1
0
Fork 0

Cleanup Haven and Khanda configs

This commit is contained in:
Aires 2024-06-25 14:27:58 -04:00
parent 2eaa08b0a1
commit 7a516e93a7
2 changed files with 12 additions and 26 deletions

View file

@ -16,6 +16,15 @@ let
config.secrets.services.forgejo.url config.secrets.services.forgejo.url
config.secrets.services.gremlin-lab.url config.secrets.services.gremlin-lab.url
]; ];
namecheapCredentials = {
"NAMECHEAP_API_USER_FILE" = "${pkgs.writeText "namecheap-api-user" ''
${config.secrets.networking.namecheap.api.user}
''}";
"NAMECHEAP_API_KEY_FILE" = "${pkgs.writeText "namecheap-api-key" ''
${config.secrets.networking.namecheap.api.key}
''}";
};
in in
{ {
imports = [ ./hardware-configuration.nix ]; imports = [ ./hardware-configuration.nix ];
@ -53,26 +62,12 @@ in
dnsProvider = "namecheap"; dnsProvider = "namecheap";
extraDomainNames = subdomains; extraDomainNames = subdomains;
webroot = null; # Required in order to prevent a failed assertion webroot = null; # Required in order to prevent a failed assertion
credentialFiles = { credentialFiles = namecheapCredentials;
"NAMECHEAP_API_USER_FILE" = "${pkgs.writeText "namecheap-api-user" ''
${config.secrets.networking.namecheap.api.user}
''}";
"NAMECHEAP_API_KEY_FILE" = "${pkgs.writeText "namecheap-api-key" ''
${config.secrets.networking.namecheap.api.key}
''}";
};
}; };
"${config.secrets.networking.blogDomain}" = { "${config.secrets.networking.blogDomain}" = {
dnsProvider = "namecheap"; dnsProvider = "namecheap";
webroot = null; # Required in order to prevent a failed assertion webroot = null; # Required in order to prevent a failed assertion
credentialFiles = { credentialFiles = namecheapCredentials;
"NAMECHEAP_API_USER_FILE" = "${pkgs.writeText "namecheap-api-user" ''
${config.secrets.networking.namecheap.api.user}
''}";
"NAMECHEAP_API_KEY_FILE" = "${pkgs.writeText "namecheap-api-key" ''
${config.secrets.networking.namecheap.api.key}
''}";
};
}; };
}; };
}; };

View file

@ -32,10 +32,7 @@ in
office.enable = true; office.enable = true;
recording.enable = true; recording.enable = true;
social.enable = true; social.enable = true;
writing = { writing.enable = true;
enable = true;
languagetool.enable = false;
};
}; };
# Enable Secure Boot support. # Enable Secure Boot support.
@ -93,10 +90,4 @@ in
# Limit the number of cores Nix can use # Limit the number of cores Nix can use
nix.settings.cores = 10; nix.settings.cores = 10;
# Configure the virtual machine created by nixos-rebuild build-vm
virtualisation.vmVariant.virtualisation = {
memorySize = 2048;
cores = 2;
};
} }