Compare commits

...

2 commits

Author SHA1 Message Date
Rouven Seifert 3accb7c392 seafile: remove 2024-08-13 11:41:03 +02:00
Rouven Seifert f7e581f792 updates and fixes 2024-08-13 11:38:01 +02:00
18 changed files with 75 additions and 187 deletions

View file

@ -12,11 +12,11 @@
"systems": "systems" "systems": "systems"
}, },
"locked": { "locked": {
"lastModified": 1722339003, "lastModified": 1723293904,
"narHash": "sha256-ZeS51uJI30ehNkcZ4uKqT4ZDARPyqrHADSKAwv5vVCU=", "narHash": "sha256-b+uqzj+Wa6xgMS9aNbX4I+sXeb5biPDi39VgvSFqFvU=",
"owner": "ryantm", "owner": "ryantm",
"repo": "agenix", "repo": "agenix",
"rev": "3f1dae074a12feb7327b4bf43cbac0d124488bb7", "rev": "f6291c5935fdc4e0bef208cfc0dcab7e3f7a1c41",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -32,9 +32,7 @@
"flake-parts": "flake-parts", "flake-parts": "flake-parts",
"flake-utils": "flake-utils", "flake-utils": "flake-utils",
"napalm": "napalm", "napalm": "napalm",
"nixpkgs": [ "nixpkgs": "nixpkgs",
"nixpkgs"
],
"poetry2nix": "poetry2nix" "poetry2nix": "poetry2nix"
}, },
"locked": { "locked": {
@ -299,11 +297,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1723015306, "lastModified": 1723399884,
"narHash": "sha256-jQnFEtH20/OsDPpx71ntZzGdRlpXhUENSQCGTjn//NA=", "narHash": "sha256-97wn0ihhGqfMb8WcUgzzkM/TuAxce2Gd20A8oiruju4=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "b3d5ea65d88d67d4ec578ed11d4d2d51e3de525e", "rev": "086f619dd991a4d355c07837448244029fc2d9ab",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -447,11 +445,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1722740924, "lastModified": 1723352546,
"narHash": "sha256-UQPgA5d8azLZuDHZMPmvDszhuKF1Ek89SrTRtqsQ4Ss=", "narHash": "sha256-WTIrvp0yV8ODd6lxAq4F7EbrPQv0gscBnyfn559c3k8=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nix-index-database", "repo": "nix-index-database",
"rev": "97ca0a0fca0391de835f57e44f369a283e37890f", "rev": "ec78079a904d7d55e81a0468d764d0fffb50ac06",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -462,17 +460,18 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1722813957, "lastModified": 1720542800,
"narHash": "sha256-IAoYyYnED7P8zrBFMnmp7ydaJfwTnwcnqxUElC1I26Y=", "narHash": "sha256-ZgnNHuKV6h2+fQ5LuqnUaqZey1Lqqt5dTUAiAnqH0QQ=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "cb9a96f23c491c081b38eab96d22fa958043c9fa", "rev": "feb2849fdeb70028c70d73b848214b00d324a497",
"type": "github" "type": "github"
}, },
"original": { "original": {
"id": "nixpkgs", "owner": "NixOS",
"ref": "nixos-unstable", "ref": "nixos-unstable",
"type": "indirect" "repo": "nixpkgs",
"type": "github"
} }
}, },
"nixpkgs-lib": { "nixpkgs-lib": {
@ -518,6 +517,21 @@
"type": "github" "type": "github"
} }
}, },
"nixpkgs_2": {
"locked": {
"lastModified": 1723362943,
"narHash": "sha256-dFZRVSgmJkyM0bkPpaYRtG/kRMRTorUIDj8BxoOt1T4=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "a58bc8ad779655e790115244571758e8de055e3d",
"type": "github"
},
"original": {
"id": "nixpkgs",
"ref": "nixos-unstable",
"type": "indirect"
}
},
"pfersel": { "pfersel": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
@ -623,7 +637,7 @@
"lanzaboote": "lanzaboote", "lanzaboote": "lanzaboote",
"nix-colors": "nix-colors", "nix-colors": "nix-colors",
"nix-index-database": "nix-index-database", "nix-index-database": "nix-index-database",
"nixpkgs": "nixpkgs", "nixpkgs": "nixpkgs_2",
"pfersel": "pfersel", "pfersel": "pfersel",
"purge": "purge", "purge": "purge",
"trucksimulatorbot": "trucksimulatorbot" "trucksimulatorbot": "trucksimulatorbot"

View file

@ -27,7 +27,7 @@
nix-colors.url = "github:Misterio77/nix-colors"; nix-colors.url = "github:Misterio77/nix-colors";
authentik = { authentik = {
url = "github:nix-community/authentik-nix"; url = "github:nix-community/authentik-nix";
inputs.nixpkgs.follows = "nixpkgs"; # inputs.nixpkgs.follows = "nixpkgs";
}; };
purge = { purge = {

