Compare commits

...

2 commits

27 changed files with 105 additions and 71 deletions

View file

@ -27,6 +27,7 @@ Configure system by setting up values as defined in the [HomeFree module](./modu
* Prevent hangs on boot due to alerts (e.g. if no monitor attached) * Prevent hangs on boot due to alerts (e.g. if no monitor attached)
* F2 to enter BIOS * F2 to enter BIOS
* Select "Boot" tab * Select "Boot" tab
* Enable Fast Boot
* Select "Boot Display Configuration" * Select "Boot Display Configuration"
* Enable "Suppress Alert Messages at Boot" * Enable "Suppress Alert Messages at Boot"
* Enable headless GPU * Enable headless GPU

81
flake.lock generated
View file

@ -144,11 +144,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1741352980, "lastModified": 1743550720,
"narHash": "sha256-+u2UunDA4Cl5Fci3m7S643HzKmIDAe+fiXrLqYsR2fs=", "narHash": "sha256-hIshGgKZCgWh6AYJpJmRgFdR3WUbkY04o82X05xqQiY=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "flake-parts", "repo": "flake-parts",
"rev": "f4330d22f1c5d2ba72d3d22df5597d123fdb60a9", "rev": "c621e8422220273271f52058f618c94e405bb0f5",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -212,16 +212,16 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1729958008, "lastModified": 1748294338,
"narHash": "sha256-EiOq8jF4Z/zQe0QYVc3+qSKxRK//CFHMB84aYrYGwEs=", "narHash": "sha256-FVO01jdmUNArzBS7NmaktLdGA5qA3lUMJ4B7a05Iynw=",
"owner": "NuschtOS", "owner": "NuschtOS",
"repo": "ixx", "repo": "ixx",
"rev": "9fd01aad037f345350eab2cd45e1946cc66da4eb", "rev": "cc5f390f7caf265461d4aab37e98d2292ebbdb85",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "NuschtOS", "owner": "NuschtOS",
"ref": "v0.0.6", "ref": "v0.0.8",
"repo": "ixx", "repo": "ixx",
"type": "github" "type": "github"
} }
@ -439,27 +439,11 @@
}, },
"nixpkgs_4": { "nixpkgs_4": {
"locked": { "locked": {
"lastModified": 1742669843, "lastModified": 1748406211,
"narHash": "sha256-G5n+FOXLXcRx+3hCJ6Rt6ZQyF1zqQ0DL0sWAMn2Nk0w=", "narHash": "sha256-B3BsCRbc+x/d0WiG1f+qfSLUy+oiIfih54kalWBi+/M=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "1e5b653dff12029333a6546c11e108ede13052eb", "rev": "3d1f29646e4b57ed468d60f9d286cde23a8d1707",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_5": {
"locked": {
"lastModified": 1742606399,
"narHash": "sha256-NAxwF5cjgh8o5aylhePXWNQETCWYaTpNvdO2bMfINpQ=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "0740f6f238767d4caf9afe774d3e88105766dfc6",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -469,7 +453,7 @@
"type": "github" "type": "github"
} }
}, },
"nixpkgs_6": { "nixpkgs_5": {
"locked": { "locked": {
"lastModified": 1744868846, "lastModified": 1744868846,
"narHash": "sha256-5RJTdUHDmj12Qsv7XOhuospjAjATNiTMElplWnJE9Hs=", "narHash": "sha256-5RJTdUHDmj12Qsv7XOhuospjAjATNiTMElplWnJE9Hs=",
@ -488,15 +472,16 @@
"nixvim": { "nixvim": {
"inputs": { "inputs": {
"flake-parts": "flake-parts_2", "flake-parts": "flake-parts_2",
"nixpkgs": "nixpkgs_5", "nixpkgs": "nixpkgs_4",
"nuschtosSearch": "nuschtosSearch" "nuschtosSearch": "nuschtosSearch",
"systems": "systems_3"
}, },
"locked": { "locked": {
"lastModified": 1742732006, "lastModified": 1748521000,
"narHash": "sha256-ZIBMfPNb/hfoFf79MRnhDXGKl0yGhjlYEpy3+/jbxFI=", "narHash": "sha256-EnXH5PIrZBoe8U09hPQr2kOuPTZSqAJy78DqUVLmWXg=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nixvim", "repo": "nixvim",
"rev": "7776e37b67e7875c3cd56d9d20fd050798071706", "rev": "a9e45072d82374dd3f0d971795e7d7f99e5bc6c2",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -507,15 +492,14 @@
}, },
"nixvim-config": { "nixvim-config": {
"inputs": { "inputs": {
"nixpkgs": "nixpkgs_4",
"nixvim": "nixvim" "nixvim": "nixvim"
}, },
"locked": { "locked": {
"lastModified": 1745217653, "lastModified": 1748553600,
"narHash": "sha256-lIPGjaEU6iQ9I0TX0FoYJcU2QTyJAAz92qP++WRBQPY=", "narHash": "sha256-WUtHKSeCZKDJBb5C2sd8iUvbeZa7AVVB+qo+HNDpKzg=",
"ref": "refs/heads/main", "ref": "refs/heads/main",
"rev": "6a2b1631f2a1c3aee1355b599ccbd7aeced74eac", "rev": "4a83351844e9ee1ccc70dd9962f581b3dc7926e3",
"revCount": 24, "revCount": 25,
"type": "git", "type": "git",
"url": "https://git.homefree.host/homefree/nixvim-config" "url": "https://git.homefree.host/homefree/nixvim-config"
}, },
@ -535,11 +519,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1742659553, "lastModified": 1748298102,
"narHash": "sha256-i/JCrr/jApVorI9GkSV5to+USrRCa0rWuQDH8JSlK2A=", "narHash": "sha256-PP11GVwUt7F4ZZi5A5+99isuq39C59CKc5u5yVisU/U=",
"owner": "NuschtOS", "owner": "NuschtOS",
"repo": "search", "repo": "search",
"rev": "508752835128a3977985a4d5225ff241f7756181", "rev": "f8a1c221afb8b4c642ed11ac5ee6746b0fe1d32f",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -595,7 +579,7 @@
}, },
"sops-nix": { "sops-nix": {
"inputs": { "inputs": {
"nixpkgs": "nixpkgs_6" "nixpkgs": "nixpkgs_5"
}, },
"locked": { "locked": {
"lastModified": 1745310711, "lastModified": 1745310711,
@ -641,6 +625,21 @@
"type": "github" "type": "github"
} }
}, },
"systems_3": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"treefmt-nix": { "treefmt-nix": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [

