typos + inseucre packages deprecated
All checks were successful
Weekly NixOS Build & Cache / build-and-cache (push) Successful in 2h4m52s
All checks were successful
Weekly NixOS Build & Cache / build-and-cache (push) Successful in 2h4m52s
This commit is contained in:
@@ -71,14 +71,6 @@
|
|||||||
nixpkgs.config = {
|
nixpkgs.config = {
|
||||||
allowUnfree = true;
|
allowUnfree = true;
|
||||||
allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [ "corefonts" ];
|
allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [ "corefonts" ];
|
||||||
permittedInsecurePackages = [
|
|
||||||
"aspnetcore-runtime-wrapped-6.0.36"
|
|
||||||
"aspnetcore-runtime-6.0.36"
|
|
||||||
"dotnet-runtime-6.0.36"
|
|
||||||
"dotnet-sdk-wrapped-6.0.428"
|
|
||||||
"dotnet-sdk-6.0.428"
|
|
||||||
"mbedtls-2.28.10"
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
nix = {
|
nix = {
|
||||||
nixPath = [ "nixpkgs=${inputs.nixpkgs}" ];
|
nixPath = [ "nixpkgs=${inputs.nixpkgs}" ];
|
||||||
|
|||||||
@@ -31,7 +31,6 @@
|
|||||||
(buildMachine "workstation" 8 40)
|
(buildMachine "workstation" 8 40)
|
||||||
(buildMachine "server" 6 17)
|
(buildMachine "server" 6 17)
|
||||||
];
|
];
|
||||||
nixpkgs.config.permittedInsecurePackages = [ "openssl-1.1.1w" ];
|
|
||||||
networking = {
|
networking = {
|
||||||
hostName = "miniserver";
|
hostName = "miniserver";
|
||||||
firewall = {
|
firewall = {
|
||||||
|
|||||||
@@ -48,6 +48,7 @@ in
|
|||||||
supportedFeatures = config.my.nix.features;
|
supportedFeatures = config.my.nix.features;
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
|
nixpkgs.config.permittedInsecurePackages = [ "mbedtls-2.28.10" ];
|
||||||
sops.secrets = {
|
sops.secrets = {
|
||||||
"server/private" = lib.mkIf config.my.secureHost {
|
"server/private" = lib.mkIf config.my.secureHost {
|
||||||
sopsFile = ../../secrets/wireguard.yaml;
|
sopsFile = ../../secrets/wireguard.yaml;
|
||||||
|
|||||||
@@ -49,10 +49,6 @@ in
|
|||||||
owner = config.users.users.nextcloud.name;
|
owner = config.users.users.nextcloud.name;
|
||||||
inherit (config.users.users.nextcloud) group;
|
inherit (config.users.users.nextcloud) group;
|
||||||
};
|
};
|
||||||
nixpkgs.config.permittedInsecurePackages = [
|
|
||||||
"nodejs-14.21.3"
|
|
||||||
"openssl-1.1.1v"
|
|
||||||
];
|
|
||||||
users = {
|
users = {
|
||||||
groups.nextcloud = {
|
groups.nextcloud = {
|
||||||
inherit gid;
|
inherit gid;
|
||||||
|
|||||||
@@ -24,7 +24,7 @@ in
|
|||||||
settings = {
|
settings = {
|
||||||
PAPERLESS_ACCOUNT_DEFAULT_HTTP_PROTOCOL = "http";
|
PAPERLESS_ACCOUNT_DEFAULT_HTTP_PROTOCOL = "http";
|
||||||
PAPERLESS_URL = "http://${config.my.ips.server}:${builtins.toString port}";
|
PAPERLESS_URL = "http://${config.my.ips.server}:${builtins.toString port}";
|
||||||
PAPERLESS_DBENGINE = "postgress";
|
PAPERLESS_DBENGINE = "postgresql";
|
||||||
PAPERLESS_DBNAME = "paperless";
|
PAPERLESS_DBNAME = "paperless";
|
||||||
PAPERLESS_DBHOST = config.my.postgresSocket;
|
PAPERLESS_DBHOST = config.my.postgresSocket;
|
||||||
PAPERLESS_TIME_ZONE = config.my.timeZone;
|
PAPERLESS_TIME_ZONE = config.my.timeZone;
|
||||||
|
|||||||
Reference in New Issue
Block a user