View file

@ -12,7 +12,6 @@
./modules/matrix ./modules/matrix
./modules/mautrix-telegram ./modules/mautrix-telegram
./modules/monitoring ./modules/monitoring
./modules/seafile
./modules/torrent ./modules/torrent
./modules/vaultwarden ./modules/vaultwarden
./modules/caddy ./modules/caddy

View file

@ -1,46 +0,0 @@
{ config, pkgs, ... }:
let
domain = "seafile.${config.networking.domain}";
in
{
services.seafile = {
enable = true;
adminEmail = "admin@rfive.de";
initialAdminPassword = "unused garbage";
ccnetSettings.General.SERVICE_URL = "https://${domain}";
ccnetSettings.General.FILE_SERVER_ROOT = "https://${domain}/seafhttp";
seafileSettings.fileserver.port = 8083;
seahubExtraConf = ''
ENABLE_OAUTH = True
OAUTH_ENABLE_INSECURE_TRANSPORT = True
OAUTH_CLIENT_ID = "seafile"
with open('/var/lib/seafile/.oidcSecret') as f:
OAUTH_CLIENT_SECRET = f.readline().rstrip()
OAUTH_REDIRECT_URL = 'https://seafile.rfive.de/oauth/callback/'
OAUTH_PROVIDER_DOMAIN = 'seafile.rfive.de'
OAUTH_AUTHORIZATION_URL = 'https://auth.rfive.de/application/o/authorize/'
OAUTH_TOKEN_URL = 'https://auth.rfive.de/application/o/token/'
OAUTH_USER_INFO_URL = 'https://auth.rfive.de/application/o/userinfo/'
OAUTH_SCOPE = [ "openid", "profile", "email"]
OAUTH_ATTRIBUTE_MAP = {
"id": (False, "not used"),
"name": (False, "full name"),
"email": (True, "email"),
}
'';
};
services.caddy.virtualHosts."${domain}".extraConfig = ''
redir /accounts/login /oauth/login
reverse_proxy unix//run/seahub/gunicorn.sock
route /media/* {
root * ${pkgs.seahub}
}
route /seafhttp/* {
uri strip_prefix /seafhttp
reverse_proxy 127.0.0.1:${toString config.services.seafile.seafileSettings.fileserver.port}
}
'';
}

View file

@ -107,6 +107,7 @@
services = { services = {
# envfs.enable = true; #usr/bin fixes
blueman.enable = true; # bluetooth blueman.enable = true; # bluetooth
devmon.enable = true; # automount stuff devmon.enable = true; # automount stuff
upower.enable = true; upower.enable = true;

View file

@ -37,7 +37,7 @@
colors.base07 colors.base07
]; ];
}; };
hardware.opengl.extraPackages = with pkgs; [ hardware.graphics.extraPackages = with pkgs; [
intel-compute-runtime intel-compute-runtime
intel-media-driver intel-media-driver
]; ];

View file

@ -66,6 +66,10 @@
authProtocols = [ "SAE" ]; authProtocols = [ "SAE" ];
extraConfig = "disabled=1"; extraConfig = "disabled=1";
}; };
"LKG-Gast" = {
psk = "@LKGDD_GUEST_PSK@";
authProtocols = [ "WPA-PSK" ];
};
"@PIXEL_SSID@" = { "@PIXEL_SSID@" = {
psk = "@PIXEL_PSK@"; psk = "@PIXEL_PSK@";
authProtocols = [ "WPA-PSK" ]; authProtocols = [ "WPA-PSK" ];

View file

@ -15,7 +15,8 @@
configFile.path = config.age.secrets.dyport-auth.path; configFile.path = config.age.secrets.dyport-auth.path;
}; };
# ugly way to add more interfaces # ugly way to add more interfaces
"enp0s13f0u2u1" = enp0s31f6; # "enp0s13f0u2u1" = enp0s31f6;
# "enp0s13f0u3u1" = enp0s31f6;
}; };
wireless.networks = { wireless.networks = {
eduroam = { eduroam = {
@ -59,6 +60,7 @@
password="@AGDSN_AUTH@" password="@AGDSN_AUTH@"
phase2="auth=PAP" phase2="auth=PAP"
''; '';
extraConfig = "disabled=1";
authProtocols = [ "WPA-EAP" ]; authProtocols = [ "WPA-EAP" ];
}; };
agdsn_fritzbox = { agdsn_fritzbox = {
@ -105,6 +107,17 @@
compression = "stateless"; compression = "stateless";
}; };
}; };
iFSR = {
protocol = "anyconnect";
gateway = "vpn2.zih.tu-dresden.de";
user = "rose159e@apb-ifsr-vpn";
passwordFile = config.age.secrets.tud.path;
autoStart = false;
extraOptions = {
authgroup = "A-Tunnel-TU-Networks";
compression = "stateless";
};
};
}; };
}; };
systemd.services = { systemd.services = {

