Compare commits

..

1 commit

Author SHA1 Message Date
9baf6704fc flake.lock: Update
Some checks failed
EVAL aarch64-linux.sisko
BUILD aarch64-linux.sisko
/ test (push) Successful in 10m25s
Flake lock file updates:

• Updated input 'catppuccin':
    'github:catppuccin/nix/32359bf226fe874d3b7a0a5753d291a4da9616fe' (2024-11-10)
  → 'github:catppuccin/nix/7413a65b3ed37964c16e2fbe20145b55bcda8281' (2024-12-30)
• Added input 'catppuccin/catppuccin-v1_1':
    'https://api.flakehub.com/f/pinned/catppuccin/nix/1.1.1/0193bdc0-b045-7eed-bbec-95611a8ecdf5/source.tar.gz?narHash=sha256-pCWJgwo77KD7EJpwynwKrWPZ//dwypHq2TfdzZWqK68%3D' (2024-12-13)
• Added input 'catppuccin/catppuccin-v1_2':
    'https://api.flakehub.com/f/pinned/catppuccin/nix/1.2.0/0193e5e0-33b7-7149-a362-bfe56b20f64e/source.tar.gz?narHash=sha256-Let3uJo4YDyfqbqaw66dpZxhJB2TrDyZWSFd5rpPLJA%3D' (2024-12-20)
• Added input 'catppuccin/home-manager':
    'github:nix-community/home-manager/1395379a7a36e40f2a76e7b9936cc52950baa1be' (2024-12-19)
• Added input 'catppuccin/home-manager/nixpkgs':
    follows 'catppuccin/nixpkgs'
• Added input 'catppuccin/home-manager-stable':
    'github:nix-community/home-manager/80b0fdf483c5d1cb75aaad909bd390d48673857f' (2024-12-16)
• Added input 'catppuccin/home-manager-stable/nixpkgs':
    follows 'catppuccin/nixpkgs-stable'
• Added input 'catppuccin/nixpkgs':
    'github:NixOS/nixpkgs/d3c42f187194c26d9f0309a8ecc469d6c878ce33' (2024-12-17)
• Added input 'catppuccin/nixpkgs-stable':
    'github:NixOS/nixpkgs/b47fd6fa00c6afca88b8ee46cfdb00e104f50bca' (2024-12-19)
• Added input 'catppuccin/nuscht-search':
    'github:NuschtOS/search/3051be7f403bff1d1d380e4612f0c70675b44fc9' (2024-12-09)
• Added input 'catppuccin/nuscht-search/flake-utils':
    'github:numtide/flake-utils/11707dc2f618dd54ca8739b309ec4fc024de578b' (2024-11-13)
• Added input 'catppuccin/nuscht-search/flake-utils/systems':
    'github:nix-systems/default/da67096a3b9bf56a91d16901293e51ba5b49a27e' (2023-04-09)
• Added input 'catppuccin/nuscht-search/ixx':
    'github:NuschtOS/ixx/9fd01aad037f345350eab2cd45e1946cc66da4eb' (2024-10-26)
• Added input 'catppuccin/nuscht-search/ixx/flake-utils':
    follows 'catppuccin/nuscht-search/flake-utils'
• Added input 'catppuccin/nuscht-search/ixx/nixpkgs':
    follows 'catppuccin/nuscht-search/nixpkgs'
• Added input 'catppuccin/nuscht-search/nixpkgs':
    follows 'catppuccin/nixpkgs'
• Updated input 'disko':
    'github:nix-community/disko/5fd852c4155a689098095406500d0ae3d04654a8' (2024-11-14)
  → 'github:nix-community/disko/84a5b93637cc16cbfcc61b6e1684d626df61eb21' (2024-12-29)
• Updated input 'dream2nix':
    'github:nix-community/dream2nix/44d41411686bc798876bd6d9f36a4c1143138d85' (2024-11-12)
  → 'github:nix-community/dream2nix/8ce6284ff58208ed8961681276f82c2f8f978ef4' (2024-12-25)
