Compare commits

..

8 Commits

Author SHA1 Message Date
772a484816 use postgres 15
All checks were successful
Check Flake / check-flake (push) Successful in 4m22s
2024-02-01 21:41:18 -07:00
eac4f0920f update gasket for linux >=6.4
All checks were successful
Check Flake / check-flake (push) Successful in 33m8s
2024-01-31 23:13:30 -07:00
ff6798e921 update removed/deprecated options
Some checks failed
Check Flake / check-flake (push) Failing after 15m35s
2024-01-31 22:45:10 -07:00
ee6ca75593 upgrade postgres
Some checks failed
Check Flake / check-flake (push) Failing after 9s
2024-01-31 22:18:35 -07:00
59177db9ad Remove dead option
Some checks failed
Check Flake / check-flake (push) Failing after 27s
2024-01-31 22:03:37 -07:00
9397099603 Use new rocm package
Some checks failed
Check Flake / check-flake (push) Failing after 7s
2024-01-31 21:51:41 -07:00
80be765bc0 Upgrade to supported nextcloud version
Some checks failed
Check Flake / check-flake (push) Failing after 21s
2024-01-31 21:47:47 -07:00
f7a02d3f8a Update to nixos 23.11
Some checks failed
Check Flake / check-flake (push) Failing after 1m45s
2024-01-31 21:42:13 -07:00
5 changed files with 16 additions and 49 deletions

View File

@ -18,7 +18,7 @@
nix.flakes.enable = true; nix.flakes.enable = true;
system.stateVersion = "23.11"; system.stateVersion = "21.11";
networking.useDHCP = false; networking.useDHCP = false;
@ -26,13 +26,7 @@
networking.firewall.allowPing = true; networking.firewall.allowPing = true;
time.timeZone = "America/Denver"; time.timeZone = "America/Denver";
i18n = { i18n.defaultLocale = "en_US.UTF-8";
defaultLocale = "en_US.UTF-8";
extraLocaleSettings = {
LANGUAGE = "en_US.UTF-8";
LC_ALL = "en_US.UTF-8";
};
};
services.openssh = { services.openssh = {
enable = true; enable = true;

View File

@ -13,7 +13,7 @@ in
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
services.gitea = { services.gitea = {
appName = cfg.hostname; appName = cfg.hostname;
lfs.enable = true; # lfs.enable = true;
# dump.enable = true; # dump.enable = true;
settings = { settings = {
server = { server = {
@ -31,9 +31,6 @@ in
}; };
session = { session = {
COOKIE_SECURE = true; COOKIE_SECURE = true;
PROVIDER = "db";
SESSION_LIFE_TIME = 259200; # 3 days
GC_INTERVAL_TIME = 259200; # 3 days
}; };
mailer = { mailer = {
ENABLED = true; ENABLED = true;
@ -47,9 +44,6 @@ in
actions = { actions = {
ENABLED = true; ENABLED = true;
}; };
indexer = {
REPO_INDEXER_ENABLED = true;
};
}; };
mailerPasswordFile = "/run/agenix/robots-email-pw"; mailerPasswordFile = "/run/agenix/robots-email-pw";
}; };
@ -68,7 +62,7 @@ in
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
locations."/" = { locations."/" = {
proxyPass = "http://localhost:${toString cfg.settings.server.HTTP_PORT}"; proxyPass = "http://localhost:${toString cfg.httpPort}";
}; };
}; };
}; };

View File

@ -8,7 +8,7 @@ in
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
services.nextcloud = { services.nextcloud = {
https = true; https = true;
package = pkgs.nextcloud28; package = pkgs.nextcloud26;
hostName = "neet.cloud"; hostName = "neet.cloud";
config.dbtype = "sqlite"; config.dbtype = "sqlite";
config.adminuser = "jeremy"; config.adminuser = "jeremy";

View File

@ -63,32 +63,17 @@
}; };
}; };
pia.wireguard.badPortForwardPorts = [ ]; pia.wireguard.badPortForwardPorts = [ ];
services.nginx.virtualHosts = { services.nginx.virtualHosts."radio.runyan.org" = {
"radio.runyan.org" = { enableACME = true;
enableACME = true; forceSSL = true;
forceSSL = true; locations = {
locations = { "/stream.mp3" = {
"/stream.mp3" = { proxyPass = "http://vpn.containers:8001/stream.mp3";
proxyPass = "http://vpn.containers:8001/stream.mp3"; extraConfig = ''
extraConfig = '' add_header Access-Control-Allow-Origin *;
add_header Access-Control-Allow-Origin *; '';
'';
};
"/".root = config.inputs.radio-web;
};
};
"radio.neet.space" = {
enableACME = true;
forceSSL = true;
locations = {
"/stream.mp3" = {
proxyPass = "http://vpn.containers:8001/stream.mp3";
extraConfig = ''
add_header Access-Control-Allow-Origin *;
'';
};
"/".root = config.inputs.radio-web;
}; };
"/".root = config.inputs.radio-web;
}; };
}; };

View File

@ -116,19 +116,13 @@
# "speed-limit-up-enabled" = true; # "speed-limit-up-enabled" = true;
/* seeding limit */ /* seeding limit */
"ratio-limit" = 3; "ratio-limit" = 2;
"ratio-limit-enabled" = true; "ratio-limit-enabled" = true;
"download-queue-enabled" = true; "download-queue-enabled" = true;
"download-queue-size" = 20; # gotta go fast "download-queue-size" = 20; # gotta go fast
}; };
}; };
# https://github.com/NixOS/nixpkgs/issues/258793
systemd.services.transmission.serviceConfig = {
RootDirectoryStartOnly = lib.mkForce (lib.mkForce false);
RootDirectory = lib.mkForce (lib.mkForce "");
};
users.groups.public_data.gid = 994; users.groups.public_data.gid = 994;
users.users.public_data = { users.users.public_data = {
isSystemUser = true; isSystemUser = true;