rm unsed sevrices, limit build jobs

This commit is contained in:
stubbfel
2021-11-28 13:31:31 +01:00
parent 94725a6762
commit b56bf82fb4
4 changed files with 19 additions and 10 deletions

View File

@@ -32,6 +32,12 @@
autoUpgrade = {
enable = true;
allowReboot = true;
flags = [
"--max-jobs"
"1"
"--builders"
"''"
];
};
};

View File

@@ -12,12 +12,12 @@
./nextcloud.nix
# ./news2kindle.nix
./resilio.nix
./sks.nix
# ./sks.nix
./gitea.nix
./nexus.nix
./wireguard.nix
# ./wireguard.nix
#./mqtt.nix
./jitsi.nix
# ./jitsi.nix
./docker.nix
./mailcow.nix
];

View File

@@ -4,11 +4,13 @@
services.nginx.virtualHosts."mailcow.stubbe.rocks" = {
enableACME = true;
forceSSL = true;
default = true;
locations."/".proxyPass = "http://localhost:7080";
serverName = "v22017115146555724.happysrv.de";
serverAliases = [
"testmail.stubbe.rocks"
"mailcow.stubbe.rocks"
"stubbe.rocks"
# "autodiscover.testmail.stubbe.rocks"
# "autoconfig.testmail.stubbe.rocks"
# "autodiscover.mailcow.stubbe.rocks"
@@ -22,11 +24,11 @@ security.acme.certs."v22017115146555724.happysrv.de".postRun = ''
cp chain.pem /opt/mailcow-dockerized/data/assets/ssl/chain.pem
'';
# services.nginx.virtualHosts."testmail.stubbe.rocks" = {
#services.nginx.virtualHosts."webmail.stubbe.rocks" = {
# enableACME = true;
# forceSSL = true;
# locations."/".proxyPass = "http://localhost:7080";
# };
# locations."/".proxyPass = "http://localhost:7080/SOGo/";
#};
systemd = {
timers.mailcow-update = {
@@ -46,6 +48,7 @@ security.acme.certs."v22017115146555724.happysrv.de".postRun = ''
pkgs.coreutils-full
pkgs.unixtools.ping
pkgs.iptables
pkgs.openssl
];
serviceConfig.Type = "oneshot";
script = ''

View File

@@ -16,10 +16,10 @@ in
users = {
defaultUserShell = pkgs.zsh;
extraUsers.etherpad = myPublicSshKeys // { isNormalUser = true; home = "/home/etherpad";};
# extraUsers.etherpad = myPublicSshKeys // { isNormalUser = true; home = "/home/etherpad";};
extraUsers.sshuser = myPublicSshKeys // { isNormalUser = true; home = "/home/sshuser";};
extraUsers.nextcloud = myPublicSshKeys // { isSystemUser = true; home = "/home/nextcloud"; createHome= true; group = "nextcloud";};
extraUsers.ledebuild = myPublicSshKeys // { isNormalUser = true; home = "/home/ledebuild"; extraGroups = [ "docker" ];};
# extraUsers.ledebuild = myPublicSshKeys // { isNormalUser = true; home = "/home/ledebuild"; extraGroups = [ "docker" ];};
# extraUsers.gitea = myPublicSshKeys // { isNormalUser = true; home = "/home/gitea"; };
extraGroups.nexdcloud.name = "nextcloud";
};