{ pkgs, pkgs-unstable, asahi-firmware, ... }: { config, ... }: { environment.systemPackages = (with pkgs-unstable; [ renoise signal-desktop wireguard-tools cifs-utils sshfs ]) ++ (with pkgs; [ prismlauncher ]); services.mysql = { enable = true; package = pkgs.mariadb; dataDir = "/var/lib/mysql"; settings = { mysqld = { bind_address = "127.0.0.1"; # socket = "/tmp/mariadb.sock"; }; }; ensureDatabases = [ "bnuybase" ]; ensureUsers = [ { name = "xenia"; ensurePermissions = { "bnuybase.*" = "ALL PRIVILEGES"; }; } ]; }; networking.firewall.allowedUDPPorts = [ 51821 51820 ]; networking.wireguard = { enable = true; interfaces.wg0 = { ips = [ "192.168.69.254/32" ]; listenPort = 51821; privateKeyFile = "/home/xenia/wireguard-keys/eta.private"; peers = [ { publicKey = "XfHU29ij76y4TB8P/QJyn1JnTl9tvxO77IGVmM6p+ic="; allowedIPs = [ "10.30.0.0/16" "10.250.0.0/16" "10.254.0.0/16" "192.168.30.0/24" "192.168.40.0/24" "192.168.50.0/24" "192.168.51.0/24" "192.168.250.0/24" ]; endpoint = "129.16.13.37:13231"; persistentKeepalive = 25; } ]; }; interfaces.wg-bnuy = { ips = [ "10.100.1.1/16" ]; listenPort = 51820; privateKeyFile = "/home/xenia/wireguard-keys/local-network.private"; peers = [ { publicKey = "Qa3saFnPTlGbxLnoyhsczczBMUGA8F/tlGsH8wnMTWY="; # https://github.com/xeniagda/cluster-config/tree/main/keys/catboy-cafe.public allowedIPs = [ "10.100.0.0/16" ]; endpoint = "95.80.26.48:51820"; persistentKeepalive = 25; } ]; }; }; services.pipewire.wireplumber.extraConfig."10-bluez" = { "monitor.bluez.properties" = { "bluez5.enable-sbc-xq" = true; "bluez5.enable-msbc" = false; "bluez5.enable-hw-volume" = true; "bluez5.codecs" = [ "sbc" "sbc_xq" "aac" ]; }; }; fileSystems."/mnt/eta" = { device = "//10.30.12.6/users"; fsType = "cifs"; options = [ "username=eta" "password=eta" "uid=1000" "gid=1000" "x-systemd.automount" "noauto" "x-systemd.idle-timeout=60" ]; }; }