chore: netbird update AZ-CLD-1

This commit is contained in:
2026-03-04 09:13:02 +01:00
parent bda2755acc
commit e8d8adb626
10 changed files with 154 additions and 24 deletions

42
flake.lock generated
View File

@@ -24,11 +24,11 @@
"agents": { "agents": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1771432333, "lastModified": 1772563257,
"narHash": "sha256-IkfbQQahxwMBRRUl+FKc03pxSZO1MX2kRxBuCqKuTD4=", "narHash": "sha256-hp6Q8TVP9xZeBFgZm51ndCacmVZxucZzLtj12pzD6c0=",
"ref": "refs/heads/master", "ref": "refs/heads/master",
"rev": "1bc81fb38c20154f0dd77f7da9b9d95439d8d873", "rev": "39ac89f388532e9a7629808037791c64cd5fc13c",
"revCount": 62, "revCount": 63,
"type": "git", "type": "git",
"url": "https://code.m3ta.dev/m3tam3re/AGENTS" "url": "https://code.m3ta.dev/m3tam3re/AGENTS"
}, },
@@ -322,11 +322,11 @@
"openspec": "openspec" "openspec": "openspec"
}, },
"locked": { "locked": {
"lastModified": 1772041931, "lastModified": 1772589687,
"narHash": "sha256-NQOQrGtR1EXM33JSVUt5Sz5MburSxWU7t9iZrJk9gQo=", "narHash": "sha256-lLNDrdU0kQE6E2LHJP0VUTFqH3SzTciCsmTIxsNXuOE=",
"ref": "refs/heads/master", "ref": "refs/heads/master",
"rev": "e22774539ac26071b1bc0e6e8272df3c3ec732f2", "rev": "3ebda192e9606565d806002a92c3f53f852550d3",
"revCount": 132, "revCount": 146,
"type": "git", "type": "git",
"url": "https://code.m3ta.dev/m3tam3re/nixpkgs" "url": "https://code.m3ta.dev/m3tam3re/nixpkgs"
}, },
@@ -516,11 +516,11 @@
}, },
"nixpkgs-master": { "nixpkgs-master": {
"locked": { "locked": {
"lastModified": 1771574031, "lastModified": 1772587492,
"narHash": "sha256-yKeO6auxI8PrBZOdt/LVRDm+bh939E60l4iZKo1ExeA=", "narHash": "sha256-eUR2gs5CHnsWqjLbQ57FzBYyMAL3b7Y7P7VPJgJ1z5s=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "ab43bb60c7d266a4a285e863d89c1e69cd124dd5", "rev": "5f4ff3b0be7289f151c703b29d41ca0e0907bde2",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -580,11 +580,11 @@
}, },
"nixpkgs_3": { "nixpkgs_3": {
"locked": { "locked": {
"lastModified": 1771369470, "lastModified": 1772542754,
"narHash": "sha256-0NBlEBKkN3lufyvFegY4TYv5mCNHbi5OmBDrzihbBMQ=", "narHash": "sha256-WGV2hy+VIeQsYXpsLjdr4GvHv5eECMISX1zKLTedhdg=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "0182a361324364ae3f436a63005877674cf45efb", "rev": "8c809a146a140c5c8806f13399592dbcb1bb5dc4",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -687,16 +687,16 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1772031356, "lastModified": 1772572115,
"narHash": "sha256-PA3/P5nUDlrKD6xjDXFoNNF8U2Wzz2JeeY4H+CzWWgY=", "narHash": "sha256-9bgjdtghbKUvFJp+fuXlvP2Kp/KNnytCfGyhfz8x3+g=",
"owner": "anomalyco", "owner": "anomalyco",
"repo": "opencode", "repo": "opencode",
"rev": "de2bc25677b419d2af0da8b6a24a05d3f22b67a8", "rev": "e66d829d1875f5a5fd8b0bfcab69cacb48b11b5d",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "anomalyco", "owner": "anomalyco",
"ref": "v1.2.14", "ref": "v1.2.16",
"repo": "opencode", "repo": "opencode",
"type": "github" "type": "github"
} }
@@ -732,11 +732,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1771554066, "lastModified": 1772182342,
"narHash": "sha256-nQPz81Um+4zhEeNz1o55Ix1DoBEM3CxeABAmOJkgIac=", "narHash": "sha256-9Q0iUyZGcDPLdgvnrBN3GumV8g9akV8TFb8bFkD1yYs=",
"owner": "Fission-AI", "owner": "Fission-AI",
"repo": "OpenSpec", "repo": "OpenSpec",
"rev": "4ba26902dfecf6f54c5a729993e012a57f4e2877", "rev": "afdca0d5dab1aa109cfd8848b2512333ccad60c3",
"type": "github" "type": "github"
}, },
"original": { "original": {

View File

@@ -5,7 +5,6 @@
home.packages = with pkgs; [ home.packages = with pkgs; [
agenix-cli agenix-cli
alejandra alejandra
beads
bc bc
bun bun
devpod devpod

