Fixed some issues after 25.11 update (stargate)
This commit is contained in:
parent
a532aa5b44
commit
88223c0172
9 changed files with 76 additions and 76 deletions
|
|
@ -1,9 +1,11 @@
|
||||||
{...}: {
|
{...}: {
|
||||||
programs.git = {
|
programs.git = {
|
||||||
enable = true;
|
enable = true;
|
||||||
userName = "Aleksandr Lebedev";
|
settings = {
|
||||||
userEmail = "alex.lebedev2003@icloud.com";
|
user = {
|
||||||
extraConfig = {
|
name = "Aleksandr Lebedev";
|
||||||
|
email = "alex.lebedev2003@icloud.com";
|
||||||
|
};
|
||||||
credential.helper = "manager";
|
credential.helper = "manager";
|
||||||
credential."https://github.com".username = "KyleKrein";
|
credential."https://github.com".username = "KyleKrein";
|
||||||
credential.credentialStore = "plaintext";
|
credential.credentialStore = "plaintext";
|
||||||
|
|
|
||||||
|
|
@ -31,10 +31,10 @@ in {
|
||||||
++ optional (cfg.swapFileOffset != null) "resume_offset=${builtins.toString cfg.swapFileOffset}";
|
++ optional (cfg.swapFileOffset != null) "resume_offset=${builtins.toString cfg.swapFileOffset}";
|
||||||
resumeDevice = mkDefault cfg.resumeDevice;
|
resumeDevice = mkDefault cfg.resumeDevice;
|
||||||
};
|
};
|
||||||
services.logind = {
|
services.logind.settings.Login = {
|
||||||
lidSwitch = mkDefault "suspend-then-hibernate";
|
HandleLidSwitch = mkDefault "suspend-then-hibernate";
|
||||||
powerKey = mkDefault "suspend-then-hibernate";
|
HandlePowerKey = mkDefault "suspend-then-hibernate";
|
||||||
powerKeyLongPress = mkDefault "poweroff";
|
HandlePowerKeyLongPress = mkDefault "poweroff";
|
||||||
};
|
};
|
||||||
systemd.sleep.extraConfig = ''
|
systemd.sleep.extraConfig = ''
|
||||||
HibernateDelaySec=30m
|
HibernateDelaySec=30m
|
||||||
|
|
|
||||||
|
|
@ -54,10 +54,10 @@ in {
|
||||||
clean.extraArgs = "--keep-since 4d --keep 3";
|
clean.extraArgs = "--keep-since 4d --keep 3";
|
||||||
flake = "/etc/nixos-config";
|
flake = "/etc/nixos-config";
|
||||||
};
|
};
|
||||||
services.logind = {
|
services.logind.settings.Login = {
|
||||||
lidSwitch = mkDefault "suspend";
|
HandleLidSwitch = mkDefault "suspend";
|
||||||
powerKey = mkDefault "suspend";
|
HandlePowerKey = mkDefault "suspend";
|
||||||
powerKeyLongPress = mkDefault "poweroff";
|
HandlePowerKeyLongPress = mkDefault "poweroff";
|
||||||
};
|
};
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
nix-output-monitor
|
nix-output-monitor
|
||||||
|
|
|
||||||
|
|
@ -24,7 +24,7 @@ in {
|
||||||
then ./facter.json
|
then ./facter.json
|
||||||
else null;
|
else null;
|
||||||
imports = lib.snowfall.fs.get-non-default-nix-files ./. ++ [../stargate/services/adguardhome.nix];
|
imports = lib.snowfall.fs.get-non-default-nix-files ./. ++ [../stargate/services/adguardhome.nix];
|
||||||
services.adguardhome.settings.dns.bind_hosts = [ "192.168.178.119" ];
|
services.adguardhome.settings.dns.bind_hosts = ["192.168.178.119"];
|
||||||
|
|
||||||
environment.sessionVariables = {
|
environment.sessionVariables = {
|
||||||
NIXOS_OZONE_WL = "1";
|
NIXOS_OZONE_WL = "1";
|
||||||
|
|
|
||||||
|
|
@ -119,7 +119,7 @@ in {
|
||||||
wget
|
wget
|
||||||
];
|
];
|
||||||
|
|
||||||
services.adguardhome.settings.dns.bind_hosts = [ "192.168.178.129" ];
|
services.adguardhome.settings.dns.bind_hosts = ["192.168.178.129"];
|
||||||
|
|
||||||
hardware.enableAllHardware = true;
|
hardware.enableAllHardware = true;
|
||||||
hardware.enableAllFirmware = true;
|
hardware.enableAllFirmware = true;
|
||||||
|
|
|
||||||
|
|
@ -45,7 +45,7 @@ in {
|
||||||
safe_search = {enabled = false;};
|
safe_search = {enabled = false;};
|
||||||
rewrites =
|
rewrites =
|
||||||
map (url: {
|
map (url: {
|
||||||
enabled = true;
|
enabled = true;
|
||||||
answer = localIp;
|
answer = localIp;
|
||||||
domain = url;
|
domain = url;
|
||||||
}) [
|
}) [
|
||||||
|
|
|
||||||
|
|
@ -3,18 +3,16 @@
|
||||||
lib,
|
lib,
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
}:
|
}: let
|
||||||
let
|
domain = "ente.kylekrein.com";
|
||||||
domain = "ente.kylekrein.com";
|
in {
|
||||||
in
|
sops.secrets."services/minio" = {owner = "minio";};
|
||||||
{
|
services.minio = {
|
||||||
sops.secrets."services/minio" = {owner = "minio";};
|
enable = true;
|
||||||
services.minio = {
|
# ente's config must match this region!
|
||||||
enable = true;
|
region = "us-east-1";
|
||||||
# ente's config must match this region!
|
listenAddress = ":21939";
|
||||||
region = "us-east-1";
|
consoleAddress = ":21940";
|
||||||
listenAddress = ":21939";
|
|
||||||
consoleAddress = ":21940";
|
|
||||||
# Please use a file, agenix or sops-nix to securely store your root user password!
|
# Please use a file, agenix or sops-nix to securely store your root user password!
|
||||||
# MINIO_ROOT_USER=your_root_user
|
# MINIO_ROOT_USER=your_root_user
|
||||||
# MINIO_ROOT_PASSWORD=a_randomly_generated_long_password
|
# MINIO_ROOT_PASSWORD=a_randomly_generated_long_password
|
||||||
|
|
@ -24,7 +22,7 @@ in
|
||||||
systemd.services.minio.environment.MINIO_SERVER_URL = "https://s3.kylekrein.com";
|
systemd.services.minio.environment.MINIO_SERVER_URL = "https://s3.kylekrein.com";
|
||||||
|
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
virtualHosts."web.s3.kylekrein.com" = {
|
virtualHosts."web.s3.kylekrein.com" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
locations."/".proxyPass = "http://localhost:21940";
|
locations."/".proxyPass = "http://localhost:21940";
|
||||||
|
|
@ -46,50 +44,50 @@ in
|
||||||
sops.secrets."services/ente/encryption" = {owner = "ente";};
|
sops.secrets."services/ente/encryption" = {owner = "ente";};
|
||||||
sops.secrets."services/ente/hash" = {owner = "ente";};
|
sops.secrets."services/ente/hash" = {owner = "ente";};
|
||||||
sops.secrets."services/ente/jwt" = {owner = "ente";};
|
sops.secrets."services/ente/jwt" = {owner = "ente";};
|
||||||
services.ente = {
|
services.ente = {
|
||||||
web = {
|
web = {
|
||||||
enable = true;
|
enable = true;
|
||||||
domains = {
|
domains = {
|
||||||
photos = "photos.${domain}";
|
photos = "photos.${domain}";
|
||||||
albums = "albums.${domain}";
|
albums = "albums.${domain}";
|
||||||
cast = "cast.${domain}";
|
cast = "cast.${domain}";
|
||||||
api = "api.${domain}";
|
api = "api.${domain}";
|
||||||
accounts = "accounts.${domain}";
|
accounts = "accounts.${domain}";
|
||||||
};
|
};
|
||||||
};
|
|
||||||
api = {
|
|
||||||
enable = true;
|
|
||||||
domain = "api.${domain}";
|
|
||||||
enableLocalDB = true;
|
|
||||||
