by 96bcaa76-0f27-45e7-9aa3-65c535e53a05

Hugo OLD

The theme I use is incompatible with latest version of hugo. In most distributions this would be very frustrating. In Nixos its as easy as

~/.bin/hugo_old

#!/usr/bin/env bash
nix run  github:NixOS/nixpkgs/nixos-22.05#hugo -- $*

and now I can run a very old version of the software without having to deprecate anything else.

by 96bcaa76-0f27-45e7-9aa3-65c535e53a05

Radicle: Distributed Git Forge

radicle

Radicle is a decentralized git forge. It is still very new as you can see from what I had to do to get it running but I am hopeful it could eventually replace github at least for me. my node is here radicle I am still working on the best way to house artifacts, but the ci is running and running with devbox support so easy to have standard reproducable environments.

configs

.radicle/config.json

{
  "publicExplorer": "https://app.radicle.xyz/nodes/$host/$rid$path",
  "preferredSeeds": [
    "z6MkrLMMsiPWUcNPHcRajuMi9mDfYckSoJyPwwnknocNYPm7@seed.radicle.garden:8776",
    "z6Mkmqogy2qEM2ummccUthFEaaHvyYmYBYh3dbe9W4ebScxo@ash.radicle.garden:8776"
  ],
  "web": {
    "pinned": {
      "repositories": [
"rad:z2ixRGetGtwFtRyXjRgu5fH573wyy",
"rad:z3N1dSXzVuiJVeJyBG17KRxgySnGs", 
"rad:zwTxygwuz5LDGBq255RA2CbNGrz8",
"rad:z4V1sjrXqjvFdnCUbxPFqd5p4DtH5",
"rad:z3gqcJUoA1n9HaHKufZs5FCSGazv5", 
"rad:z3qg5TKmN83afz2fj9z3fQjU8vaYE" 
      ]
    }
  },
  "cli": {
    "hints": true
  },
  "node": {
    "alias": "rad.rldn.net",
    "listen": ["0.0.0.0:8776"],
    "externalAddresses": [
      "rad.rldn.net:8776"
    ],
    "peers": {
      "type": "dynamic"
    },
    "connect": [],
    "network": "main",
    "log": "INFO",
    "relay": "auto",
    "limits": {
      "routingMaxSize": 1000,
      "routingMaxAge": 604800,
      "gossipMaxAge": 1209600,
      "fetchConcurrency": 1,
      "maxOpenFiles": 4096,
      "rate": {
        "inbound": {
          "fillRate": 5.0,
          "capacity": 1024
        },
        "outbound": {
          "fillRate": 10.0,
          "capacity": 2048
        }
      },
      "connection": {
        "inbound": 128,
        "outbound": 16
      }
    },
    "workers": 8,
    "seedingPolicy": {
      "default": "block"
    }
  }
}

radicle-cib.yaml

default_adapter: native
db: /mnt/drive_1/state/radicle/ci-broker.sqlite
report_dir: /mnt/drive_1/state/radicle/reports
adapters:
  native:
    command: radicle-native-ci
    env:
      RADICLE_NATIVE_CI: /mnt/drive_1/state/radicle/radicle-native.yaml
    sensitive_env:
      some_secret: some_secret_value_that_is_not_logged
filters:
  - !And
    - !Repository "rad:z2ixRGetGtwFtRyXjRgu5fH573wyy"
    - !Or
      - !Branch "main"
      - !AnyPatchRef

radicle-native.yaml

state: /mnt/drive_1/state/radicle/reports/http
log: /mnt/drive_1/state/radicle/native-ci.log
base_url: https://radci.rldn.net/http

