From bda2755acc2363932a139c43ebc81450fdb6beb6 Mon Sep 17 00:00:00 2001 From: "sascha.koenig" Date: Mon, 2 Mar 2026 12:47:50 +0100 Subject: [PATCH] chore: litellm update --- flake.lock | 34 +++++++++---------- .../AZ-CLD-1/services/containers/litellm.nix | 2 +- .../AZ-PRM-1/services/containers/baserow.nix | 26 -------------- hosts/AZ-PRM-1/services/default.nix | 5 ++- hosts/AZ-PRM-1/services/vaultwarden.nix | 29 ---------------- 5 files changed, 20 insertions(+), 76 deletions(-) delete mode 100644 hosts/AZ-PRM-1/services/containers/baserow.nix delete mode 100644 hosts/AZ-PRM-1/services/vaultwarden.nix diff --git a/flake.lock b/flake.lock index 4256d04..d5bb119 100644 --- a/flake.lock +++ b/flake.lock @@ -322,11 +322,11 @@ "openspec": "openspec" }, "locked": { - "lastModified": 1771433707, - "narHash": "sha256-O6S4YB16lN9ACb2Z6lEWxE22IyUhb+Z3mJgQJw3hpA4=", + "lastModified": 1772041931, + "narHash": "sha256-NQOQrGtR1EXM33JSVUt5Sz5MburSxWU7t9iZrJk9gQo=", "ref": "refs/heads/master", - "rev": "58312b2ca2fdf5e0f753e496b4902a523cbb96aa", - "revCount": 120, + "rev": "e22774539ac26071b1bc0e6e8272df3c3ec732f2", + "revCount": 132, "type": "git", "url": "https://code.m3ta.dev/m3tam3re/nixpkgs" }, @@ -516,11 +516,11 @@ }, "nixpkgs-master": { "locked": { - "lastModified": 1770917518, - "narHash": "sha256-XSwv/tVrNo/L8SPH8Lx9xZH1PrZd/3Z3J/0SH7Xertg=", + "lastModified": 1771574031, + "narHash": "sha256-yKeO6auxI8PrBZOdt/LVRDm+bh939E60l4iZKo1ExeA=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "3f4a3c08f2f318ee29fc8a2689f390071a94aaf0", + "rev": "ab43bb60c7d266a4a285e863d89c1e69cd124dd5", "type": "github" }, "original": { @@ -580,11 +580,11 @@ }, "nixpkgs_3": { "locked": { - "lastModified": 1770562336, - "narHash": "sha256-ub1gpAONMFsT/GU2hV6ZWJjur8rJ6kKxdm9IlCT0j84=", + "lastModified": 1771369470, + "narHash": "sha256-0NBlEBKkN3lufyvFegY4TYv5mCNHbi5OmBDrzihbBMQ=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "d6c71932130818840fc8fe9509cf50be8c64634f", + "rev": "0182a361324364ae3f436a63005877674cf45efb", "type": "github" }, "original": { @@ -687,16 +687,16 @@ ] }, "locked": { - "lastModified": 1771271829, - "narHash": "sha256-43vPMyO7DsAgKrh0Wmt7jLDYCWUsaj30nBITreyYgX8=", + "lastModified": 1772031356, + "narHash": "sha256-PA3/P5nUDlrKD6xjDXFoNNF8U2Wzz2JeeY4H+CzWWgY=", "owner": "anomalyco", "repo": "opencode", - "rev": "d8c25bfeb44771cc3a3ba17bf8de6ad2add9de2c", + "rev": "de2bc25677b419d2af0da8b6a24a05d3f22b67a8", "type": "github" }, "original": { "owner": "anomalyco", - "ref": "v1.2.6", + "ref": "v1.2.14", "repo": "opencode", "type": "github" } @@ -732,11 +732,11 @@ ] }, "locked": { - "lastModified": 1771409495, - "narHash": "sha256-LplnuO/OHSFL8S8iwQ16CZTjlPxRV9XohkKxL3uA5Sc=", + "lastModified": 