Skip to content
Snippets Groups Projects
Commit cef07cde authored by Florian Sesser's avatar Florian Sesser
Browse files

Fix up some remaining warnings due to the upgrade

parent 2f266667
Branches
No related tags found
2 merge requests!387Upgrade to NixOS 22.11,!384update production
Pipeline #3300 failed
...@@ -60,7 +60,7 @@ Vagrant.configure("2") do |config| ...@@ -60,7 +60,7 @@ Vagrant.configure("2") do |config|
end end
# To make the VMs assign the static IPs to the network interfaces we need a rebuild: # To make the VMs assign the static IPs to the network interfaces we need a rebuild:
config.vm.provision "shell", inline: "echo '{nix.trustedUsers = [ \"@wheel\" \"root\" \"vagrant\" ];}' > /etc/nixos/custom-configuration.nix" config.vm.provision "shell", inline: "echo '{nix.settings.trusted-users = [ \"@wheel\" \"root\" \"vagrant\" ];}' > /etc/nixos/custom-configuration.nix"
config.vm.provision "shell", inline: "nixos-rebuild switch" config.vm.provision "shell", inline: "nixos-rebuild switch"
config.trigger.after :up do |trigger| config.trigger.after :up do |trigger|
......
...@@ -52,6 +52,6 @@ ...@@ -52,6 +52,6 @@
}; };
# We want to push packages with morph without having to sign them # We want to push packages with morph without having to sign them
nix.trustedUsers = [ "@wheel" "root" "vagrant" ]; nix.settings.trusted-users = [ "@wheel" "root" "vagrant" ];
}; };
} }
...@@ -36,10 +36,10 @@ in { ...@@ -36,10 +36,10 @@ in {
# Configure the system to use our binary cache so that deployment updates # Configure the system to use our binary cache so that deployment updates
# only require downloading pre-built software, not building it ourselves. # only require downloading pre-built software, not building it ourselves.
nix = { nix = {
binaryCachePublicKeys = [ settings.trusted-public-keys = [
"saxtons.private.storage:MplOcEH8G/6mRlhlKkbA8GdeFR3dhCFsSszrspE/ZwY=" "saxtons.private.storage:MplOcEH8G/6mRlhlKkbA8GdeFR3dhCFsSszrspE/ZwY="
]; ];
binaryCaches = [ settings.substituters = [
"http://saxtons.private.storage" "http://saxtons.private.storage"
]; ];
}; };
......
...@@ -254,7 +254,7 @@ in { ...@@ -254,7 +254,7 @@ in {
]; ];
# NGINX reverse proxy # NGINX reverse proxy
security.acme.email = cfg.letsEncryptAdminEmail; security.acme.defaults.email = cfg.letsEncryptAdminEmail;
security.acme.acceptTerms = true; security.acme.acceptTerms = true;
services.nginx = { services.nginx = {
enable = true; enable = true;
......
...@@ -29,7 +29,7 @@ ...@@ -29,7 +29,7 @@
allowSFTP = false; allowSFTP = false;
# We only allow key-based authentication. # We only allow key-based authentication.
challengeResponseAuthentication = false; kbdInteractiveAuthentication = false;
passwordAuthentication = false; passwordAuthentication = false;
extraConfig = '' extraConfig = ''
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment