Merge pull request 'disable minecraft' (#629) from disable-minecraft into main
All checks were successful
Hydra jobsets Hydra build #24971 of nixos-config:.jobsets:jobsets

Reviewed-on: #629
This commit is contained in:
Charlotte 🦝 Delenk 2024-11-10 11:01:35 +00:00
commit 6d7cb628be
Signed by: gitea-bot
GPG key ID: C9974EDF9932B558

View file

@ -3,7 +3,8 @@
lib, lib,
modulesPath, modulesPath,
... ...
} @ args: { }@args:
{
networking.hostName = "instance-20221213-1915"; networking.hostName = "instance-20221213-1915";
networking.hostId = "746d4523"; networking.hostId = "746d4523";
@ -16,7 +17,7 @@
./services/shitalloverme.nix ./services/shitalloverme.nix
./users/remote-build.nix ./users/remote-build.nix
./services/atticd.nix ./services/atticd.nix
./services/minecraft.nix #./services/minecraft.nix
./services/postgres.nix ./services/postgres.nix
./services/uptime-kuma.nix ./services/uptime-kuma.nix
./services/reverse-proxy.nix ./services/reverse-proxy.nix
@ -27,10 +28,14 @@
./services/chir-rs.nix ./services/chir-rs.nix
]; ];
boot.initrd.availableKernelModules = ["xhci_pci" "virtio_pci" "usbhid"]; boot.initrd.availableKernelModules = [
boot.initrd.kernelModules = []; "xhci_pci"
boot.kernelModules = []; "virtio_pci"
boot.extraModulePackages = []; "usbhid"
];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ ];
boot.extraModulePackages = [ ];
fileSystems."/" = { fileSystems."/" = {
device = "tank/local/root"; device = "tank/local/root";
@ -89,7 +94,7 @@
services.postgresql.dataDir = "/persist/var/lib/postgresql/${config.services.postgresql.package.psqlSchema}"; services.postgresql.dataDir = "/persist/var/lib/postgresql/${config.services.postgresql.package.psqlSchema}";
networking.wireguard.interfaces."wg0".ips = ["fd0d:a262:1fa6:e621:746d:4523:5c04:1453/64"]; networking.wireguard.interfaces."wg0".ips = [ "fd0d:a262:1fa6:e621:746d:4523:5c04:1453/64" ];
home-manager.users.darkkirb = import ./home-manager/darkkirb.nix { home-manager.users.darkkirb = import ./home-manager/darkkirb.nix {
desktop = false; desktop = false;
inherit args; inherit args;
@ -122,8 +127,8 @@
owner = "root"; owner = "root";
path = "/etc/secrets/initrd/ssh_host_ed25519_key"; path = "/etc/secrets/initrd/ssh_host_ed25519_key";
}; };
sops.age.sshKeyPaths = lib.mkForce ["/persist/ssh/ssh_host_ed25519_key"]; sops.age.sshKeyPaths = lib.mkForce [ "/persist/ssh/ssh_host_ed25519_key" ];
services.bind.forwarders = lib.mkForce []; services.bind.forwarders = lib.mkForce [ ];
boot.loader.systemd-boot.configurationLimit = lib.mkForce 1; boot.loader.systemd-boot.configurationLimit = lib.mkForce 1;
services.tailscale.useRoutingFeatures = "server"; services.tailscale.useRoutingFeatures = "server";
services.postgresql.settings = { services.postgresql.settings = {
@ -145,5 +150,5 @@
max_parallel_maintenance_workers = 2; max_parallel_maintenance_workers = 2;
}; };
services.restic.backups.sysbackup.paths = ["/persist"]; services.restic.backups.sysbackup.paths = [ "/persist" ];
} }