Compare commits

..

No commits in common. "1c6643d4c2cfae1346f1b8bf3a7f4a07a4fb091c" and "94022737a054f1f6bce14d51944c2a8b7747d850" have entirely different histories.

11 changed files with 35 additions and 37 deletions

46
flake.lock generated
View file

@ -58,11 +58,11 @@
"systems": "systems_3" "systems": "systems_3"
}, },
"locked": { "locked": {
"lastModified": 1736005916, "lastModified": 1733851514,
"narHash": "sha256-a/sqKV5GvqEcQEGfUGQkhWaUnqIRi8oiDAHbBG1oFZg=", "narHash": "sha256-fQt/HzF+OBC8xLRYeHiYLSEzjrgOLNWhyd102aY2oLU=",
"owner": "nix-community", "owner": "nix-community",
"repo": "authentik-nix", "repo": "authentik-nix",
"rev": "5db6f7711a28abd4b6bbe152c8a7de9d00b1e30d", "rev": "b059e1d6e7a94bbeabb4e87d47b5f5097fd61823",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -74,16 +74,16 @@
"authentik-src": { "authentik-src": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1734959339, "lastModified": 1733849292,
"narHash": "sha256-CkUmsVKzAQ/VWIhtxWxlcGtrWVa8hxqsMqvfcsG5ktA=", "narHash": "sha256-gJYgrRxytoGHkjeEsiKY/tl06D8XOnZZ9SDpK1WSyUw=",
"owner": "goauthentik", "owner": "goauthentik",
"repo": "authentik", "repo": "authentik",
"rev": "e87a17fd8169d3fa92bcc47eb2743928df83bc95", "rev": "0edd7531a152910e6bdd4f7d3d0cde3ed5fdd956",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "goauthentik", "owner": "goauthentik",
"ref": "version/2024.12.1", "ref": "version/2024.10.5",
"repo": "authentik", "repo": "authentik",
"type": "github" "type": "github"
} }
@ -246,16 +246,16 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1735344290, "lastModified": 1726989464,
"narHash": "sha256-oJDtWPH1oJT34RJK1FSWjwX4qcGOBRkcNQPD0EbSfNM=", "narHash": "sha256-Vl+WVTJwutXkimwGprnEtXc/s/s8sMuXzqXaspIGlwM=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "613691f285dad87694c2ba1c9e6298d04736292d", "rev": "2f23fa308a7c067e52dfcc30a0758f47043ec176",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nix-community", "owner": "nix-community",
"ref": "release-24.11", "ref": "release-24.05",
"repo": "home-manager", "repo": "home-manager",
"type": "github" "type": "github"
} }
@ -269,11 +269,11 @@
"spectrum": "spectrum" "spectrum": "spectrum"
}, },
"locked": { "locked": {
"lastModified": 1735074045, "lastModified": 1733868086,
"narHash": "sha256-CeYsC8J2dNiV2FCQOxK1oZ/jNpOF2io7aCEFHmfi95U=", "narHash": "sha256-CeYsC8J2dNiV2FCQOxK1oZ/jNpOF2io7aCEFHmfi95U=",
"owner": "astro", "owner": "astro",
"repo": "microvm.nix", "repo": "microvm.nix",
"rev": "2ae08de8e8068b00193b9cfbc0acc9dfdda03181", "rev": "870cb181719aa12baf478d7cde6068ec7ed144ae",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -360,11 +360,11 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1735834308, "lastModified": 1730200266,
"narHash": "sha256-dklw3AXr3OGO4/XT1Tu3Xz9n/we8GctZZ75ZWVqAVhk=", "narHash": "sha256-l253w0XMT8nWHGXuXqyiIC/bMvh1VRszGXgdpQlfhvU=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "6df24922a1400241dae323af55f30e4318a6ca65", "rev": "807e9154dcb16384b1b765ebe9cd2bba2ac287fd",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -376,16 +376,16 @@
}, },
"nixpkgs_3": { "nixpkgs_3": {
"locked": { "locked": {
"lastModified": 1736200483, "lastModified": 1733730953,
"narHash": "sha256-JO+lFN2HsCwSLMUWXHeOad6QUxOuwe9UOAF/iSl1J4I=", "narHash": "sha256-dlK7n82FEyZlHH7BFHQAM5tua+lQO1Iv7aAtglc1O5s=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "3f0a8ac25fb674611b98089ca3a5dd6480175751", "rev": "7109b680d161993918b0a126f38bc39763e5a709",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "NixOS", "owner": "NixOS",
"ref": "nixos-24.11", "ref": "nixos-24.05",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }
@ -408,11 +408,11 @@
"treefmt-nix": "treefmt-nix" "treefmt-nix": "treefmt-nix"
}, },
"locked": { "locked": {
"lastModified": 1735164664, "lastModified": 1730284601,
"narHash": "sha256-DaWy+vo3c4TQ93tfLjUgcpPaSoDw4qV4t76Y3Mhu84I=", "narHash": "sha256-eHYcKVLIRRv3J1vjmxurS6HVdGphB53qxUeAkylYrZY=",
"owner": "nix-community", "owner": "nix-community",
"repo": "poetry2nix", "repo": "poetry2nix",
"rev": "1fb01e90771f762655be7e0e805516cd7fa4d58e", "rev": "43a898b4d76f7f3f70df77a2cc2d40096bc9d75e",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -2,9 +2,9 @@
description = "A simple system flake using some Aux defaults"; description = "A simple system flake using some Aux defaults";
inputs = { inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.11"; nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.05";
home-manager = { home-manager = {
url = "github:nix-community/home-manager/release-24.11"; url = "github:nix-community/home-manager/release-24.05";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
microvm.url = "github:astro/microvm.nix"; microvm.url = "github:astro/microvm.nix";

