Compare commits

..

No commits in common. "df7e96e62824101e99fd995141010d43a5499b99" and "04d0d7bce69839f5b8acf0db79e793a69f5fdcfd" have entirely different histories.

3 changed files with 21 additions and 66 deletions

View File

@ -23,16 +23,16 @@
]
},
"locked": {
"lastModified": 1720042825,
"narHash": "sha256-A0vrUB6x82/jvf17qPCpxaM+ulJnD8YZwH9Ci0BsAzE=",
"lastModified": 1715381426,
"narHash": "sha256-wPuqrAQGdv3ISs74nJfGb+Yprm23U/rFpcHFFNWgM94=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "e1391fb22e18a36f57e6999c7a9f966dc80ac073",
"rev": "ab5542e9dbd13d0100f8baae2bc2d68af901f4b4",
"type": "github"
},
"original": {
"owner": "nix-community",
"ref": "release-24.05",
"ref": "release-23.11",
"repo": "home-manager",
"type": "github"
}
@ -44,11 +44,11 @@
]
},
"locked": {
"lastModified": 1722936497,
"narHash": "sha256-UBst8PkhY0kqTgdKiR8MtTBt4c1XmjJoOV11efjsC/o=",
"lastModified": 1715930644,
"narHash": "sha256-W9pyM3/vePxrffHtzlJI6lDS3seANQ+Nqp+i58O46LI=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "a6c743980e23f4cef6c2a377f9ffab506568413a",
"rev": "e3ad5108f54177e6520535768ddbf1e6af54b59d",
"type": "github"
},
"original": {
@ -60,11 +60,11 @@
"lf-icons": {
"flake": false,
"locked": {
"lastModified": 1722900728,
"narHash": "sha256-jJhq6SkoJa0iciDJrTq7KVMbNyFE5XaDokXghun34qo=",
"lastModified": 1715142021,
"narHash": "sha256-J58ZRN0nPqzzzkAENOQ6wbOdmGgk0ocp9JcTT0s7aa4=",
"owner": "gokcehan",
"repo": "lf",
"rev": "b258d8fbf060e3db5f82825cf7c4186dfb10157f",
"rev": "12e99fdb641565e3122ab62dce0b77e836aa69a4",
"type": "github"
},
"original": {
@ -94,16 +94,16 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1722791413,
"narHash": "sha256-rCTrlCWvHzMCNcKxPE3Z/mMK2gDZ+BvvpEVyRM4tKmU=",
"lastModified": 1715948915,
"narHash": "sha256-dxMrggEogQuJQr6f02VAFtsSNtjEPkgxczeiyW7WOQc=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "8b5b6723aca5a51edf075936439d9cd3947b7b2c",
"rev": "bacb8503d3a51d9e9b52e52a1ba45e2c380ad07d",
"type": "github"
},
"original": {
"id": "nixpkgs",
"ref": "nixos-24.05",
"ref": "nixos-23.11",
"type": "indirect"
}
},
@ -124,11 +124,11 @@
},
"nixpkgs-unstable": {
"locked": {
"lastModified": 1722813957,
"narHash": "sha256-IAoYyYnED7P8zrBFMnmp7ydaJfwTnwcnqxUElC1I26Y=",
"lastModified": 1715961556,
"narHash": "sha256-+NpbZRCRisUHKQJZF3CT+xn14ZZQO+KjxIIanH3Pvn4=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "cb9a96f23c491c081b38eab96d22fa958043c9fa",
"rev": "4a6b83b05df1a8bd7d99095ec4b4d271f2956b64",
"type": "github"
},
"original": {

View File

@ -4,8 +4,8 @@
inputs = {
# Stable
nixpkgs.url = "nixpkgs/nixos-24.05";
home-manager.url = "github:nix-community/home-manager/release-24.05";
nixpkgs.url = "nixpkgs/nixos-23.11";
home-manager.url = "github:nix-community/home-manager/release-23.11";
home-manager.inputs.nixpkgs.follows = "nixpkgs";
# Unstable

View File

@ -26,8 +26,8 @@
# USB WiFi driver kernel module
boot.extraModulePackages = [ config.boot.kernelPackages.rtl88xxau-aircrack ];
boot.kernelModules = [ "88XXau" "sg" ];
boot.extraModulePackages = [ config.boot.kernelPackages.rtl8821au ];
boot.kernelModules = [ "8821au" "sg" ];
networking.hostName = "nixserver";
@ -102,51 +102,6 @@
openFirewall = true;
};
security.acme.acceptTerms = true;
security.acme.certs."owl.cam123.dev" = {
dnsResolver = "1.1.1.1:53";
dnsProvider = "cloudflare";
email = "cameron@cam123.dev";
environmentFile = "/var/acme/secrets/.env";
extraDomainNames = [ "jelly.cam123.dev" ];
};
services.nginx = {
enable = true;
virtualHosts = {
"jelly.cam123.dev" = {
forceSSL = true;
useACMEHost = "owl.cam123.dev";
locations."/" = {
proxyPass = "http://127.0.0.1:8096";
recommendedProxySettings = true;
};
};
"owl.cam123.dev" = {
forceSSL = true;
enableACME = true;
acmeRoot = null;
locations."/" = {
proxyPass = "http://127.0.0.1:8080";
recommendedProxySettings = true;
};
};
};
};
virtualisation.oci-containers = {
backend = "docker";
containers.kitchenowl = {
image = "tombursch/kitchenowl:latest";
environmentFiles = [ /home/cameron/kitchenowl/.env ];
volumes = [ "/home/cameron/kitchenowl/data:/data" ];
ports = [ "8080:8080" ];
};
};
# Open ports in the firewall.
# networking.firewall.allowedTCPPorts = [ ... ];
# networking.firewall.allowedUDPPorts = [ ... ];