Skip to content

Commit

Permalink
fix(server): small errors
Browse files Browse the repository at this point in the history
  • Loading branch information
System administrator committed Aug 16, 2023
1 parent 7633bb4 commit 8dc890d
Show file tree
Hide file tree
Showing 7 changed files with 25 additions and 25 deletions.
24 changes: 12 additions & 12 deletions flake.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

5 changes: 1 addition & 4 deletions hosts/bernie/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,7 @@

boot = {
loader = "grub";
device = lib.mkForce "/dev/sda15";
enableKernelTweaks = true;
enableInitrdTweaks = true;
loadRecommendedModules = true;
Expand Down Expand Up @@ -71,7 +72,6 @@
};

zramSwap.enable = true;
boot.cleanTmpDir = true;
services.openssh.enable = true;
users.users.root.openssh.authorizedKeys.keys = [
"ssh-rsa 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 root"
Expand All @@ -88,9 +88,6 @@
};
};

networking.domain = "isabelroses.com";
networking.useDHCP = lib.mkDefault true;

nix.settings.system-features = ["nixos-test" "benchmark" "big-parallel" "kvm" "gccarch-armv8-a"];
};
}
3 changes: 0 additions & 3 deletions hosts/hydra/hardware-configuration.nix
Original file line number Diff line number Diff line change
@@ -1,6 +1,3 @@
# Do not modify this file! It was generated by ‘nixos-generate-config’
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{
config,
lib,
Expand Down
4 changes: 1 addition & 3 deletions modules/common/core/system/boot/loader/grub/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -9,10 +9,8 @@
in {
config = mkIf (cfg.boot.loader == "grub") {
boot.loader = {
# default grub to disabled, we manually enable grub on "server" hosts
# or any other host that needs it
grub = {
enable = mkDefault false;
enable = mkDefault true;
useOSProber = true;
efiSupport = true;
enableCryptodisk = mkDefault false;
Expand Down
6 changes: 6 additions & 0 deletions modules/common/options/system/boot.nix
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,12 @@ with lib; {
description = "The bootloader that should be used for the device.";
};

device = mkOption {
type = with types; nullOr str;
default = "nodev";
description = "The device to install the bootloader to.";
};

plymouth = {
enable = mkEnableOption "plymouth boot splash";
withThemes = mkEnableOption "plymouth theme";
Expand Down
6 changes: 4 additions & 2 deletions modules/common/types/server/services/nginx/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -46,6 +46,7 @@ in {
};
# vaultwawrden
"vault.isabelroses.com" =
mkIf (config.modules.services.vaultwarden.enable)
template
// {
locations."/" = {
Expand All @@ -55,16 +56,17 @@ in {
};
# gitea
"git.isabelroses.com" =
mkIf (config.modules.services.gitea.enable)
template
// {
locations."/".proxyPass = "http://127.0.0.1:${toString config.services.gitea.settings.server.HTTP_PORT}";
};

# mailserver
"mail.isabelroses.com" = template;
"mail.isabelroses.com" = mkIf (config.modules.services.mailserver.enable) template;

# webmail
"webmail.isabelroses.com" = template;
"webmail.isabelroses.com" = mkIf (config.modules.services.mailserver.enable) template;

"search.isabelroses.com" =
template
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ in {

services.vaultwarden = {
enable = true;
environmentFile = config.age.secrets.vaultwarden-env.path;
environmentFile = config.sops.secrets.vaultwarden-env.path;
backupDir = "/srv/storage/vaultwarden/backup";
config = {
DOMAIN = "https://vault.isabelroses.com";
Expand Down

0 comments on commit 8dc890d

Please sign in to comment.