Compare commits

..

No commits in common. "f8eee37e5136ee9de59ad69c1a5b9768ff332a43" and "8d87ef1e2154adf1c1fe8d4bbb3cc8743fc7fb17" have entirely different histories.

13 changed files with 44 additions and 66 deletions

33
flake.lock generated
View file

@ -39,11 +39,11 @@
"uv2nix": "uv2nix" "uv2nix": "uv2nix"
}, },
"locked": { "locked": {
"lastModified": 1746874492, "lastModified": 1746770624,
"narHash": "sha256-Gm2Eb5KBxAL6y9WJj7phRMXNAZzVkKlm9Dky9WDZHtQ=", "narHash": "sha256-40c1p1EiveXd8P4MsG21+M4x/0QOCGQJP0ISyx9L1QE=",
"owner": "nix-community", "owner": "nix-community",
"repo": "authentik-nix", "repo": "authentik-nix",
"rev": "2ef24fac993808a1a57f367ef58ac0f5254c3489", "rev": "0b5a36483867e2473a40610d0dcb7cb06260a6cf",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -85,26 +85,6 @@
"type": "github" "type": "github"
} }
}, },
"caddy-patched": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1746901403,
"narHash": "sha256-2tkRHeNEkaE1x0ayfi30+nrIQv4Nio/NeT8U3i3qeQA=",
"owner": "rouven0",
"repo": "nixos-caddy-patched",
"rev": "ad2df7623e62ee4595c8f523b30cf6914a2cb6bd",
"type": "github"
},
"original": {
"owner": "rouven0",
"repo": "nixos-caddy-patched",
"type": "github"
}
},
"crane": { "crane": {
"locked": { "locked": {
"lastModified": 1731098351, "lastModified": 1731098351,
@ -299,11 +279,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1746892839, "lastModified": 1746798521,
"narHash": "sha256-0b9us0bIOgA1j/s/6zlxVyP3m97yAh0U+YwKayJ6mmU=", "narHash": "sha256-axfz/jBEH9XHpS7YSumstV7b2PrPf7L8bhWUtLBv3nA=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "12e67385964d9c9304daa81d0ad5ba3b01fdd35e", "rev": "e95a7c5b6fa93304cd2fd78cf676c4f6d23c422c",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -636,7 +616,6 @@
"inputs": { "inputs": {
"agenix": "agenix", "agenix": "agenix",
"authentik": "authentik", "authentik": "authentik",
"caddy-patched": "caddy-patched",
"dns": "dns", "dns": "dns",
"home-manager": "home-manager", "home-manager": "home-manager",
"impermanence": "impermanence", "impermanence": "impermanence",

View file

@ -47,10 +47,6 @@
url = "github:nix-community/lanzaboote/v0.4.2"; url = "github:nix-community/lanzaboote/v0.4.2";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
caddy-patched = {
url = "github:rouven0/nixos-caddy-patched";
inputs.nixpkgs.follows = "nixpkgs";
};
}; };
outputs = outputs =
@ -66,7 +62,6 @@
, purge , purge
, trucksimulatorbot , trucksimulatorbot
, pfersel , pfersel
, caddy-patched
, ... , ...
}@attrs: { }@attrs: {
packages.x86_64-linux = { packages.x86_64-linux = {

View file

@ -1,4 +1,4 @@
{ config, caddy-patched, ... }: { config, ... }:
let let
# matrix homeserver discovery # matrix homeserver discovery
matrix_domain = "matrix.${config.networking.domain}"; matrix_domain = "matrix.${config.networking.domain}";

