fix lints
This commit is contained in:
parent
a25ef0c8ab
commit
d22f444fc5
14 changed files with 201 additions and 247 deletions
|
@ -54,7 +54,6 @@
|
||||||
, nixos-generators
|
, nixos-generators
|
||||||
, nur
|
, nur
|
||||||
, attic
|
, attic
|
||||||
, microvm
|
|
||||||
, ...
|
, ...
|
||||||
}@inputs:
|
}@inputs:
|
||||||
let
|
let
|
||||||
|
|
|
@ -34,6 +34,8 @@
|
||||||
enableUserServices = true;
|
enableUserServices = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
security.polkit.enable = lib.mkDefault true;
|
||||||
|
|
||||||
# Nix Settings
|
# Nix Settings
|
||||||
nix = {
|
nix = {
|
||||||
registry.nixpkgs.flake = inputs.nixpkgs;
|
registry.nixpkgs.flake = inputs.nixpkgs;
|
||||||
|
@ -74,9 +76,6 @@
|
||||||
|
|
||||||
nixpkgs.config.allowUnfree = true;
|
nixpkgs.config.allowUnfree = true;
|
||||||
|
|
||||||
nixpkgs.config.permittedInsecurePackages =
|
|
||||||
[ "nodejs-16.20.2" "nodejs-14.21.3" "openssl-1.1.1w" ];
|
|
||||||
|
|
||||||
# Limit the systemd journal to 100 MB of disk or the
|
# Limit the systemd journal to 100 MB of disk or the
|
||||||
# last 7 days of logs, whichever happens first.
|
# last 7 days of logs, whichever happens first.
|
||||||
services.journald.extraConfig = ''
|
services.journald.extraConfig = ''
|
||||||
|
|
|
@ -1,11 +1,13 @@
|
||||||
{ config, pkgs, lib, ... }: {
|
{ config, pkgs, lib, ... }: {
|
||||||
imports = [ ./laura.nix ./vivian.nix ./jonathan.nix ];
|
imports = [ ./laura.nix ./vivian.nix ./jonathan.nix ];
|
||||||
|
programs = {
|
||||||
|
|
||||||
# Setup ZSH to use grml config
|
# Setup ZSH to use grml config
|
||||||
programs.zsh = {
|
zsh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
enableCompletion = true;
|
enableCompletion = true;
|
||||||
syntaxHighlighting.enable = true;
|
syntaxHighlighting.enable = true;
|
||||||
|
autosuggestions.enable = true;
|
||||||
interactiveShellInit = ''
|
interactiveShellInit = ''
|
||||||
source "${pkgs.grml-zsh-config}/etc/zsh/zshrc"
|
source "${pkgs.grml-zsh-config}/etc/zsh/zshrc"
|
||||||
export FZF_DEFAULT_COMMAND="${pkgs.ripgrep}/bin/rg --files --follow"
|
export FZF_DEFAULT_COMMAND="${pkgs.ripgrep}/bin/rg --files --follow"
|
||||||
|
@ -17,16 +19,19 @@
|
||||||
promptInit = "";
|
promptInit = "";
|
||||||
};
|
};
|
||||||
|
|
||||||
environment.pathsToLink = [ "/share/zsh" ];
|
|
||||||
|
|
||||||
# Install Neovim and set it as alias for vi(m)
|
# Install Neovim and set it as alias for vi(m)
|
||||||
programs.neovim = {
|
neovim = {
|
||||||
enable = true;
|
enable = true;
|
||||||
viAlias = true;
|
viAlias = true;
|
||||||
vimAlias = true;
|
vimAlias = true;
|
||||||
defaultEditor = true;
|
defaultEditor = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
tmux.enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
environment.pathsToLink = [ "/share/zsh" ];
