feat: Added seafile and remove homeassistant

This commit is contained in:
uttarayan21
2025-06-15 03:11:32 +05:30
parent 935231c118
commit 5d598b20d5
3 changed files with 52 additions and 11 deletions

View File

@@ -9,12 +9,12 @@
./caddy.nix ./caddy.nix
./fail2ban.nix ./fail2ban.nix
./gitea.nix ./gitea.nix
./home-assistant.nix
# ./appflowy.nix # ./appflowy.nix
# ./home-assistant.nix
# ./jellyfin.nix # ./jellyfin.nix
# ./polaris.nix # ./polaris.nix
# ./seafile.nix ./seafile.nix
# ./syncthing.nix # ./syncthing.nix
# ./vscode.nix # ./vscode.nix
# ./nextcloud.nix # ./nextcloud.nix

View File

@@ -7,12 +7,19 @@
"met" "met"
"radio_browser" "radio_browser"
"wiz" "wiz"
"homekit"
"homekit_controller"
]; ];
customComponents = [ customComponents = [
pkgs.home-assistant-custom-components.auth-header pkgs.home-assistant-custom-components.auth-header
]; ];
config = { config = {
default_config = {}; default_config = {};
homeassistant = {
external_url = "https://home.darksailor.dev";
name = "Home Assistant";
time_zone = "Asia/Kolkata";
};
http = { http = {
server_host = "::1"; server_host = "::1";
trusted_proxies = ["::1"]; trusted_proxies = ["::1"];
@@ -33,8 +40,43 @@
''; '';
}; };
}; };
networking.firewall.allowedTCPPorts = [5555 5353 1900 51827 48784 38989 18555]; networking.firewall.allowedTCPPorts = [
networking.firewall.allowedUDPPorts = [5555]; 8888
5555
5432
5000
7070
6600
2019
22
21064
48829
11434
3000
8123
5432
443
22
80
55447
25565
21064
40000
];
networking.firewall.allowedUDPPorts = [
5353
41641
68
5353
5353
41641
47663
53040
443
1900
1900
5555
];
networking.firewall.allowedTCPPortRanges = [ networking.firewall.allowedTCPPortRanges = [
{ {
from = 21063; from = 21063;

View File

@@ -1,13 +1,12 @@
{config, ...}: { {config, ...}: {
# sops = { sops = {
# secrets."nextcloud/adminpass".owner = config.users.users.caddy.name; secrets."nextcloud/adminpass".owner = config.users.users.caddy.name;
# }; };
nixpkgs.config.allowBroken = true;
services = { services = {
seafile = { seafile = {
enable = true; enable = true;
# group = config.services.caddy.group; # group = config.services.caddy.group;
adminEmail = "admin@uttarayan.me"; adminEmail = "admin@darksailor.dev";
initialAdminPassword = "foobar"; initialAdminPassword = "foobar";
seahubExtraConf = seahubExtraConf =
@@ -18,11 +17,11 @@
ENABLE_REMOTE_USER_AUTHENTICATION = True ENABLE_REMOTE_USER_AUTHENTICATION = True
# Optional, HTTP header, which is configured in your web server conf file, # Optional, HTTP header, which is configured in your web server conf file,
# used for Seafile to get user's unique id, default value is 'HTTP_REMOTE_USER'. # used for Seafile to get user's unique id, default value is 'HTTP_REMOTE_USER'.
REMOTE_USER_HEADER = 'REMOTE_USER' REMOTE_USER_HEADER = "HTTP_REMOTE_USER"
# Optional, when the value of HTTP_REMOTE_USER is not a valid email address # Optional, when the value of HTTP_REMOTE_USER is not a valid email address
# Seafile will build a email-like unique id from the value of 'REMOTE_USER_HEADER' # Seafile will build a email-like unique id from the value of 'REMOTE_USER_HEADER'
# and this domain, e.g. user1@example.com. # and this domain, e.g. user1@example.com.
# REMOTE_USER_DOMAIN = 'uttarayan.me' REMOTE_USER_DOMAIN = "darksailor.dev"
# Optional, whether to create new user in Seafile system, default value is True. # Optional, whether to create new user in Seafile system, default value is True.
# If this setting is disabled, users doesn't preexist in the Seafile DB cannot login. # If this setting is disabled, users doesn't preexist in the Seafile DB cannot login.
# The admin has to first import the users from external systems like LDAP. # The admin has to first import the users from external systems like LDAP.