package setup

radicle-ci-broker.nix

{ fetchgit
, rustPlatform
, stdenv
, lib
}: rustPlatform.buildRustPackage rec {
  pname = "radicle-ci-broker";
  version = "0.8.0";
  src = fetchgit {
    url = "https://radapi.rldn.net/zwTxygwuz5LDGBq255RA2CbNGrz8.git";
    rev = "cdc4af1462af48fa61ec96da1e549cfb8c537028";
    hash = "sha256-+CXxljESm/thCQPcG7k5/l5SnLtgMKRHSkKPr4XNnWc=";
  };
  cargoHash = "sha256-k8aHeouZ9PaYZZkRccEIBpp9YCESp5FuU48Qdgtnyx0=";
 doCheck = false;
  meta = {
    description = "Radicle CI Broker";
    longDescription = ''
      Radicle is an open source, peer-to-peer code collaboration stack built on Git.
      This is a CI broker for that stack.
    '';
    homepage = "https://radicle.xyz";
    license = with lib.licenses; [ asl20 mit ];
    platforms = lib.platforms.unix;
    maintainers = with lib.maintainers; [ mog ];
    mainProgram = "cib";
  };
}

radicle-native-ci.nix

{ fetchgit
, rustPlatform
, stdenv
, lib
}: rustPlatform.buildRustPackage rec {
  pname = "radicle-native-ci";
  version = "0.3.0";
  src = fetchgit {
    url = "https://radapi.rldn.net/z3qg5TKmN83afz2fj9z3fQjU8vaYE.git";
    rev = "6b0b32bb7546f1efe7e8fef995a14593aac6a605";
    hash = "sha256-KJD+0r5XJFbpK8/a0g/OmPIqCWjOqVuoC2YWKHTXNw4=";
#lib.fakeHash;
  };
  cargoHash =  "sha256-y75yHms8KerrPEAXo9ha4zeqZRjeTCYiXHJdA3jGgDg=";
#lib.fakeHash;
  doCheck = false;
    
  meta = {
    description = "Radicle Native CI";
    longDescription = ''
      Radicle is an open source, peer-to-peer code collaboration stack built on Git.
      This is the runner for the broker
    '';
    homepage = "https://radicle.xyz";
    license = with lib.licenses; [ asl20 mit ];
    platforms = lib.platforms.unix;
    maintainers = with lib.maintainers; [ mog ];
    mainProgram = "cib";
  };
}

radicle service


systemd.services.mog_radicle = {
  enable = true;
  after = [ "network.target" ];
  wantedBy = [ "default.target" ];
  description = "Mog radicle";
  path = [ pkgs.unstable.radicle-httpd
           pkgs.unstable.radicle-node
           (pkgs.unstable.callPackage ../pkgs/radicle-ci-broker.nix { })
           (pkgs.unstable.callPackage ../pkgs/radicle-native-ci.nix { })
           pkgs.bash
           pkgs.git
           pkgs.nix
           pkgs.devbox
         ];
  serviceConfig = {
      Type = "simple";
      User = "mog";
      Restart = "always";
      RestartSec = "3"; # Added
      ExecStart = ''/home/mog/code/dotfiles/nixos/services/radicle.sh'';
  };
};

radicle bash script

#!/usr/bin/env bash
rad node start
radicle-httpd --listen 127.0.0.1:8675 &
cib --config /mnt/drive_1/state/radicle/radicle-cib.yaml process-events

caddy config

    virtualHosts."radapi.rldn.net" = {
      useACMEHost = "rldn.net";
      extraConfig = ''
       reverse_proxy http://127.0.0.1:8675
    '';
    };

    virtualHosts."rad.rldn.net" = {
      useACMEHost = "rldn.net";
      extraConfig = ''
        root * /mnt/drive_1/state/radicle-explorer/build
	try_files {path} /index.html
        file_server
    '';
    };

    virtualHosts."radci.rldn.net" = {
      useACMEHost = "rldn.net";
      extraConfig = ''
        root * /mnt/drive_1/state/radicle/reports
	try_files {path} /index.html
        file_server
    '';
    };
by 96bcaa76-0f27-45e7-9aa3-65c535e53a05

Home Assistant Auth

I have recently fallen in love with Authelia and using it with ldap to be my soul source of authentication across all my apps. Getting AudioBookshelf, using oidc, and Jellyfin , using ldap directly where not that difficult.

