No description
Find a file
Dominik Polakovics bfae290927 feat(web-arm): add AVIF image support to cloonar.dev
Implement AVIF image content negotiation with WebP fallback for
cloonar.dev website. Browser will receive AVIF if supported and
available, otherwise WebP, falling back to original JPEG/PNG.

- Add AVIF-first content negotiation in image location block
- Maintain existing WebP fallback logic
- Include .avif in long-term cache headers (365d)
- Add Vary: Accept header for proper CDN/browser caching

AVIF files should be placed at /avif/$request_uri.avif to be served.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-22 23:55:08 +02:00
.github feat: add copilot instructions symlink 2025-06-22 14:26:57 +02:00
.roo/rules feat: add metrics exporters for Dovecot and Postfix, update Signal execution command, and improve configuration management 2025-06-03 23:06:40 +02:00
esphome feat: esphome updates 2025-09-29 15:59:12 +02:00
hosts feat(web-arm): add AVIF image support to cloonar.dev 2025-10-22 23:55:08 +02:00
iso feat: change iso to btrfs 2025-08-07 12:08:19 +02:00
raspberry Add a11ywatch and related configurations for Podman and Nginx 2025-05-29 00:10:07 +02:00
raspberry-new Add a11ywatch and related configurations for Podman and Nginx 2025-05-29 00:10:07 +02:00
scripts feat: add update-keys script 2025-10-14 20:02:42 +02:00
utils fix: use autoupgrade only on AC 2025-10-19 13:31:31 +02:00
.chatgpt_config.yaml add host to wireguard 2025-02-04 11:51:20 +01:00
.gitignore add host to wireguard 2025-02-04 11:51:20 +01:00
.sops.yaml feat: add attic cache 2025-10-14 22:30:20 +02:00
AGENTS.md feat: add AGENTS.md 2025-10-08 22:14:09 +02:00
buchhaltung.md changes 2024-12-21 13:47:00 +01:00
config.sh initial home assistant change 2023-12-09 15:16:49 +01:00
fleet.nix Update fleet.nix 2025-10-08 13:53:13 +02:00
fömi-tool.md changes 2024-10-16 20:24:40 +02:00
gpd-win-4.md many changes 2025-02-23 16:00:33 +01:00
README.md feat: update readme to new nixos-infect channel 2025-10-22 15:24:34 +02:00
shell.nix fix: disable not working and not needed mcps 2025-06-22 14:26:07 +02:00
todos.md fix: fivefilters https 2025-10-14 14:13:37 +02:00

1. Installation of new servers

  • install ubuntu 20.04
  • get age key from SSH
curl https://raw.githubusercontent.com/elitak/nixos-infect/master/nixos-infect | PROVIDER=hetznercloud NIX_CHANNEL=nixos-25.05 bash 2>&1 | tee /tmp/infect.log
nix-shell -p ssh-to-age --run 'ssh-keyscan install.cloonar.com | ssh-to-age'
  • fix secrets files
nix-shell -p sops --run "sops updatekeys -y secrets.yaml"
  • run install command
./install.sh example.com

2. Sops command

nix-shell -p sops --run 'sops hosts/cloonar.com/secrets.yaml'

2. Web Server specific

  • change the permissions for /var/www
chown nginx:nginx /var/www
chmod 755 /var/www

3. Net data

  • Netdata data page: Add a node
  • Once you got the token, we will claim it to associate it to a node:
  • create /var/lib/netdata/cloud.d/token and write the token in it
  • run nix-shell -p netdata --run "netdata-claim.sh -id=$(uuidgen)" as root
  • your node should be registered in Netdata cloud

Borg Backup

add ssh key to hetzner cat ~/.ssh/id_rsa.pub | ssh -p23 u149513-subx@u149513-subx.your-backup.de install-ssh-key

4. Add new Host

sftp host.cloonar.com@git.cloonar.com:/config/bootstrap.sh ./

5. Yubikey

ykman fido access change-pin --new-pin 654321
systemd-cryptenroll --fido2-device=auto --fido2-with-client-pin=yes /dev/nvme0n1p2

6. Wireguard

wg genkey | (umask 077 && tee privatekey) | wg pubkey > publickey
umask 0077; wg genpsk > psk

7. Hash for new packages

nix hash to-sri --type sha256 $(nix-prefetch-url https://tar.gz)

8. Fingerprint Reader Setup (e.g., on Framework Laptop with Goodix reader)

This section assumes you have configured fingerprint support in your NixOS configuration, for example, by creating and importing a module like hosts/nb/modules/fingerprint.nix with the following content:

# hosts/nb/modules/fingerprint.nix
{ config, pkgs, ... }:

{
  services.fprintd.enable = true;

  security.pam.services.login.fprintAuth = true;
  security.pam.services.sudo.fprintAuth = true;
  # Add other services like swaylock if needed
  # security.pam.services.swaylock.fprintAuth = true;
}

After rebuilding your NixOS configuration (sudo nixos-rebuild switch), you can enroll fingerprints for a user.

Enrolling Fingerprints

To enroll a fingerprint for the current user:

fprintd-enroll

Or for a specific user (e.g., dominik):

fprintd-enroll dominik

Follow the on-screen prompts to scan your fingerprint multiple times.

Verifying Enrollment

You can verify enrolled fingerprints:

fprintd-verify

Listing Enrolled Fingerprints

To see which fingers are enrolled for the current user:

fprintd-list $(whoami)

Or for a specific user:

fprintd-list dominik

Deleting Fingerprints

To delete all fingerprints for the current user:

fprintd-delete $(whoami)

Or for a specific user:

fprintd-delete dominik

You can also delete specific fingerprints by their ID if you know it.