diff --git a/flake.lock b/flake.lock index e616973..c38e837 100644 --- a/flake.lock +++ b/flake.lock @@ -40,11 +40,11 @@ ] }, "locked": { - "lastModified": 1736373539, - "narHash": "sha256-dinzAqCjenWDxuy+MqUQq0I4zUSfaCvN9rzuCmgMZJY=", + "lastModified": 1735344290, + "narHash": "sha256-oJDtWPH1oJT34RJK1FSWjwX4qcGOBRkcNQPD0EbSfNM=", "owner": "nix-community", "repo": "home-manager", - "rev": "bd65bc3cde04c16755955630b344bc9e35272c56", + "rev": "613691f285dad87694c2ba1c9e6298d04736292d", "type": "github" }, "original": { @@ -91,11 +91,11 @@ }, "nixos-hardware": { "locked": { - "lastModified": 1738391520, - "narHash": "sha256-6HI58PKjddsC0RA0gBQlt6ox47oH//jLUHwx05RO8g0=", + "lastModified": 1735388221, + "narHash": "sha256-e5IOgjQf0SZcFCEV/gMGrsI0gCJyqOKShBQU0iiM3Kg=", "owner": "NixOS", "repo": "nixos-hardware", - "rev": "34b64e4e1ddb14e3ffc7db8d4a781396dbbab773", + "rev": "7c674c6734f61157e321db595dbfcd8523e04e19", "type": "github" }, "original": { @@ -107,11 +107,11 @@ }, "nixpkgs": { "locked": { - "lastModified": 1738277201, - "narHash": "sha256-6L+WXKCw5mqnUIExvqkD99pJQ41xgyCk6z/H9snClwk=", + "lastModified": 1735922141, + "narHash": "sha256-vk0xwGZSlvZ/596yxOtsk4gxsIx2VemzdjiU8zhjgWw=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "666e1b3f09c267afd66addebe80fb05a5ef2b554", + "rev": "d29ab98cd4a70a387b8ceea3e930b3340d41ac5a", "type": "github" }, "original": { diff --git a/home/vinzenz/.config/containers/policy.json b/home/vinzenz/.config/containers/policy.json deleted file mode 100644 index d13844e..0000000 --- a/home/vinzenz/.config/containers/policy.json +++ /dev/null @@ -1,16 +0,0 @@ -{ - "default": [ - { - "type": "reject" - } - ], - "transports": { - "docker-daemon": { - "": [ - { - "type": "insecureAcceptAnything" - } - ] - } - } -} \ No newline at end of file diff --git a/home/vinzenz/default.nix b/home/vinzenz/default.nix index 0b06468..6cd8b3a 100644 --- a/home/vinzenz/default.nix +++ b/home/vinzenz/default.nix @@ -48,7 +48,22 @@ inputs@{ pkgs, ... }: home.file."policy.json" = { target = ".config/containers/policy.json"; - text = builtins.readFile ./.config/containers/policy.json; + text = '' + { + "default": [ + { + "type": "insecureAcceptAnything" + } + ], + "transports": + { + "docker-daemon": + { + "": [{"type":"insecureAcceptAnything"}] + } + } + } + ''; }; }; } diff --git a/hosts/forgejo-runner-1/default.nix b/hosts/forgejo-runner-1/default.nix index 3029e52..4c2666e 100644 --- a/hosts/forgejo-runner-1/default.nix +++ b/hosts/forgejo-runner-1/default.nix @@ -11,8 +11,8 @@ nixpkgs.lib.nixosSystem { } { services.tailscale.useRoutingFeatures = "both"; - system.autoUpgrade.allowReboot = true; - + } + { users.users = { root.openssh.authorizedKeys.keys = [ ''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCJUpbpB3KEKVoKWsKoar9J4RNah8gmQoSH6jQEw5dY vinzenz-pixel-JuiceSSH'' @@ -20,10 +20,9 @@ nixpkgs.lib.nixosSystem { ''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPDNpLDmctyqGpow/ElQvdhY4BLBPS/sigDJ1QEcC7wC vinzenz-lpt2-roaming'' ]; }; - - environment.systemPackages = with nixpkgs; [ - forgejo-runner - ]; + } + { + system.autoUpgrade.allowReboot = true; } ]; }