• Updated input 'emacs-overlay':
    'github:nix-community/emacs-overlay/4639038b0f5e66e7d0f3d103b8e44ded3ab7e337' (2024-11-14)
  → 'github:nix-community/emacs-overlay/bc19dc80cd2987406a19b5c644e0400c4cf67e33' (2024-12-30)
• Updated input 'emacs-overlay/nixpkgs':
    'github:NixOS/nixpkgs/dc460ec76cbff0e66e269457d7b728432263166c' (2024-11-11)
  → 'github:NixOS/nixpkgs/88195a94f390381c6afcdaa933c2f6ff93959cb4' (2024-12-29)
• Updated input 'emacs-overlay/nixpkgs-stable':
    'github:NixOS/nixpkgs/689fed12a013f56d4c4d3f612489634267d86529' (2024-11-12)
  → 'github:NixOS/nixpkgs/9f94733f93e4fe6e82f516efae007096e4ab5a21' (2024-12-28)
• Updated input 'flakeParts':
    'github:hercules-ci/flake-parts/506278e768c2a08bec68eb62932193e341f55c90' (2024-11-01)
  → 'github:hercules-ci/flake-parts/205b12d8b7cd4802fbcb8e8ef6a0f1408781a4f9' (2024-12-04)
• Updated input 'flakeParts/nixpkgs-lib':
    'cc2f280002.tar.gz?narHash=sha256-lXvH/vOfb4aGYyvFmZK/HlsNsr/0CVWlwYvo2rxJk3s%3D' (2024-11-01)
  → '5487e69da4.tar.gz?narHash=sha256-1qRH7uAUsyQI7R1Uwl4T%2BXvdNv778H0Nb5njNrqvylY%3D' (2024-12-01)
• Updated input 'git-hooks-nix':
    'github:cachix/git-hooks.nix/cd1af27aa85026ac759d5d3fccf650abe7e1bbf0' (2024-11-11)
  → 'github:cachix/git-hooks.nix/f0f0dc4920a903c3e08f5bdb9246bb572fcae498' (2024-12-21)
• Updated input 'homeManager':
    'github:nix-community/home-manager/65912bc6841cf420eb8c0a20e03df7cbbff5963f' (2024-12-05)
  → 'github:nix-community/home-manager/10e99c43cdf4a0713b4e81d90691d22c6a58bdf2' (2024-12-28)
• Updated input 'impermanence':
    'github:nix-community/impermanence/3ed3f0eaae9fcc0a8331e77e9319c8a4abd8a71a' (2024-11-10)
  → 'github:nix-community/impermanence/d000479f4f41390ff7cf9204979660ad5dd16176' (2024-12-23)
• Updated input 'lanzaboote':
    'github:nix-community/lanzaboote/cef39a78679c266300874e7a7000b4da066228d4' (2024-11-04)
  → 'github:nix-community/lanzaboote/93e6f0d77548be8757c11ebda5c4235ef4f3bc67' (2024-12-23)
• Updated input 'lanzaboote/crane':
    'github:ipetkov/crane/a4ca93905455c07cb7e3aca95d4faf7601cba458' (2024-11-03)
  → 'github:ipetkov/crane/ef80ead953c1b28316cc3f8613904edc2eb90c28' (2024-11-08)
• Updated input 'lanzaboote/pre-commit-hooks-nix':
    'github:cachix/pre-commit-hooks.nix/af8a16fe5c264f5e9e18bcee2859b40a656876cf' (2024-10-30)
  → 'github:cachix/pre-commit-hooks.nix/cd1af27aa85026ac759d5d3fccf650abe7e1bbf0' (2024-11-11)
• Updated input 'lanzaboote/pre-commit-hooks-nix/nixpkgs-stable':
    'github:NixOS/nixpkgs/194846768975b7ad2c4988bdb82572c00222c0d7' (2024-07-07)
  → 'github:NixOS/nixpkgs/d063c1dd113c91ab27959ba540c0d9753409edf3' (2024-11-04)
• Updated input 'lanzaboote/rust-overlay':
    'github:oxalica/rust-overlay/8d1b40f8dfd7539aaa3de56e207e22b3cc451825' (2024-11-03)
  → 'github:oxalica/rust-overlay/0be641045af6d8666c11c2c40e45ffc9667839b5' (2024-11-18)
