1
0
mirror of https://github.com/ellmau/nixos.git synced 2025-12-20 09:39:39 +01:00

Compare commits

..

4 Commits

Author SHA1 Message Date
01fbbbdc91
Add recommended settings to nginx configuration
[metis]
2022-10-27 14:55:48 +02:00
490c17682c
Fix chown issue on nix-index-db service 2022-10-27 11:29:39 +02:00
84658992e9
flake.lock: Update
Flake lock file updates:

• Updated input 'emacs-overlay':
    'github:nix-community/emacs-overlay/c3e508d7f6429e17283836350764d13ba564e391' (2022-10-24)
  → 'github:nix-community/emacs-overlay/cdaafbd7700b461f13869610954014f317338600' (2022-10-27)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/0e6593630071440eb89cd97a52921497482b22c6' (2022-10-17)
  → 'github:NixOS/nixos-hardware/dfd91284332a4882c504b4807b1922e0fe386621' (2022-10-27)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/471d92178b978fcbad8db27c2e8a4e737d4e0e27' (2022-10-23)
  → 'github:NixOS/nixpkgs/e6e675cafe6a1d1b0eeb9ac3fe046091244b714e' (2022-10-26)
• Updated input 'nixpkgs-unstable':
    'github:NixOS/nixpkgs/95aeaf83c247b8f5aa561684317ecd860476fcd6' (2022-10-22)
  → 'github:NixOS/nixpkgs/f994293d1eb8812f032e8919e10a594567cf6ef7' (2022-10-25)
2022-10-27 11:21:46 +02:00
2528e87906
Update dap-mode options for emacs 2022-10-27 11:20:53 +02:00
4 changed files with 26 additions and 16 deletions

24
flake.lock generated
View File

@ -71,11 +71,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1666593425, "lastModified": 1666837668,
"narHash": "sha256-hr4ItI9O5Lz4CLaZ7t/EudgJKxJIKThbHAQH75g/6M0=", "narHash": "sha256-EAR96dIDxFdzukRruBLCecQe02a8v1HzWmIvLmd09eM=",
"owner": "nix-community", "owner": "nix-community",
"repo": "emacs-overlay", "repo": "emacs-overlay",
"rev": "c3e508d7f6429e17283836350764d13ba564e391", "rev": "cdaafbd7700b461f13869610954014f317338600",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -228,11 +228,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1665987993, "lastModified": 1666851028,
"narHash": "sha256-MvlaIYTRiqefG4dzI5p6vVCfl+9V8A1cPniUjcn6Ngc=", "narHash": "sha256-e6DpqCMGzlpkhZDuS2fdDX1DsauFk8NARqQ1DDF42VY=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "0e6593630071440eb89cd97a52921497482b22c6", "rev": "dfd91284332a4882c504b4807b1922e0fe386621",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -307,11 +307,11 @@
}, },
"nixpkgs-unstable": { "nixpkgs-unstable": {
"locked": { "locked": {
"lastModified": 1666447894, "lastModified": 1666703756,
"narHash": "sha256-i9WHX4w/et4qPMzEXd9POmnO0/bthjr7R4cblKNHGms=", "narHash": "sha256-GwpMJ1hT+z1fMAUkaGtvbvofJQwdVFDEGVhfE82+AUk=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "95aeaf83c247b8f5aa561684317ecd860476fcd6", "rev": "f994293d1eb8812f032e8919e10a594567cf6ef7",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -323,11 +323,11 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1666528161, "lastModified": 1666767323,
"narHash": "sha256-PFOQSC0x4xPD1p/GZIbpKuoEBu6M8HnEOeNRiBUCELA=", "narHash": "sha256-drbsgF8iLzQQ6umzOU/idYkI+UoifQdpH+mwohB3J7c=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "471d92178b978fcbad8db27c2e8a4e737d4e0e27", "rev": "e6e675cafe6a1d1b0eeb9ac3fe046091244b714e",
"type": "github" "type": "github"
}, },
"original": { "original": {

View File

@ -455,11 +455,15 @@
;; dap ;; dap
(use-package dap-mode (use-package dap-mode
:ensure
:after lsp-mode :after lsp-mode
:requires (dap-cpptools)
:config
(dap-ui-mode)
(dap-ui-controls-mode 1)
:custom :custom
(dap-mode t) (dap-mode t)
(dap-ui-mode t) (dap-ui-mode t))
(require 'dap-cpptools))
;; flycheck ;; flycheck
(use-package flycheck (use-package flycheck

View File

@ -34,7 +34,7 @@ with lib; {
]; ];
ExecStart = toString nix-index-db-update; ExecStart = toString nix-index-db-update;
User = "nobody"; User = "nobody";
Group = "nobody"; Group = "nogroup";
}; };
}; };

View File

@ -9,7 +9,13 @@ with lib; {
cfg = config.elss.server.nginx; cfg = config.elss.server.nginx;
in in
mkIf cfg.enable { mkIf cfg.enable {
services.nginx.enable = true; services.nginx = {
enable = true;
recommendedGzipSettings = true;
recommendedOptimisation = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
};
networking.firewall.allowedTCPPorts = [80 443]; networking.firewall.allowedTCPPorts = [80 443];
services.nginx.virtualHosts."localhost" = { services.nginx.virtualHosts."localhost" = {
addSSL = false; addSSL = false;