summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--flake.lock56
-rw-r--r--flake.nix4
-rw-r--r--modules/auto-update.nix5
-rw-r--r--modules/common.nix5
-rw-r--r--modules/desktop.nix8
-rw-r--r--modules/nextcloud.nix4
-rw-r--r--modules/router.nix6
-rw-r--r--modules/yubikey.nix1
8 files changed, 40 insertions, 49 deletions
diff --git a/flake.lock b/flake.lock
index 6d49f2e..9baf71c 100644
--- a/flake.lock
+++ b/flake.lock
@@ -10,11 +10,11 @@
"systems": "systems"
},
"locked": {
- "lastModified": 1712079060,
- "narHash": "sha256-/JdiT9t+zzjChc5qQiF+jhrVhRt8figYH29rZO7pFe4=",
+ "lastModified": 1716561646,
+ "narHash": "sha256-UIGtLO89RxKt7RF2iEgPikSdU53r6v/6WYB0RW3k89I=",
"owner": "ryantm",
"repo": "agenix",
- "rev": "1381a759b205dff7a6818733118d02253340fd5e",
+ "rev": "c2fc0762bbe8feb06a2e59a364fa81b3a57671c9",
"type": "github"
},
"original": {
@@ -74,11 +74,11 @@
"nixpkgs-stable": "nixpkgs-stable"
},
"locked": {
- "lastModified": 1713978400,
- "narHash": "sha256-Q/sRS7bKVuaqJWtVwQl3DcjNdW8KikSYx/khPvbgFbc=",
+ "lastModified": 1717923950,
+ "narHash": "sha256-k7WYdsUm4oeFlAC2JLKXDIxp1pS7/mrUyN7ztEF5DGM=",
"owner": "nix-community",
"repo": "emacs-overlay",
- "rev": "2426b41b8b6be7ccac87159476b109c81894d0bf",
+ "rev": "a5143ff8b6be9201f6b7aabe209a4c2a4a832ae3",
"type": "github"
},
"original": {
@@ -181,11 +181,11 @@
"nixpkgs": "nixpkgs_2"
},
"locked": {
- "lastModified": 1713946567,
- "narHash": "sha256-gbffQxWoGmq9rmSwM2y4a+VGaTTuXSN+yyRoCkMuRjs=",
+ "lastModified": 1717685136,
+ "narHash": "sha256-S+C/DX5HOhlhJAmcGxbB+Tv6oqZOkr3z/WzPuydXI14=",
"owner": "Jovian-Experiments",
"repo": "Jovian-NixOS",
- "rev": "c3255d642c945847c61a867be15de63b8f81d5dc",
+ "rev": "fd13986ede9b94c50e84aecb2c88863e297bbb52",
"type": "github"
},
"original": {
@@ -242,11 +242,11 @@
},
"nixos-hardware": {
"locked": {
- "lastModified": 1713864415,
- "narHash": "sha256-/BPDMJEkrsFAFOsQWhwm31wezlgshPFlLBn34KEUdVA=",
+ "lastModified": 1717828156,
+ "narHash": "sha256-YvstO0lobf3JWQuAfZCLYRTROC2ZDEgtWeQtWbO49p4=",
"owner": "NixOS",
"repo": "nixos-hardware",
- "rev": "797f8d8082c7cc3259cba7275c699d4991b09ecc",
+ "rev": "057a7996d012f342a38a26261ee529cebb1755ef",
"type": "github"
},
"original": {
@@ -258,11 +258,11 @@
},
"nixpkgs": {
"locked": {
- "lastModified": 1713714899,
- "narHash": "sha256-+z/XjO3QJs5rLE5UOf015gdVauVRQd2vZtsFkaXBq2Y=",
+ "lastModified": 1717786204,
+ "narHash": "sha256-4q0s6m0GUcN7q+Y2DqD27iLvbcd1G50T2lv08kKxkSI=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "6143fc5eeb9c4f00163267708e26191d1e918932",
+ "rev": "051f920625ab5aabe37c920346e3e69d7d34400e",
"type": "github"
},
"original": {
@@ -274,11 +274,11 @@
},
"nixpkgs-stable": {
"locked": {
- "lastModified": 1713828541,
- "narHash": "sha256-KtvQeE12MSkCOhvVmnmcZCjnx7t31zWin2XVSDOwBDE=",
+ "lastModified": 1717530100,