View file

@ -229,7 +229,7 @@
nixvim-config = { nixvim-config = {
enable = true; enable = true;
startify-header = let header-space = " "; in [ startify-header = let header-space = " "; in [
''${header-space} ___ ___ ___________'' ''${header-space} ___ ___ ___________''
''${header-space} / | \ ____ _____ ____\_ _____/______ ____ ____'' ''${header-space} / | \ ____ _____ ____\_ _____/______ ____ ____''
''${header-space}/ ~ \/ _ \ / \_/ __ \| __) \_ __ \_/ __ \_/ __ \'' ''${header-space}/ ~ \/ _ \ / \_/ __ \| __) \_ __ \_/ __ \_/ __ \''
@ -272,6 +272,7 @@
inetutils inetutils
iotop iotop
iperf3 iperf3
jq
lemonade lemonade
luarocks luarocks
lshw lshw

View file

@ -162,6 +162,11 @@ in
ruleset = '' ruleset = ''
flush ruleset flush ruleset
# add table inet filter
# add table ip nat
# flush table inet filter
# flush table ip nat
## "inet" indicates both ipv4 and ipv6 ## "inet" indicates both ipv4 and ipv6
table inet filter { table inet filter {
## allow all packets sent by the firewall machine itself ## allow all packets sent by the firewall machine itself
@ -188,6 +193,7 @@ in
## Allow for web traffic ## Allow for web traffic
## http is needed for headscale relaying ## http is needed for headscale relaying
## 3022 is for git/forgejo ssh ## 3022 is for git/forgejo ssh
## @TODO: 3022 should only be opened if forgejo is set to public
tcp dport { http, https, 3022 } ct state new accept; tcp dport { http, https, 3022 } ct state new accept;
## Headscale connections ## Headscale connections

View file

@ -17,7 +17,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -38,7 +38,8 @@ in
systemd.services.podman-baikal = { systemd.services.podman-baikal = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires =[ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "baikal-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "baikal-prestart" preStart}" ];
}; };

