Compare commits

...

2 Commits

Author SHA1 Message Date
5092943641 Fixup Databases 2023-11-21 09:24:51 -05:00
f3ddf6b3ae flake.lock: Update
Flake lock file updates:

• Updated input 'home-manager':
    'github:nix-community/home-manager/280721186ab75a76537713ec310306f0eba3e407' (2023-11-12)
  → 'github:nix-community/home-manager/1aabb0a31b25ad83cfaa37c3fe29053417cd9a0f' (2023-11-21)
• Updated input 'nix-darwin':
    'github:LnL7/nix-darwin/0f1ad801387445fdda01d080db8ecf169be8e793' (2023-11-11)
  → 'github:LnL7/nix-darwin/e67f2bf515343da378c3f82f098df8ca01bccc5f' (2023-11-13)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/85f1ba3e51676fa8cc604a3d863d729026a6b8eb' (2023-11-04)
  → 'github:NixOS/nixpkgs/e4ad989506ec7d71f7302cc3067abd82730a4beb' (2023-11-19)
• Updated input 'sops-nix':
    'github:Mic92/sops-nix/2fc3c9edc3029ed396ec917f39a7253acc3d8999' (2023-11-12)
  → 'github:Mic92/sops-nix/49a87c6c827ccd21c225531e30745a9a6464775c' (2023-11-19)
• Updated input 'sops-nix/nixpkgs':
    'github:NixOS/nixpkgs/9b92dad3804b543a8b5db878aabf7132d601fa91' (2023-11-07)
  → 'github:NixOS/nixpkgs/7414e9ee0b3e9903c24d3379f577a417f0aae5f1' (2023-11-16)
• Updated input 'sops-nix/nixpkgs-stable':
    'github:NixOS/nixpkgs/9502d0245983bb233da8083b55d60d96fd3c29ff' (2023-11-12)
  → 'github:NixOS/nixpkgs/decdf666c833a325cb4417041a90681499e06a41' (2023-11-18)
2023-11-21 09:24:24 -05:00
5 changed files with 27 additions and 32 deletions

36
flake.lock generated
View File

@@ -66,11 +66,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1699025595, "lastModified": 1700553346,
"narHash": "sha256-e+o4PoSu2Z6Ww8y/AVUmMU200rNZoRK+p2opQ7Db8Rg=", "narHash": "sha256-kW7uWsCv/lxuA824Ng6EYD9hlVYRyjuFn0xBbYltAeQ=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "8765d4e38aa0be53cdeee26f7386173e6c65618d", "rev": "1aabb0a31b25ad83cfaa37c3fe29053417cd9a0f",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -108,11 +108,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1698429334, "lastModified": 1699867978,
"narHash": "sha256-Gq3+QabboczSu7RMpcy79RSLMSqnySO3wsnHQk4DfbE=", "narHash": "sha256-+arl45HUOcBdKiRGrKXZYXDyBQ6MQGkYPZa/28f6Yzo=",
"owner": "LnL7", "owner": "LnL7",
"repo": "nix-darwin", "repo": "nix-darwin",
"rev": "afe83cbc2e673b1f08d32dd0f70df599678ff1e7", "rev": "e67f2bf515343da378c3f82f098df8ca01bccc5f",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -124,11 +124,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1698924604, "lastModified": 1700390070,
"narHash": "sha256-GCFbkl2tj8fEZBZCw3Tc0AkGo0v+YrQlohhEGJ/X4s0=", "narHash": "sha256-de9KYi8rSJpqvBfNwscWdalIJXPo8NjdIZcEJum1mH0=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "fa804edfb7869c9fb230e174182a8a1a7e512c40", "rev": "e4ad989506ec7d71f7302cc3067abd82730a4beb",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -156,11 +156,11 @@
}, },
"nixpkgs-stable_2": { "nixpkgs-stable_2": {
"locked": { "locked": {
"lastModified": 1698544399, "lastModified": 1700342017,
"narHash": "sha256-vhRmPyEyoPkrXF2iykBsWHA05MIaOSmMRLMF7Hul6+s=", "narHash": "sha256-HaibwlWH5LuqsaibW3sIVjZQtEM/jWtOHX4Nk93abGE=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "d87c5d8c41c9b3b39592563242f3a448b5cc4bc9", "rev": "decdf666c833a325cb4417041a90681499e06a41",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -172,11 +172,11 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1698336494, "lastModified": 1700108881,
"narHash": "sha256-sO72WDBKyijYD1GcKPlGsycKbMBiTJMBCnmOxLAs880=", "narHash": "sha256-+Lqybl8kj0+nD/IlAWPPG/RDTa47gff9nbei0u7BntE=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "808c0d8c53c7ae50f82aca8e7df263225cf235bf", "rev": "7414e9ee0b3e9903c24d3379f577a417f0aae5f1",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -201,11 +201,11 @@
"nixpkgs-stable": "nixpkgs-stable_2" "nixpkgs-stable": "nixpkgs-stable_2"
}, },
"locked": { "locked": {
"lastModified": 1699021419, "lastModified": 1700362823,
"narHash": "sha256-oy2j2OHXYcckifASMeZzpmbDLSvobMGt0V/RvoDotF4=", "narHash": "sha256-/H7XgvrYM0IbkpWkcdfkOH0XyBM5ewSWT1UtaLvOgKY=",
"owner": "Mic92", "owner": "Mic92",
"repo": "sops-nix", "repo": "sops-nix",
"rev": "275b28593ef3a1b9d05b6eeda3ddce2f45f5c06f", "rev": "49a87c6c827ccd21c225531e30745a9a6464775c",
"type": "github" "type": "github"
}, },
"original": { "original": {

