diff --git a/flake.nix b/flake.nix index 8c8c19f..c11f335 100755 --- a/flake.nix +++ b/flake.nix @@ -2,7 +2,7 @@ description = "Configuration for Everest"; inputs = { -nixpkgs.url = "nixpkgs/nixos-23.05"; +nixpkgs.url = "nixpkgs/nixos-22.11"; nixpkgs-unstable.url = "nixpkgs/nixos-unstable"; agenix = { @@ -13,7 +13,7 @@ agenix = { }; }; -home-manager.url = "github:nix-community/home-manager/release-23.05"; +home-manager.url = "github:nix-community/home-manager/release-22.11"; home-manager.inputs.nixpkgs.follows = "nixpkgs"; nix-impermanence.url = "github:nix-community/impermanence"; diff --git a/machines/Everest/configuration.nix b/machines/Everest/configuration.nix index 5b6d2fe..b349e46 100755 --- a/machines/Everest/configuration.nix +++ b/machines/Everest/configuration.nix @@ -76,7 +76,7 @@ useGlobalPkgs = true; users.toast = { config, ... }: { home = { - stateVersion = "23.05"; + stateVersion = "22.11"; file = { # This symlinks the Transmission downloads folder into my user's downloads folder for easy access "Downloads/Transmission".source = config.lib.file.mkOutOfStoreSymlink "/var/lib/transmission/Downloads"; diff --git a/roles/common/configuration.nix b/roles/common/configuration.nix index 96b3b9e..34901b3 100755 --- a/roles/common/configuration.nix +++ b/roles/common/configuration.nix @@ -47,5 +47,5 @@ }; }; - system.stateVersion = "23.05"; + system.stateVersion = "22.11"; } diff --git a/roles/server/gitea.nix b/roles/server/gitea.nix index 40c8cb9..ae5cbb7 100644 --- a/roles/server/gitea.nix +++ b/roles/server/gitea.nix @@ -5,12 +5,10 @@ services.gitea = { enable = true; # TODO: Make this not be hardcoded + rootUrl = "http://everest.local:3000"; settings = { - server = { - #server.SSH_PORT = 69; - DISABLE_REGISTRATION = lib.mkDefault true; - ROOT_URL = "http://everest.local:3000"; - }; + #server.SSH_PORT = 69; + service.DISABLE_REGISTRATION = lib.mkDefault true; }; }; networking.firewall = { diff --git a/roles/server/ssh.nix b/roles/server/ssh.nix index 576cd3b..fd19c30 100755 --- a/roles/server/ssh.nix +++ b/roles/server/ssh.nix @@ -3,10 +3,8 @@ { services.openssh = { enable = true; - settings = { - PermitRootLogin = "no"; - PasswordAuthentication = false; - }; startWhenNeeded = true; + permitRootLogin = "no"; + passwordAuthentication = false; }; }