Merge pull request 'disable minecraft' (#629) from disable-minecraft into main
All checks were successful
Hydra jobsets Hydra build #24971 of nixos-config:.jobsets:jobsets
All checks were successful
Hydra jobsets Hydra build #24971 of nixos-config:.jobsets:jobsets
Reviewed-on: #629
This commit is contained in:
commit
6d7cb628be
1 changed files with 15 additions and 10 deletions
|
@ -3,7 +3,8 @@
|
||||||
lib,
|
lib,
|
||||||
modulesPath,
|
modulesPath,
|
||||||
...
|
...
|
||||||
} @ args: {
|
}@args:
|
||||||
|
{
|
||||||
networking.hostName = "instance-20221213-1915";
|
networking.hostName = "instance-20221213-1915";
|
||||||
networking.hostId = "746d4523";
|
networking.hostId = "746d4523";
|
||||||
|
|
||||||
|
@ -16,7 +17,7 @@
|
||||||
./services/shitalloverme.nix
|
./services/shitalloverme.nix
|
||||||
./users/remote-build.nix
|
./users/remote-build.nix
|
||||||
./services/atticd.nix
|
./services/atticd.nix
|
||||||
./services/minecraft.nix
|
#./services/minecraft.nix
|
||||||
./services/postgres.nix
|
./services/postgres.nix
|
||||||
./services/uptime-kuma.nix
|
./services/uptime-kuma.nix
|
||||||
./services/reverse-proxy.nix
|
./services/reverse-proxy.nix
|
||||||
|
@ -27,10 +28,14 @@
|
||||||
./services/chir-rs.nix
|
./services/chir-rs.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.initrd.availableKernelModules = ["xhci_pci" "virtio_pci" "usbhid"];
|
boot.initrd.availableKernelModules = [
|
||||||
boot.initrd.kernelModules = [];
|
"xhci_pci"
|
||||||
boot.kernelModules = [];
|
"virtio_pci"
|
||||||
boot.extraModulePackages = [];
|
"usbhid"
|
||||||
|
];
|
||||||
|
boot.initrd.kernelModules = [ ];
|
||||||
|
boot.kernelModules = [ ];
|
||||||
|
boot.extraModulePackages = [ ];
|
||||||
|
|
||||||
fileSystems."/" = {
|
fileSystems."/" = {
|
||||||
device = "tank/local/root";
|
device = "tank/local/root";
|
||||||
|
@ -89,7 +94,7 @@
|
||||||
|
|
||||||
services.postgresql.dataDir = "/persist/var/lib/postgresql/${config.services.postgresql.package.psqlSchema}";
|
services.postgresql.dataDir = "/persist/var/lib/postgresql/${config.services.postgresql.package.psqlSchema}";
|
||||||
|
|
||||||
networking.wireguard.interfaces."wg0".ips = ["fd0d:a262:1fa6:e621:746d:4523:5c04:1453/64"];
|
networking.wireguard.interfaces."wg0".ips = [ "fd0d:a262:1fa6:e621:746d:4523:5c04:1453/64" ];
|
||||||
home-manager.users.darkkirb = import ./home-manager/darkkirb.nix {
|
home-manager.users.darkkirb = import ./home-manager/darkkirb.nix {
|
||||||
desktop = false;
|
desktop = false;
|
||||||
inherit args;
|
inherit args;
|
||||||
|
@ -122,8 +127,8 @@
|
||||||
owner = "root";
|
owner = "root";
|
||||||
path = "/etc/secrets/initrd/ssh_host_ed25519_key";
|
path = "/etc/secrets/initrd/ssh_host_ed25519_key";
|
||||||
};
|
};
|
||||||
sops.age.sshKeyPaths = lib.mkForce ["/persist/ssh/ssh_host_ed25519_key"];
|
sops.age.sshKeyPaths = lib.mkForce [ "/persist/ssh/ssh_host_ed25519_key" ];
|
||||||
services.bind.forwarders = lib.mkForce [];
|
services.bind.forwarders = lib.mkForce [ ];
|
||||||
boot.loader.systemd-boot.configurationLimit = lib.mkForce 1;
|
boot.loader.systemd-boot.configurationLimit = lib.mkForce 1;
|
||||||
services.tailscale.useRoutingFeatures = "server";
|
services.tailscale.useRoutingFeatures = "server";
|
||||||
services.postgresql.settings = {
|
services.postgresql.settings = {
|
||||||
|
@ -145,5 +150,5 @@
|
||||||
max_parallel_maintenance_workers = 2;
|
max_parallel_maintenance_workers = 2;
|
||||||
};
|
};
|
||||||
|
|
||||||
services.restic.backups.sysbackup.paths = ["/persist"];
|
services.restic.backups.sysbackup.paths = [ "/persist" ];
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue