Compare commits

...

5 commits

Author SHA1 Message Date
307bbead60
home: add daphbot to ssh
All checks were successful
flake check / check (push) Successful in 3m4s
fmt check / check (push) Successful in 40s
2023-10-28 08:51:40 -04:00
35d3f725b4
forgejo: set log to debug 2023-10-28 08:51:21 -04:00
7733e14864
tsuki: updates 2023-10-28 08:51:09 -04:00
3ddcf07967
chatterino7: bump version 2023-10-28 08:49:19 -04:00
cb6ef9c31a
traefik: add cors 2023-10-27 12:33:05 -04:00
5 changed files with 15 additions and 12 deletions

View file

@ -57,6 +57,10 @@
HostName 100.87.54.48 HostName 100.87.54.48
User notoh User notoh
IdentityFile ~/.ssh/sora IdentityFile ~/.ssh/sora
Host daphbot
Hostname 100.109.118.139
User root
IdentityFile ~/.ssh/daphbot
Host tsuru Host tsuru
HostName 100.82.146.40 HostName 100.82.146.40
User notoh User notoh

View file

@ -1,9 +1,4 @@
{ {lib, ...}: {
pkgs,
lib,
config,
...
}: {
networking.firewall.allowedTCPPorts = [2222]; networking.firewall.allowedTCPPorts = [2222];
services.forgejo = { services.forgejo = {
enable = true; enable = true;
@ -11,6 +6,7 @@
settings = { settings = {
service.DISABLE_REGISTRATION = true; service.DISABLE_REGISTRATION = true;
DEFAULT.APP_NAME = "forgejo"; DEFAULT.APP_NAME = "forgejo";
log.LEVEL = "Debug";
ui = { ui = {
DEFAULT_THEME = "forgejo-dark"; DEFAULT_THEME = "forgejo-dark";
}; };

View file

@ -33,6 +33,11 @@
redirectscheme.scheme = "https"; redirectscheme.scheme = "https";
redirectscheme.permanent = true; redirectscheme.permanent = true;
}; };
cors = {
headers = {
accessControlAllowOriginList = "https://daphbot.notohh.dev";
};
};
}; };
routers = { routers = {
api = { api = {
@ -117,6 +122,7 @@
service = "forgejo"; service = "forgejo";
tls.domains = [{main = "*.flake.sh";}]; tls.domains = [{main = "*.flake.sh";}];
tls.certresolver = "production"; tls.certresolver = "production";
middlewares = "cors";
}; };
rustypaste-insecure = { rustypaste-insecure = {
rule = "Host(`i.flake.sh`)"; rule = "Host(`i.flake.sh`)";

View file

@ -1,7 +1,6 @@
{ {
config, config,
pkgs, pkgs,
inputs,
... ...
}: { }: {
imports = [ imports = [
@ -32,8 +31,6 @@
hostName = "tsuki"; hostName = "tsuki";
}; };
programs.sniffnet.enable = true;
services = { services = {
xserver = { xserver = {
enable = true; enable = true;
@ -110,6 +107,7 @@
}; };
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
nil
dconf dconf
polkit_gnome polkit_gnome
libvirt libvirt
@ -117,6 +115,5 @@
pinentry-gtk2 pinentry-gtk2
jdk17 jdk17
comma comma
inputs.matugen.packages.x86_64-linux.default
]; ];
} }

View file

@ -21,8 +21,8 @@ stdenv.mkDerivation rec {
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "SevenTV"; owner = "SevenTV";
repo = pname; repo = pname;
rev = "v${version}"; rev = "c7a11ebce0b4ef7acaa1a71389f242861726c3a7";
sha256 = "sha256-WFmv15rZPnTFruoYpXHUBj1NduppNE3dt5S/ArWL1Wg="; sha256 = "sha256-yDqkhlYuaLCWS//Z8ndN/LXSCL61N5vAJWe/SmEHt2Y=";
fetchSubmodules = true; fetchSubmodules = true;
}; };