Revert "hedgedoc update"
All checks were successful
continuous-integration/drone/push Build is passing

This commit is contained in:
Vivian 2022-06-03 16:35:55 +02:00
parent ee8dd1022a
commit 2441b7c151
3 changed files with 10 additions and 10 deletions

View file

@ -257,16 +257,16 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1654258420, "lastModified": 1654019511,
"narHash": "sha256-H6oJnoRzsQIwpNfMFnqGex+6dZ1YL6TGFQfRzyEO5R8=", "narHash": "sha256-s3fcwUxa2rV2ZmSbdOtisNmXqeqnF9IFrvhPQL5GCBU=",
"owner": "NULLx76", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "5506d60e56272eee4a1b111cf05dfa585a91f68d", "rev": "692517bf851f2d8d999f0ad50f53fa1d2dd5c8f9",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "NULLx76", "owner": "nixos",
"ref": "0x76", "ref": "nixos-unstable",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }

View file

@ -6,7 +6,7 @@
# * https://git.voidcorp.nl/j00lz/nixos-configs/src/branch/main/flake.nix # * https://git.voidcorp.nl/j00lz/nixos-configs/src/branch/main/flake.nix
inputs = { inputs = {
nixpkgs.url = "github:NULLx76/nixpkgs/0x76"; nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
deploy-rs.url = "github:serokell/deploy-rs"; deploy-rs.url = "github:serokell/deploy-rs";
deploy-rs.inputs.nixpkgs.follows = "nixpkgs"; deploy-rs.inputs.nixpkgs.follows = "nixpkgs";

View file

@ -26,7 +26,7 @@ in
environment.noXlibs = lib.mkForce false; environment.noXlibs = lib.mkForce false;
networking.firewall.allowedTCPPorts = [ config.services.hedgedoc.settings.port ]; networking.firewall.allowedTCPPorts = [ config.services.hedgedoc.configuration.port ];
vault-secrets.secrets.hedgedoc = { }; vault-secrets.secrets.hedgedoc = { };
@ -46,7 +46,7 @@ in
services.hedgedoc = { services.hedgedoc = {
enable = true; enable = true;
environmentFile = "${vs.hedgedoc}/environment"; environmentFile = "${vs.hedgedoc}/environment";
settings = { configuration = {
host = "0.0.0.0"; host = "0.0.0.0";
port = 3000; port = 3000;
sessionSecret = "$SESSION_SECRET"; sessionSecret = "$SESSION_SECRET";
@ -54,7 +54,7 @@ in
protocolUseSSL = true; protocolUseSSL = true;
hsts.enable = true; hsts.enable = true;
allowOrigin = [ allowOrigin = [
config.services.hedgedoc.settings.domain config.services.hedgedoc.configuration.domain
"hedgedoc" "hedgedoc"
]; ];
allowAnonymous = false; allowAnonymous = false;