View file

@ -11,8 +11,7 @@ let
{ {
nameServer = "ns.rfive.de."; nameServer = "ns.rfive.de.";
adminEmail = "hostmaster@rfive.de"; adminEmail = "hostmaster@rfive.de";
# serial = lib.strings.toInt (builtins.substring 0 8 self.sourceInfo.lastModifiedDate + toString ((modulo self.sourceInfo.lastModified 86400) / 864)); serial = lib.strings.toInt (builtins.substring 0 8 self.sourceInfo.lastModifiedDate + toString ((modulo self.sourceInfo.lastModified 86400) / 864));
serial = 2025051079;
refresh = 10800; refresh = 10800;
retry = 3600; retry = 3600;
expire = 604800; expire = 604800;
@ -34,17 +33,10 @@ let
(spf.soft [ "mx" ]) (spf.soft [ "mx" ])
]; ];
subdomains = subdomains =
let let
# fetches all VgetVirtualHosts from the caddy config
getVirtualHosts = hostname: map (name: builtins.substring 0 (builtins.stringLength name - (builtins.stringLength domain + 1)) name) (builtins.attrNames self.nixosConfigurations."${hostname}".config.services.caddy.virtualHosts); getVirtualHosts = hostname: map (name: builtins.substring 0 (builtins.stringLength name - (builtins.stringLength domain + 1)) name) (builtins.attrNames self.nixosConfigurations."${hostname}".config.services.caddy.virtualHosts);
# generate CNAMES from caddy service to host
genCNAMEs = hostname: lib.attrsets.genAttrs (getVirtualHosts hostname) (_label: { CNAME = [ "${hostname}.${domain}." ]; }); genCNAMEs = hostname: lib.attrsets.genAttrs (getVirtualHosts hostname) (_label: { CNAME = [ "${hostname}.${domain}." ]; });
# generate ACME challenge recorsd for every VirtualHost
genACMECNAMEs = hostname: lib.attrsets.genAttrs (getVirtualHosts hostname) (_label: { subdomains._acme-challenge.CNAME = [ "challenge.acme.${domain}." ]; });
# fuckery to merge the generated attribute lists
mergeRecords = recordList: lib.attrsets.mapAttrs (_host: records: lib.attrsets.mergeAttrsList records) (lib.attrsets.zipAttrs recordList);
in in
lib.attrsets.mergeAttrsList [ lib.attrsets.mergeAttrsList [
rec { rec {
@ -62,17 +54,9 @@ let
mail = falkenstein; mail = falkenstein;
_dmarc.TXT = [ "v=DMARC1; p=none; adkim=s; fo=1; rua=mailto:dmarc@rfive.de; ruf=mailto:dmarc@rfive.de" ]; _dmarc.TXT = [ "v=DMARC1; p=none; adkim=s; fo=1; rua=mailto:dmarc@rfive.de; ruf=mailto:dmarc@rfive.de" ];
_domainkey.subdomains.rspamd.TXT = [ "v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDoirUMubro4nlmY6a8JMwK9QB2agAXiJzexDU/7ba6KCggONfoSTfUHlrM/XeM1GG/9oKpngApxDPP97adJuxc8/EELyo4HjTyYD8GBFZhg0AN7V8IPaJ1o5k6dGDk8ZLh41ZCnlAVWkhVSKs5pYtzkrlJIfUSzyuoe8nuFsVe3QIDAQAB" ]; _domainkey.subdomains.rspamd.TXT = [ "v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDoirUMubro4nlmY6a8JMwK9QB2agAXiJzexDU/7ba6KCggONfoSTfUHlrM/XeM1GG/9oKpngApxDPP97adJuxc8/EELyo4HjTyYD8GBFZhg0AN7V8IPaJ1o5k6dGDk8ZLh41ZCnlAVWkhVSKs5pYtzkrlJIfUSzyuoe8nuFsVe3QIDAQAB" ];
"*".subdomains."_acme-challenge".CNAME = [ "challenge.acme.rfive.de" ];
} }
(mergeRecords [ (builtins.removeAttrs (genCNAMEs "nuc") [ ":2018" ])
(builtins.removeAttrs (genCNAMEs "nuc") ([ ":2018" ] ++ (builtins.filter (host: lib.strings.hasInfix "vpn" host) (getVirtualHosts "nuc")))) (builtins.removeAttrs (genCNAMEs "falkenstein") [ "mail" ":2018" ])
(builtins.removeAttrs (genACMECNAMEs "nuc") ([ ":2018" ]))
])
(mergeRecords [
(builtins.removeAttrs (genCNAMEs "falkenstein") ([ ":2018" "mail" ]))
(builtins.removeAttrs (genACMECNAMEs "falkenstein") ([ ":2018" "mail" ]))
])
(builtins.removeAttrs (genACMECNAMEs "fujitsu") ([ ":2018" ]))
]; ];
}); });
in in
@ -101,9 +85,6 @@ in
dnssec-policy split-keys; dnssec-policy split-keys;
inline-signing yes; inline-signing yes;
serial-update-method date; serial-update-method date;
update-policy {
grant caddy. name challenge.acme.rfive.de. txt;
};
''; '';
file = "${directory}/rfive.de.zone.txt"; file = "${directory}/rfive.de.zone.txt";
}; };

View file

@ -1,4 +1,4 @@
{ ... }: { config, ... }:
let let
domain = "media.vpn.rfive.de"; domain = "media.vpn.rfive.de";
in in
@ -6,7 +6,7 @@ in
services.jellyfin = { services.jellyfin = {
enable = true; enable = true;
}; };
services.caddy.virtualHosts."${domain}".extraConfig = '' services.caddy.virtualHosts."http://${domain}".extraConfig = ''
reverse_proxy 127.0.0.1:8096 reverse_proxy 127.0.0.1:8096
''; '';
} }

View file

@ -13,7 +13,7 @@ in
http.address = "127.0.0.1:${toString port}"; http.address = "127.0.0.1:${toString port}";
}; };
}; };
services.caddy.virtualHosts."${domain}".extraConfig = '' services.caddy.virtualHosts."http://${domain}".extraConfig = ''
reverse_proxy 127.0.0.1:${toString port} reverse_proxy 127.0.0.1:${toString port}
''; '';
} }