• Updated input 'lix':
    'git+https://git@git.lix.systems/lix-project/lix?rev=f6077314fa6aff862758095bb55fe844e9162a1d' (2024-10-15)
  → 'git+https://git@git.lix.systems/lix-project/lix?ref=refs/heads/main&rev=f6077314fa6aff862758095bb55fe844e9162a1d' (2024-10-15)
• Updated input 'lix-eval-jobs':
    'git+https://git.lix.systems/lix-project/nix-eval-jobs?ref=refs/heads/main&rev=dfc286ca3dc49118c30d8d6205d6d6af76c62b7a' (2024-11-23)
  → 'git+https://git.lix.systems/lix-project/nix-eval-jobs?ref=refs/heads/main&rev=df3edf37301cdc77ca5bd5f3f6fcccd6d0befee5' (2024-12-06)
• Updated input 'lix-module':
    'git+https://git.lix.systems/lix-project/nixos-module?ref=refs/heads/main&rev=15b999f9c958c475f71fb8c543b9fc2f36ae8730' (2024-11-26)
  → 'git+https://git.lix.systems/lix-project/nixos-module?ref=refs/heads/main&rev=c374ebf5548c7b6d4bf884369a5b6879cfc916ea' (2024-12-06)
• Updated input 'mobile-nixos':
    'github:NixOS/mobile-nixos/2268e358ed407d9c0a4499ae767d105eeaeec586' (2024-11-06)
  → 'github:NixOS/mobile-nixos/595d359518864a13483fd3f4f4ad740cb3bae825' (2024-12-26)
• Updated input 'nix-fast-build':
    'github:Mic92/nix-fast-build/8e7c9d76979381441facb8888f21408312cf177a' (2024-10-30)
  → 'github:Mic92/nix-fast-build/ed736c65a8cb58a85369f6ee1c3f4403aa904fcc' (2024-12-20)
• Updated input 'nix-fast-build/flake-parts':
    'github:hercules-ci/flake-parts/8471fe90ad337a8074e957b69ca4d0089218391d' (2024-08-01)
  → 'github:hercules-ci/flake-parts/205b12d8b7cd4802fbcb8e8ef6a0f1408781a4f9' (2024-12-04)
• Updated input 'nix-fast-build/treefmt-nix':
    'github:numtide/treefmt-nix/1d07739554fdc4f8481068f1b11d6ab4c1a4167a' (2024-08-16)
  → 'github:numtide/treefmt-nix/76159fc74eeac0599c3618e3601ac2b980a29263' (2024-12-18)
• Updated input 'nixDarwin':
    'github:LnL7/nix-darwin/6c71c49e2448e51ad830ed211024e6d0edc50116' (2024-11-12)
  → 'github:LnL7/nix-darwin/71a3a075e3229a7518d76636bb762aef2bcb73ac' (2024-12-29)
• Updated input 'nixThePlanet':
    'github:MatthewCroughan/NixThePlanet/ef5fad336a55fcbb0680ad21aa58812b2f826435' (2024-11-09)
  → 'github:MatthewCroughan/NixThePlanet/b70d951ab433806e44a6b366367af55c469da52d' (2024-12-15)
• Updated input 'nixosHardware':
    'github:NixOS/nixos-hardware/f6581f1c3b137086e42a08a906bdada63045f991' (2024-11-12)
  → 'github:NixOS/nixos-hardware/7c674c6734f61157e321db595dbfcd8523e04e19' (2024-12-28)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/55d15ad12a74eb7d4646254e13638ad0c4128776' (2024-12-03)
  → 'github:NixOS/nixpkgs/88195a94f390381c6afcdaa933c2f6ff93959cb4' (2024-12-29)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/746901bb8dba96d154b66492a29f5db0693dbfcc' (2024-10-30)
  → 'github:numtide/treefmt-nix/9e09d30a644c57257715902efbb3adc56c79cf28' (2024-12-25)
2024-12-30 15:01:36 +00:00
22 changed files with 64 additions and 130 deletions

