Compare commits

..

No commits in common. "ef50b987a46849ed58ae3452e0eac4600cb4ef09" and "54a86b59ed3c1e6e77e0802fd1a8742aa9c30da4" have entirely different histories.

8 changed files with 17 additions and 19 deletions

8
flake.lock generated
View file

@ -160,16 +160,16 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1718208800, "lastModified": 1716361217,
"narHash": "sha256-US1tAChvPxT52RV8GksWZS415tTS7PV42KTc2PNDBmc=", "narHash": "sha256-mzZDr00WUiUXVm1ujBVv6A0qRd8okaITyUp4ezYRgc4=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "cc54fb41d13736e92229c21627ea4f22199fee6b", "rev": "46397778ef1f73414b03ed553a3368f0e7e33c2f",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nixos", "owner": "nixos",
"ref": "nixos-24.05", "ref": "nixos-23.11",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }

View file

@ -1,6 +1,6 @@
{ {
inputs = { inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixos-24.05"; nixpkgs.url = "github:nixos/nixpkgs/nixos-23.11";
nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable"; nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable";
sops-nix.url = "github:Mic92/sops-nix"; sops-nix.url = "github:Mic92/sops-nix";
sops-nix.inputs.nixpkgs.follows = "nixpkgs"; sops-nix.inputs.nixpkgs.follows = "nixpkgs";

View file

@ -50,13 +50,13 @@
services.xserver.enable = true; services.xserver.enable = true;
# Enable the KDE Plasma Desktop Environment. # Enable the KDE Plasma Desktop Environment.
services.displayManager.sddm.enable = true; services.xserver.displayManager.sddm.enable = true;
services.xserver.desktopManager.plasma5.enable = true; services.xserver.desktopManager.plasma5.enable = true;
# Configure keymap in X11 # Configure keymap in X11
services.xserver = { services.xserver = {
xkb.layout = "de"; layout = "de";
xkb.variant = ""; xkbVariant = "";
}; };
# Configure console keymap # Configure console keymap
@ -90,7 +90,7 @@
services.avahi = { services.avahi = {
enable = true; enable = true;
nssmdns4 = true; nssmdns = true;
openFirewall = true; openFirewall = true;
publish = { publish = {
enable = true; enable = true;

View file

@ -26,10 +26,7 @@
mailcommand = "${pkgs.bacula}/bin/bsmtp -f \"Bacula <bacula@${config.networking.domain}>\" -s \"Bacula report" %r" mailcommand = "${pkgs.bacula}/bin/bsmtp -f \"Bacula <bacula@${config.networking.domain}>\" -s \"Bacula report" %r"
mail = root+backup = all, !skipped mail = root+backup = all, !skipped
''; '';
director."abel-dir" = { director."abel-dir".password = "@${config.sops.secrets."bacula/password".path}";
password = "@${config.sops.secrets."bacula/password".path}";
tls.enable = false;
};
}; };
environment.etc."bacula/bconsole.conf".text = '' environment.etc."bacula/bconsole.conf".text = ''
Director { Director {

View file

@ -1,5 +1,6 @@
{ pkgs, config, ... }: { { pkgs, config, ... }: {
nix = { nix = {
package = pkgs.nixUnstable; # or versioned attributes like nix_2_4
extraOptions = '' extraOptions = ''
experimental-features = nix-command flakes experimental-features = nix-command flakes
''; '';

View file

@ -100,7 +100,7 @@ in
# set to satisfy the sieveScripts check, will be overridden by userdb lookups anyways # set to satisfy the sieveScripts check, will be overridden by userdb lookups anyways
mailUser = "vmail"; mailUser = "vmail";
mailGroup = "vmail"; mailGroup = "vmail";
sieve.scripts = { sieveScripts = {
before = pkgs.writeText "spam.sieve" '' before = pkgs.writeText "spam.sieve" ''
require "fileinto"; require "fileinto";

View file

@ -30,7 +30,7 @@ in
database.createLocally = true; database.createLocally = true;
# enable HEIC image preview # enable HEIC image preview
settings.enabledPreviewProviders = [ extraOptions.enabledPreviewProviders = [
"OC\\Preview\\BMP" "OC\\Preview\\BMP"
"OC\\Preview\\GIF" "OC\\Preview\\GIF"
"OC\\Preview\\JPEG" "OC\\Preview\\JPEG"

View file

@ -5,7 +5,7 @@ let
in in
{ {
sops.secrets."directus_env" = { }; sops.secrets."directus_env" = { };
environment.systemPackages = [ pkgs.nodejs_22 ]; environment.systemPackages = [ pkgs.nodejs_21 ];
virtualisation.oci-containers = { virtualisation.oci-containers = {
containers.directus-ese = { containers.directus-ese = {
image = "directus/directus:latest"; image = "directus/directus:latest";