View file

@ -6,7 +6,7 @@ in
services.atuin = { services.atuin = {
enable = true; enable = true;
}; };
services.caddy.virtualHosts."${domain}".extraConfig = '' services.caddy.virtualHosts."http://${domain}".extraConfig = ''
reverse_proxy 127.0.0.1:${toString config.services.atuin.port} reverse_proxy 127.0.0.1:${toString config.services.atuin.port}
''; '';
} }

View file

@ -6,7 +6,7 @@ in
services.prowlarr = { services.prowlarr = {
enable = true; enable = true;
}; };
services.caddy.virtualHosts."${domain}".extraConfig = '' services.caddy.virtualHosts."http://${domain}".extraConfig = ''
reverse_proxy 127.0.0.1:${toString config.services.prowlarr.settings.server.port} reverse_proxy 127.0.0.1:${toString config.services.prowlarr.settings.server.port}
''; '';
} }

View file

@ -6,7 +6,7 @@ in
services.radarr = { services.radarr = {
enable = true; enable = true;
}; };
services.caddy.virtualHosts."${domain}".extraConfig = '' services.caddy.virtualHosts."http://${domain}".extraConfig = ''
reverse_proxy 127.0.0.1:${toString config.services.radarr.settings.server.port} reverse_proxy 127.0.0.1:${toString config.services.radarr.settings.server.port}
''; '';
} }

View file

@ -6,7 +6,7 @@ in
services.sonarr = { services.sonarr = {
enable = true; enable = true;
}; };
services.caddy.virtualHosts."${domain}".extraConfig = '' services.caddy.virtualHosts."http://${domain}".extraConfig = ''
reverse_proxy 127.0.0.1:${toString config.services.sonarr.settings.server.port} reverse_proxy 127.0.0.1:${toString config.services.sonarr.settings.server.port}
''; '';
} }

View file

@ -125,7 +125,7 @@ in
SystemCallFilter = "@system-service"; SystemCallFilter = "@system-service";
}; };
}; };
services.caddy.virtualHosts."${domain}".extraConfig = '' services.caddy.virtualHosts."http://${domain}".extraConfig = ''
reverse_proxy 127.0.0.1:${toString cfg.port} reverse_proxy 127.0.0.1:${toString cfg.port}
''; '';
systemd.tmpfiles.rules = [ systemd.tmpfiles.rules = [

View file

@ -1,6 +1,7 @@
_final: prev: _final: prev:
let let
inherit (prev) callPackage; inherit (prev) callPackage;
inherit (prev) fetchFromGitHub;
inherit (prev) fetchpatch; inherit (prev) fetchpatch;
in in
{ {
@ -11,7 +12,6 @@ in
rm $out/share/applications/pcmanfm-desktop-pref.desktop rm $out/share/applications/pcmanfm-desktop-pref.desktop
''; '';
}); });
# fix slow escape key
zsh-vi-mode = prev.zsh-vi-mode.overrideAttrs (_: { zsh-vi-mode = prev.zsh-vi-mode.overrideAttrs (_: {
patches = [ patches = [
(fetchpatch { (fetchpatch {
@ -24,7 +24,31 @@ in
ianny = callPackage ../pkgs/ianny { }; ianny = callPackage ../pkgs/ianny { };
tpm2-pkcs11 = prev.tpm2-pkcs11.override { fapiSupport = false; }; tpm2-pkcs11 = prev.tpm2-pkcs11.override { fapiSupport = false; };
zsh-fzf-tab = prev.zsh-fzf-tab.overrideAttrs (_: rec {
version = "1.1.1";
src = fetchFromGitHub {
owner = "Aloxaf";
repo = "fzf-tab";
rev = "v${version}";
sha256 = "sha256-0/YOL1/G2SWncbLNaclSYUz7VyfWu+OB8TYJYm4NYkM=";
};
});
gnome-break-timer = callPackage ../pkgs/gnome-break-timer { }; gnome-break-timer = callPackage ../pkgs/gnome-break-timer { };
jmri = callPackage ../pkgs/jmri { }; jmri = callPackage ../pkgs/jmri { };
adguardian-term = callPackage ../pkgs/adguardian-term { }; adguardian-term = callPackage ../pkgs/adguardian-term { };
python312 = prev.python312.override {
packageOverrides = _final: prev: {
pysaml2 = prev.pysaml2.overridePythonAttrs (orig: {
disabledTests =
orig.disabledTests
++ [
"test_encrypted_response_6"
"test_validate_cert_chains"
"test_validate_with_root_cert"
];
});
};
};
} }

View file

@ -1,8 +1,7 @@
{ config, caddy-patched, ... }: { config, ... }:
{ {
services.caddy = { services.caddy = {
enable = true; enable = true;
# package = caddy-patched.packages.x86_64-linux.default;
email = "ca@${config.networking.domain}"; email = "ca@${config.networking.domain}";
logFormat = "format console"; logFormat = "format console";
globalConfig = '' globalConfig = ''