nginx.enable = true;
|
|
||||||
settings = {
|
|
||||||
apps.accounts = "https://accounts.${domain}";
|
|
||||||
apps.cast = "https://cast.${domain}";
|
|
||||||
public-albums = "https://albums.${domain}";
|
|
||||||
s3 = {
|
|
||||||
b2-eu-cen = {
|
|
||||||
are_local_buckets = false;
|
|
||||||
use_path_style_urls = true;
|
|
||||||
endpoint = "https://s3.kylekrein.com";
|
|
||||||
region = "us-east-1";
|
|
||||||
bucket = "ente";
|
|
||||||
key._secret = config.sops.secrets."services/ente/minio/user".path;
|
|
||||||
secret._secret = config.sops.secrets."services/ente/minio/password".path;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
key = {
|
|
||||||
# generate with: openssl rand -base64 32
|
|
||||||
encryption._secret = config.sops.secrets."services/ente/encryption".path;
|
|
||||||
# generate with: openssl rand -base64 64
|
|
||||||
hash._secret = config.sops.secrets."services/ente/hash".path;
|
|
||||||
};
|
|
||||||
# generate with: openssl rand -base64 32
|
|
||||||
jwt.secret._secret = config.sops.secrets."services/ente/jwt".path;
|
|
||||||
internal = {
|
|
||||||
admin = 1580559962386438;
|
|
||||||
disable-registration = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
api = {
|
||||||
|
enable = true;
|
||||||
|
domain = "api.${domain}";
|
||||||
|
enableLocalDB = true;
|
||||||
|
nginx.enable = true;
|
||||||
|
settings = {
|
||||||
|
apps.accounts = "https://accounts.${domain}";
|
||||||
|
apps.cast = "https://cast.${domain}";
|
||||||
|
public-albums = "https://albums.${domain}";
|
||||||
|
s3 = {
|
||||||
|
b2-eu-cen = {
|
||||||
|
are_local_buckets = false;
|
||||||
|
use_path_style_urls = true;
|
||||||
|
endpoint = "https://s3.kylekrein.com";
|
||||||
|
region = "us-east-1";
|
||||||
|
bucket = "ente";
|
||||||
|
key._secret = config.sops.secrets."services/ente/minio/user".path;
|
||||||
|
secret._secret = config.sops.secrets."services/ente/minio/password".path;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
key = {
|
||||||
|
# generate with: openssl rand -base64 32
|
||||||
|
encryption._secret = config.sops.secrets."services/ente/encryption".path;
|
||||||
|
# generate with: openssl rand -base64 64
|
||||||
|
hash._secret = config.sops.secrets."services/ente/hash".path;
|
||||||
|
};
|
||||||
|
# generate with: openssl rand -base64 32
|
||||||
|
jwt.secret._secret = config.sops.secrets."services/ente/jwt".path;
|
||||||
|
internal = {
|
||||||
|
admin = 1580559962386438;
|
||||||
|
disable-registration = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
|
||||||
|
|
@ -41,7 +41,7 @@ in {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
"ente.kylekrein.com" = {
|
"ente.kylekrein.com" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
|
|
|
||||||
|
|
@ -6,8 +6,8 @@
|
||||||
}: {
|
}: {
|
||||||
services.postfix = {
|
services.postfix = {
|
||||||
enable = true;
|
enable = true;
|
||||||
config = {
|
settings.main = {
|
||||||
myhostname = "stargate.local";
|
myhostname = "notthebees.org";
|
||||||
mydestination = "localhost, localhost.com";
|
mydestination = "localhost, localhost.com";
|
||||||
|
|
||||||
relay_domains = ["notthebees.org"];
|
relay_domains = ["notthebees.org"];
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue