diff --git a/flake.nix b/flake.nix index c11f335..8c8c19f 100755 --- a/flake.nix +++ b/flake.nix @@ -2,7 +2,7 @@ description = "Configuration for Everest"; inputs = { -nixpkgs.url = "nixpkgs/nixos-22.11"; +nixpkgs.url = "nixpkgs/nixos-23.05"; nixpkgs-unstable.url = "nixpkgs/nixos-unstable"; agenix = { @@ -13,7 +13,7 @@ agenix = { }; }; -home-manager.url = "github:nix-community/home-manager/release-22.11"; +home-manager.url = "github:nix-community/home-manager/release-23.05"; home-manager.inputs.nixpkgs.follows = "nixpkgs"; nix-impermanence.url = "github:nix-community/impermanence"; diff --git a/machines/Everest/configuration.nix b/machines/Everest/configuration.nix index b349e46..5b6d2fe 100755 --- a/machines/Everest/configuration.nix +++ b/machines/Everest/configuration.nix @@ -76,7 +76,7 @@ useGlobalPkgs = true; users.toast = { config, ... }: { home = { - stateVersion = "22.11"; + stateVersion = "23.05"; file = { # This symlinks the Transmission downloads folder into my user's downloads folder for easy access "Downloads/Transmission".source = config.lib.file.mkOutOfStoreSymlink "/var/lib/transmission/Downloads"; diff --git a/roles/common/configuration.nix b/roles/common/configuration.nix index 34901b3..96b3b9e 100755 --- a/roles/common/configuration.nix +++ b/roles/common/configuration.nix @@ -47,5 +47,5 @@ }; }; - system.stateVersion = "22.11"; + system.stateVersion = "23.05"; } diff --git a/roles/server/gitea.nix b/roles/server/gitea.nix index ae5cbb7..40c8cb9 100644 --- a/roles/server/gitea.nix +++ b/roles/server/gitea.nix @@ -5,10 +5,12 @@ services.gitea = { enable = true; # TODO: Make this not be hardcoded - rootUrl = "http://everest.local:3000"; settings = { - #server.SSH_PORT = 69; - service.DISABLE_REGISTRATION = lib.mkDefault true; + server = { + #server.SSH_PORT = 69; + DISABLE_REGISTRATION = lib.mkDefault true; + ROOT_URL = "http://everest.local:3000"; + }; }; }; networking.firewall = { diff --git a/roles/server/ssh.nix b/roles/server/ssh.nix index fd19c30..576cd3b 100755 --- a/roles/server/ssh.nix +++ b/roles/server/ssh.nix @@ -3,8 +3,10 @@ { services.openssh = { enable = true; + settings = { + PermitRootLogin = "no"; + PasswordAuthentication = false; + }; startWhenNeeded = true; - permitRootLogin = "no"; - passwordAuthentication = false; }; }