However Home-Assistant seemed to be a bit more difficult. I found this post which made me think it would be a complete dead end. I then found hass-auth-header which seemeed to work well, except it does not seem to work with the mobile clients. I then found homeassistant-auth-authelia which was working mostly well. Although it would not find my existing users and would always just create a new user each time. Digging in some more it looks like the command_line auth feature of home-assistant was broken. So I decided to try and fix that.

This was difficult as I like many people only use home-assistant in a docker container, so making changes to the underlying python can’t be tested as any change to the image isn’t persisted and home-assistant needs to be restarted as you do this. I worked around that by doing this

      volumes = [ "home-assistant:/config"
"/home/mog/code/command_line.py:/usr/src/homeassistant/homeassistant/auth/providers/command_line.py"
"/home/mog/code/cache:/usr/src/homeassistant/homeassistant/auth/providers/__pycache__"
 ];

These mounts allowed me to make and test changes, although I still needed to restart the system each time and clear out the cache. After a few hours I had my pr built GITHub

So my working system is this now

Configuration.yaml

homeassistant:
  allowlist_external_dirs:
    - "/tmp"
  media_dirs:
    media: /config/media
  auth_providers:
    - type: command_line
      command: /config/bin/auth_authelia.sh
      args:
        ["https://auth.rldn.net", "https://hass.rldn.net", "hass", "hass_admin" ]
      meta: true
    - type: homeassistant

/config/bin/auth_authelia.sh

#! /usr/bin/env bash

## auth_authelia.sh
## Authenticate a Home Assistant user against an authelia instance

## Copyright 2023 Christian Baer
## http://github.com/chrisb86/

## Permission is hereby granted, free of charge, to any person obtaining
## a copy of this software and associated documentation files (the
## "Software"), to deal in the Software without restriction, including
## without limitation the rights to use, copy, modify, merge, publish,
## distribute, sublicense, and/or sell copies of the Software, and to
## permit persons to whom the Software is furnished to do so, subject to
## the following conditions:

## The above copyright notice and this permission notice shall be
## included in all copies or substantial portions of the Software.

## THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
## EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
## MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
## NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
## LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
## OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
## WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

## Inspired by https://kevo.io/posts/2023-01-29-authelia-home-assistant-auth/ by Kevin O'Connor

## This script expects 2 command line parametes. You can specifiy a third one.
## Usage: authelia_auth.sh AUTHELIA_DOMAIN HOMEASSISTANT_DOMAIN [AUTHELIA_HOMEASSISTANT_GROUP]

## AUTHELIA_DOMAIN: Domain of your authelia instance 
## For example:
##  - https://sso.example.com
##  - https://example.com/auth
##  - http://example.com:8443

## HOMEASSISTANT_DOMAIN: Domain of your home assistant instance as configured in authelia
## For example:
##  - https://ha.example.com
##  - http://homeassistant.example.com:8123

## AUTHELIA_HOMEASSISTANT_GROUP (optional): The authelia group name for users that are allowed to access home assistant
## For example:
##  - homassistant_users
##  - home_automation

## The variables ${username} and ${password} will be set to the environment by home assistant


## Populate variables from command line
AUTHELIA_DOMAIN="${1}"
HOME_ASSISTANT_DOMAIN="${2}"
AUTHELIA_HOME_ASSISTANT_GROUP="${3}"
AUTHELIA_HOME_ASSISTANT_GROUP_ADMIN="${4}"



## Usernames should be validated using a regular expression to be of
## a known format. Special characters will be escaped anyway, but it is
## generally not recommended to allow more than necessary.
USERNAME_PATTERN='^[a-z|A-Z|0-9|_|-|.]+$'