|
||||||
|
|
||||||
# Disable sudo prompt for `wheel` users.
|
# Disable sudo prompt for `wheel` users.
|
||||||
security.sudo.wheelNeedsPassword = lib.mkDefault false;
|
security.sudo.wheelNeedsPassword = lib.mkDefault false;
|
||||||
|
|
||||||
|
@ -41,15 +46,15 @@
|
||||||
|
|
||||||
# Setup packages available everywhere
|
# Setup packages available everywhere
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
|
file
|
||||||
fzf
|
fzf
|
||||||
git
|
git
|
||||||
htop
|
htop
|
||||||
ncdu
|
ncdu
|
||||||
psmisc
|
psmisc
|
||||||
|
helix
|
||||||
ripgrep
|
ripgrep
|
||||||
rsync
|
rsync
|
||||||
tmux
|
|
||||||
zoxide
|
zoxide
|
||||||
tmux
|
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
|
@ -26,10 +26,7 @@ in {
|
||||||
ensureDatabases = [ "atticd" ];
|
ensureDatabases = [ "atticd" ];
|
||||||
ensureUsers = [{
|
ensureUsers = [{
|
||||||
name = "atticd";
|
name = "atticd";
|
||||||
ensurePermissions = {
|
ensureDBOwnership = true;
|
||||||
"DATABASE atticd" = "ALL PRIVILEGES";
|
|
||||||
"schema public" = "ALL";
|
|
||||||
};
|
|
||||||
}];
|
}];
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
|
@ -5,16 +5,7 @@
|
||||||
programs.mosh.enable = true;
|
programs.mosh.enable = true;
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
cachix
|
|
||||||
clang
|
|
||||||
direnv
|
|
||||||
git-crypt
|
|
||||||
nix-update
|
|
||||||
pinentry-curses
|
|
||||||
ripgrep
|
|
||||||
rsync
|
|
||||||
rustup
|
rustup
|
||||||
tmux
|
|
||||||
vault
|
vault
|
||||||
];
|
];
|
||||||
|
|
||||||
|
|
|
@ -7,8 +7,7 @@ let
|
||||||
# https://github.com/immich-app/immich/releases
|
# https://github.com/immich-app/immich/releases
|
||||||
# version = "1.55.1";
|
# version = "1.55.1";
|
||||||
dataDir = "/var/lib/immich";
|
dataDir = "/var/lib/immich";
|
||||||
in
|
in {
|
||||||
{
|
|
||||||
imports = [ ];
|
imports = [ ];
|
||||||
|
|
||||||
# This value determines the NixOS release from which the default
|
# This value determines the NixOS release from which the default
|
||||||
|
@ -22,31 +21,32 @@ in
|
||||||
# Additional packages
|
# Additional packages
|
||||||
environment.systemPackages = with pkgs; [ ];
|
environment.systemPackages = with pkgs; [ ];
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
# TODO: https://github.com/suderman/nixos/tree/main/modules/nixos/immich
|
# TODO: https://github.com/suderman/nixos/tree/main/modules/nixos/immich
|
||||||
|
|
||||||
fileSystems."/mnt/storage" = {
|
fileSystems."/mnt/storage" = {
|
||||||
device = "storage:/mnt/storage";
|
device = "storage:/mnt/storage";
|
||||||
fsType = "nfs";
|
fsType = "nfs";
|
||||||
};
|
};
|
||||||
|
ids = {
|
||||||
# Unused uid/gid snagged from this list:
|
# Unused uid/gid snagged from this list:
|
||||||
# https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/misc/ids.nix
|
# https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/misc/ids.nix
|
||||||
ids.uids.immich = 911;
|
uids.immich = 911;
|
||||||
ids.gids.immich = 911;
|
gids.immich = 911;
|
||||||
|
};
|
||||||
|
users = {
|
||||||
|
groups = {
|
||||||
|
photos = { };
|
||||||
|
immich = { gid = config.ids.gids.immich; };
|
||||||
|
};
|
||||||
|
|
||||||
users.groups.photos = {};
|
users.immich = {
