mirror of
https://git.sr.ht/~rouven/nixos-config
synced 2024-11-15 05:13:10 +01:00
adguard + nextcloud: remove
This commit is contained in:
parent
a3b8f97208
commit
81d601608d
12
flake.lock
12
flake.lock
|
@ -179,11 +179,11 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1700087144,
|
"lastModified": 1700118404,
|
||||||
"narHash": "sha256-LJP1RW0hKNWmv2yRhnjkUptMXInKpn/rV6V6ofuZkHU=",
|
"narHash": "sha256-XkqpZpVoy1FV7UbiLkP+fQxxv/6KnwLYkFEHgE8z2IQ=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "ab1459a1fb646c40419c732d05ec0bf2416d4506",
|
"rev": "c1a033122df8a3c74fda3780c83a104a7d60873c",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -309,11 +309,11 @@
|
||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1699781429,
|
"lastModified": 1699963925,
|
||||||
"narHash": "sha256-UYefjidASiLORAjIvVsUHG6WBtRhM67kTjEY4XfZOFs=",
|
"narHash": "sha256-LE7OV/SwkIBsCpAlIPiFhch/J+jBDGEZjNfdnzCnCrY=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "e44462d6021bfe23dfb24b775cc7c390844f773d",
|
"rev": "bf744fe90419885eefced41b3e5ae442d732712d",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|
|
@ -4,13 +4,11 @@
|
||||||
[
|
[
|
||||||
# Include the results of the hardware scan.
|
# Include the results of the hardware scan.
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
# ./modules/adguard
|
|
||||||
./modules/networks
|
./modules/networks
|
||||||
./modules/backup
|
./modules/backup
|
||||||
./modules/grafana
|
./modules/grafana
|
||||||
./modules/prometheus
|
./modules/prometheus
|
||||||
./modules/matrix
|
./modules/matrix
|
||||||
./modules/nextcloud
|
|
||||||
./modules/seafile
|
./modules/seafile
|
||||||
./modules/uptime-kuma
|
./modules/uptime-kuma
|
||||||
./modules/vaultwarden
|
./modules/vaultwarden
|
||||||
|
|
|
@ -1,10 +0,0 @@
|
||||||
{ ... }:
|
|
||||||
{
|
|
||||||
networking.firewall.allowedTCPPorts = [ 53 ];
|
|
||||||
networking.firewall.allowedUDPPorts = [ 53 ];
|
|
||||||
services.adguardhome = {
|
|
||||||
enable = true;
|
|
||||||
openFirewall = true;
|
|
||||||
settings.bind_port = 3000;
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,51 +0,0 @@
|
||||||
{ config, pkgs, ... }:
|
|
||||||
let
|
|
||||||
domain = "nextcloud.${config.networking.domain}";
|
|
||||||
in
|
|
||||||
{
|
|
||||||
age.secrets = {
|
|
||||||
"nextcloud/adminpass" = {
|
|
||||||
file = ../../../../secrets/nuc/nextcloud/adminpass.age;
|
|
||||||
owner = "nextcloud";
|
|
||||||
group = "nextcloud";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services = {
|
|
||||||
nextcloud = {
|
|
||||||
enable = true;
|
|
||||||
package = pkgs.nextcloud27; # Use current latest nextcloud package
|
|
||||||
hostName = "${domain}";
|
|
||||||
https = true; # Use https for all urls
|
|
||||||
config = {
|
|
||||||
dbtype = "pgsql";
|
|
||||||
dbuser = "nextcloud";
|
|
||||||
dbhost = "/run/postgresql";
|
|
||||||
