rm unsed sevrices, limit build jobs
This commit is contained in:
@@ -32,6 +32,12 @@
|
|||||||
autoUpgrade = {
|
autoUpgrade = {
|
||||||
enable = true;
|
enable = true;
|
||||||
allowReboot = true;
|
allowReboot = true;
|
||||||
|
flags = [
|
||||||
|
"--max-jobs"
|
||||||
|
"1"
|
||||||
|
"--builders"
|
||||||
|
"''"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
@@ -12,12 +12,12 @@
|
|||||||
./nextcloud.nix
|
./nextcloud.nix
|
||||||
# ./news2kindle.nix
|
# ./news2kindle.nix
|
||||||
./resilio.nix
|
./resilio.nix
|
||||||
./sks.nix
|
# ./sks.nix
|
||||||
./gitea.nix
|
./gitea.nix
|
||||||
./nexus.nix
|
./nexus.nix
|
||||||
./wireguard.nix
|
# ./wireguard.nix
|
||||||
#./mqtt.nix
|
#./mqtt.nix
|
||||||
./jitsi.nix
|
# ./jitsi.nix
|
||||||
./docker.nix
|
./docker.nix
|
||||||
./mailcow.nix
|
./mailcow.nix
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -4,11 +4,13 @@
|
|||||||
services.nginx.virtualHosts."mailcow.stubbe.rocks" = {
|
services.nginx.virtualHosts."mailcow.stubbe.rocks" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
|
default = true;
|
||||||
locations."/".proxyPass = "http://localhost:7080";
|
locations."/".proxyPass = "http://localhost:7080";
|
||||||
serverName = "v22017115146555724.happysrv.de";
|
serverName = "v22017115146555724.happysrv.de";
|
||||||
serverAliases = [
|
serverAliases = [
|
||||||
"testmail.stubbe.rocks"
|
"testmail.stubbe.rocks"
|
||||||
"mailcow.stubbe.rocks"
|
"mailcow.stubbe.rocks"
|
||||||
|
"stubbe.rocks"
|
||||||
# "autodiscover.testmail.stubbe.rocks"
|
# "autodiscover.testmail.stubbe.rocks"
|
||||||
# "autoconfig.testmail.stubbe.rocks"
|
# "autoconfig.testmail.stubbe.rocks"
|
||||||
# "autodiscover.mailcow.stubbe.rocks"
|
# "autodiscover.mailcow.stubbe.rocks"
|
||||||
@@ -22,11 +24,11 @@ security.acme.certs."v22017115146555724.happysrv.de".postRun = ''
|
|||||||
cp chain.pem /opt/mailcow-dockerized/data/assets/ssl/chain.pem
|
cp chain.pem /opt/mailcow-dockerized/data/assets/ssl/chain.pem
|
||||||
'';
|
'';
|
||||||
|
|
||||||
# services.nginx.virtualHosts."testmail.stubbe.rocks" = {
|
#services.nginx.virtualHosts."webmail.stubbe.rocks" = {
|
||||||
# enableACME = true;
|
# enableACME = true;
|
||||||
# forceSSL = true;
|
# forceSSL = true;
|
||||||
# locations."/".proxyPass = "http://localhost:7080";
|
# locations."/".proxyPass = "http://localhost:7080/SOGo/";
|
||||||
# };
|
#};
|
||||||
|
|
||||||
systemd = {
|
systemd = {
|
||||||
timers.mailcow-update = {
|
timers.mailcow-update = {
|
||||||
@@ -46,6 +48,7 @@ security.acme.certs."v22017115146555724.happysrv.de".postRun = ''
|
|||||||
pkgs.coreutils-full
|
pkgs.coreutils-full
|
||||||
pkgs.unixtools.ping
|
pkgs.unixtools.ping
|
||||||
pkgs.iptables
|
pkgs.iptables
|
||||||
|
pkgs.openssl
|
||||||
];
|
];
|
||||||
serviceConfig.Type = "oneshot";
|
serviceConfig.Type = "oneshot";
|
||||||
script = ''
|
script = ''
|
||||||
|
|||||||
@@ -16,10 +16,10 @@ in
|
|||||||
|
|
||||||
users = {
|
users = {
|
||||||
defaultUserShell = pkgs.zsh;
|
defaultUserShell = pkgs.zsh;
|
||||||
extraUsers.etherpad = myPublicSshKeys // { isNormalUser = true; home = "/home/etherpad";};
|
# extraUsers.etherpad = myPublicSshKeys // { isNormalUser = true; home = "/home/etherpad";};
|
||||||
extraUsers.sshuser = myPublicSshKeys // { isNormalUser = true; home = "/home/sshuser";};
|
extraUsers.sshuser = myPublicSshKeys // { isNormalUser = true; home = "/home/sshuser";};
|
||||||
extraUsers.nextcloud = myPublicSshKeys // { isSystemUser = true; home = "/home/nextcloud"; createHome= true; group = "nextcloud";};
|
extraUsers.nextcloud = myPublicSshKeys // { isSystemUser = true; home = "/home/nextcloud"; createHome= true; group = "nextcloud";};
|
||||||
extraUsers.ledebuild = myPublicSshKeys // { isNormalUser = true; home = "/home/ledebuild"; extraGroups = [ "docker" ];};
|
# extraUsers.ledebuild = myPublicSshKeys // { isNormalUser = true; home = "/home/ledebuild"; extraGroups = [ "docker" ];};
|
||||||
# extraUsers.gitea = myPublicSshKeys // { isNormalUser = true; home = "/home/gitea"; };
|
# extraUsers.gitea = myPublicSshKeys // { isNormalUser = true; home = "/home/gitea"; };
|
||||||
extraGroups.nexdcloud.name = "nextcloud";
|
extraGroups.nexdcloud.name = "nextcloud";
|
||||||
};
|
};
|
||||||
|
|||||||
Reference in New Issue
Block a user