+ "narHash": "sha256-b4Dn+PnrZoVZ/BoR9JN2fTxXxplJrAsdSUIePf4Cacs=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "b500489fd3cf653eafc075f9362423ad5cdd8676",
+ "rev": "a2e1d0414259a144ebdc048408a807e69e0565af",
"type": "github"
},
"original": {
@@ -290,11 +290,11 @@
},
"nixpkgs-unstable": {
"locked": {
- "lastModified": 1713895582,
- "narHash": "sha256-cfh1hi+6muQMbi9acOlju3V1gl8BEaZBXBR9jQfQi4U=",
+ "lastModified": 1717786204,
+ "narHash": "sha256-4q0s6m0GUcN7q+Y2DqD27iLvbcd1G50T2lv08kKxkSI=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "572af610f6151fd41c212f897c71f7056e3fb518",
+ "rev": "051f920625ab5aabe37c920346e3e69d7d34400e",
"type": "github"
},
"original": {
@@ -306,11 +306,11 @@
},
"nixpkgs_2": {
"locked": {
- "lastModified": 1713248628,
- "narHash": "sha256-NLznXB5AOnniUtZsyy/aPWOk8ussTuePp2acb9U+ISA=",
+ "lastModified": 1716330097,
+ "narHash": "sha256-8BO3B7e3BiyIDsaKA0tY8O88rClYRTjvAp66y+VBUeU=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "5672bc9dbf9d88246ddab5ac454e82318d094bb8",
+ "rev": "5710852ba686cc1fd0d3b8e22b3117d43ba374c2",
"type": "github"
},
"original": {
@@ -338,16 +338,16 @@
},
"nixpkgs_4": {
"locked": {
- "lastModified": 1713828541,
- "narHash": "sha256-KtvQeE12MSkCOhvVmnmcZCjnx7t31zWin2XVSDOwBDE=",
+ "lastModified": 1717696253,
+ "narHash": "sha256-1+ua0ggXlYYPLTmMl3YeYYsBXDSCqT+Gw3u6l4gvMhA=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "b500489fd3cf653eafc075f9362423ad5cdd8676",
+ "rev": "9b5328b7f761a7bbdc0e332ac4cf076a3eedb89b",
"type": "github"
},
"original": {
"owner": "NixOS",
- "ref": "nixos-23.11",
+ "ref": "nixos-24.05",
"repo": "nixpkgs",
"type": "github"
}
diff --git a/flake.nix b/flake.nix
index 9103c13..4b5b63e 100644
--- a/flake.nix
+++ b/flake.nix
@@ -4,7 +4,7 @@
extra-trusted-public-keys = "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=";
};
- inputs.nixpkgs.url = "github:NixOS/nixpkgs/nixos-23.11";
+ inputs.nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.05";
inputs.nixpkgs-unstable.url = "github:NixOS/nixpkgs/nixos-unstable";
inputs.nixos-hardware.url = "github:NixOS/nixos-hardware/master";
inputs.emacs-overlay.url = "github:nix-community/emacs-overlay";
@@ -42,7 +42,7 @@
nixosModules = orbekk-modules // { inherit registry-module; };
overlays = {
- emacs-overlay = emacs-overlay.overlay;
+ #emacs-overlay = emacs-overlay.overlay;
extraPackages = final: prev: {
agenix = agenix.packages.${final.system}.default;
diff --git a/modules/auto-update.nix b/modules/auto-update.nix
index 996ff81..75f1838 100644
--- a/modules/auto-update.nix
+++ b/modules/auto-update.nix
@@ -1,12 +1,9 @@
{ config, lib, pkgs, ... }:
{
system.autoUpgrade = {
- enable = true;
+ enable = false;
dates = "04:40";
flake =
- if config.networking.hostName == "dragon" then
- "git+file:///storage/projects/nixos-config.git"
- else
"git+https://git.orbekk.com/nixos-config.git";
};
}
diff --git a/modules/common.nix b/modules/common.nix
