chore(gitea): comment out OAuth setup configuration
All checks were successful
Flake checker / Build Nix targets (push) Successful in 9m27s

refactor(home): simplify homeDirectory assignment

chore(satisfactory): disable service by default
This commit is contained in:
uttarayan21
2025-09-04 14:05:52 +05:30
parent a3f048d256
commit 6d12728ae8
3 changed files with 32 additions and 34 deletions

View File

@@ -32,10 +32,7 @@
home = { home = {
username = device.user; username = device.user;
homeDirectory = homeDirectory = device.home;
if device.isDarwin
then lib.mkForce "/Users/${device.user}"
else lib.mkForce "/home/${device.user}";
file = { file = {
".config/fish/themes".source = pkgs.catppuccinThemes.fish + "/themes"; ".config/fish/themes".source = pkgs.catppuccinThemes.fish + "/themes";

View File

@@ -3,7 +3,8 @@
../../../../modules/nixos/satisfactory.nix ../../../../modules/nixos/satisfactory.nix
]; ];
services.satisfactory = { services.satisfactory = {
enable = true; # enable = true;
enable = false;
maxPlayers = 4; maxPlayers = 4;
}; };
} }

View File

@@ -143,33 +143,33 @@
}; };
}; };
systemd.services.gitea-oauth-setup = let # systemd.services.gitea-oauth-setup = let
name = "authelia"; # name = "authelia";
gitea_oauth_script = pkgs.writeShellApplication { # gitea_oauth_script = pkgs.writeShellApplication {
name = "gitea_oauth2_script"; # name = "gitea_oauth2_script";
runtimeInputs = [config.services.gitea.package]; # runtimeInputs = [config.services.gitea.package];
text = '' # text = ''
gitea admin auth delete --id "$(gitea admin auth list | grep "${name}" | cut -d "$(printf '\t')" -f1)" # gitea admin auth delete --id "$(gitea admin auth list | grep "${name}" | cut -d "$(printf '\t')" -f1)"
gitea admin auth add-oauth --provider=openidConnect --name=${name} --key="$CLIENT_ID" --secret="$CLIENT_SECRET" --auto-discover-url=https://auth.darksailor.dev/.well-known/openid-configuration --scopes='openid email profile' # gitea admin auth add-oauth --provider=openidConnect --name=${name} --key="$CLIENT_ID" --secret="$CLIENT_SECRET" --auto-discover-url=https://auth.darksailor.dev/.well-known/openid-configuration --scopes='openid email profile'
''; # '';
}; # };
in { # in {
description = "Configure Gitea OAuth with Authelia"; # description = "Configure Gitea OAuth with Authelia";
after = ["gitea.service"]; # after = ["gitea.service"];
wants = ["gitea.service"]; # wants = ["gitea.service"];
wantedBy = ["multi-user.target"]; # wantedBy = ["multi-user.target"];
serviceConfig = { # serviceConfig = {
Type = "oneshot"; # Type = "oneshot";
User = config.services.gitea.user; # User = config.services.gitea.user;
Group = config.services.gitea.group; # Group = config.services.gitea.group;
RemainAfterExit = true; # RemainAfterExit = true;
ExecStart = "${lib.getExe gitea_oauth_script}"; # ExecStart = "${lib.getExe gitea_oauth_script}";
WorkingDirectory = config.services.gitea.stateDir; # WorkingDirectory = config.services.gitea.stateDir;
EnvironmentFile = config.sops.templates."GITEA_OAUTH_SETUP.env".path; # EnvironmentFile = config.sops.templates."GITEA_OAUTH_SETUP.env".path;
}; # };
environment = { # environment = {
GITEA_WORK_DIR = config.services.gitea.stateDir; # GITEA_WORK_DIR = config.services.gitea.stateDir;
GITEA_CUSTOM = config.services.gitea.customDir; # GITEA_CUSTOM = config.services.gitea.customDir;
}; # };
}; # };
} }