upgrade system
This commit is contained in:
parent
299e863e6b
commit
d131a02623
871
flake.lock
generated
871
flake.lock
generated
File diff suppressed because it is too large
Load Diff
@ -23,6 +23,7 @@
|
||||
url = "github:arkenfox/user.js";
|
||||
flake = false;
|
||||
};
|
||||
# ataraxiasjel-nur.url = "/home/ataraxia/projects/nur";
|
||||
ataraxiasjel-nur.url = "github:AtaraxiaSjel/nur";
|
||||
attic.url = "github:zhaofengli/attic";
|
||||
base16.url = "github:AtaraxiaSjel/base16-nix";
|
||||
@ -123,7 +124,7 @@
|
||||
# permittedInsecurePackages = [ "electron-25.9.0" ];
|
||||
};
|
||||
channels.unstable.input = nixpkgs;
|
||||
channels.unstable.patches = patchesPath [ "297158.patch" "zen-kernels.patch" "ydotoold.patch" ] ++ sharedPatches;
|
||||
channels.unstable.patches = patchesPath [ "zen-kernels.patch" "ydotoold.patch" ] ++ sharedPatches;
|
||||
channels.stable.input = inputs.nixpkgs-stable;
|
||||
channels.stable.patches = sharedPatches;
|
||||
|
||||
|
@ -1,46 +0,0 @@
|
||||
From 49f83b701e7939079c529f378c79fa8544f4db72 Mon Sep 17 00:00:00 2001
|
||||
From: =?UTF-8?q?Andr=C3=A9=20Silva?= <andrerfosilva@gmail.com>
|
||||
Date: Tue, 19 Mar 2024 11:31:45 +0000
|
||||
Subject: [PATCH] waybar: build against wireplumber-0.4
|
||||
|
||||
---
|
||||
pkgs/applications/misc/waybar/default.nix | 14 +++++++++++++-
|
||||
1 file changed, 13 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/pkgs/applications/misc/waybar/default.nix b/pkgs/applications/misc/waybar/default.nix
|
||||
index 47071c60f29424..fd24f6605e4e08 100644
|
||||
--- a/pkgs/applications/misc/waybar/default.nix
|
||||
+++ b/pkgs/applications/misc/waybar/default.nix
|
||||
@@ -2,6 +2,7 @@
|
||||
, stdenv
|
||||
, bash
|
||||
, fetchFromGitHub
|
||||
+, fetchFromGitLab
|
||||
, SDL2
|
||||
, alsa-lib
|
||||
, catch2_3
|
||||
@@ -72,6 +73,17 @@ let
|
||||
rev = "0.10.1";
|
||||
hash = "sha256-iIYKvpOWafPJB5XhDOSIW9Mb4I3A4pcgIIPQdQYEqUw=";
|
||||
};
|
||||
+
|
||||
+ wireplumber_0_4 = wireplumber.overrideAttrs (attrs: rec {
|
||||
+ version = "0.4.17";
|
||||
+ src = fetchFromGitLab {
|
||||
+ domain = "gitlab.freedesktop.org";
|
||||
+ owner = "pipewire";
|
||||
+ repo = "wireplumber";
|
||||
+ rev = version;
|
||||
+ hash = "sha256-vhpQT67+849WV1SFthQdUeFnYe/okudTQJoL3y+wXwI=";
|
||||
+ };
|
||||
+ });
|
||||
in
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "waybar";
|
||||
@@ -138,7 +150,7 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
++ lib.optional traySupport libdbusmenu-gtk3
|
||||
++ lib.optional udevSupport udev
|
||||
++ lib.optional upowerSupport upower
|
||||
- ++ lib.optional wireplumberSupport wireplumber
|
||||
+ ++ lib.optional wireplumberSupport wireplumber_0_4
|
||||
++ lib.optional (!stdenv.isLinux) libinotify-kqueue;
|
@ -1,22 +1,23 @@
|
||||
diff --git a/nixos/modules/services/security/vaultwarden/default.nix b/nixos/modules/services/security/vaultwarden/default.nix
