Revert "hedgedoc update"
All checks were successful
continuous-integration/drone/push Build is passing
All checks were successful
continuous-integration/drone/push Build is passing
This commit is contained in:
parent
ee8dd1022a
commit
2441b7c151
3 changed files with 10 additions and 10 deletions
12
flake.lock
12
flake.lock
|
@ -257,16 +257,16 @@
|
||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1654258420,
|
"lastModified": 1654019511,
|
||||||
"narHash": "sha256-H6oJnoRzsQIwpNfMFnqGex+6dZ1YL6TGFQfRzyEO5R8=",
|
"narHash": "sha256-s3fcwUxa2rV2ZmSbdOtisNmXqeqnF9IFrvhPQL5GCBU=",
|
||||||
"owner": "NULLx76",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "5506d60e56272eee4a1b111cf05dfa585a91f68d",
|
"rev": "692517bf851f2d8d999f0ad50f53fa1d2dd5c8f9",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "NULLx76",
|
"owner": "nixos",
|
||||||
"ref": "0x76",
|
"ref": "nixos-unstable",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
|
|
|
@ -6,7 +6,7 @@
|
||||||
# * https://git.voidcorp.nl/j00lz/nixos-configs/src/branch/main/flake.nix
|
# * https://git.voidcorp.nl/j00lz/nixos-configs/src/branch/main/flake.nix
|
||||||
|
|
||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs.url = "github:NULLx76/nixpkgs/0x76";
|
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
|
||||||
|
|
||||||
deploy-rs.url = "github:serokell/deploy-rs";
|
deploy-rs.url = "github:serokell/deploy-rs";
|
||||||
deploy-rs.inputs.nixpkgs.follows = "nixpkgs";
|
deploy-rs.inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
|
|
@ -26,7 +26,7 @@ in
|
||||||
|
|
||||||
environment.noXlibs = lib.mkForce false;
|
environment.noXlibs = lib.mkForce false;
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ config.services.hedgedoc.settings.port ];
|
networking.firewall.allowedTCPPorts = [ config.services.hedgedoc.configuration.port ];
|
||||||
|
|
||||||
vault-secrets.secrets.hedgedoc = { };
|
vault-secrets.secrets.hedgedoc = { };
|
||||||
|
|
||||||
|
@ -46,7 +46,7 @@ in
|
||||||
services.hedgedoc = {
|
services.hedgedoc = {
|
||||||
enable = true;
|
enable = true;
|
||||||
environmentFile = "${vs.hedgedoc}/environment";
|
environmentFile = "${vs.hedgedoc}/environment";
|
||||||
settings = {
|
configuration = {
|
||||||
host = "0.0.0.0";
|
host = "0.0.0.0";
|
||||||
port = 3000;
|
port = 3000;
|
||||||
sessionSecret = "$SESSION_SECRET";
|
sessionSecret = "$SESSION_SECRET";
|
||||||
|
@ -54,7 +54,7 @@ in
|
||||||
protocolUseSSL = true;
|
protocolUseSSL = true;
|
||||||
hsts.enable = true;
|
hsts.enable = true;
|
||||||
allowOrigin = [
|
allowOrigin = [
|
||||||
config.services.hedgedoc.settings.domain
|
config.services.hedgedoc.configuration.domain
|
||||||
"hedgedoc"
|
"hedgedoc"
|
||||||
];
|
];
|
||||||
allowAnonymous = false;
|
allowAnonymous = false;
|
||||||
|
|
Loading…
Reference in a new issue