Compare commits
No commits in common. "6ed8bd861b5074084a67d3bf150cdf732476bf31" and "953c238a47cf95ee874eaefca9f710a8c899fd87" have entirely different histories.
6ed8bd861b
...
953c238a47
9 changed files with 53 additions and 77 deletions
20
flake.lock
generated
20
flake.lock
generated
|
|
@ -686,6 +686,22 @@
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"nixpkgs_10": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1727348695,
|
||||||
|
"narHash": "sha256-J+PeFKSDV+pHL7ukkfpVzCOO7mBSrrpJ3svwBFABbhI=",
|
||||||
|
"owner": "nixos",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "1925c603f17fc89f4c8f6bf6f631a802ad85d784",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nixos",
|
||||||
|
"ref": "nixos-unstable",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"nixpkgs_2": {
|
"nixpkgs_2": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1756578978,
|
"lastModified": 1756578978,
|
||||||
|
|
@ -1170,9 +1186,7 @@
|
||||||
"zen-browser": {
|
"zen-browser": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"home-manager": "home-manager_2",
|
"home-manager": "home-manager_2",
|
||||||
"nixpkgs": [
|
"nixpkgs": "nixpkgs_10"
|
||||||
"nixpkgs"
|
|
||||||
]
|
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1756876659,
|
"lastModified": 1756876659,
|
||||||
|
|
|
||||||
|
|
@ -41,10 +41,7 @@
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
|
|
||||||
zen-browser = {
|
zen-browser.url = "github:0xc000022070/zen-browser-flake";
|
||||||
url = "github:0xc000022070/zen-browser-flake";
|
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
|
||||||
};
|
|
||||||
|
|
||||||
nix-minecraft.url = "github:Infinidoge/nix-minecraft";
|
nix-minecraft.url = "github:Infinidoge/nix-minecraft";
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -10,10 +10,6 @@ in
|
||||||
};
|
};
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
config = mkIf cfg.enable {
|
||||||
home.packages = with pkgs; [ fractal element-desktop ];
|
home.packages = with pkgs; [ fractal ];
|
||||||
|
|
||||||
programs.element-desktop = {
|
|
||||||
enable = true;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -19,8 +19,6 @@ in
|
||||||
};
|
};
|
||||||
|
|
||||||
programs.zen-browser = {
|
programs.zen-browser = {
|
||||||
enable = true;
|
|
||||||
|
|
||||||
policies = {
|
policies = {
|
||||||
AutofillAddressEnabled = true;
|
AutofillAddressEnabled = true;
|
||||||
AutofillCreditCardEnabled = false;
|
AutofillCreditCardEnabled = false;
|
||||||
|
|
|
||||||
|
|
@ -64,7 +64,7 @@ in
|
||||||
};
|
};
|
||||||
|
|
||||||
kwalletrc = {
|
kwalletrc = {
|
||||||
Wallet.Enabled = true;
|
Wallet.Enabled = false;
|
||||||
};
|
};
|
||||||
|
|
||||||
plasmarc = {
|
plasmarc = {
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,6 @@
|
||||||
{ ... }:
|
{ ... }:
|
||||||
{
|
{
|
||||||
config = {
|
config = {
|
||||||
home-manager.backupFileExtension = "homeManagerBackup";
|
home-manager.backupFileExtension = "back";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,26 +0,0 @@
|
||||||
{ config, lib, pkgs, namespace, ... }:
|
|
||||||
let
|
|
||||||
inherit (lib) mkIf mkEnableOption;
|
|
||||||
|
|
||||||
cfg = config.${namespace}.services.backup.borg;
|
|
||||||
in
|
|
||||||
{
|
|
||||||
options.${namespace}.services.backup.borg = {
|
|
||||||
enable = mkEnableOption "Borg Backup";
|
|
||||||
};
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
services = {
|
|
||||||
borgbackup.jobs = {
|
|
||||||
media = {
|
|
||||||
paths = "/var/media/test";
|
|
||||||
encryption.mode = "none";
|
|
||||||
environment.BORG_SSH = "ssh -i /home/chris/.ssh/id_ed25519 -4";
|
|
||||||
repo = "ssh://chris@beheer.hazelhof.nl:222/home/chris/backups/media";
|
|
||||||
compression = "auto,zstd";
|
|
||||||
startAt = "daily";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
@ -3,7 +3,7 @@ let
|
||||||
inherit (builtins) toString toJSON;
|
inherit (builtins) toString toJSON;
|
||||||
inherit (lib) mkIf mkEnableOption;
|
inherit (lib) mkIf mkEnableOption;
|
||||||
|
|
||||||
cfg = config.${namespace}.services.communication.matrix;
|
cfg = config.${namespace}.services.communication.conduit;
|
||||||
|
|
||||||
domain = "kruining.eu";
|
domain = "kruining.eu";
|
||||||
fqn = "matrix.${domain}";
|
fqn = "matrix.${domain}";