1771554066, + "narHash": "sha256-nQPz81Um+4zhEeNz1o55Ix1DoBEM3CxeABAmOJkgIac=", "owner": "Fission-AI", "repo": "OpenSpec", - "rev": "5fd8e9d66c3b6b116e7af814a6013c2d9c4958dd", + "rev": "4ba26902dfecf6f54c5a729993e012a57f4e2877", "type": "github" }, "original": { diff --git a/hosts/AZ-CLD-1/services/containers/litellm.nix b/hosts/AZ-CLD-1/services/containers/litellm.nix index 96a1d6e..2b4d018 100644 --- a/hosts/AZ-CLD-1/services/containers/litellm.nix +++ b/hosts/AZ-CLD-1/services/containers/litellm.nix @@ -9,7 +9,7 @@ in { virtualisation.oci-containers.containers.${serviceName} = { #image = "ghcr.io/berriai/litellm:v1.78.5-stable"; - image = "docker.litellm.ai/berriai/litellm:v1.81.9-stable"; + image = "docker.litellm.ai/berriai/litellm:v1.81.12-stable"; ports = ["127.0.0.1:${toString servicePort}:4000"]; environmentFiles = [config.age.secrets.litellm-env.path]; environment = { diff --git a/hosts/AZ-PRM-1/services/containers/baserow.nix b/hosts/AZ-PRM-1/services/containers/baserow.nix deleted file mode 100644 index b3d871d..0000000 --- a/hosts/AZ-PRM-1/services/containers/baserow.nix +++ /dev/null @@ -1,26 +0,0 @@ -{config, ...}: { - virtualisation.oci-containers.containers."baserow" = { - image = "docker.io/baserow/baserow:2.0.6"; - environmentFiles = [config.age.secrets.baserow-env.path]; - ports = ["127.0.0.1:3032:80"]; - volumes = ["baserow_data:/baserow/data"]; - extraOptions = ["--add-host=postgres:10.89.0.1" "--ip=10.89.0.11" "--network=web"]; - }; - # Traefik configuration specific to baserow - services.traefik.dynamicConfigOptions.http = { - services.baserow.loadBalancer.servers = [ - { - url = "http://localhost:3032/"; - } - ]; - - routers.baserow = { - rule = "Host(`db.i.az-intec.com`)"; - tls = { - certResolver = "ionos"; - }; - service = "baserow"; - entrypoints = "websecure"; - }; - }; -} diff --git a/hosts/AZ-PRM-1/services/default.nix b/hosts/AZ-PRM-1/services/default.nix index a157248..7dfcd69 100644 --- a/hosts/AZ-PRM-1/services/default.nix +++ b/hosts/AZ-PRM-1/services/default.nix @@ -1,8 +1,7 @@ { imports = [ - ./n8n.nix + # ./n8n.nix ./postgres.nix - ./traefik.nix - ./vaultwarden.nix + # ./traefik.nix ]; } diff --git a/hosts/AZ-PRM-1/services/vaultwarden.nix b/hosts/AZ-PRM-1/services/vaultwarden.nix deleted file mode 100644 index 36576c0..0000000 --- a/hosts/AZ-PRM-1/services/vaultwarden.nix +++ /dev/null @@ -1,29 +0,0 @@ -{config, ...}: { - services.vaultwarden = { - enable = true; - backupDir = "/var/backup/vaultwarden"; - config = { - ROCKET_ADDRESS = "127.0.0.1"; - ROCKET_PORT = 3030; - }; - environmentFile = "${config.age.secrets.vaultwarden-env.path}"; - }; - - # Traefik configuration for headscale - services.traefik.dynamicConfigOptions.http = { - services.vaultwarden.loadBalancer.servers = [ - { - url = "http://localhost:3030/"; - } - ]; - - routers.vaultwarden = { - rule = "Host(`pw.i.az-intec.com`)"; - tls = { - certResolver = "ionos"; - }; - service = "vaultwarden"; - entrypoints = "websecure"; - }; - }; -}