View file

@ -1,10 +1,10 @@
{ pkgs, ... }: { pkgs, ... }:
{ {
# environment.systemPackages = with pkgs; [ cups ]; # environment.systemPackages = with pkgs; [ cups ];
services.avahi = { # services.avahi = {
enable = true; # enable = true;
nssmdns4 = true; # nssmdns4 = true;
}; # };
services.printing = { services.printing = {
enable = true; enable = true;
stateless = true; stateless = true;

View file

@ -45,9 +45,9 @@
}; };
}; };
# broken again # broken again
# services = { services = {
# fprintd.enable = true; # log in using fingerprint fprintd.enable = true; # log in using fingerprint
# }; };
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
agenix.packages.x86_64-linux.default agenix.packages.x86_64-linux.default
tpm2-tools tpm2-tools

View file

@ -1,10 +1,10 @@
{ pkgs, ... }: { pkgs, ... }:
{ {
virtualisation = { virtualisation = {
podman = { # podman = {
enable = true; # enable = true;
defaultNetwork.settings.dns_enabled = true; # defaultNetwork.settings.dns_enabled = true;
}; # };
libvirtd = { libvirtd = {
enable = true; enable = true;
qemu = { qemu = {

View file

@ -2,9 +2,6 @@ _final: prev:
let let
inherit (prev) callPackage; inherit (prev) callPackage;
inherit (prev) fetchFromGitHub; inherit (prev) fetchFromGitHub;
inherit (prev) fetchPypi;
inherit (prev) makeWrapper;
inherit (prev) python3Packages;
in in
{ {
@ -36,80 +33,4 @@ in
gnome-break-timer = callPackage ../pkgs/gnome-break-timer { }; gnome-break-timer = callPackage ../pkgs/gnome-break-timer { };
jmri = callPackage ../pkgs/jmri { }; jmri = callPackage ../pkgs/jmri { };
adguardian-term = callPackage ../pkgs/adguardian-term { }; adguardian-term = callPackage ../pkgs/adguardian-term { };
# upstream package is broken and can't be fixed by overriding attrs. so I just completely redo it in here
seahub = (python3Packages.buildPythonApplication rec {
pname = "seahub";
version = "11.0.1";
format = "other";
src = fetchFromGitHub {
owner = "haiwen";
repo = "seahub";
rev = "v11.0.1-pro";
sha256 = "sha256-dxMvbiAdECMZIf+HgA5P2gZYI9l+k+nhmdzfg90037A=";
};
dontBuild = true;
doCheck = false; # disabled because it requires a ccnet environment
nativeBuildInputs = [
makeWrapper
];
propagatedBuildInputs = with python3Packages; [
django
future
django-compressor
django-statici18n
django-webpack-loader
django-simple-captcha
django-picklefield
django-formtools
mysqlclient
pillow
python-dateutil
djangorestframework
openpyxl
requests
requests-oauthlib
chardet
pyjwt
pycryptodome
qrcode
pysearpc
seaserv
gunicorn
markdown
bleach
# python-ldap
pyopenssl
(buildPythonPackage rec {
pname = "djangosaml2";
version = "1.7.0";
doCheck = false;
propagatedBuildInputs = [
pysaml2
django
defusedxml
];
src = fetchPypi {
inherit pname version;
sha256 = "sha256-WiMl2UvbOskLA5o5LXPrBF2VktlDnlBNdc42eZ62Fko=";
};
})
];
installPhase = ''
cp -dr --no-preserve='ownership' . $out/
wrapProgram $out/manage.py \
--prefix PYTHONPATH : "$PYTHONPATH:$out/thirdpart:"
'';
passthru = rec {
python = prev.python3;
pythonPath = python.pkgs.makePythonPath propagatedBuildInputs;
};
});
} }

View file

@ -9,7 +9,7 @@ rustPlatform.buildRustPackage rec {
rev = version; rev = version;
hash = "sha256-r7dh31fZgcUBffzwoBqIoV9XhZOjJRb9aWZUuuiz7y8="; hash = "sha256-r7dh31fZgcUBffzwoBqIoV9XhZOjJRb9aWZUuuiz7y8=";
}; };
cargoSha256 = "sha256-GB3CQ9VPBkKbT5Edq/jJlGEkVGICWSQloIt+nkHRDJU="; cargoHash = "sha256-GB3CQ9VPBkKbT5Edq/jJlGEkVGICWSQloIt+nkHRDJU=";
meta = with lib; { meta = with lib; {
description = "Terminal-based, real-time traffic monitoring and statistics for your AdGuard Home instance Resources"; description = "Terminal-based, real-time traffic monitoring and statistics for your AdGuard Home instance Resources";

