From b8bbe16a7b7f6691e52b9bef2e066f2c9eacfc4a Mon Sep 17 00:00:00 2001 From: Lillian-Violet Date: Thu, 19 Feb 2026 22:29:45 +0100 Subject: [PATCH] disable anubis for now --- nixos/hosts/queen/configuration.nix | 50 ++++++++++++++--------------- 1 file changed, 25 insertions(+), 25 deletions(-) diff --git a/nixos/hosts/queen/configuration.nix b/nixos/hosts/queen/configuration.nix index 47a99db..4de2ab2 100644 --- a/nixos/hosts/queen/configuration.nix +++ b/nixos/hosts/queen/configuration.nix @@ -32,33 +32,33 @@ preservation.enable = lib.mkForce false; - services.anubis.instances.default.settings.TARGET = "http://localhost:8123"; + # services.anubis.instances.default.settings.TARGET = "http://localhost:8123"; - # required due to unix socket permissions - users.users.nginx.extraGroups = [config.users.groups.anubis.name]; - services.nginx.virtualHosts."*.gladtherescake.eu" = { - locations = { - "/".proxyPass = "http://unix:${config.services.anubis.instances.default.settings.BIND}"; - }; - }; - services.nginx.virtualHosts."*.lillianviolet.dev" = { - locations = { - "/".proxyPass = "http://unix:${config.services.anubis.instances.default.settings.BIND}"; - }; - }; + # # required due to unix socket permissions + # users.users.nginx.extraGroups = [config.users.groups.anubis.name]; + # services.nginx.virtualHosts."*.gladtherescake.eu" = { + # locations = { + # "/".proxyPass = "http://unix:${config.services.anubis.instances.default.settings.BIND}"; + # }; + # }; + # services.nginx.virtualHosts."*.lillianviolet.dev" = { + # locations = { + # "/".proxyPass = "http://unix:${config.services.anubis.instances.default.settings.BIND}"; + # }; + # }; - zramSwap.enable = false; - services = { - openssh = { - enable = true; - settings = { - # require public key authentication for better security - PasswordAuthentication = false; - KbdInteractiveAuthentication = false; - PermitRootLogin = "no"; - }; - }; - }; + # zramSwap.enable = false; + # services = { + # openssh = { + # enable = true; + # settings = { + # # require public key authentication for better security + # PasswordAuthentication = false; + # KbdInteractiveAuthentication = false; + # PermitRootLogin = "no"; + # }; + # }; + # }; nixpkgs = { # You can add overlays here