|
||||||
|
|
||||||
users.users.immich = {
|
|
||||||
isSystemUser = true;
|
isSystemUser = true;
|
||||||
group = "photos";
|
group = "photos";
|
||||||
description = "Immich daemon user";
|
description = "Immich daemon user";
|
||||||
home = dataDir;
|
home = dataDir;
|
||||||
uid = config.ids.uids.immich;
|
uid = config.ids.uids.immich;
|
||||||
};
|
};
|
||||||
|
};
|
||||||
users.groups.immich = { gid = config.ids.gids.immich; };
|
|
||||||
|
|
||||||
# Postgres database configuration
|
# Postgres database configuration
|
||||||
services.postgresql = {
|
services.postgresql = {
|
||||||
|
@ -56,7 +56,7 @@ in
|
||||||
|
|
||||||
ensureUsers = [{
|
ensureUsers = [{
|
||||||
name = "immich";
|
name = "immich";
|
||||||
ensurePermissions = { "DATABASE immich" = "ALL PRIVILEGES"; };
|
ensureDBOwnership = true;
|
||||||
}];
|
}];
|
||||||
ensureDatabases = [ "immich" ];
|
ensureDatabases = [ "immich" ];
|
||||||
|
|
||||||
|
|
|
@ -49,10 +49,12 @@ in {
|
||||||
allowedTCPPorts = [ 25565 ];
|
allowedTCPPorts = [ 25565 ];
|
||||||
};
|
};
|
||||||
|
|
||||||
users.extraUsers.laura.extraGroups = [ "wheel" ];
|
users = {
|
||||||
users.groups.mc = { };
|
groups.mc = { };
|
||||||
|
extraUsers = {
|
||||||
|
laura.extraGroups = [ "wheel" ];
|
||||||
|
|
||||||
users.extraUsers.julia = {
|
julia = {
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
shell = pkgs.zsh;
|
shell = pkgs.zsh;
|
||||||
|
|
||||||
|
@ -62,4 +64,6 @@ in {
|
||||||
|
|
||||||
extraGroups = [ "mc" "wheel" ];
|
extraGroups = [ "mc" "wheel" ];
|
||||||
};
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,36 +2,21 @@
|
||||||
let
|
let
|
||||||
vs = config.vault-secrets.secrets;
|
vs = config.vault-secrets.secrets;
|
||||||
cfg = config.services.mastodon;
|
cfg = config.services.mastodon;
|
||||||
in
|
in {
|
||||||
{
|
|
||||||
system.stateVersion = "21.05";
|
system.stateVersion = "21.05";
|
||||||
# Use DHCP with static leases
|
# Use DHCP with static leases
|
||||||
networking.interfaces.eth0.useDHCP = true;
|
networking.interfaces.eth0.useDHCP = true;
|
||||||
|
|
||||||
# Better cache hits
|
# Better cache hits
|
||||||
environment.noXlibs = lib.mkForce false;
|
environment.noXlibs = lib.mkForce false;
|
||||||
|
services = {
|
||||||
services.elasticsearch = {
|
elasticsearch = {
|
||||||
enable = true;
|
enable = true;
|
||||||
cluster_name = "mastodon-es";
|
cluster_name = "mastodon-es";
|
||||||
package = pkgs.elasticsearch7;
|
package = pkgs.elasticsearch7;
|
||||||
};
|
};
|
||||||
|
|
||||||
vault-secrets.secrets.mastodon = {
|
postgresql = {
|
||||||
services = [ "mastodon-init-dirs" "mastodon" "mastodon-media-autoremove" ];
|
|
||||||
inherit (cfg) user group;
|
|
||||||
};
|
|
||||||
|
|
||||||
# Append the init-dirs script to add AWS/Minio secrets
|
|
||||||
systemd.services.mastodon-init-dirs.script = ''
|
|
||||||
cat >> /var/lib/mastodon/.secrets_env <<EOF
|
|
||||||
AWS_ACCESS_KEY_ID="$(cat ${vs.mastodon}/garageKeyId)"
|
|
||||||
AWS_SECRET_ACCESS_KEY="$(cat ${vs.mastodon}/garageSecretKey)"
|
|
||||||
DEEPL_API_KEY="$(cat ${vs.mastodon}/deeplAPIKey)"
|
|
||||||
EOF
|
|
||||||
'';
|
|
||||||
|
|
||||||
services.postgresql = {
|
