rm unsed sevrices, limit build jobs
This commit is contained in:
@@ -32,6 +32,12 @@
|
||||
autoUpgrade = {
|
||||
enable = true;
|
||||
allowReboot = true;
|
||||
flags = [
|
||||
"--max-jobs"
|
||||
"1"
|
||||
"--builders"
|
||||
"''"
|
||||
];
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
@@ -12,12 +12,12 @@
|
||||
./nextcloud.nix
|
||||
# ./news2kindle.nix
|
||||
./resilio.nix
|
||||
./sks.nix
|
||||
# ./sks.nix
|
||||
./gitea.nix
|
||||
./nexus.nix
|
||||
./wireguard.nix
|
||||
# ./wireguard.nix
|
||||
#./mqtt.nix
|
||||
./jitsi.nix
|
||||
# ./jitsi.nix
|
||||
./docker.nix
|
||||
./mailcow.nix
|
||||
];
|
||||
|
||||
@@ -4,11 +4,13 @@
|
||||
services.nginx.virtualHosts."mailcow.stubbe.rocks" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
default = true;
|
||||
locations."/".proxyPass = "http://localhost:7080";
|
||||
serverName = "v22017115146555724.happysrv.de";
|
||||
serverAliases = [
|
||||
"testmail.stubbe.rocks"
|
||||
"mailcow.stubbe.rocks"
|
||||
"stubbe.rocks"
|
||||
# "autodiscover.testmail.stubbe.rocks"
|
||||
# "autoconfig.testmail.stubbe.rocks"
|
||||
# "autodiscover.mailcow.stubbe.rocks"
|
||||
@@ -22,10 +24,10 @@ security.acme.certs."v22017115146555724.happysrv.de".postRun = ''
|
||||
cp chain.pem /opt/mailcow-dockerized/data/assets/ssl/chain.pem
|
||||
'';
|
||||
|
||||
# services.nginx.virtualHosts."testmail.stubbe.rocks" = {
|
||||
#services.nginx.virtualHosts."webmail.stubbe.rocks" = {
|
||||
# enableACME = true;
|
||||
# forceSSL = true;
|
||||
# locations."/".proxyPass = "http://localhost:7080";
|
||||
# locations."/".proxyPass = "http://localhost:7080/SOGo/";
|
||||
#};
|
||||
|
||||
systemd = {
|
||||
@@ -46,6 +48,7 @@ security.acme.certs."v22017115146555724.happysrv.de".postRun = ''
|
||||
pkgs.coreutils-full
|
||||
pkgs.unixtools.ping
|
||||
pkgs.iptables
|
||||
pkgs.openssl
|
||||
];
|
||||
serviceConfig.Type = "oneshot";
|
||||
script = ''
|
||||
|
||||
@@ -16,10 +16,10 @@ in
|
||||
|
||||
users = {
|
||||
defaultUserShell = pkgs.zsh;
|
||||
extraUsers.etherpad = myPublicSshKeys // { isNormalUser = true; home = "/home/etherpad";};
|
||||
# extraUsers.etherpad = myPublicSshKeys // { isNormalUser = true; home = "/home/etherpad";};
|
||||
extraUsers.sshuser = myPublicSshKeys // { isNormalUser = true; home = "/home/sshuser";};
|
||||
extraUsers.nextcloud = myPublicSshKeys // { isSystemUser = true; home = "/home/nextcloud"; createHome= true; group = "nextcloud";};
|
||||
extraUsers.ledebuild = myPublicSshKeys // { isNormalUser = true; home = "/home/ledebuild"; extraGroups = [ "docker" ];};
|
||||
# extraUsers.ledebuild = myPublicSshKeys // { isNormalUser = true; home = "/home/ledebuild"; extraGroups = [ "docker" ];};
|
||||
# extraUsers.gitea = myPublicSshKeys // { isNormalUser = true; home = "/home/gitea"; };
|
||||
extraGroups.nexdcloud.name = "nextcloud";
|
||||
};
|
||||
|
||||
Reference in New Issue
Block a user