|
||||
index aaa3f5507f7..d6a72f74370 100644
|
||||
index b2920931f..443b8421b 100644
|
||||
--- a/nixos/modules/services/security/vaultwarden/default.nix
|
||||
+++ b/nixos/modules/services/security/vaultwarden/default.nix
|
||||
@@ -25,7 +25,7 @@ let
|
||||
configEnv = concatMapAttrs (name: value: optionalAttrs (value != null) {
|
||||
${nameToEnvVar name} = if isBool value then boolToString value else toString value;
|
||||
@@ -23,7 +23,7 @@ let
|
||||
configEnv = lib.concatMapAttrs (name: value: lib.optionalAttrs (value != null) {
|
||||
${nameToEnvVar name} = if lib.isBool value then lib.boolToString value else toString value;
|
||||
}) cfg.config;
|
||||
- in { DATA_FOLDER = "/var/lib/bitwarden_rs"; } // optionalAttrs (!(configEnv ? WEB_VAULT_ENABLED) || configEnv.WEB_VAULT_ENABLED == "true") {
|
||||
+ in { DATA_FOLDER = cfg.dataDir; } // optionalAttrs (!(configEnv ? WEB_VAULT_ENABLED) || configEnv.WEB_VAULT_ENABLED == "true") {
|
||||
- in { DATA_FOLDER = "/var/lib/bitwarden_rs"; } // lib.optionalAttrs (!(configEnv ? WEB_VAULT_ENABLED) || configEnv.WEB_VAULT_ENABLED == "true") {
|
||||
+ in { DATA_FOLDER = cfg.dataDir; } // lib.optionalAttrs (!(configEnv ? WEB_VAULT_ENABLED) || configEnv.WEB_VAULT_ENABLED == "true") {
|
||||
WEB_VAULT_FOLDER = "${cfg.webVaultPackage}/share/vaultwarden/vault";
|
||||
} // configEnv;
|
||||
|
||||
@@ -57,6 +57,16 @@ in {
|
||||
'';
|
||||
@@ -163,6 +163,16 @@ in {
|
||||
defaultText = lib.literalExpression "pkgs.vaultwarden.webvault";
|
||||
description = "Web vault package to use.";
|
||||
};
|
||||
|
||||
+ dataDir = mkOption {
|
||||
+ type = str;
|
||||
+
|
||||
+ dataDir = lib.mkOption {
|
||||
+ type = lib.types.str;
|
||||
+ default = "/var/lib/bitwarden_rs";
|
||||
+ description = ''
|
||||
+ The directury in which vaultwarden will keep its state. If left as the default value
|
||||
@ -24,18 +25,17 @@ index aaa3f5507f7..d6a72f74370 100644
|
||||
+ the sysadmin is responsible for ensuring the directory exists with appropriate ownership and permissions.
|
||||
+ '';
|
||||
+ };
|
||||
+
|
||||
config = mkOption {
|
||||
type = attrsOf (nullOr (oneOf [ bool int str ]));
|
||||
default = {};
|
||||
@@ -184,21 +194,25 @@ in {
|
||||
aliases = [ "bitwarden_rs.service" ];
|
||||
};
|
||||
|
||||
config = lib.mkIf cfg.enable {
|
||||
@@ -180,28 +190,32 @@ in {
|
||||
systemd.services.vaultwarden = {
|
||||
after = [ "network.target" ];
|
||||
path = with pkgs; [ openssl ];
|
||||
- serviceConfig = {
|
||||
- User = user;
|
||||
- Group = group;
|
||||
- EnvironmentFile = [ configFile ] ++ optional (cfg.environmentFile != null) cfg.environmentFile;
|
||||
- EnvironmentFile = [ configFile ] ++ lib.optional (cfg.environmentFile != null) cfg.environmentFile;
|
||||
- ExecStart = "${vaultwarden}/bin/vaultwarden";
|
||||
- LimitNOFILE = "1048576";
|
||||
