diff --git a/modules/presets/cli.nix b/modules/presets/cli.nix index 2b7b7615..e737f20e 100644 --- a/modules/presets/cli.nix +++ b/modules/presets/cli.nix @@ -46,10 +46,8 @@ in substituters = [ # "https://cache.lix.systems" # "https://helix.cachix.org" - "https://attic.hailsatan.eu/xyno" ]; trusted-public-keys = [ - "xyno:l2mXaEYOj2kSjxT1dbP1iVya1bBXmKuO7jRXUZohi8c=" # "cache.lix.systems:aBnZUw8zA7H35Cz2RyKFVs3H4PlGTLawyY5KRbvJR8o=" # "helix.cachix.org-1:ejp9KQpR1FBI2onstMQ34yogDm4OgU2ru6lIwPvuCVs=" ]; diff --git a/modules/services/authentik.nix b/modules/services/authentik.nix index 67314897..fc951d97 100644 --- a/modules/services/authentik.nix +++ b/modules/services/authentik.nix @@ -122,14 +122,14 @@ in }; systemd.services.authentik.after = cfg.after; systemd.services.authentik-ldap.after = [ "authentik-config.service" ]; - systemd.services.authentik-ldap.environment.AUTHENTIK_LISTEN__METRICS = mkForce "[::1]:9302"; + systemd.services.authentik-ldap.environment.AUTHENTIK_LISTEN__METRICS = "[::1]:9302"; services.authentik-ldap = { environmentFile = "${environmentFileDir}/ldap_config"; enable = true; }; systemd.services.authentik-proxy.after = [ "authentik-config.service" ]; - systemd.services.authentik-proxy.environment.AUTHENTIK_LISTEN__HTTP = mkForce "[::1]:9001"; - systemd.services.authentik-proxy.environment.AUTHENTIK_LISTEN__METRICS = mkForce "[::1]:9301"; + systemd.services.authentik-proxy.environment.AUTHENTIK_LISTEN__HTTP = "[::1]:9001"; + systemd.services.authentik-proxy.environment.AUTHENTIK_LISTEN__METRICS = "[::1]:9301"; services.authentik-proxy = { enable = true; environmentFile = "${environmentFileDir}/proxy_config";