View file

@ -1,4 +1,4 @@
{ rustPlatform, fetchFromGitHub, lib, ninja, dbus, pkg-config, gettext }: { rustPlatform, fetchFromGitHub, lib, ninja, dbus, pkg-config }:
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "ianny"; pname = "ianny";
version = "unstable-2023-12-16"; version = "unstable-2023-12-16";
@ -8,7 +8,7 @@ rustPlatform.buildRustPackage rec {
rev = "370bea372c35610e65426f5a1c45db99584dfb9a"; rev = "370bea372c35610e65426f5a1c45db99584dfb9a";
hash = "sha256-oWwRCQSP0g6IJh3cEgD32AIBF/pfN9QGJ9LANjCthMw="; hash = "sha256-oWwRCQSP0g6IJh3cEgD32AIBF/pfN9QGJ9LANjCthMw=";
}; };
cargoSha256 = "sha256-5/Sb2ds+xfcYFqTF3RObPScDzK4FdBNk8T1Z5YcQgCM="; cargoHash = "sha256-5/Sb2ds+xfcYFqTF3RObPScDzK4FdBNk8T1Z5YcQgCM=";
buildInputs = [ buildInputs = [
dbus dbus
ninja ninja

Binary file not shown.

View file

@ -1,6 +1,5 @@
{ pkgs, lib, ... }: { pkgs, lib, ... }:
{ {
# fixes qt and themes # fixes qt and themes
environment.variables = { environment.variables = {
"QT_STYLE_OVERRIDE" = lib.mkForce "kvantum"; "QT_STYLE_OVERRIDE" = lib.mkForce "kvantum";
@ -9,10 +8,10 @@
"GTK_THEME" = "Dracula"; "GTK_THEME" = "Dracula";
}; };
# open ports for kde connect # open ports for kde connect
networking.firewall = rec { # networking.firewall = rec {
allowedTCPPortRanges = [{ from = 1714; to = 1764; }]; # allowedTCPPortRanges = [{ from = 1714; to = 1764; }];
allowedUDPPortRanges = allowedTCPPortRanges; # allowedUDPPortRanges = allowedTCPPortRanges;
}; # };
# enable xdg portals for sway # enable xdg portals for sway
xdg.portal = { xdg.portal = {
enable = true; enable = true;
@ -37,24 +36,7 @@
# home manager needs dconf # home manager needs dconf
programs.dconf.enable = true; programs.dconf.enable = true;
# fixes pam entries for swaylock # fixes pam entries for swaylock
# auth sufficient ${pkgs.fprintd}/lib/security/pam_fprintd.so security.pam.services.swaylock = { };
security.pam.services.swaylock.text = ''
# Account management.
account required pam_unix.so
# Authentication management.
auth sufficient pam_unix.so nullok likeauth try_first_pass
auth sufficient ${pkgs.pam_u2f}/lib/security/pam_u2f.so
auth required pam_deny.so
# Password management.
password sufficient pam_unix.so nullok sha512
# Session management.
session required pam_env.so conffile=/etc/pam/environment readenv=0
session required pam_unix.so
'';
# global wrapper for ausweisapp # global wrapper for ausweisapp
programs.ausweisapp = { programs.ausweisapp = {
enable = true; enable = true;
@ -64,5 +46,5 @@
programs.steam.enable = true; programs.steam.enable = true;
# enable java black magic # enable java black magic
programs.java.enable = true; # programs.java.enable = true;
} }

View file

@ -11,7 +11,6 @@
pcmanfm pcmanfm
xdg-utils # used for xdg-open xdg-utils # used for xdg-open
appimage-run appimage-run
seafile-client
# graphics # graphics
(zathura.override { plugins = [ zathuraPkgs.zathura_pdf_mupdf ]; }) (zathura.override { plugins = [ zathuraPkgs.zathura_pdf_mupdf ]; })
@ -50,6 +49,7 @@
hut hut
wine wine
ansible ansible
ansible-lint
# programming languages # programming languages
cargo cargo

View file

@ -11,7 +11,7 @@ in
controlPersist = "10m"; controlPersist = "10m";
extraConfig = '' extraConfig = ''
CanonicalizeHostname yes CanonicalizeHostname yes
CanonicalDomains agdsn.network vpn.rfive.de CanonicalDomains agdsn.network vpn.rfive.de net.tu-dresden.de
PKCS11Provider /run/current-system/sw/lib/libtpm2_pkcs11.so PKCS11Provider /run/current-system/sw/lib/libtpm2_pkcs11.so
IdentityFile ~/.ssh/id_ed25519 IdentityFile ~/.ssh/id_ed25519
SetEnv TERM=xterm-256color SetEnv TERM=xterm-256color