View file

@ -80,7 +80,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -116,6 +116,7 @@ in
systemd.services.podman-cryptpad = { systemd.services.podman-cryptpad = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires =[ "dns-ready.service" ]; requires =[ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "cryptpad-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "cryptpad-prestart" preStart}" ];
}; };

View file

@ -22,7 +22,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -80,6 +80,7 @@ in
systemd.services.podman-forgejo = { systemd.services.podman-forgejo = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "forgejo-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "forgejo-prestart" preStart}" ];
}; };

View file

@ -140,7 +140,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
## 1GB of memory, reduces SSD/SD Card wear ## 1GB of memory, reduces SSD/SD Card wear
"--mount=type=tmpfs,target=/tmp/cache,tmpfs-size=1000000000" "--mount=type=tmpfs,target=/tmp/cache,tmpfs-size=1000000000"
"--shm-size=512M" "--shm-size=512M"
@ -175,6 +175,7 @@ in
systemd.services.podman-frigate = { systemd.services.podman-frigate = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "frigate-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "frigate-prestart" preStart}" ];
}; };

View file

@ -21,7 +21,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -42,6 +42,7 @@ in
systemd.services.podman-grocy = { systemd.services.podman-grocy = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "grocy-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "grocy-prestart" preStart}" ];
}; };

View file

@ -138,7 +138,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -185,6 +185,7 @@ in
systemd.services.podman-headplane = { systemd.services.podman-headplane = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "headplane-prestart" headplane-preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "headplane-prestart" headplane-preStart}" ];
}; };

View file

@ -69,7 +69,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
"--network=host" "--network=host"
"--privileged" "--privileged"
]; ];
@ -89,6 +89,7 @@ in
systemd.services.podman-homeassistant = { systemd.services.podman-homeassistant = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "homeassistant-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "homeassistant-prestart" preStart}" ];
}; };

View file

@ -17,7 +17,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -40,6 +40,7 @@ in
systemd.services.podman-homebox = { systemd.services.podman-homebox = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "homebox-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "homebox-prestart" preStart}" ];
}; };

View file

@ -97,7 +97,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -138,7 +138,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
## 1GB of memory, reduces SSD/SD Card wear ## 1GB of memory, reduces SSD/SD Card wear
"--mount=type=tmpfs,target=/tmp/cache,tmpfs-size=1000000000" "--mount=type=tmpfs,target=/tmp/cache,tmpfs-size=1000000000"
"--device=/dev/bus/usb:/dev/bus/usb" # Passes the USB Coral, needs to be modified for other versions "--device=/dev/bus/usb:/dev/bus/usb" # Passes the USB Coral, needs to be modified for other versions
@ -170,7 +170,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
"--health-cmd=redis-cli ping || exit 1" "--health-cmd=redis-cli ping || exit 1"
]; ];
@ -187,6 +187,7 @@ in
systemd.services.podman-immich-server = { systemd.services.podman-immich-server = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "imimich-server-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "imimich-server-prestart" preStart}" ];
}; };
@ -195,11 +196,13 @@ in
systemd.services.podman-immich-machine-learning = { systemd.services.podman-immich-machine-learning = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
}; };
systemd.services.podman-immich-redis = { systemd.services.podman-immich-redis = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
}; };
homefree.service-config = if config.homefree.services.immich.enable == true then [ homefree.service-config = if config.homefree.services.immich.enable == true then [

View file

@ -41,7 +41,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
## 1GB of memory, reduces SSD/SD Card wear ## 1GB of memory, reduces SSD/SD Card wear
"--mount=type=tmpfs,target=/tmp/cache,tmpfs-size=1000000000" "--mount=type=tmpfs,target=/tmp/cache,tmpfs-size=1000000000"
"--device=/dev/dri:/dev/dri" "--device=/dev/dri:/dev/dri"
@ -76,6 +76,7 @@ in
systemd.services.podman-jellyfin = { systemd.services.podman-jellyfin = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "jellyfin-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "jellyfin-prestart" preStart}" ];
}; };

View file

@ -25,7 +25,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -52,6 +52,7 @@ in
systemd.services.podman-joplin = { systemd.services.podman-joplin = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
}; };
homefree.service-config = if config.homefree.services.joplin.enable == true then [ homefree.service-config = if config.homefree.services.joplin.enable == true then [