View File

@@ -36,11 +36,12 @@ in {
services.postgresql = { services.postgresql = {
enable = true; enable = true;
port = 5432; port = 5432;
ensureDatabases = [
"gitea"
];
ensureUsers = [{ ensureUsers = [{
name = "gitea"; name = "gitea";
ensurePermissions = { ensureDBOwnership = true;
"DATABASE \"gitea\"" = "ALL PRIVILEGES";
};
ensureClauses = { ensureClauses = {
createdb = true; createdb = true;
}; };

View File

@@ -76,8 +76,8 @@ in {
# generate video thumbnails with preview generator # generate video thumbnails with preview generator
ffmpeg_5-headless ffmpeg_5-headless
# required for recognize app # required for recognize app
nodejs-14_x # runtime and installation requirement nodejs_20 # runtime and installation requirement
nodejs-14_x.pkgs.node-pre-gyp # installation requirement nodejs_20.pkgs.node-pre-gyp # installation requirement
util-linux # runtime requirement for taskset util-linux # runtime requirement for taskset
]; ];
}; };
@@ -103,9 +103,7 @@ in {
]; ];
ensureUsers = [{ ensureUsers = [{
name = "nextcloud"; name = "nextcloud";
ensurePermissions = { ensureDBOwnership = true;
"DATABASE \"nextcloud\"" = "ALL PRIVILEGES";
};
ensureClauses = { ensureClauses = {
createdb = true; createdb = true;
}; };

View File

@@ -42,9 +42,7 @@
]; ];
ensureUsers = [{ ensureUsers = [{
name = "onlyoffice"; name = "onlyoffice";
ensurePermissions = { ensureDBOwnership = true;
"DATABASE \"onlyoffice\"" = "ALL PRIVILEGES";
};
}]; }];
}; };
} }

View File

@@ -22,9 +22,7 @@
]; ];
ensureUsers = [{ ensureUsers = [{
name = "vaultwarden"; name = "vaultwarden";
ensurePermissions = { ensureDBOwnership = true;
"DATABASE \"vaultwarden\"" = "ALL PRIVILEGES";
};
}]; }];
}; };
services.caddy.virtualHosts = { services.caddy.virtualHosts = {