updated olympus
Some checks are pending
Plex Update / update (push) Waiting to run

This commit is contained in:
Vivian 2024-11-01 16:51:49 +01:00
parent c5bc2e1a19
commit 9d976b6c2f
10 changed files with 33 additions and 59 deletions

66
flake.lock generated
View file

@ -624,11 +624,11 @@
]
},
"locked": {
"lastModified": 1729104314,
"narHash": "sha256-pZRZsq5oCdJt3upZIU4aslS9XwFJ+/nVtALHIciX/BI=",
"lastModified": 1730302582,
"narHash": "sha256-W1MIJpADXQCgosJZT8qBYLRuZls2KSiKdpnTVdKBuvU=",
"owner": "cachix",
"repo": "git-hooks.nix",
"rev": "3c3e88f0f544d6bb54329832616af7eb971b6be6",
"rev": "af8a16fe5c264f5e9e18bcee2859b40a656876cf",
"type": "github"
},
"original": {
@ -723,11 +723,11 @@
]
},
"locked": {
"lastModified": 1730016908,
"narHash": "sha256-bFCxJco7d8IgmjfNExNz9knP8wvwbXU4s/d53KOK6U0=",
"lastModified": 1730450782,
"narHash": "sha256-0AfApF8aexgB6o34qqLW2cCX4LaWJajBVdU6ddiWZBM=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "e83414058edd339148dc142a8437edb9450574c8",
"rev": "8ca921e5a806b5b6171add542defe7bdac79d189",
"type": "github"
},
"original": {
@ -855,11 +855,11 @@
"spectrum": "spectrum"
},
"locked": {
"lastModified": 1730167839,
"narHash": "sha256-V9ON7dVdjBg8mwx78chSSyBZsw+Q8m+HO9UfUOIo9L8=",
"lastModified": 1730296510,
"narHash": "sha256-ZiQPP6LE+SLKbS0UYNeDax08whSXlhZeniDzzLQGVEw=",
"owner": "astro",
"repo": "microvm.nix",
"rev": "46ed88edeee85cb80063c1a511318fe39f9f846f",
"rev": "6ff444ef6cfd5d2effb6c4f50da2ca6f20f2677f",
"type": "github"
},
"original": {
@ -919,11 +919,11 @@
]
},
"locked": {
"lastModified": 1729982130,
"narHash": "sha256-HmLLQbX07rYD0RXPxbf3kJtUo66XvEIX9Y+N5QHQ9aY=",
"lastModified": 1730184279,
"narHash": "sha256-6OB+WWR6gnaWiqSS28aMJypKeK7Pjc2Wm6L0MtOrTuA=",
"owner": "lnl7",
"repo": "nix-darwin",
"rev": "2eb472230a5400c81d9008014888b4bff23bcf44",
"rev": "b379bd4d872d159e5189053ce9a4adf86d56db4b",
"type": "github"
},
"original": {
@ -986,11 +986,11 @@
},
"nixos-hardware": {
"locked": {
"lastModified": 1730161780,
"narHash": "sha256-z5ILcmwMtiCoHTXS1KsQWqigO7HJO8sbyK7f7wn9F/E=",
"lastModified": 1730368399,
"narHash": "sha256-F8vJtG389i9fp3k2/UDYHMed3PLCJYfxCqwiVP7b9ig=",
"owner": "nixos",
"repo": "nixos-hardware",
"rev": "07d15e8990d5d86a631641b4c429bc0a7400cfb8",
"rev": "da14839ac5f38ee6adbdb4e6db09b5eef6d6ccdc",
"type": "github"
},
"original": {
@ -1193,11 +1193,11 @@
},
"nixpkgs_7": {
"locked": {
"lastModified": 1729880355,
"narHash": "sha256-RP+OQ6koQQLX5nw0NmcDrzvGL8HDLnyXt/jHhL1jwjM=",
"lastModified": 1730200266,
"narHash": "sha256-l253w0XMT8nWHGXuXqyiIC/bMvh1VRszGXgdpQlfhvU=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "18536bf04cd71abd345f9579158841376fdd0c5a",
"rev": "807e9154dcb16384b1b765ebe9cd2bba2ac287fd",
"type": "github"
},
"original": {
@ -1208,11 +1208,11 @@
},
"nixpkgs_8": {
"locked": {
"lastModified": 1729880355,
"narHash": "sha256-RP+OQ6koQQLX5nw0NmcDrzvGL8HDLnyXt/jHhL1jwjM=",
"lastModified": 1730200266,
"narHash": "sha256-l253w0XMT8nWHGXuXqyiIC/bMvh1VRszGXgdpQlfhvU=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "18536bf04cd71abd345f9579158841376fdd0c5a",
"rev": "807e9154dcb16384b1b765ebe9cd2bba2ac287fd",
"type": "github"
},
"original": {
@ -1266,11 +1266,11 @@
"treefmt-nix": "treefmt-nix"
},
"locked": {
"lastModified": 1730150629,
"narHash": "sha256-5afcjZhCy5EcCdNGKTPoUdywm2yppTSf7GwX/2Rq6Ig=",
"lastModified": 1730368298,
"narHash": "sha256-5z4pDqRSSovXPPtN1BNEJOkGoCd/XSYuCWh8AsvoTio=",
"owner": "pta2002",
"repo": "nixvim",
"rev": "a4c3ad01cd0755dd1e93473d74efdd89a1cf5999",
"rev": "42ea1626cb002fa759a6b1e2841bfc80a4e59615",
"type": "github"
},
"original": {
@ -1281,11 +1281,11 @@
},
"nur": {
"locked": {
"lastModified": 1730186143,
"narHash": "sha256-5wi2z2JQp6jhGu1YB1CI0jmLt1knjh8LGQ8lkU0DJgs=",
"lastModified": 1730464205,
"narHash": "sha256-J8dDwKgRXrS6Jfija3Fu/UhsjtESq7LVc6rSd3TCRzc=",
"owner": "nix-community",
"repo": "NUR",
"rev": "47b74dec0590af547549be4d70d43d8245ef3832",
"rev": "0cec4b96fa9a9f3b348439ede1fd5ef46593b966",
"type": "github"
},
"original": {
@ -1304,11 +1304,11 @@
]
},
"locked": {
"lastModified": 1730044642,
"narHash": "sha256-DbyV9l3hkrSWcN34S6d9M4kAFss0gEHGtjqqMdG9eAs=",
"lastModified": 1730337772,
"narHash": "sha256-uTxvqDohfG85+zldO5Tf1B+fuAF8ZhMouNwG5S6OAnA=",
"owner": "NuschtOS",
"repo": "search",
"rev": "e373332c1f8237fc1263901745b0fe747228c8ba",
"rev": "4e0a7a95a3df3333771abc4df6a656e7baf67106",
"type": "github"
},
"original": {
@ -1631,11 +1631,11 @@
]
},
"locked": {
"lastModified": 1730025913,
"narHash": "sha256-Y9NtFmP8ciLyRsopcCx1tyoaaStKeq+EndwtGCgww7I=",
"lastModified": 1730321837,
"narHash": "sha256-vK+a09qq19QNu2MlLcvN4qcRctJbqWkX7ahgPZ/+maI=",
"owner": "numtide",
"repo": "treefmt-nix",
"rev": "bae131e525cc8718da22fbeb8d8c7c43c4ea502a",
"rev": "746901bb8dba96d154b66492a29f5db0693dbfcc",
"type": "github"
},
"original": {

