsa.enable = true;
#};
#environment.systemPackages = with pkgs; [
# pulseaudio # pacmd and pactl
# pulsemixer
#];
systemd.services.snapclient = {
enable = true;
description = "Snapcast client";

View file

@ -1,4 +1,4 @@
args@{ lib, pkgs, config, custom-utils, ... }:
args@{ lib, pkgs, config, ... }:
let
ports = import ../../ports.nix args;
interfaces = import ../../interfaces.nix;

View file

@ -1,4 +1,4 @@
args@{ config, lib, custom-utils, ... }:
args:
let
ports = import ../ports.nix args;

View file

@ -1,4 +1,4 @@
args@{ pkgs, custom-utils, ... }:
args@{ pkgs, ... }:
let
ports = import ../ports.nix args;

View file

@ -1,4 +1,4 @@
args@{ config, pkgs, custom-utils, ... }:
args@{ pkgs, ... }:
let
ports = import ../ports.nix args;

View file

@ -1,4 +1,4 @@
{ config, lib, ... }:
{ lib, ... }:
{
imports = [
@ -6,6 +6,7 @@
./services
../../users/jalr
./persistence.nix
./ports.nix
];
networking.hostName = "magnesium";

View file

@ -1,15 +1,15 @@
{ custom-utils, ... }:
custom-utils.validatePortAttrset {
coturn-cli.tcp = 5766;
coturn-plain = { tcp = [ 3478 3479 ]; udp = [ 3478 3479 ]; };
coturn-relay.udp.range = [ 49160 49200 ];
coturn-tls = { tcp = [ 5349 5350 ]; udp = [ 5349 5350 ]; };
forgejo-ssh.tcp = 2022;
hedgedoc.tcp = 3000;
nginx-http.tcp = 80;
nginx-https.tcp = 443;
ntfy.tcp = 12474;
trilium.tcp = 12783;
wireguard-public-ip-tunnel.udp = 51000;
{
config.networking.ports = {
coturn-cli.tcp = 5766;
coturn-plain = { tcp = [ 3478 3479 ]; udp = [ 3478 3479 ]; };
coturn-relay.udp = { from = 49160; to = 49200; };
coturn-tls = { tcp = [ 5349 5350 ]; udp = [ 5349 5350 ]; };
forgejo-ssh.tcp = 2022;
hedgedoc.tcp = 3000;
nginx-http.tcp = 80;
nginx-https.tcp = 443;
ntfy.tcp = 12474;
trilium.tcp = 12783;
wireguard-public-ip-tunnel.udp = 51000;
};
}

View file

@ -1,9 +1,9 @@
args@{ config, lib, pkgs, custom-utils, ... }:
{ config, lib, pkgs, ... }:
let
ports = import ../ports.nix args;
cfg = config.services.coturn;
fqdn = "turn.jalr.de";
ports = config.networking.ports;
in
{
sops.secrets.turn-static-auth-secret = {
@ -22,8 +22,8 @@ in
tls-listening-port = builtins.elemAt ports.coturn-tls.tcp 0;
alt-tls-listening-port = builtins.elemAt ports.coturn-tls.tcp 1;
cli-port = ports.coturn-cli.tcp;
min-port = builtins.elemAt ports.coturn-relay.udp.range 0;
max-port = builtins.elemAt ports.coturn-relay.udp.range 1;
min-port = ports.coturn-relay.udp.from;
max-port = ports.coturn-relay.udp.to;
}
) // {
enable = true;
@ -108,10 +108,6 @@ in
networking.firewall = {
allowedTCPPorts = with cfg; [ listening-port alt-listening-port tls-listening-port alt-tls-listening-port ];
allowedUDPPorts = with cfg; [ listening-port alt-listening-port tls-listening-port alt-tls-listening-port ];
allowedUDPPortRanges = lib.singleton {
from = builtins.elemAt ports.coturn-relay.udp.range 0;
to = builtins.elemAt ports.coturn-relay.udp.range 1;
};
allowedUDPPortRanges = lib.singleton ports.coturn-relay.udp;
};
}

View file

@ -1,8 +1,8 @@
args@{ config, custom-utils, ... }:
{ config, ... }:
let
domain = "git.jalr.de";
cfg = config.services.forgejo;
ports = import ../ports.nix args;
ports = config.networking.ports;
in
{
sops.secrets.forgejo-mail = {

View file

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, pkgs, ... }:
{
sops.secrets.gitlab-runner_fablab-nea-hcloud-labsync = {

View file

@ -1,9 +1,9 @@
args@{ config, custom-utils, ... }:
{ config, ... }:
let
domain = "pad.jalr.de";
ports = import ../ports.nix args;
cfg = config.services.hedgedoc;
ports = config.networking.ports;
in
{
sops.secrets.hedgedoc-session-secret = {

View file

@ -1,9 +1,9 @@
args@{ lib, pkgs, config, custom-utils, ... }:
{ config, ... }:
let
cfg = config.services.ntfy-sh;
ports = import ../ports.nix args;
domain = "ntfy.jalr.de";
datadir = "/var/lib/ntfy-sh";
ports = config.networking.ports;
in
{
# ntfy access --auth-file /var/lib/private/ntfy-sh/user.db '*' 'up*' write-only

View file

@ -1,9 +1,9 @@
args@{ config, lib, pkgs, custom-utils, ... }:
{ config, lib, ... }:
let
ports = import ../ports.nix args;
listenPort = ports.wireguard-public-ip-tunnel.udp;
publicKey = "GCmQs7upvDYFueEfqD2yJkkOZg3K7YaGluWWzdjsyTo=";
ports = config.networking.ports;
in
{
sops.secrets = lib.listToAttrs (map

View file

@ -1,8 +1,8 @@
args@{ config, lib, pkgs, custom-utils, ... }:
{ config, pkgs, ... }:
let
ports = import ../ports.nix args;
domain = "notes.jalr.de";
ports = config.networking.ports;
in
{
services.trilium-server = {

View file

@ -1,9 +1,9 @@
args@{ config, lib, pkgs, custom-utils, ... }:
{ config, lib, pkgs, ... }:
let
ports = import ../ports.nix args;
domain = "jalr.de";
matrixDomain = "matrix.jalr.de";
ports = config.networking.ports;
in
{
networking.firewall.allowedTCPPorts = [ ports.nginx-http.tcp ports.nginx-https.tcp ];

View file

@ -1,4 +1,4 @@
{ config, lib, pkgs, modulesPath, ... }:
{ lib, modulesPath, ... }:
{
imports = [ (modulesPath + "/profiles/qemu-guest.nix") ];

View file

@ -1,4 +1,4 @@
{ lib, custom-utils, ... }:
{ custom-utils, ... }:
custom-utils.validatePortAttrset {
nginx-http.tcp = 80;

View file

@ -1,4 +1,4 @@
args@{ config, lib, pkgs, custom-utils, ... }:
args@{ config, lib, ... }:
let
cfg = config.services.pretix;