summaryrefslogtreecommitdiff
path: root/modules
diff options
context:
space:
mode:
authorKjetil Orbekk <kj@orbekk.com>2023-06-03 21:22:12 -0400
committerKjetil Orbekk <kj@orbekk.com>2023-06-03 21:22:12 -0400
commit475455d1c7a417cdfc2edd1e34bdd8385e204620 (patch)
tree0420da24e4804e72df168e24c2f4edebd730ad32 /modules
parentff52b6050a0acd9c4ceb28ac1a33344a3f3bb6f4 (diff)
Fix errors
Diffstat (limited to 'modules')
-rw-r--r--modules/backup-server.nix28
-rw-r--r--modules/development.nix1
-rw-r--r--modules/users.nix1
3 files changed, 14 insertions, 16 deletions
diff --git a/modules/backup-server.nix b/modules/backup-server.nix
index 4d9005d..de0f772 100644
--- a/modules/backup-server.nix
+++ b/modules/backup-server.nix
@@ -69,20 +69,20 @@ in {
};
services.borgbackup.repos = lib.mkIf cfg.enableServer {
- dragon = {
- authorizedKeys =
- [ (builtins.readFile ../secrets/dragon-borg-ssh-key.pub) ];
- path = [ "/var/lib/dragon" ];
- };
- breakds = {
- authorizedKeys = [ (builtins.readFile ../data/breakds.pub) ];
- path = [ "/var/lib/borg/breakds" ];
- };
- pincer = {
- authorizedKeys =
- [ (builtins.readFile ../secrets/pincer-borg-ssh-key.pub) ];
- path = [ "/var/lib/borg-pincer" ];
- };
+ # dragon = {
+ # authorizedKeys =
+ # [ (builtins.readFile ../secrets/dragon-borg-ssh-key.pub) ];
+ # path = [ "/var/lib/dragon" ];
+ # };
+ # breakds = {
+ # authorizedKeys = [ (builtins.readFile ../data/breakds.pub) ];
+ # path = [ "/var/lib/borg/breakds" ];
+ # };
+ # pincer = {
+ # authorizedKeys =
+ # [ (builtins.readFile ../secrets/pincer-borg-ssh-key.pub) ];
+ # path = [ "/var/lib/borg-pincer" ];
+ # };
};
services.borgbackup.jobs = lib.mkIf cfg.enableClient backupJobs;
diff --git a/modules/development.nix b/modules/development.nix
index 6b380db..f3ee2d1 100644
--- a/modules/development.nix
+++ b/modules/development.nix
@@ -12,7 +12,6 @@ in {
podman = {
enable = true;
dockerCompat = true;
- defaultNetwork.dnsname.enable = true;
};
};
};
diff --git a/modules/users.nix b/modules/users.nix
index ec78433..8520fdb 100644
--- a/modules/users.nix
+++ b/modules/users.nix
@@ -89,7 +89,6 @@ in {
uid = 506;
useDefaultShell = true;
home = "/storage";
- isNormalUser = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKhRj4eYL01OAboBynL05+YRrYeglZoagbqkGzgX2uJq kagee"
];