Merge pull request #9631 from cole-h/fixup-check-warnings

Fix warnings when running checks

(cherry picked from commit 75e10e42f3)
Change-Id: Id955008fe045f23f72fae2a2cdf8f7ccddd1e6b9
This commit is contained in:
eldritch horrors 2024-03-07 09:58:15 +01:00
parent bac3c5ad97
commit b87f059ed4
4 changed files with 5 additions and 5 deletions

View file

@ -144,7 +144,7 @@ in
virtualisation.memorySize = 4096; virtualisation.memorySize = 4096;
nix.settings.substituters = lib.mkForce [ ]; nix.settings.substituters = lib.mkForce [ ];
nix.extraOptions = "experimental-features = nix-command flakes"; nix.extraOptions = "experimental-features = nix-command flakes";
networking.hosts.${(builtins.head nodes.github.config.networking.interfaces.eth1.ipv4.addresses).address} = networking.hosts.${(builtins.head nodes.github.networking.interfaces.eth1.ipv4.addresses).address} =
[ "channels.nixos.org" "api.github.com" "github.com" ]; [ "channels.nixos.org" "api.github.com" "github.com" ];
security.pki.certificateFiles = [ "${cert}/ca.crt" ]; security.pki.certificateFiles = [ "${cert}/ca.crt" ];
}; };

View file

@ -36,7 +36,7 @@ in {
server = server =
{ config, pkgs, ... }: { config, pkgs, ... }:
{ services.openssh.enable = true; { services.openssh.enable = true;
services.openssh.permitRootLogin = "yes"; services.openssh.settings.PermitRootLogin = "yes";
users.users.root.password = "foobar"; users.users.root.password = "foobar";
virtualisation.writableStore = true; virtualisation.writableStore = true;
virtualisation.additionalPaths = [ pkgB pkgC ]; virtualisation.additionalPaths = [ pkgB pkgC ];

View file

@ -84,8 +84,8 @@ in
client = { lib, nodes, pkgs, ... }: { client = { lib, nodes, pkgs, ... }: {
networking.useDHCP = false; networking.useDHCP = false;
networking.nameservers = [ networking.nameservers = [
(lib.head nodes.http_dns.config.networking.interfaces.eth1.ipv6.addresses).address (lib.head nodes.http_dns.networking.interfaces.eth1.ipv6.addresses).address
(lib.head nodes.http_dns.config.networking.interfaces.eth1.ipv4.addresses).address (lib.head nodes.http_dns.networking.interfaces.eth1.ipv4.addresses).address
]; ];
networking.interfaces.eth1.ipv6.addresses = [ networking.interfaces.eth1.ipv6.addresses = [
{ address = "fd21::10"; prefixLength = 64; } { address = "fd21::10"; prefixLength = 64; }

View file

@ -108,7 +108,7 @@ in
flake-registry = https://git.sr.ht/~NixOS/flake-registry/blob/master/flake-registry.json flake-registry = https://git.sr.ht/~NixOS/flake-registry/blob/master/flake-registry.json
''; '';
environment.systemPackages = [ pkgs.jq ]; environment.systemPackages = [ pkgs.jq ];
networking.hosts.${(builtins.head nodes.sourcehut.config.networking.interfaces.eth1.ipv4.addresses).address} = networking.hosts.${(builtins.head nodes.sourcehut.networking.interfaces.eth1.ipv4.addresses).address} =
[ "git.sr.ht" ]; [ "git.sr.ht" ];
security.pki.certificateFiles = [ "${cert}/ca.crt" ]; security.pki.certificateFiles = [ "${cert}/ca.crt" ];
}; };