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.postgresql_16;
|
package = pkgs.postgresql_16;
|
||||||
settings = {
|
settings = {
|
||||||
|
@ -43,7 +28,7 @@ in
|
||||||
# The rest of the database setup is handled by mastodon
|
# The rest of the database setup is handled by mastodon
|
||||||
};
|
};
|
||||||
|
|
||||||
services.mastodon = {
|
mastodon = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.v.glitch-soc;
|
package = pkgs.v.glitch-soc;
|
||||||
streamingProcesses = 3;
|
streamingProcesses = 3;
|
||||||
|
@ -105,8 +90,22 @@ in
|
||||||
DEEPL_PLAN = "free";
|
DEEPL_PLAN = "free";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
};
|
||||||
|
|
||||||
networking.firewall =
|
vault-secrets.secrets.mastodon = {
|
||||||
let cfg = config.services.mastodon;
|
services = [ "mastodon-init-dirs" "mastodon" "mastodon-media-autoremove" ];
|
||||||
|
inherit (cfg) user group;
|
||||||
|
};
|
||||||
|
|
||||||
|
# Append the init-dirs script to add AWS/Minio secrets
|
||||||
|
systemd.services.mastodon-init-dirs.script = ''
|
||||||
|
cat >> /var/lib/mastodon/.secrets_env <<EOF
|
||||||
|
AWS_ACCESS_KEY_ID="$(cat ${vs.mastodon}/garageKeyId)"
|
||||||
|
AWS_SECRET_ACCESS_KEY="$(cat ${vs.mastodon}/garageSecretKey)"
|
||||||
|
DEEPL_API_KEY="$(cat ${vs.mastodon}/deeplAPIKey)"
|
||||||
|
EOF
|
||||||
|
'';
|
||||||
|
|
||||||
|
networking.firewall = let cfg = config.services.mastodon;
|
||||||
in { allowedTCPPorts = [ cfg.webPort ]; };
|
in { allowedTCPPorts = [ cfg.webPort ]; };
|
||||||
}
|
}
|
||||||
|
|
|
@ -12,8 +12,7 @@ let
|
||||||
proxyWebsockets = true;
|
proxyWebsockets = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
in
|
in {
|
||||||
{
|
|
||||||
imports = [ ];
|
imports = [ ];
|
||||||
|
|
||||||
# This value determines the NixOS release from which the default
|
# This value determines the NixOS release from which the default
|
||||||
|
@ -46,22 +45,25 @@ in
|
||||||
"xirion.net" = {
|
"xirion.net" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
locations."/".extraConfig = ''
|
locations = {
|
||||||
|
"/".extraConfig = ''
|
||||||
add_header Content-Type 'text/html; charset=UTF-8';
|
add_header Content-Type 'text/html; charset=UTF-8';
|
||||||
return 200 'Hello, World!';
|
return 200 'Hello, World!';
|
||||||
'';
|
'';
|
||||||
|
|
||||||
# Mastodon federation
|
# Mastodon federation
|
||||||
locations."= /.well-known/host-meta".extraConfig = ''
|
"= /.well-known/host-meta".extraConfig = ''
|
||||||
return 301 https://fedi.xirion.net$request_uri;
|
return 301 https://fedi.xirion.net$request_uri;
|
||||||
'';
|
'';
|
||||||
locations."/.well-known/webfinger".extraConfig = ''
|
"/.well-known/webfinger".extraConfig = ''
|
||||||
add_header Access-Control-Allow-Origin '*';
|
add_header Access-Control-Allow-Origin '*';
|
||||||
return 301 https://fedi.xirion.net$request_uri;
|
return 301 https://fedi.xirion.net$request_uri;
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
};
|
||||||
|
|
||||||
"peepeepoopoo.xirion.net" = proxy "http://tautulli.hades:8080"; # Deprecated but Ricardo has it bookmarked already!
|
"peepeepoopoo.xirion.net" = proxy
|
||||||
|
"http://tautulli.hades:8080"; # Deprecated but Ricardo has it bookmarked already!
|
||||||
|
|
||||||
"plex.xirion.net" = {
|
"plex.xirion.net" = {
|
||||||
# Since we want a secure connection, we force SSL
|
# Since we want a secure connection, we force SSL
|
||||||
|
|
|
@ -2,13 +2,40 @@
|
||||||
let vs = config.vault-secrets.secrets;
|
let vs = config.vault-secrets.secrets;
|
||||||
in {
|
in {
|
||||||
imports = [ ./rtorrent.nix ];
|
imports = [ ./rtorrent.nix ];
|
||||||
|
networking = {
|
||||||
|
interfaces.eth0.useDHCP = true;
|
||||||
|
firewall = {
|
||||||
|
allowedTCPPorts = [ config.services.rtorrent.port ];
|
||||||
|
allowedUDPPorts = [ config.services.rtorrent.port ];
|
||||||
|
};
|
||||||
|
|
||||||
networking.interfaces.eth0.useDHCP = true;
|
wg-quick.interfaces = let
|
||||||
|
postUpScript = pkgs.writeScriptBin "post_up" ''
|
||||||
|
#!${pkgs.stdenv.shell}
|
||||||
|
${pkgs.iproute2}/bin/ip route add 10.42.42.0/23 via 192.168.0.1
|
||||||
|
${pkgs.iproute2}/bin/ip route add 10.100.0.0/24 via 192.168.0.1
|
||||||
|
'';
|
||||||
|
in {
|
||||||
|
wg0 = {
|
||||||
|
address =
|
||||||
|
[ "10.129.112.89/32, fd7d:76ee:e68f:a993:edd1:668b:49f7:b7c3/128" ];
|
||||||
|
mtu = 1320;
|
||||||
|
dns = [ "10.128.0.1" "fd7d:76ee:e68f:a993::1" ];
|
||||||
|
privateKeyFile = "${vs.rtorrent}/wireguardKey";
|
||||||
|
postUp = "${postUpScript}/bin/post_up || true";
|
||||||
|
|
||||||
|
peers = [{
|
||||||
|
publicKey = "PyLCXAQT8KkM4T+dUsOQfn+Ub3pGxfGlxkIApuig+hk=";
|
||||||
|
allowedIPs = [ "0.0.0.0/0" "::/0" ];
|
||||||
|
endpoint = "europe3.vpn.airdns.org:1637";
|
||||||
|
presharedKeyFile = "${vs.rtorrent}/presharedKey";
|
||||||
|
persistentKeepalive = 15;
|
||||||
|
}];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
system.stateVersion = "22.05";
|
system.stateVersion = "22.05";
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ config.services.rtorrent.port ];
|
|
||||||
networking.firewall.allowedUDPPorts = [ config.services.rtorrent.port ];
|
|
||||||
|
|
||||||
fileSystems."/mnt/storage" = {
|
fileSystems."/mnt/storage" = {
|
||||||
device = "storage:/mnt/storage";
|
device = "storage:/mnt/storage";
|
||||||
fsType = "nfs";
|
fsType = "nfs";
|
||||||
|
@ -22,32 +49,4 @@ in {
|
||||||
};
|
};
|
||||||
|
|
||||||
vault-secrets.secrets.rtorrent = { services = [ "wg-quick-wg0" ]; };
|
vault-secrets.secrets.rtorrent = { services = [ "wg-quick-wg0" ]; };
|
||||||
|
|
||||||
networking.wg-quick.interfaces =
|
|
||||||
let
|
|
||||||
postUpScript = pkgs.writeScriptBin "post_up" ''
|
|
||||||
#!${pkgs.stdenv.shell}
|
|
||||||
${pkgs.iproute2}/bin/ip route add 10.42.42.0/23 via 192.168.0.1
|
|
||||||
${pkgs.iproute2}/bin/ip route add 10.100.0.0/24 via 192.168.0.1
|
|
||||||
'';
|
|
||||||
in
|
|
||||||
{
|
|
||||||
wg0 = {
|
|
||||||
address = [ "10.129.112.89/32, fd7d:76ee:e68f:a993:edd1:668b:49f7:b7c3/128" ];
|
|
||||||
mtu = 1320;
|
|
||||||
dns = [ "10.128.0.1" "fd7d:76ee:e68f:a993::1" ];
|
|
||||||
privateKeyFile = "${vs.rtorrent}/wireguardKey";
|
|
||||||
postUp = "${postUpScript}/bin/post_up || true";
|
|
||||||
|
|
||||||
peers = [
|
|
||||||
{
|
|
||||||
publicKey = "PyLCXAQT8KkM4T+dUsOQfn+Ub3pGxfGlxkIApuig+hk=";
|
|
||||||
allowedIPs = [ "0.0.0.0/0" "::/0" ];
|
|
||||||
endpoint = "europe3.vpn.airdns.org:1637";
|
|
||||||
presharedKeyFile = "${vs.rtorrent}/presharedKey";
|
|
||||||
persistentKeepalive = 15;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,36 +2,13 @@
|
||||||
# your system. Help is available in the configuration.nix(5) man page
|
# your system. Help is available in the configuration.nix(5) man page
|
||||||
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
||||||
|
|
||||||
{ pkgs, ... }:
|
{ pkgs, ... }: {
|
||||||
let
|
|
||||||
fix-vscode = pkgs.writeScriptBin "fix-vscode" ''
|
|
||||||
#!${pkgs.stdenv.shell}
|
|
||||||
# Check if vscode-server dir exists
|
|
||||||
if [[ -d "$HOME/.vscode-server/bin" ]]; then
|
|
||||||
# For every bin folder within
|
|
||||||
for versiondir in "$HOME"/.vscode-server/bin/*; do
|
|
||||||
# Remove bundled node (dynamic links are borked for nix)
|
|
||||||
rm "$versiondir/node"
|
|
||||||
# symlink node form the nixpkg
|
|
||||||
ln -s "${pkgs.nodejs-16_x}/bin/node" "$versiondir/node"
|
|
||||||
done
|
|
||||||
fi
|
|
||||||
'';