## Temporary file path for storing authelia headers
TMP_FILE_NAME="./tmp_curl_${username}_$(date +%s)"

## Log messages to stderr.
log() {
  echo "$1" >&2
}

err=0
group_permissions=false

## Check username and password are present and not malformed.
if [ -z "$username" ] || [ -z "$password" ]; then
  log "Need username and password environment variables."
  err=1
elif [ ! -z "$USERNAME_PATTERN" ]; then
  username_match=$(echo "$username" | sed -r "s/$USERNAME_PATTERN/x/")
  if [ "$username_match" != "x" ]; then
    log "Username '$username' has an invalid format."
    err=1
  fi
fi

[ $err -ne 0 ] && exit 2

## Authenticate with authelia and dump headers to temporary file
curl --silent \
  --request GET \
  --header "X-Original-URL: ${HOME_ASSISTANT_DOMAIN}" \
  --basic --user "${username}:${password}" \
  -D "${TMP_FILE_NAME}" \
  "${AUTHELIA_DOMAIN}/api/verify?auth=basic"

maybe_admin="system-users"
## Extract user name and groups from temporary file
homeassistant_name=$(cat "${TMP_FILE_NAME}" | grep remote-name | cut -d ' ' -f 2-)
homeassistant_user=$(cat "${TMP_FILE_NAME}" | grep remote-user | cut -d ' ' -f 2-)
homeassistant_groups=$(cat "${TMP_FILE_NAME}" | grep remote-groups | cut -d ' ' -f 2-)
 
## Delete temporary file
rm "${TMP_FILE_NAME}"

## Check if user name is set. Otherwise exit becaus we'r not authenticated
if [ -z "${homeassistant_user}" ]; then
    log "Could not authenticate with server."
    exit 3
else
  ## Check if home assistant group is specified

  if [ -n "${AUTHELIA_HOME_ASSISTANT_GROUP}" ]; then 
	     if [[ $homeassistant_groups == *"${AUTHELIA_HOME_ASSISTANT_GROUP}"* ]]; then
               group_permissions=true
             fi
         if [ -n "${AUTHELIA_HOME_ASSISTANT_GROUP}" ]; then 
	     if [[ $homeassistant_groups == *"${AUTHELIA_HOME_ASSISTANT_GROUP_ADMIN}"* ]]; then
               group_permissions=true
	       maybe_admin="system-admin"
             fi
     fi
  fi

   ## If group permissions are granted, echo the user name as expected by home assistant
  if [ "${group_permissions}" == true ]; then
     echo "name = ${homeassistant_user}"
     echo "fullname = ${homeassistant_name}"
     echo "group = ${maybe_admin}"
  else
    ## Otherwise exit
    log "User has no permissions to access Home Assistant. Check group membership."
    exit 4
  fi
fi

/usr/src/homeassistant/homeassistant/auth/providers/command_line.py

"""Auth provider that validates credentials via an external command."""
from __future__ import annotations

import asyncio
from collections.abc import Mapping
import logging
import os
from typing import Any, cast

import voluptuous as vol

from homeassistant.core import async_get_hass
from homeassistant.core import callback

from homeassistant.components import person

from homeassistant.const import CONF_COMMAND
from homeassistant.data_entry_flow import FlowResult
from homeassistant.exceptions import HomeAssistantError

from ..models import Credentials, UserMeta
from . import AUTH_PROVIDER_SCHEMA, AUTH_PROVIDERS, AuthProvider, LoginFlow

CONF_ARGS = "args"
CONF_META = "meta"

CONFIG_SCHEMA = AUTH_PROVIDER_SCHEMA.extend(
    {
        vol.Required(CONF_COMMAND): vol.All(
            str, os.path.normpath, msg="must be an absolute path"
        ),
        vol.Optional(CONF_ARGS, default=None): vol.Any(vol.DefaultTo(list), [str]),
        vol.Optional(CONF_META, default=False): bool,
    },
    extra=vol.PREVENT_EXTRA,
)

_LOGGER = logging.getLogger(__name__)


class InvalidAuthError(HomeAssistantError):
    """Raised when authentication with given credentials fails."""