dbname = "nextcloud";
|
|
||||||
adminpassFile = config.age.secrets."nextcloud/adminpass".path;
|
|
||||||
adminuser = "rouven";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Enable ACME and force SSL
|
|
||||||
nginx = {
|
|
||||||
recommendedProxySettings = true;
|
|
||||||
virtualHosts = {
|
|
||||||
"${domain}" = {
|
|
||||||
enableACME = true;
|
|
||||||
forceSSL = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# ensure that postgres is running *before* running the setup
|
|
||||||
systemd.services."nextcloud-setup" = {
|
|
||||||
requires = [ "postgresql.service" ];
|
|
||||||
after = [ "postgresql.service" ];
|
|
||||||
};
|
|
||||||
systemd.services."nextcloud-cron" = {
|
|
||||||
requires = [ "postgresql.service" ];
|
|
||||||
after = [ "postgresql.service" ];
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -199,6 +199,7 @@
|
||||||
cups
|
cups
|
||||||
agenix.packages.x86_64-linux.default
|
agenix.packages.x86_64-linux.default
|
||||||
mosh
|
mosh
|
||||||
|
qpwgraph
|
||||||
];
|
];
|
||||||
|
|
||||||
services.mysql = {
|
services.mysql = {
|
||||||
|
|
|
@ -26,15 +26,6 @@ in
|
||||||
|
|
||||||
pww = callPackage ../pkgs/pww { };
|
pww = callPackage ../pkgs/pww { };
|
||||||
|
|
||||||
# fix pairing
|
|
||||||
AusweisApp2 = prev.AusweisApp2.overrideAttrs (_: {
|
|
||||||
patches = [
|
|
||||||
(fetchpatch {
|
|
||||||
url = "https://patch-diff.githubusercontent.com/raw/Governikus/AusweisApp2/pull/47.patch";
|
|
||||||
hash = "sha256-98ttPVOFHsxmvUFgNpxW0/C9PK64dUwmTxrNnXefkKo=";
|
|
||||||
})
|
|
||||||
];
|
|
||||||
});
|
|
||||||
|
|
||||||
tpm2-pkcs11 = prev.tpm2-pkcs11.overrideAttrs (_: {
|
tpm2-pkcs11 = prev.tpm2-pkcs11.overrideAttrs (_: {
|
||||||
configureFlags = [ "--with-fapi=no" ];
|
configureFlags = [ "--with-fapi=no" ];
|
||||||
|
|
|
@ -12,7 +12,7 @@ buildGoModule rec {
|
||||||
|
|
||||||
nativeBuildInputs = [ makeWrapper ];
|
nativeBuildInputs = [ makeWrapper ];
|
||||||
|
|
||||||
vendorSha256 = "sha256-3PnXB8AfZtgmYEPJuh0fwvG38dtngoS/lxyx3H+rvFs=";
|
vendorHash = "sha256-3PnXB8AfZtgmYEPJuh0fwvG38dtngoS/lxyx3H+rvFs=";
|
||||||
postInstall = ''
|
postInstall = ''
|
||||||
wrapProgram $out/bin/${pname} \
|
wrapProgram $out/bin/${pname} \
|
||||||
--prefix PATH : "${lib.makeBinPath [ playerctl ]}"
|
--prefix PATH : "${lib.makeBinPath [ playerctl ]}"
|
||||||
|
|
|
@ -14,7 +14,6 @@ in
|
||||||
"secrets/thinkpad/borg/key.age".publicKeys = [ rouven thinkpad ];
|
"secrets/thinkpad/borg/key.age".publicKeys = [ rouven thinkpad ];
|
||||||
|
|
||||||
# nuc
|
# nuc
|
||||||
"secrets/nuc/nextcloud/adminpass.age".publicKeys = [ rouven nuc ];
|
|
||||||
"secrets/nuc/matrix/shared.age".publicKeys = [ rouven nuc ];
|
"secrets/nuc/matrix/shared.age".publicKeys = [ rouven nuc ];
|
||||||
"secrets/nuc/matrix/sync.age".publicKeys = [ rouven nuc ];
|
"secrets/nuc/matrix/sync.age".publicKeys = [ rouven nuc ];