|
|
||||||
in
|
|
||||||
{
|
|
||||||
imports = [
|
imports = [
|
||||||
# Include the results of the hardware scan.
|
# Include the results of the hardware scan.
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
# This _should_ fix vscode errors as well
|
|
||||||
programs.nix-ld.enable = true;
|
programs.nix-ld.enable = true;
|
||||||
# environment.variables = {
|
|
||||||
# NIX_LD_LIBRARY_PATH = lib.makeLibraryPath [
|
|
||||||
# pkgs.stdenv.cc.cc
|
|
||||||
# ];
|
|
||||||
# # NIX_LD = lib.fileContents "${pkgs.stdenv.cc}/nix-support/dynamic-linker";
|
|
||||||
# };
|
|
||||||
|
|
||||||
# Use the GRUB 2 boot loader.
|
# Use the GRUB 2 boot loader.
|
||||||
boot.loader.grub.enable = true;
|
boot.loader.grub.enable = true;
|
||||||
|
@ -48,22 +25,7 @@ in
|
||||||
virtualisation.podman.enable = true;
|
virtualisation.podman.enable = true;
|
||||||
|
|
||||||
# Additional packages
|
# Additional packages
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [ vault ];
|
||||||
binutils
|
|
||||||
fix-vscode
|
|
||||||
fluxcd
|
|
||||||
k9s
|
|
||||||
kubectl
|
|
||||||
kubectx
|
|
||||||
nix-prefetch-git
|
|
||||||
nixpkgs-fmt
|
|
||||||
nixpkgs-review
|
|
||||||
ripgrep
|
|
||||||
rsync
|
|
||||||
tmux
|
|
||||||
vault
|
|
||||||
vim
|
|
||||||
];
|
|
||||||
|
|
||||||
programs.gnupg.agent = {
|
programs.gnupg.agent = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
|
@ -33,10 +33,7 @@ in {
|
||||||
ensureDatabases = [ db_name ];
|
ensureDatabases = [ db_name ];
|
||||||
ensureUsers = [{
|
ensureUsers = [{
|
||||||
name = db_user;
|
name = db_user;
|
||||||
ensurePermissions = {
|
ensureDBOwnership = true;
|
||||||
"DATABASE ${db_name}" = "ALL PRIVILEGES";
|
|
||||||
"schema public" = "ALL";
|
|
||||||
};
|
|
||||||
}];
|
}];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -32,7 +32,7 @@ in
|
||||||
ensureDatabases = [ db_name ];
|
ensureDatabases = [ db_name ];
|
||||||
ensureUsers = [{
|
ensureUsers = [{
|
||||||
name = db_user;
|
name = db_user;
|
||||||
ensurePermissions = { "DATABASE ${db_name}" = "ALL PRIVILEGES"; };
|
ensureDBOwnership = true;
|
||||||
}];
|
}];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -11,7 +11,7 @@ in
|
||||||
rev = "v${version}";
|
rev = "v${version}";
|
||||||
hash = "sha256-fZH3zPEU5jnYFhLx8OKDNrvsSVT46Peu92L84Fg5YpQ=";
|
hash = "sha256-fZH3zPEU5jnYFhLx8OKDNrvsSVT46Peu92L84Fg5YpQ=";
|
||||||
};
|
};
|
||||||
patches = patches ++ [];
|
inherit patches;
|
||||||
}) // {
|
}) // {
|
||||||
inherit version;
|
inherit version;
|
||||||
yarnHash = "sha256-P7KswzsCusyiS4MxUFnC1HYMTQ6fLpIwd97AglCukIk=";
|
yarnHash = "sha256-P7KswzsCusyiS4MxUFnC1HYMTQ6fLpIwd97AglCukIk=";
|
||||||
|
|
Loading…
Add table
Reference in a new issue