@AUTH_PROVIDERS.register("command_line")
class CommandLineAuthProvider(AuthProvider):
    """Auth provider validating credentials by calling a command."""

    DEFAULT_TITLE = "Command Line Authentication"

    # which keys to accept from a program's stdout
    ALLOWED_META_KEYS = (
        "name",
        "fullname",
        "group",
        "local_only",
    )

    def __init__(self, *args: Any, **kwargs: Any) -> None:
        """Extend parent's __init__.

        Adds self._user_meta dictionary to hold the user-specific
        attributes provided by external programs.
        """
        super().__init__(*args, **kwargs)
        self._user_meta: dict[str, dict[str, Any]] = {}

    async def async_login_flow(self, context: dict[str, Any] | None) -> LoginFlow:
        """Return a flow to login."""
        return CommandLineLoginFlow(self)

    async def async_validate_login(self, username: str, password: str) -> None:
        """Validate a username and password."""
        env = {"username": username, "password": password}
        try:
            process = await asyncio.create_subprocess_exec(
                self.config[CONF_COMMAND],
                *self.config[CONF_ARGS],
                env=env,
                stdout=asyncio.subprocess.PIPE if self.config[CONF_META] else None,
                close_fds=False,  # required for posix_spawn
            )
            stdout, _ = await process.communicate()
        except OSError as err:
            # happens when command doesn't exist or permission is denied
            _LOGGER.error("Error while authenticating %r: %s", username, err)
            raise InvalidAuthError from err

        if process.returncode != 0:
            _LOGGER.error(
                "User %r failed to authenticate, command exited with code %d",
                username,
                process.returncode,
            )
            raise InvalidAuthError

        if self.config[CONF_META]:
            meta: dict[str, str] = {}
            for _line in stdout.splitlines():
                try:
                    line = _line.decode().lstrip()
                except ValueError:
                    # malformed line
                    continue
                if line.startswith("#") or "=" not in line:
                    continue
                key, _, value = line.partition("=")
                key = key.strip()
                value = value.strip()
                if key in self.ALLOWED_META_KEYS:
                    meta[key] = value
            self._user_meta[username] = meta

    async def async_get_or_create_credentials(
        self, flow_result: Mapping[str, str]
    ) -> Credentials:
        """Get credentials based on the flow result."""
        username = flow_result["username"].strip().casefold()

        users = await self.store.async_get_users()
        for user in users:
            if user.name and user.name.strip().casefold() != username:
                continue

            if not user.is_active:
                continue

            for credential in await self.async_credentials():
                if credential.data["username"] and credential.data["username"].strip().casefold() == username:
                    return credential

            cred = self.async_create_credentials({"username": username})
            await self.store.async_link_user(user, cred)
            return cred

        hass = async_get_hass()
        meta = self._user_meta.get(flow_result["username"], {})

        provider = _async_get_hass_provider(hass)
        await provider.async_initialize()

        user = await hass.auth.async_create_user(flow_result["username"], group_ids=[meta.get("group")])
        cred = await provider.async_get_or_create_credentials({"username": flow_result["username"]})

        pretty_name = meta.get("fullname")
        if not pretty_name:
            pretty_name = flow_result["username"]
        await provider.data.async_save()
        await hass.auth.async_link_user(user, cred)
        if "person" in hass.config.components:
            await person.async_create_person(hass, pretty_name, user_id=user.id)
        # Create new credentials.
        return cred

    async def async_user_meta_for_credentials(
        self, credentials: Credentials
    ) -> UserMeta:
        """Return extra user metadata for credentials.