View File

@@ -30,6 +30,43 @@
extensions = [".nix"]; extensions = [".nix"];
}; };
}; };
provider = {
litellm = {
npm = "@ai-sdk/openai-compatible";
name = "LiteLLM (AZ-Gruppe)";
options.baseURL = "https://llm.az-gruppe.com/v1";
models = {
"gpt-5.2" = {
name = "GPT-5.2";
limit = {
context = 400000;
output = 128000;
};
};
"gpt-5.3-codex" = {
name = "GPT-5.3 Codex";
limit = {
context = 400000;
output = 128000;
};
};
"claude-sonnet-4-6" = {
name = "Claude Sonnet 4.6";
limit = {
context = 200000;
output = 64000;
};
};
"claude-opus-4-6" = {
name = "Claude Opus 4.6";
limit = {
context = 200000;
output = 128000;
};
};
};
};
};
mcp = { mcp = {
Ref = { Ref = {
type = "local"; type = "local";

View File

@@ -93,6 +93,7 @@
# eww # eww
# firefox-devedition # firefox-devedition
file-roller file-roller
kdotool
ksnip ksnip
hyprpaper-random hyprpaper-random
hyprpanel hyprpanel

View File

@@ -6,6 +6,7 @@
./gotenberg.nix ./gotenberg.nix
./metabase.nix ./metabase.nix
./n8n.nix ./n8n.nix
./netbird.nix
./ntfy.nix ./ntfy.nix
./outline.nix ./outline.nix
./postgres.nix ./postgres.nix

View File

@@ -0,0 +1,31 @@
{pkgs, ...}: {
services.netbird = {
enable = true;
package = pkgs.unstable.netbird;
};
systemd.services.netbird = {
environment = {
NB_DISABLE_SSH_CONFIG = "true";
};
path = [
pkgs.shadow
pkgs.util-linux
];
};
programs.ssh.extraConfig = ''
Match exec "${pkgs.netbird}/bin/netbird ssh detect %h %p"
PreferredAuthentications password,publickey,keyboard-interactive
PasswordAuthentication yes
PubkeyAuthentication yes
BatchMode no
ProxyCommand ${pkgs.netbird}/bin/netbird ssh proxy %h %p
StrictHostKeyChecking no
UserKnownHostsFile /dev/null
CheckHostIP no
LogLevel ERROR
'';
networking.firewall.checkReversePath = "loose";
}

View File

@@ -15,7 +15,7 @@
]; ];
routers.n8n = { routers.n8n = {
rule = "Host(`wf.i.az-intec.com`)"; rule = "Host(`wf.l.az-gruppe.com`)";
tls = { tls = {
certResolver = "ionos"; certResolver = "ionos";
}; };

View File

@@ -0,0 +1,28 @@
{pkgs, ...}: {
services.netbird.enable = true;
systemd.services.netbird = {
environment = {
NB_DISABLE_SSH_CONFIG = "true";
};
path = [
pkgs.shadow
pkgs.util-linux
];
};
programs.ssh.extraConfig = ''
Match exec "${pkgs.netbird}/bin/netbird ssh detect %h %p"
PreferredAuthentications password,publickey,keyboard-interactive
PasswordAuthentication yes
PubkeyAuthentication yes
BatchMode no
ProxyCommand ${pkgs.netbird}/bin/netbird ssh proxy %h %p
StrictHostKeyChecking no
UserKnownHostsFile /dev/null
CheckHostIP no
LogLevel ERROR
'';
networking.firewall.checkReversePath = "loose";
}

View File

@@ -1,12 +1,17 @@
{ {pkgs, ...}: {
imports = [ imports = [
# ./ad.nix # ./ad.nix
./mem0.nix ./mem0.nix
./n8n.nix ./n8n.nix
./netbird.nix
./sound.nix ./sound.nix
./udev.nix ./udev.nix
]; ];
services = { services = {
espanso = {
enable = true;
package = pkgs.espanso-wayland;
};
hypridle.enable = true; hypridle.enable = true;
printing.enable = true; printing.enable = true;
gvfs.enable = true; gvfs.enable = true;

View File

@@ -0,0 +1,28 @@
{pkgs, ...}: {
services.netbird.enable = true;
systemd.services.netbird = {
environment = {
NB_DISABLE_SSH_CONFIG = "true";
};
path = [
pkgs.shadow
pkgs.util-linux
];
};
programs.ssh.extraConfig = ''
Match exec "${pkgs.netbird}/bin/netbird ssh detect %h %p"
PreferredAuthentications password,publickey,keyboard-interactive
PasswordAuthentication yes
PubkeyAuthentication yes
BatchMode no
ProxyCommand ${pkgs.netbird}/bin/netbird ssh proxy %h %p
StrictHostKeyChecking no
UserKnownHostsFile /dev/null
CheckHostIP no
LogLevel ERROR
'';
networking.firewall.checkReversePath = "loose";
}