View file

@ -54,7 +54,6 @@ in {
enable = true;
inherit (cfg) openFirewall;
inherit (config.services.unbound) group;
controlInterface = config.services.unbound.localControlSocketPath;
};
services.unbound = {
enable = true;

View file

@ -9,7 +9,5 @@
vault
];
environment.noXlibs = lib.mkForce false;
system.stateVersion = "22.11";
}

View file

@ -11,10 +11,6 @@
openFirewall = true;
};
# Required for Java
# gets forced to true due the lxc profile
environment.noXlibs = lib.mkForce false;
# Unifi Web Port
networking.firewall.allowedTCPPorts = [ 8443 ];
}

View file

@ -21,8 +21,6 @@ in
# Additional packages
environment.systemPackages = with pkgs; [ ];
environment.noXlibs = lib.mkForce false;
networking.firewall.allowedTCPPorts = [ port ];
services = {

View file

@ -20,8 +20,6 @@ in
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "21.11"; # Did you read the comment?
environment.noXlibs = lib.mkForce false;
networking.firewall.allowedTCPPorts = [ port ];
vault-secrets.secrets.hedgedoc = { };

View file

@ -16,8 +16,6 @@
# Additional packages
environment.systemPackages = with pkgs; [ ];
environment.noXlibs = lib.mkForce false;
networking.firewall.allowedTCPPorts = [ ];
services.minecraft-server = {

View file

@ -42,16 +42,6 @@ in
'';
};
services.matrix-sliding-sync = {
enable = false;
createDatabase = true;
environmentFile = "${vs.synapse}/sync";
settings = {
SYNCV3_SERVER = "http://localhost:${toString port}";
SYNCV3_BINDADDR = ":${toString slidingSyncPort}";
};
};
services.matrix-synapse = {
enable = true;
withJemalloc = true;

View file

@ -17,8 +17,6 @@
networking.firewall.allowedTCPPorts = [ 8443 ];
environment.noXlibs = lib.mkForce false;
services.unifi = {
enable = true;
unifiPackage = pkgs.unifi;

View file

@ -18,7 +18,6 @@ in {
# Additional packages
environment.systemPackages = with pkgs; [ wireguard-tools ];
environment.noXlibs = lib.mkForce false;
networking = {
firewall.allowedUDPPorts =