        Currently, supports name, group and local_only.
        """
        meta = self._user_meta.get(credentials.data["username"], {})
        username = credentials.data["username"]
        user_meta = UserMeta(
            name=credentials.data["username"],
            is_active=True,
            group=meta.get("group"),
            local_only=meta.get("local_only") == "true",
        )

        return user_meta

class CommandLineLoginFlow(LoginFlow):
    """Handler for the login flow."""

    async def async_step_init(
        self, user_input: dict[str, str] | None = None
    ) -> FlowResult:
        """Handle the step of the form."""
        errors = {}

        if user_input is not None:
            user_input["username"] = user_input["username"].strip()
            try:
                await cast(
                    CommandLineAuthProvider, self._auth_provider
                ).async_validate_login(user_input["username"], user_input["password"])
            except InvalidAuthError:
                errors["base"] = "invalid_auth"

            if not errors:
                user_input.pop("password")
                return await self.async_finish(user_input)

        return self.async_show_form(
            step_id="init",
            data_schema=vol.Schema(
                {
                    vol.Required("username"): str,
                    vol.Required("password"): str,
                }
            ),
            errors=errors,
        )


@callback
def _async_get_hass_provider(hass):
    """Get the Home Assistant auth provider."""
    for prv in hass.auth.auth_providers:
        if prv.type == "homeassistant":
            return prv

    raise RuntimeError("No Home Assistant provider found")
by 96bcaa76-0f27-45e7-9aa3-65c535e53a05

Gnome Console set max buffer length

Gnome Console no longer easily let’s you set a longer scroll buffer. It’s default length is just 10,000 lines which can be lacking at times. You can still configure it via gsettings though

gsettings set  org.gnome.Console scrollback-lines 9223372036854775807

set its to the max it can be as its an int64 number.

by 96bcaa76-0f27-45e7-9aa3-65c535e53a05

Nixos Always Latest

Nixos often has the latest versions of packages. Especially if you pull from unstable or directly from github, but there are times when the most bleeding edge of software has not been packaged yet. Nix does provide an easy fix though. For example I want to run the latest version of prusa-slicer I can do this easily by doing the following.

let
  mog_prusa-slicer = pkgs.unstable.prusa-slicer.overrideAttrs (oldAttrs: rec {
    version = "2.6.1-rc2";
    src = pkgs.fetchFromGitHub {
      owner = "prusa3d";
      repo = "PrusaSlicer";
      hash =
        "sha256-eSAKQNNNh4sDHwBTl0AmETlM+eFbC3PL5we5O5oOXfI="; # lib.fakeHash;
      rev = "version_${version}";
    };
  });
in {
  environment.systemPackages = with pkgs; [
    mog_prusa-slicer
  ];
}

this is altering the standard nixos package which is at 2.6.0 to build from the 2.6.1-rc2 version. Given the depdencies haven’t changed it just worked. To find the hash value you need you can use lib.fakeHash it will cause nix to give you the correct hash for the new version of the software you are trying to build.

by 96bcaa76-0f27-45e7-9aa3-65c535e53a05

Nixos debian backup

Often it is helpful to have a non nix environment to test things in, my go to choice is debian. this is my config. it just starts a debian instance via nspawn so its very fast.

First get the image and their public key from here hub nspawn

sudo sudo gpg --no-default-keyring \
         --keyserver=keys.openpgp.org \
         --keyring=/etc/systemd/import-pubring.gpg \
         --search 9E31BD4963FC2D19815FA7180E2A1E4B25A425F6
    
sudo machinectl pull-tar \
         --verify=signature \ 
         https://hub.nspawn.org/storage/debian/bookworm/tar/image.tar.xz \
         debian-bookworm

here is the configuation.


{ config, lib, pkgs, ... }:

{
  systemd.targets.machines.enable = true;
  systemd.nspawn."debian-bookworm" = {
    enable = true;
    execConfig = { Boot = true; };

    filesConfig = {
      BindReadOnly =
        [ "/etc/resolv.conf:/etc/resolv.conf" "/etc/hosts:/etc/hosts" ];
    };
    networkConfig = { Private = false; };
  };
  systemd.services."systemd-nspawn@debian-bookworm" = {
    enable = true;
    requiredBy = [ "machines.target" ];
    overrideStrategy = "asDropin";
  };
}

and I can enter it easily

machinectl login debian-bookworm
by 96bcaa76-0f27-45e7-9aa3-65c535e53a05