View file

@ -197,7 +197,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -219,6 +219,7 @@ in
systemd.services.podman-kanidm = { systemd.services.podman-kanidm = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "kanidm-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "kanidm-prestart" preStart}" ];
}; };

View file

@ -20,7 +20,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -45,6 +45,7 @@ in
systemd.services.podman-lidarr = { systemd.services.podman-lidarr = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "lidarr-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "lidarr-prestart" preStart}" ];
}; };

View file

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }: { config, pkgs, ... }:
let let
version = "v2.10.2"; version = "v2.10.2";
version-meili = "v1.12.8"; version-meili = "v1.12.8";
@ -39,7 +39,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -68,7 +68,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
volumes = [ volumes = [
@ -86,6 +86,7 @@ in
systemd.services.podman-linkwarden = { systemd.services.podman-linkwarden = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "linkwarden-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "linkwarden-prestart" preStart}" ];
}; };
@ -94,6 +95,7 @@ in
systemd.services.podman-meilisearch = { systemd.services.podman-meilisearch = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "meili-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "meili-prestart" preStart}" ];
}; };

View file

@ -11,7 +11,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -31,6 +31,7 @@ in
systemd.services.podman-logseq = { systemd.services.podman-logseq = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
}; };
homefree.service-config = if config.homefree.services.logseq.enable == true then [ homefree.service-config = if config.homefree.services.logseq.enable == true then [

View file

@ -17,7 +17,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -39,6 +39,7 @@ in
systemd.services.podman-mongo = { systemd.services.podman-mongo = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "mongo-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "mongo-prestart" preStart}" ];
}; };

View file

@ -18,7 +18,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -44,6 +44,7 @@ in
systemd.services.podman-nzbget = { systemd.services.podman-nzbget = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "nzbget-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "nzbget-prestart" preStart}" ];
}; };

View file

@ -31,7 +31,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
"--add-host=host.docker.internal:host-gateway" "--add-host=host.docker.internal:host-gateway"
]; ];
@ -64,6 +64,7 @@ in
systemd.services.podman-ollama-webui = { systemd.services.podman-ollama-webui = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "ollama-webui-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "ollama-webui-prestart" preStart}" ];
}; };

View file

@ -16,7 +16,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -37,6 +37,7 @@ in
systemd.services.podman-radicale = { systemd.services.podman-radicale = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "radicale-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "radicale-prestart" preStart}" ];
}; };

View file

@ -44,7 +44,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -243,6 +243,7 @@ in
systemd.services.podman-snipe-it = { systemd.services.podman-snipe-it = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "snipe-it-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "snipe-it-prestart" preStart}" ];
}; };

View file

@ -55,7 +55,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -85,7 +85,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -144,6 +144,7 @@ in
systemd.services.podman-unifi-db = { systemd.services.podman-unifi-db = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "unifi-db-prestart" mongo-preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "unifi-db-prestart" mongo-preStart}" ];
}; };
@ -152,6 +153,7 @@ in
systemd.services.podman-unifi = { systemd.services.podman-unifi = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "unifi-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "unifi-prestart" preStart}" ];
}; };

View file

@ -17,7 +17,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -38,6 +38,7 @@ in
systemd.services.podman-vaultwarden = { systemd.services.podman-vaultwarden = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "vaultwarden-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "vaultwarden-prestart" preStart}" ];
}; };

View file

@ -20,7 +20,7 @@ in
autoStart = true; autoStart = true;
extraOptions = [ extraOptions = [
"--pull=always" # "--pull=always"
]; ];
ports = [ ports = [
@ -67,6 +67,7 @@ in
systemd.services.podman-zitadel = { systemd.services.podman-zitadel = {
after = [ "dns-ready.service" ]; after = [ "dns-ready.service" ];
requires = [ "dns-ready.service" ]; requires = [ "dns-ready.service" ];
partOf = [ "nftables.service" ];
serviceConfig = { serviceConfig = {
ExecStartPre = [ "!${pkgs.writeShellScript "zitadel-prestart" preStart}" ]; ExecStartPre = [ "!${pkgs.writeShellScript "zitadel-prestart" preStart}" ];
}; };