|
||||||
"secrets/nuc/vaultwarden.age".publicKeys = [ rouven nuc ];
|
"secrets/nuc/vaultwarden.age".publicKeys = [ rouven nuc ];
|
||||||
|
|
|
@ -1,10 +0,0 @@
|
||||||
age-encryption.org/v1
|
|
||||||
-> ssh-ed25519 uWbAHQ 04CqSy3PpePLQ60Ky55Bxtytnj4t+Wz5X9qZxaSWyDs
|
|
||||||
QM8jHjiXvx70ZokFiuwSnkfI3De3t3cQwFf2zezYc74
|
|
||||||
-> ssh-ed25519 2TRdXg wUXwM0JL1YjeQvIUGzoZhhQ4WBu9HwmMbOfsTj918E0
|
|
||||||
XlNUno46LV1LD1ni3DAhDL+MwBUtZYUEjgMWjiCy03Y
|
|
||||||
-> _yK#P&-grease x|25 "[ Eg]|<,
|
|
||||||
3fuuF3W/4MbQthuHpYwMSdh0QEgIi9OILjM3oXyNzVjbPdN99NvEJ+nYYuh3FDGP
|
|
||||||
vp02QsTygDBMaZBDtSBYGdQ
|
|
||||||
--- CvrR1mOa9m1ovX66PoB/1qi+fqMCyt4/6jrdnsoZKuo
|
|
||||||
1*JùÒ[LÇøt˜i5å§fbŒ[B£Ä%èÎ 1¡§35ÙÜÅÖijPÈ#ÿÉqšs&ˆ,<2C><07>”€
|
|
|
@ -83,7 +83,7 @@ in
|
||||||
gpg.key = gpg-default-key;
|
gpg.key = gpg-default-key;
|
||||||
realName = "Rouven Seifert";
|
realName = "Rouven Seifert";
|
||||||
userName = "rose159e";
|
userName = "rose159e";
|
||||||
passwordCommand = "${pkgs.coreutils}/bin/cat $XDG_RUNTIME_DIR/secrets/email/tu-dresden";
|
passwordCommand = "${pkgs.coreutils}/bin/cat ${config.age.secrets."mail/tu-dresden".path}";
|
||||||
imap = {
|
imap = {
|
||||||
host = "msx.tu-dresden.de";
|
host = "msx.tu-dresden.de";
|
||||||
port = 993;
|
port = 993;
|
||||||
|
@ -164,7 +164,7 @@ in
|
||||||
gpg.key = gpg-default-key;
|
gpg.key = gpg-default-key;
|
||||||
realName = "Rouven Seifert";
|
realName = "Rouven Seifert";
|
||||||
userName = "rouven.seifert";
|
userName = "rouven.seifert";
|
||||||
passwordCommand = "${pkgs.coreutils}/bin/cat $XDG_RUNTIME_DIR/secrets/email/ifsr";
|
passwordCommand = "${pkgs.coreutils}/bin/cat ${config.age.secrets."mail/ifsr".path}";
|
||||||
imap = {
|
imap = {
|
||||||
host = "mail.ifsr.de";
|
host = "mail.ifsr.de";
|
||||||
port = 993;
|
port = 993;
|
||||||
|
@ -195,7 +195,7 @@ in
|
||||||
"r5@agdsn.de"
|
"r5@agdsn.de"
|
||||||
"rouven.seifert@agdsn.de"
|
"rouven.seifert@agdsn.de"
|
||||||
];
|
];
|
||||||
passwordCommand = "${pkgs.coreutils}/bin/cat $XDG_RUNTIME_DIR/secrets/email/agdsn";
|
passwordCommand = "${pkgs.coreutils}/bin/cat ${config.age.secrets."mail/agdsn".path}";
|
||||||
imap = {
|
imap = {
|
||||||
host = "imap.agdsn.de";
|
host = "imap.agdsn.de";
|
||||||
port = 993;
|
port = 993;
|
||||||
|
@ -221,7 +221,7 @@ in
|
||||||
address = "seifertrouven@gmail.com";
|
address = "seifertrouven@gmail.com";
|
||||||
realName = "Rouven Seifert";
|
realName = "Rouven Seifert";
|
||||||
userName = address;
|
userName = address;
|
||||||
passwordCommand = "${pkgs.coreutils}/bin/cat $XDG_RUNTIME_DIR/secrets/email/google";
|
passwordCommand = "${pkgs.coreutils}/bin/cat ${config.age.secrets."mail/google".path}";
|
||||||
imap = {
|
imap = {
|
||||||
host = "imap.gmail.com";
|
host = "imap.gmail.com";
|
||||||
port = 993;
|
port = 993;
|
||||||
|
|
Loading…
Reference in a new issue