rm unsed sevrices, limit build jobs

This commit is contained in:
stubbfel
2021-11-28 13:31:31 +01:00
parent 94725a6762
commit b56bf82fb4
4 changed files with 19 additions and 10 deletions

View File

@@ -32,6 +32,12 @@
autoUpgrade = { autoUpgrade = {
enable = true; enable = true;
allowReboot = true; allowReboot = true;
flags = [
"--max-jobs"
"1"
"--builders"
"''"
];
}; };
}; };

View File

@@ -12,12 +12,12 @@
./nextcloud.nix ./nextcloud.nix
# ./news2kindle.nix # ./news2kindle.nix
./resilio.nix ./resilio.nix
./sks.nix # ./sks.nix
./gitea.nix ./gitea.nix
./nexus.nix ./nexus.nix
./wireguard.nix # ./wireguard.nix
#./mqtt.nix #./mqtt.nix
./jitsi.nix # ./jitsi.nix
./docker.nix ./docker.nix
./mailcow.nix ./mailcow.nix
]; ];

View File

@@ -4,11 +4,13 @@
services.nginx.virtualHosts."mailcow.stubbe.rocks" = { services.nginx.virtualHosts."mailcow.stubbe.rocks" = {
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
default = true;
locations."/".proxyPass = "http://localhost:7080"; locations."/".proxyPass = "http://localhost:7080";
serverName = "v22017115146555724.happysrv.de"; serverName = "v22017115146555724.happysrv.de";
serverAliases = [ serverAliases = [
"testmail.stubbe.rocks" "testmail.stubbe.rocks"
"mailcow.stubbe.rocks" "mailcow.stubbe.rocks"
"stubbe.rocks"
# "autodiscover.testmail.stubbe.rocks" # "autodiscover.testmail.stubbe.rocks"
# "autoconfig.testmail.stubbe.rocks" # "autoconfig.testmail.stubbe.rocks"
# "autodiscover.mailcow.stubbe.rocks" # "autodiscover.mailcow.stubbe.rocks"
@@ -22,11 +24,11 @@ security.acme.certs."v22017115146555724.happysrv.de".postRun = ''
cp chain.pem /opt/mailcow-dockerized/data/assets/ssl/chain.pem cp chain.pem /opt/mailcow-dockerized/data/assets/ssl/chain.pem
''; '';
# services.nginx.virtualHosts."testmail.stubbe.rocks" = { #services.nginx.virtualHosts."webmail.stubbe.rocks" = {
# enableACME = true; # enableACME = true;
# forceSSL = true; # forceSSL = true;
# locations."/".proxyPass = "http://localhost:7080"; # locations."/".proxyPass = "http://localhost:7080/SOGo/";
# }; #};
systemd = { systemd = {
timers.mailcow-update = { timers.mailcow-update = {
@@ -46,6 +48,7 @@ security.acme.certs."v22017115146555724.happysrv.de".postRun = ''
pkgs.coreutils-full pkgs.coreutils-full
pkgs.unixtools.ping pkgs.unixtools.ping
pkgs.iptables pkgs.iptables
pkgs.openssl
]; ];
serviceConfig.Type = "oneshot"; serviceConfig.Type = "oneshot";
script = '' script = ''

View File

@@ -16,10 +16,10 @@ in
users = { users = {
defaultUserShell = pkgs.zsh; defaultUserShell = pkgs.zsh;
extraUsers.etherpad = myPublicSshKeys // { isNormalUser = true; home = "/home/etherpad";}; # extraUsers.etherpad = myPublicSshKeys // { isNormalUser = true; home = "/home/etherpad";};
extraUsers.sshuser = myPublicSshKeys // { isNormalUser = true; home = "/home/sshuser";}; extraUsers.sshuser = myPublicSshKeys // { isNormalUser = true; home = "/home/sshuser";};
extraUsers.nextcloud = myPublicSshKeys // { isSystemUser = true; home = "/home/nextcloud"; createHome= true; group = "nextcloud";}; extraUsers.nextcloud = myPublicSshKeys // { isSystemUser = true; home = "/home/nextcloud"; createHome= true; group = "nextcloud";};
extraUsers.ledebuild = myPublicSshKeys // { isNormalUser = true; home = "/home/ledebuild"; extraGroups = [ "docker" ];}; # extraUsers.ledebuild = myPublicSshKeys // { isNormalUser = true; home = "/home/ledebuild"; extraGroups = [ "docker" ];};
# extraUsers.gitea = myPublicSshKeys // { isNormalUser = true; home = "/home/gitea"; }; # extraUsers.gitea = myPublicSshKeys // { isNormalUser = true; home = "/home/gitea"; };
extraGroups.nexdcloud.name = "nextcloud"; extraGroups.nexdcloud.name = "nextcloud";
}; };