index 28643f8..9f1d9b6 100644
--- a/modules/common.nix
+++ b/modules/common.nix
@@ -60,7 +60,7 @@
dnsutils
binutils
#emacs
- emacs-pgtk
+ #emacs-pgtk
#pkgs.unstable.emacsNativeComp
fd
fzf
@@ -102,6 +102,7 @@
services = {
emacs.install = true;
+ emacs.startWithGraphical = true;
postgresql = { package = pkgs.postgresql_12; };
openssh.settings.PasswordAuthentication = false;
openssh.settings.KbdInteractiveAuthentication = false;
@@ -135,7 +136,7 @@
'';
};
- services.emacs.package = pkgs.emacs-pgtk;
+ services.emacs.package = pkgs.emacs;
services.emacs.enable = true;
boot.tmp.cleanOnBoot = true;
diff --git a/modules/desktop.nix b/modules/desktop.nix
index 54972b5..7b4997b 100644
--- a/modules/desktop.nix
+++ b/modules/desktop.nix
@@ -157,14 +157,6 @@ in {
sbcl openssl exercism
];
- # i18n.inputMethod = {
- # enabled = "fcitx";
- # fcitx.engines = with pkgs.fcitx-engines; [ cloudpinyin ];
- # };
-
- # boot.plymouth.enable = true;
- # boot.kernelParams = ["quiet" "splash" "vt.global_cursor_default=0" "fbcon=nodefer"];
-
# Larger console font setup.
console.font = "ter-i32b";
console.packages = [ pkgs.terminus_font ];
diff --git a/modules/nextcloud.nix b/modules/nextcloud.nix
index c927490..6004fdc 100644
--- a/modules/nextcloud.nix
+++ b/modules/nextcloud.nix
@@ -12,7 +12,7 @@ in
config = lib.mkIf cfg.enable {
services.nextcloud = {
enable = true;
- package = pkgs.nextcloud27;
+ package = pkgs.nextcloud28;
hostName = "nextcloud.orbekk.com";
home = "/storage/nextcloud";
config = {
@@ -24,7 +24,7 @@ in
adminuser = "root";
};
maxUploadSize = "16G";
- autoUpdateApps.enable = true;
+ #autoUpdateApps.enable = true;
https = true;
};
diff --git a/modules/router.nix b/modules/router.nix
index fe411b9..fa5b19c 100644
--- a/modules/router.nix
+++ b/modules/router.nix
@@ -200,7 +200,7 @@ let
dhcp-option=tag:servers-vport,option:router,172.20.20.1
dhcp-option=tag:servers-vport,option:dns-server,172.20.20.1
dhcp-range=tag:servers-vport,::,static,constructor:servers-vport,5m
- dhcp-host=id:dragon,tag:servers-vport,172.20.20.2
+ dhcp-host=id:*,tag:servers-vport,172.20.20.2
dhcp-host=id:00:01:00:01:21:a2:4e:a8:d0:bf:9c:45:a6:ec,tag:servers-vport,[::d]
# dhcp-host=id:dragon,::d
@@ -345,8 +345,8 @@ in {
config = mkIf cfg.enable {
systemd.services."router-netns" = {
description = "router network namespace";
- before = ["network.target"];
- after = ["network-interfaces.target"];
+ after = ["network-pre.target"];
+ before = ["network.target" "wireguard-muddvad.service"];
path = with pkgs; [bash iproute];
serviceConfig = {
Type = "oneshot";
diff --git a/modules/yubikey.nix b/modules/yubikey.nix
index b171408..bae980d 100644
--- a/modules/yubikey.nix
+++ b/modules/yubikey.nix
@@ -30,6 +30,7 @@ in
programs.gnupg.agent = {
enable = true;
enableSSHSupport = true;
+ pinentryPackage = pkgs.pinentry-qt;
};
# Use GPG agent instead.
programs.ssh.startAgent = lib.mkDefault false;