|
||||||
|
|
@ -12,24 +12,43 @@ let
|
||||||
database = "synapse";
|
database = "synapse";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options.${namespace}.services.communication.matrix = {
|
options.${namespace}.services.communication.conduit = {
|
||||||
enable = mkEnableOption "Matrix server (Synapse)";
|
enable = mkEnableOption "conduit (Matrix server)";
|
||||||
};
|
};
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
config = mkIf cfg.enable {
|
||||||
${namespace}.services = {
|
# ${namespace}.services = {
|
||||||
persistance.postgresql.enable = true;
|
# persistance.postgresql.enable = true;
|
||||||
# virtualisation.podman.enable = true;
|
# virtualisation.podman.enable = true;
|
||||||
};
|
# };
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 4001 ];
|
networking.firewall.allowedTCPPorts = [ 4001 8448 ];
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
|
matrix-conduit = {
|
||||||
|
enable = false;
|
||||||
|
|
||||||
|
settings.global = {
|
||||||
|
address = "::";
|
||||||
|
port = port;
|
||||||
|
|
||||||
|
server_name = domain;
|
||||||
|
|
||||||
|
database_backend = "rocksdb";
|
||||||
|
# database_path = "/var/lib/matrix-conduit/";
|
||||||
|
|
||||||
|
allow_check_for_updates = false;
|
||||||
|
allow_registration = false;
|
||||||
|
|
||||||
|
enable_lightning_bolt = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
matrix-synapse = {
|
matrix-synapse = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
||||||
extras = [ "oidc" ];
|
extras = [ "oidc" ];
|
||||||
# plugins = with config.services.matrix-synapse.package.plugins; [];
|
plugins = with config.services.matrix-synapse.package.plugins; [];
|
||||||
|
|
||||||
settings = {
|
settings = {
|
||||||
server_name = domain;
|
server_name = domain;
|
||||||
|
|
@ -37,32 +56,10 @@ in
|
||||||
|
|
||||||
enable_registration = false;
|
enable_registration = false;
|
||||||
registration_shared_secret = "tZtBnlhEmLbMwF0lQ112VH1Rl5MkZzYH9suI4pEoPXzk6nWUB8FJF4eEnwLkbstz";
|
registration_shared_secret = "tZtBnlhEmLbMwF0lQ112VH1Rl5MkZzYH9suI4pEoPXzk6nWUB8FJF4eEnwLkbstz";
|
||||||
|
|
||||||
url_preview_enabled = true;
|
url_preview_enabled = true;
|
||||||
precence.enabled = true;
|
precence.enabled = true;
|
||||||
|
|
||||||
sso = {
|
|
||||||
client_whitelist = [ "http://[::1]:9092" ];
|
|
||||||
update_profile_information = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
oidc_providers = [
|
|
||||||
{
|
|
||||||
discover = true;
|
|
||||||
|
|
||||||
idp_id = "zitadel";
|
|
||||||
idp_name = "Zitadel";
|
|
||||||
issuer = "https://auth.amarth.cloud";
|
|
||||||
client_id = "337858153251143939";
|
|
||||||
client_secret = "ePkf5n8BxGD5DF7t1eNThTL0g6PVBO5A1RC0EqPp61S7VsiyXvDs8aJeczrpCpsH";
|
|
||||||
scopes = [ "openid" "profile" ];
|
|
||||||
# user_mapping_provider.config = {
|
|
||||||
# localpart_template = "{{ user.prefered_username }}";
|
|
||||||
# display_name_template = "{{ user.name }}";
|
|
||||||
# };
|
|
||||||
}
|
|
||||||
];
|
|
||||||
|
|
||||||
database = {
|
database = {
|
||||||
# this is postgresql (also the default, but I prefer to be explicit)
|
# this is postgresql (also the default, but I prefer to be explicit)
|
||||||
name = "psycopg2";
|
name = "psycopg2";
|
||||||
|
|
@ -98,7 +95,7 @@ in
|
||||||
settings = {
|
settings = {
|
||||||
appservice = {
|
appservice = {
|
||||||
provisioning.enabled = false;
|
provisioning.enabled = false;
|
||||||
# port = 40011;
|
port = 40011;
|
||||||
};
|
};
|
||||||
|
|
||||||
homeserver = {
|
homeserver = {
|
||||||
|
|
@ -121,7 +118,7 @@ in
|
||||||
settings = {
|
settings = {
|
||||||
appservice = {
|
appservice = {
|
||||||
provisioning.enabled = false;
|
provisioning.enabled = false;
|
||||||
# port = 40012;
|
port = 40012;
|
||||||
};
|
};
|
||||||
|
|
||||||
homeserver = {
|
homeserver = {
|
||||||
|
|
@ -10,7 +10,7 @@
|
||||||
authentication.authelia.enable = true;
|
authentication.authelia.enable = true;
|
||||||
authentication.zitadel.enable = true;
|
authentication.zitadel.enable = true;
|
||||||
|
|
||||||
communication.matrix.enable = true;
|
communication.conduit.enable = true;
|
||||||
|
|
||||||
development.forgejo.enable = true;
|
development.forgejo.enable = true;
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue