Compare commits

...

4 commits

Author SHA1 Message Date
Harry d6ce39fd4b fix: encryption 2024-12-24 14:46:38 +01:00
kity cce56d9ee0 fix: deprecated samba flag 2024-12-24 14:38:29 +01:00
Harry f25504ed66 nix 24.05 is deprecated 2024-12-24 14:37:20 +01:00
Harry 57bc21faf4 removed runner support for now 2024-12-23 16:32:09 +01:00
7 changed files with 33 additions and 33 deletions

View file

@ -281,11 +281,11 @@
"treefmt-nix": "treefmt-nix"
},
"locked": {
"lastModified": 1734942015,
"narHash": "sha256-7qj3Hk2NMiWdBNk3E3T6GdHkMDUCWK0kz10P9Jl6z58=",
"lastModified": 1734999862,
"narHash": "sha256-CJ3dXoCQzbSR/b8kbswlf/JIGKIN/6c9ywRw2rQAIYY=",
"owner": "nix-community",
"repo": "neovim-nightly-overlay",
"rev": "38f1d0177de284cb54045b3e888d66cd4710ce5a",
"rev": "0d0beafd94c34915fb951b31e165be5cf1cf3a7c",
"type": "github"
},
"original": {
@ -297,11 +297,11 @@
"neovim-src": {
"flake": false,
"locked": {
"lastModified": 1734887107,
"narHash": "sha256-h5U1/by2ikiPBUPCTbWAMALCy+DTkjt6Fs8nepY44/4=",
"lastModified": 1734989976,
"narHash": "sha256-DVlI7ua+VOkqC70WpSbJO+FjQyBEarGZnKoql7I7Unk=",
"owner": "neovim",
"repo": "neovim",
"rev": "665a0e85c4788cb2847e270c333c0aee306f07ad",
"rev": "c51bf5a6b24928ac04d0bb129b1b424d4c78f28d",
"type": "github"
},
"original": {
@ -400,11 +400,11 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1734435836,
"narHash": "sha256-kMBQ5PRiFLagltK0sH+08aiNt3zGERC2297iB6vrvlU=",
"lastModified": 1734856068,
"narHash": "sha256-Q+CB1ajsJg4Z9HGHTBAGY1q18KpnnkmF/eCTLUY6FQ0=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "4989a246d7a390a859852baddb1013f825435cee",
"rev": "93ff48c9be84a76319dac293733df09bbbe3f25c",
"type": "github"
},
"original": {
@ -416,16 +416,16 @@
},
"nixpkgs_2": {
"locked": {
"lastModified": 1734835170,
"narHash": "sha256-JG6n9tQET7ZLjvwjH9BdYE6pES/Alcduxv2FDXliuBM=",
"lastModified": 1734875076,
"narHash": "sha256-Pzyb+YNG5u3zP79zoi8HXYMs15Q5dfjDgwCdUI5B0nY=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "6df924734e1b626efd70925545de844b1c25246f",
"rev": "1807c2b91223227ad5599d7067a61665c52d1295",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-24.05",
"ref": "nixos-24.11",
"repo": "nixpkgs",
"type": "github"
}
@ -518,11 +518,11 @@
]
},
"locked": {
"lastModified": 1734704479,
"narHash": "sha256-MMi74+WckoyEWBRcg/oaGRvXC9BVVxDZNRMpL+72wBI=",
"lastModified": 1734982074,
"narHash": "sha256-N7M37KP7cHWoXicuE536GrVvU8nMDT/gpI1kja2hkdg=",
"owner": "numtide",
"repo": "treefmt-nix",
"rev": "65712f5af67234dad91a5a4baee986a8b62dbf8f",
"rev": "e41e948cf097cbf96ba4dff47a30ea6891af9f33",
"type": "github"
},
"original": {

View file

@ -2,7 +2,7 @@
description = "the silliest NixOS config!";
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.05";
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.11-small";
sops-nix.url = "github:Mic92/sops-nix";
home-manager.url = "github:nix-community/home-manager/release-24.05";

View file

@ -1,5 +1,5 @@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View file

@ -18,7 +18,7 @@ in
enable = true;
securityType = "user";
openFirewall = true;
extraConfig = ''
settings = ''
workgroup = WORKGROUP
server string = hyperserver
netbios name = hyperserver

View file

@ -1,5 +1,5 @@
U2FsdGVkX1+OxQJs9k/4JL1g9iZi/V4LYrvEhkf6JFwvTFhv+sIYDI9YFXpGFk2f
DxWy76EO2LgRWZxTeBAQWTyinbDpYM2Efr3EqJvZmocBsrzrAIOfUyQ5gX9a3f9v
QHIYSPSwapr9qVEkl92bbdLKw8aQExz7SLG4viIouIb8sXShq7HGeajwrXgpj8F9
UsFVRnrsWznu5Ubg5X40Q7EQy3vswzACkL65MeeT1AlF//vbPs/CAqa9zyc1pkoa
QGHEinlNI/0Rb/RJ7rzmuEU28Z8M24tMajQWt5JmJ6Y=
U2FsdGVkX19ppf7TEMU3F2FGMog2/1b+FDS2xAq25+IM3TRqOirn/VqgUgv4Rssx
cG9VJA3mj2FWYjUl/tz1ebcBq24neFljbg97h5zwXZYo2vpg3PX9NO9tg1htNoP+
RIroUVHUMVbjAl7BGkJU4aMierp8eGkriiBrUgnYY0j1doYAwPwx3qJ2F4U8dLB5
ANgmBG00cvIhOoqRyAkha7SuYqwTGww8I23BclR//uGP3DYqScbFhEEd2UebraEX
QNYZQgWXYEq6dNbIjYAzCfyFkkpNMjskWgSwXN4qmlE=

View file

@ -36,10 +36,10 @@
mailerPasswordFile = config.sops.secrets.smtp_password.path;
};
/*
sops.secrets.forgejo-runner-token = {
owner = "forgejo";
};
services.gitea-actions-runner = {
package = pkgs.forgejo-actions-runner;
instances.default = {
@ -57,7 +57,7 @@
];
};
};
*/
systemd.services.forgejo.preStart = ''
create="${lib.getExe config.services.forgejo.package} admin user create"
$create --admin --email "`cat ${config.sops.secrets.forgejoInitialMail.path}`" --username you --password "`cat ${config.sops.secrets.forgejoInitialPassword.path}`" &>/dev/null || true

View file

@ -1,3 +1,3 @@
U2FsdGVkX18gq8c8sLObTxZnVycdd9qBcE6mzuVR+7ff6J7ntoPxlWdeNWTSnWiI
cVRz0XEH9+DX7EyUbuwQcDtzepoJONsGowXM6Hs+N1A5feaku0J+jGFoMtXX1kv8
SXpR3emmKFbtNmwCqW0++DLolU9R/pdRlWFlQiABlMc=
U2FsdGVkX1/ixxXYs6xxTpANvXjGIxaSjQqP8AOH3jKdVL2KCIEWbRjZPCAe3fMH
TlukgeAsKFKwrGU67xlI/BenkqJlCbE+wb/1K8c1yLTSYINHIU0KpOfuyk2IzQkU
nXRfgFqiNBo7RV0xMwx8jI3jtmMuyyPHbzCSppIbc1w=