Update to nixos 23.11
All checks were successful
Check Flake / check-flake (push) Successful in 1m24s
All checks were successful
Check Flake / check-flake (push) Successful in 1m24s
This commit is contained in:
parent
932b05a42e
commit
800a95d431
@ -72,9 +72,6 @@ in
|
|||||||
config = {
|
config = {
|
||||||
imports = allModules ++ [ cfg.config ];
|
imports = allModules ++ [ cfg.config ];
|
||||||
|
|
||||||
# speeds up evaluation
|
|
||||||
nixpkgs.pkgs = pkgs;
|
|
||||||
|
|
||||||
# networking.firewall.enable = mkForce false;
|
# networking.firewall.enable = mkForce false;
|
||||||
networking.firewall.trustedInterfaces = [
|
networking.firewall.trustedInterfaces = [
|
||||||
# completely trust internal interface to host
|
# completely trust internal interface to host
|
||||||
|
@ -12,12 +12,14 @@ in
|
|||||||
};
|
};
|
||||||
config = lib.mkIf cfg.enable {
|
config = lib.mkIf cfg.enable {
|
||||||
services.gitea = {
|
services.gitea = {
|
||||||
domain = cfg.hostname;
|
|
||||||
rootUrl = "https://${cfg.hostname}/";
|
|
||||||
appName = cfg.hostname;
|
appName = cfg.hostname;
|
||||||
# lfs.enable = true;
|
# lfs.enable = true;
|
||||||
# dump.enable = true;
|
# dump.enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
|
server = {
|
||||||
|
ROOT_URL = "https://${cfg.hostname}/";
|
||||||
|
DOMAIN = cfg.hostname;
|
||||||
|
};
|
||||||
other = {
|
other = {
|
||||||
SHOW_FOOTER_VERSION = false;
|
SHOW_FOOTER_VERSION = false;
|
||||||
};
|
};
|
||||||
|
@ -8,13 +8,12 @@ in
|
|||||||
config = lib.mkIf cfg.enable {
|
config = lib.mkIf cfg.enable {
|
||||||
services.nextcloud = {
|
services.nextcloud = {
|
||||||
https = true;
|
https = true;
|
||||||
package = pkgs.nextcloud25;
|
package = pkgs.nextcloud26;
|
||||||
hostName = "neet.cloud";
|
hostName = "neet.cloud";
|
||||||
config.dbtype = "sqlite";
|
config.dbtype = "sqlite";
|
||||||
config.adminuser = "jeremy";
|
config.adminuser = "jeremy";
|
||||||
config.adminpassFile = "/run/agenix/nextcloud-pw";
|
config.adminpassFile = "/run/agenix/nextcloud-pw";
|
||||||
autoUpdateApps.enable = true;
|
autoUpdateApps.enable = true;
|
||||||
enableBrokenCiphersForSSE = false;
|
|
||||||
};
|
};
|
||||||
age.secrets.nextcloud-pw = {
|
age.secrets.nextcloud-pw = {
|
||||||
file = ../../secrets/nextcloud-pw.age;
|
file = ../../secrets/nextcloud-pw.age;
|
||||||
|
8
flake.lock
generated
8
flake.lock
generated
@ -185,16 +185,16 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1695825837,
|
"lastModified": 1706515015,
|
||||||
"narHash": "sha256-4Ne11kNRnQsmSJCRSSNkFRSnHC4Y5gPDBIQGjjPfJiU=",
|
"narHash": "sha256-eFfY5A7wlYy3jD/75lx6IJRueg4noE+jowl0a8lIlVo=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "5cfafa12d57374f48bcc36fda3274ada276cf69e",
|
"rev": "f4a8d6d5324c327dcc2d863eb7f3cc06ad630df4",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"ref": "nixos-23.05",
|
"ref": "nixos-23.11",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs.url = "github:NixOS/nixpkgs/nixos-23.05";
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-23.11";
|
||||||
|
|
||||||
flake-utils.url = "github:numtide/flake-utils";
|
flake-utils.url = "github:numtide/flake-utils";
|
||||||
|
|
||||||
|
@ -96,7 +96,7 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
# pin postgresql for matrix (will need to migrate eventually)
|
# pin postgresql for matrix (will need to migrate eventually)
|
||||||
services.postgresql.package = pkgs.postgresql_11;
|
services.postgresql.package = pkgs.postgresql_15;
|
||||||
|
|
||||||
# iodine DNS-based vpn
|
# iodine DNS-based vpn
|
||||||
services.iodine.server.enable = true;
|
services.iodine.server.enable = true;
|
||||||
|
@ -38,7 +38,7 @@
|
|||||||
rocm-opencl-runtime
|
rocm-opencl-runtime
|
||||||
];
|
];
|
||||||
systemd.tmpfiles.rules = [
|
systemd.tmpfiles.rules = [
|
||||||
"L+ /opt/rocm/hip - - - - ${pkgs.hip}"
|
"L+ /opt/rocm/hip - - - - ${pkgs.rocmPackages.clr}"
|
||||||
];
|
];
|
||||||
|
|
||||||
# System wide barrier instance
|
# System wide barrier instance
|
||||||
|
@ -7,8 +7,8 @@ stdenv.mkDerivation rec {
|
|||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
owner = "google";
|
owner = "google";
|
||||||
repo = "gasket-driver";
|
repo = "gasket-driver";
|
||||||
rev = "97aeba584efd18983850c36dcf7384b0185284b3";
|
rev = "09385d485812088e04a98a6e1227bf92663e0b59";
|
||||||
sha256 = "pJwrrI7jVKFts4+bl2xmPIAD01VKFta2SRuElerQnTo=";
|
sha256 = "fcnqCBh04e+w8g079JyuyY2RPu34M+/X+Q8ObE+42i4=";
|
||||||
};
|
};
|
||||||
|
|
||||||
makeFlags = [
|
makeFlags = [
|
||||||
|
Loading…
x
Reference in New Issue
Block a user