View file

@ -103,6 +103,6 @@
qemuGuest.enable = true; qemuGuest.enable = true;
}; };
system.stateVersion = "24.11"; # Did you read the comment? system.stateVersion = "24.05"; # Did you read the comment?
} }

View file

@ -2,7 +2,7 @@
{ {
home = { home = {
username = "tbarnouin"; username = "tbarnouin";
stateVersion = "24.11"; stateVersion = "24.05";
sessionPath = [ sessionPath = [
"$HOME/.local/bin" "$HOME/.local/bin"
]; ];

View file

@ -103,6 +103,6 @@
qemuGuest.enable = true; qemuGuest.enable = true;
}; };
system.stateVersion = "24.11"; # Did you read the comment? system.stateVersion = "24.05"; # Did you read the comment?
} }

View file

@ -2,7 +2,7 @@
{ {
home = { home = {
username = "tbarnouin"; username = "tbarnouin";
stateVersion = "24.11"; stateVersion = "24.05";
sessionPath = [ sessionPath = [
"$HOME/.local/bin" "$HOME/.local/bin"
]; ];

View file

@ -118,7 +118,7 @@
}; };
system = { system = {
stateVersion = "24.11"; stateVersion = "24.05";
activationScripts.ensure-ssh-key-dir.text = "mkdir -p /etc/ssh"; activationScripts.ensure-ssh-key-dir.text = "mkdir -p /etc/ssh";
}; };
} }

View file

@ -61,14 +61,12 @@ in
# Enable CSP for your services. # Enable CSP for your services.
#add_header Content-Security-Policy "script-src 'self'; object-src 'none'; base-uri 'none';" always; #add_header Content-Security-Policy "script-src 'self'; object-src 'none'; base-uri 'none';" always;
add_header Content-Security-Policy "frame-ancestors self cloud.le43.eu office.le43.eu; upgrade-insecure-requests; frame-src 'self' http://office.le43.eu;";
# Minimize information leaked to other domains # Minimize information leaked to other domains
add_header 'Referrer-Policy' 'origin-when-cross-origin'; add_header 'Referrer-Policy' 'origin-when-cross-origin';
# Disable embedding as a frame # Disable embedding as a frame
#add_header X-Frame-Options SAMEORIGIN; add_header X-Frame-Options SAMEORIGIN;
# Prevent injection of code in other mime types (XSS Attacks) # Prevent injection of code in other mime types (XSS Attacks)
add_header X-Content-Type-Options nosniff; add_header X-Content-Type-Options nosniff;
@ -115,7 +113,7 @@ in
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
proxyPass = "http://192.168.1.125:8000"; proxyPass = "http://192.168.1.46";
proxyWebsockets = true; proxyWebsockets = true;
recommendedProxySettings = true; recommendedProxySettings = true;
}; };

View file

@ -126,7 +126,7 @@
}; };
system = { system = {
stateVersion = "24.11"; stateVersion = "24.05";
activationScripts.ensure-ssh-key-dir.text = "mkdir -p /etc/ssh"; activationScripts.ensure-ssh-key-dir.text = "mkdir -p /etc/ssh";
}; };
} }

View file

@ -187,7 +187,7 @@ in
}; };
system = { system = {
stateVersion = "24.11"; stateVersion = "24.05";
activationScripts.ensure-ssh-key-dir.text = "mkdir -p /etc/ssh"; activationScripts.ensure-ssh-key-dir.text = "mkdir -p /etc/ssh";
}; };
}; };

View file

@ -114,7 +114,7 @@
}; };
system = { system = {
stateVersion = "24.11"; stateVersion = "24.05";
activationScripts.ensure-ssh-key-dir.text = "mkdir -p /etc/ssh"; activationScripts.ensure-ssh-key-dir.text = "mkdir -p /etc/ssh";
}; };
} }