From 65091d8d4c400f9da0ee214355122c47c8b40115 Mon Sep 17 00:00:00 2001 From: osbm Date: Sun, 2 Nov 2025 19:16:27 +0300 Subject: [PATCH] Revert "add seafile" This reverts commit 56449b8b7d4671a739c5e33fde705a043952f7cb. --- modules/nixos/options.nix | 1 - modules/nixos/services/default.nix | 1 - modules/nixos/services/seafile.nix | 71 ------------------------------ 3 files changed, 73 deletions(-) delete mode 100644 modules/nixos/services/seafile.nix diff --git a/modules/nixos/options.nix b/modules/nixos/options.nix index a22712b..0286dec 100644 --- a/modules/nixos/options.nix +++ b/modules/nixos/options.nix @@ -154,7 +154,6 @@ glance.enable = lib.mkEnableOption "glance"; hydra.enable = lib.mkEnableOption "hydra"; immich.enable = lib.mkEnableOption "immich"; - seafile.enable = lib.mkEnableOption "seafile"; vscode-server.enable = lib.mkEnableOption "vscode-server"; wanikani-bypass-lessons.enable = lib.mkEnableOption "wanikani-bypass-lessons"; wanikani-fetch-data.enable = lib.mkEnableOption "wanikani-fetch-data"; diff --git a/modules/nixos/services/default.nix b/modules/nixos/services/default.nix index 1877f47..3143a49 100644 --- a/modules/nixos/services/default.nix +++ b/modules/nixos/services/default.nix @@ -14,7 +14,6 @@ ./jellyfin.nix ./mailserver.nix ./nginx.nix - ./seafile.nix ./syncthing.nix ./tailscale.nix ./vaultwarden.nix diff --git a/modules/nixos/services/seafile.nix b/modules/nixos/services/seafile.nix deleted file mode 100644 index 759bd03..0000000 --- a/modules/nixos/services/seafile.nix +++ /dev/null @@ -1,71 +0,0 @@ -{ config, lib, ... }: - -{ - config = lib.mkMerge [ - (lib.mkIf config.osbmModules.services.seafile.enable { - services.seafile = { - enable = true; - adminEmail = "osbm@osbm.dev"; - initialAdminPassword = "changeme"; - seafileSettings = { - fileserver = { - host = "unix:/run/seafile/server.sock"; - }; - }; - }; - }) - - # seafile and nginx - (lib.mkIf (config.osbmModules.services.nginx.enable && config.osbmModules.services.seafile.enable) { - services.nginx.virtualHosts."seafile.osbm.dev" = { - forceSSL = true; - enableACME = true; - locations = { - "/" = { - proxyPass = "http://unix:/run/seahub/gunicorn.sock"; - extraConfig = '' - proxy_set_header Host $host; - proxy_set_header X-Real-IP $remote_addr; - proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; - proxy_set_header X-Forwarded-Host $server_name; - proxy_read_timeout 1200s; - client_max_body_size 0; - ''; - }; - "/seafhttp" = { - proxyPass = "http://unix:/run/seafile/server.sock"; - extraConfig = '' - rewrite ^/seafhttp(.*)$ $1 break; - client_max_body_size 0; - proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; - proxy_connect_timeout 36000s; - proxy_read_timeout 36000s; - proxy_send_timeout 36000s; - send_timeout 36000s; - ''; - }; - }; - }; - }) - - # impermanence and seafile - (lib.mkIf - ( - config.osbmModules.services.seafile.enable - && config.osbmModules.hardware.disko.zfs.root.impermanenceRoot - ) - { - environment.persistence."/persist" = { - directories = [ - { - directory = "/var/lib/seafile"; - user = config.services.seafile.user; - group = config.services.seafile.group; - mode = "0750"; - } - ]; - }; - } - ) - ]; -}