1
1
Fork 0

Compare commits

..

5 Commits

Author SHA1 Message Date
Jaculabilis 961229b4ed Disable amanuensis and redstring temporarily 2022-12-11 13:07:19 +00:00
Jaculabilis 9f1026a73b Use a local inquisitor checkout temporarily 2022-12-11 13:06:56 +00:00
Jaculabilis 9fcd9bf01d Fix IP for catacomb forward 2022-12-11 13:06:10 +00:00
Jaculabilis 8f030a559b Update empyrean to nixpkgs 22.11 2022-12-11 00:02:38 +00:00
Jaculabilis d385788c25 Pass pkgs to inquisitor package build 2022-12-02 04:45:34 +00:00
7 changed files with 17 additions and 34 deletions

View File

@ -66,22 +66,6 @@
"type": "indirect" "type": "indirect"
} }
}, },
"nixpkgs-empyrean": {
"locked": {
"lastModified": 1646588256,
"narHash": "sha256-ZHljmNlt19nSm0Mz8fx6QEhddKUkU4hhwFmfNmGn+EY=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "2ebb6c1e5ae402ba35cca5eec58385e5f1adea04",
"type": "github"
},
"original": {
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "2ebb6c1e5ae402ba35cca5eec58385e5f1adea04",
"type": "github"
}
},
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1669833724, "lastModified": 1669833724,
@ -101,8 +85,7 @@
"root": { "root": {
"inputs": { "inputs": {
"nixos-wsl": "nixos-wsl", "nixos-wsl": "nixos-wsl",
"nixpkgs": "nixpkgs_2", "nixpkgs": "nixpkgs_2"
"nixpkgs-empyrean": "nixpkgs-empyrean"
} }
} }
}, },

View File

@ -1,16 +1,15 @@
{ {
inputs = { inputs = {
nixpkgs.url = "github:NixOS/nixpkgs?ref=refs/tags/22.11"; nixpkgs.url = "github:NixOS/nixpkgs?ref=refs/tags/22.11";
nixpkgs-empyrean.url = "github:NixOS/nixpkgs?rev=2ebb6c1e5ae402ba35cca5eec58385e5f1adea04";
nixos-wsl.url = github:nix-community/NixOS-WSL; nixos-wsl.url = github:nix-community/NixOS-WSL;
}; };
outputs = { self, nixpkgs, nixpkgs-empyrean, nixos-wsl }@attrs: { outputs = { self, nixpkgs, nixos-wsl }@attrs: {
nixosConfigurations.catacomb = nixpkgs.lib.nixosSystem { nixosConfigurations.catacomb = nixpkgs.lib.nixosSystem {
system = "aarch64-linux"; system = "aarch64-linux";
modules = [ ./machine/catacomb ]; modules = [ ./machine/catacomb ];
}; };
nixosConfigurations.empyrean = nixpkgs-empyrean.lib.nixosSystem { nixosConfigurations.empyrean = nixpkgs.lib.nixosSystem {
system = "x86_64-linux"; system = "x86_64-linux";
modules = [ ./machine/empyrean ]; modules = [ ./machine/empyrean ];
}; };

View File

@ -12,18 +12,18 @@
''; '';
locations = { locations = {
# Forwards to the index server # Forwards to the index server
"/browse/".proxyPass = "http://10.7.3.16:7472/browse/"; "/browse/".proxyPass = "http://10.22.20.2:7472/browse/";
# Forwards to nginx via catacomb auth server # Forwards to nginx via catacomb auth server
"/".extraConfig = '' "/".extraConfig = ''
auth_request /auth; auth_request /auth;
proxy_buffering off; proxy_buffering off;
proxy_pass http://10.7.3.16:7470/; proxy_pass http://10.22.20.2:7470/;
''; '';
"= /auth".extraConfig = '' "= /auth".extraConfig = ''
internal; internal;
proxy_buffering off; proxy_buffering off;
proxy_pass_request_body off; proxy_pass_request_body off;
proxy_pass http://10.7.3.16:7471/; proxy_pass http://10.22.20.2:7471/;
proxy_set_header Content-Length ""; proxy_set_header Content-Length "";
proxy_set_header X-Original-URI $request_uri; proxy_set_header X-Original-URI $request_uri;
''; '';

View File

@ -8,8 +8,8 @@
imports = imports =
[ # Include the results of the hardware scan. [ # Include the results of the hardware scan.
./hardware-configuration.nix ./hardware-configuration.nix
./amanuensis.nix #./amanuensis.nix
./redstring.nix #./redstring.nix
./catacomb.nix ./catacomb.nix
./gitea.nix ./gitea.nix
./inquisitor.nix ./inquisitor.nix
@ -26,7 +26,7 @@
nix = { nix = {
package = pkgs.nixFlakes; package = pkgs.nixFlakes;
maxJobs = 2; settings.max-jobs = 2;
extraOptions = '' extraOptions = ''
experimental-features = nix-command flakes experimental-features = nix-command flakes
''; '';
@ -95,7 +95,7 @@
}; };
}; };
security.acme = { security.acme = {
email = "tim.vanbaak+alogoulogoi@gmail.com"; defaults.email = "tim.vanbaak+alogoulogoi@gmail.com";
acceptTerms = true; acceptTerms = true;
}; };

View File

@ -12,8 +12,6 @@
domain = "git.alogoulogoi.com"; domain = "git.alogoulogoi.com";
rootUrl = "https://git.alogoulogoi.com/"; rootUrl = "https://git.alogoulogoi.com/";
# Private server
disableRegistration = true;
#useWizard = true; # Needed for first-time building #useWizard = true; # Needed for first-time building
# Settings # Settings
@ -23,7 +21,6 @@
enable = true; enable = true;
interval = "weekly"; interval = "weekly";
}; };
log.level = "Info";
settings = { settings = {
"repository" = { "repository" = {
DEFAULT_PRIVATE = true; DEFAULT_PRIVATE = true;
@ -45,6 +42,9 @@
}; };
"cron.archive_cleanup".ENABLED = false; "cron.archive_cleanup".ENABLED = false;
"cron.sync_external_users".ENABLED = false; "cron.sync_external_users".ENABLED = false;
log.LEVEL = "Info";
# Private server
service.DISABLE_REGISTRATION = true;
}; };
}; };

View File

@ -18,5 +18,5 @@
swapDevices = [ ]; swapDevices = [ ];
nix.maxJobs = lib.mkDefault 1; nix.settings.max-jobs = lib.mkDefault 1;
} }

View File

@ -5,10 +5,11 @@ let
inquisitorSource = pkgs.fetchFromGitHub { inquisitorSource = pkgs.fetchFromGitHub {
owner = "Jaculabilis"; owner = "Jaculabilis";
repo = "Inquisitor"; repo = "Inquisitor";
rev = "a6d961aba948d3a682dbde12dbaa8805eadbbd84"; rev = "dd3a8016d3148681886c9a2bba465d5eab85a0ac";
sha256 = "10n6c5zvi27f92b7am0rrdizxz0mlp3rw1y1jyd44b57ykk7x6fr"; sha256 = "10n6c5zvi27f92b7am0rrdizxz0mlp3rw1y1jyd44b57ykk7x6fr";
}; };
inquisitor = pkgs.callPackage inquisitorSource {}; inquisitorLocal = "/root/inquisitor";
inquisitor = pkgs.callPackage inquisitorLocal { inherit pkgs; };
# Define the inquisitor data directory # Define the inquisitor data directory
inquisiDir = "/var/lib/inquisitor"; inquisiDir = "/var/lib/inquisitor";