refactor(tazjin): Additional restricted-eval cleanup
Change-Id: I4baa94f65a16248023b5fb0e2dd305d6984566c8 Reviewed-on: https://cl.tvl.fyi/c/depot/+/5690 Reviewed-by: tazjin <tazjin@tvl.su> Reviewed-by: sterni <sternenseemann@systemli.org> Autosubmit: tazjin <tazjin@tvl.su> Tested-by: BuildkiteCI
This commit is contained in:
parent
48dfefe40d
commit
565993f016
2 changed files with 7 additions and 22 deletions
|
@ -10,25 +10,13 @@ let
|
||||||
|
|
||||||
extraConfig = "return 301 https://${to}$request_uri;";
|
extraConfig = "return 301 https://${to}$request_uri;";
|
||||||
};
|
};
|
||||||
|
mod = name: depot.path.origSrc + ("/ops/modules/" + name);
|
||||||
in
|
in
|
||||||
lib.fix (self: {
|
lib.fix (self: {
|
||||||
# Disable the current ACME module and use the old one from 19.09
|
imports = [
|
||||||
# instead, until the various regressions have been sorted out.
|
(mod "quassel.nix")
|
||||||
# TODO(tazjin): Remove this once the new ACME module works.
|
(mod "smtprelay.nix")
|
||||||
disabledModules = [ "security/acme" ];
|
];
|
||||||
imports =
|
|
||||||
let
|
|
||||||
oldChannel = fetchTarball {
|
|
||||||
# NixOS 19.09 on 2020-10-04
|
|
||||||
url = "https://github.com/NixOS/nixpkgs-channels/archive/75f4ba05c63be3f147bcc2f7bd4ba1f029cedcb1.tar.gz";
|
|
||||||
sha256 = "157c64220lf825ll4c0cxsdwg7cxqdx4z559fdp7kpz0g6p8fhhr";
|
|
||||||
};
|
|
||||||
in
|
|
||||||
[
|
|
||||||
"${depot.path}/ops/modules/quassel.nix"
|
|
||||||
"${depot.path}/ops/modules/smtprelay.nix"
|
|
||||||
"${oldChannel}/nixos/modules/security/acme.nix"
|
|
||||||
];
|
|
||||||
|
|
||||||
# camden is intended to boot unattended, despite having an encrypted
|
# camden is intended to boot unattended, despite having an encrypted
|
||||||
# root partition.
|
# root partition.
|
||||||
|
@ -201,11 +189,10 @@ lib.fix (self: {
|
||||||
# Provision a TLS certificate outside of nginx to avoid
|
# Provision a TLS certificate outside of nginx to avoid
|
||||||
# nixpkgs#38144
|
# nixpkgs#38144
|
||||||
security.acme = {
|
security.acme = {
|
||||||
# acceptTerms = true;
|
acceptTerms = true;
|
||||||
|
|
||||||
certs."tazj.in" = {
|
certs."tazj.in" = {
|
||||||
email = "mail@tazj.in";
|
email = "mail@tazj.in";
|
||||||
user = "nginx";
|
|
||||||
group = "nginx";
|
group = "nginx";
|
||||||
webroot = "/var/lib/acme/acme-challenge";
|
webroot = "/var/lib/acme/acme-challenge";
|
||||||
extraDomains = {
|
extraDomains = {
|
||||||
|
@ -222,9 +209,7 @@ lib.fix (self: {
|
||||||
certs."quassel.tazj.in" = {
|
certs."quassel.tazj.in" = {
|
||||||
email = "mail@tazj.in";
|
email = "mail@tazj.in";
|
||||||
webroot = "/var/lib/acme/challenge-quassel";
|
webroot = "/var/lib/acme/challenge-quassel";
|
||||||
user = "nginx"; # required because of a bug in the ACME module
|
|
||||||
group = "quassel";
|
group = "quassel";
|
||||||
allowKeysForGroup = true;
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -12,7 +12,7 @@ let
|
||||||
in
|
in
|
||||||
lib.fix (self: {
|
lib.fix (self: {
|
||||||
imports = [
|
imports = [
|
||||||
"${depot.path}/ops/modules/v4l2loopback.nix"
|
(depot.path.origSrc + "/ops/modules/v4l2loopback.nix")
|
||||||
];
|
];
|
||||||
|
|
||||||
boot = {
|
boot = {
|
||||||
|
|
Loading…
Reference in a new issue