- PrivateTmp = "true";
|
||||
@ -47,15 +47,15 @@ index aaa3f5507f7..d6a72f74370 100644
|
||||
- StateDirectoryMode = "0700";
|
||||
- Restart = "always";
|
||||
- };
|
||||
+ serviceConfig = mkMerge [
|
||||
+ (mkIf (cfg.dataDir == "/var/lib/bitwarden_rs") {
|
||||
+ serviceConfig = lib.mkMerge [
|
||||
+ (lib.mkIf (cfg.dataDir == "/var/lib/bitwarden_rs") {
|
||||
+ StateDirectory = "bitwarden_rs";
|
||||
+ StateDirectoryMode = "0700";
|
||||
+ })
|
||||
+ {
|
||||
+ User = user;
|
||||
+ Group = group;
|
||||
+ EnvironmentFile = [ configFile ] ++ optional (cfg.environmentFile != null) cfg.environmentFile;
|
||||
+ EnvironmentFile = [ configFile ] ++ lib.optional (cfg.environmentFile != null) cfg.environmentFile;
|
||||
+ ExecStart = "${vaultwarden}/bin/vaultwarden";
|
||||
+ LimitNOFILE = "1048576";
|
||||
+ PrivateTmp = "true";
|
||||
@ -69,8 +69,7 @@ index aaa3f5507f7..d6a72f74370 100644
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
|
||||
@@ -206,7 +220,7 @@ in {
|
||||
aliases = [ "backup-bitwarden_rs.service" ];
|
||||
systemd.services.backup-vaultwarden = lib.mkIf (cfg.backupDir != null) {
|
||||
description = "Backup vaultwarden";
|
||||
environment = {
|
||||
- DATA_FOLDER = "/var/lib/bitwarden_rs";
|
||||
|
@ -0,0 +1,17 @@
|
||||
diff --git a/pkgs/os-specific/linux/kernel/zen-kernels.nix b/pkgs/os-specific/linux/kernel/zen-kernels.nix
|
||||
index 1f36e36..0e4e1ae 100644
|
||||
--- a/pkgs/os-specific/linux/kernel/zen-kernels.nix
|
||||
+++ b/pkgs/os-specific/linux/kernel/zen-kernels.nix
|
||||
@@ -11,9 +11,9 @@ let
|
||||
};
|
||||
# ./update-zen.py lqx
|
||||
lqxVariant = {
|
||||
- version = "6.8.6"; #lqx
|
||||
- suffix = "lqx2"; #lqx
|
||||
- sha256 = "0mxbl0h8s021m0ab12yy778qyhdlb5789qjbn66l8qxsw0dv4ags"; #lqx
|
||||
+ version = "6.7.12"; #lqx
|
||||
+ suffix = "lqx1"; #lqx
|
||||
+ sha256 = "1kcw2jmqmwb1mfqgiwms8i30sqdqzs8qvjfslyc9bcidpyg6qrqf"; #lqx
|
||||
isLqx = true;
|
||||
};
|
||||
zenKernelsFor = { version, suffix, sha256, isLqx }: buildLinux (args // {
|
@ -1,4 +1,5 @@
|
||||
{ config, pkgs, lib, inputs, ... }: {
|
||||
{ config, pkgs, lib, inputs, modulesPath, ... }: {
|
||||
disabledModules = [ "${modulesPath}/services/web-apps/ocis.nix" ];
|
||||
imports = with inputs.ataraxiasjel-nur.nixosModules; [ ocis wopiserver ];
|
||||
|
||||
sops.secrets.wopiserver-secret.sopsFile = inputs.self.secretsDir + /home-hypervisor/ocis.yaml;
|
||||
|
@ -21,6 +21,7 @@ in {
|
||||
defaultBranch = "dev";
|
||||
};
|
||||
pull.rebase = true;
|
||||
safe.directory = "*";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
@ -55,7 +55,6 @@ in with config.deviceSpecific; with lib; {
|
||||
'';
|
||||
wayland.windowManager.hyprland = {
|
||||
enable = true;
|
||||
enableNvidiaPatches = false;
|
||||
systemd.enable = true;
|
||||
xwayland.enable = true;
|
||||
extraConfig = let
|
||||
|
Loading…
x
Reference in New Issue
Block a user