85
flake.lock generated
View file

@ -32,11 +32,11 @@
"nuscht-search": "nuscht-search"
},
"locked": {
"lastModified": 1735634086,
"narHash": "sha256-DTcB/kBZULyJztXXnH3OVF5LHLl+O670DuLZZNUMnNo=",
"lastModified": 1735569271,
"narHash": "sha256-4CIClg4LMcmcCRIXSTcHDe6ujPzlxMtbCjMH7ntV784=",
"owner": "catppuccin",
"repo": "nix",
"rev": "63290ea1d2a28e65195017ed78a81cfc242ef0df",
"rev": "7413a65b3ed37964c16e2fbe20145b55bcda8281",
"type": "github"
},
"original": {
@ -156,11 +156,11 @@
"nixpkgs-stable": "nixpkgs-stable_2"
},
"locked": {
"lastModified": 1735635676,
"narHash": "sha256-mr3Slf2LDg6YMjQcrNdj/i8tQK4p7NIYVshVPBgtYBM=",
"lastModified": 1735550039,
"narHash": "sha256-hIyQM5hqBpOfvb6lMHl+707pg7iwBJKfbsANEZFhV+0=",
"owner": "nix-community",
"repo": "emacs-overlay",
"rev": "7dc139dffc4ad8301c639210a00d993e1c158069",
"rev": "bc19dc80cd2987406a19b5c644e0400c4cf67e33",
"type": "github"
},
"original": {
@ -688,15 +688,16 @@
"lix": {
"flake": false,
"locked": {
"lastModified": 1735572323,
"narHash": "sha256-Wjt+PK15IdaOUoI0sgsRzaNMxKQGSROLe9sOd44+fwM=",
"lastModified": 1728951119,
"narHash": "sha256-vUBgL8zJBDyj2serxdEVbNqe6pBN4YgWwhtg3XP8mpQ=",
"ref": "refs/heads/main",
"rev": "5c7ea4f446de58aa64f78087bb4ec26b9c4111aa",
"revCount": 16600,
"rev": "f6077314fa6aff862758095bb55fe844e9162a1d",
"revCount": 16344,
"type": "git",
"url": "https://git@git.lix.systems/lix-project/lix"
},
"original": {
"rev": "f6077314fa6aff862758095bb55fe844e9162a1d",
"type": "git",
"url": "https://git@git.lix.systems/lix-project/lix"
}
@ -882,7 +883,9 @@
"inputs": {
"flake-parts": "flake-parts_4",
"hercules-ci-effects": "hercules-ci-effects",
"nixpkgs": "nixpkgs_8",
"nixpkgs": [
"nixpkgs"
],
"osx-kvm": "osx-kvm"
},
"locked": {
@ -1010,11 +1013,11 @@
},
"nixpkgs-stable_2": {
"locked": {
"lastModified": 1735531152,
"narHash": "sha256-As8I+ebItDKtboWgDXYZSIjGlKeqiLBvjxsQHUmAf1Q=",
"lastModified": 1735412871,
"narHash": "sha256-Qoz0ow6jDGUIBHxduc7Y1cjYFS71tvEGJV5Src/mj98=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "3ffbbdbac0566a0977da3d2657b89cbcfe9a173b",
"rev": "9f94733f93e4fe6e82f516efae007096e4ab5a21",
"type": "github"
},
"original": {
@ -1056,20 +1059,6 @@
"type": "github"
}
},
"nixpkgs_10": {
"locked": {
"lastModified": 1682134069,
"narHash": "sha256-TnI/ZXSmRxQDt2sjRYK/8j8iha4B4zP2cnQCZZ3vp7k=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "fd901ef4bf93499374c5af385b2943f5801c0833",
"type": "github"
},
"original": {
"id": "nixpkgs",
"type": "indirect"
}
},
"nixpkgs_2": {
"locked": {
"lastModified": 1734424634,
@ -1164,22 +1153,6 @@
}
},
"nixpkgs_8": {
"locked": {
"lastModified": 1703255338,
"narHash": "sha256-Z6wfYJQKmDN9xciTwU3cOiOk+NElxdZwy/FiHctCzjU=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "6df37dc6a77654682fe9f071c62b4242b5342e04",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_9": {
"locked": {
"lastModified": 1735471104,
"narHash": "sha256-0q9NGQySwDQc7RhAV2ukfnu7Gxa5/ybJ2ANT8DQrQrs=",
@ -1195,6 +1168,20 @@
"type": "github"
}
},
"nixpkgs_9": {
"locked": {
"lastModified": 1682134069,
"narHash": "sha256-TnI/ZXSmRxQDt2sjRYK/8j8iha4B4zP2cnQCZZ3vp7k=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "fd901ef4bf93499374c5af385b2943f5801c0833",
"type": "github"
},
"original": {
"id": "nixpkgs",
"type": "indirect"
}
},
"nmd": {
"inputs": {
"nixpkgs": [
@ -1361,7 +1348,7 @@
"nixDarwin": "nixDarwin",
"nixThePlanet": "nixThePlanet",
"nixosHardware": "nixosHardware",
"nixpkgs": "nixpkgs_9",
"nixpkgs": "nixpkgs_8",
"treefmt-nix": "treefmt-nix_3",
"vscode-server": "vscode-server"
}
@ -1534,11 +1521,11 @@
]
},
"locked": {
"lastModified": 1735653038,
"narHash": "sha256-Q6xAmciTXDtZfUxf6c15QqtRR8BvX4edYPstF/uoqMk=",
"lastModified": 1735135567,
"narHash": "sha256-8T3K5amndEavxnludPyfj3Z1IkcFdRpR23q+T0BVeZE=",
"owner": "numtide",
"repo": "treefmt-nix",
"rev": "56c0ecd79f7ba01a0ec027da015df751d6ca3ae7",
"rev": "9e09d30a644c57257715902efbb3adc56c79cf28",
"type": "github"
},
"original": {
@ -1550,7 +1537,7 @@
"vscode-server": {
"inputs": {
"flake-utils": "flake-utils_3",
"nixpkgs": "nixpkgs_10"
"nixpkgs": "nixpkgs_9"
},
"locked": {
"lastModified": 1729422940,

View file

@ -28,13 +28,16 @@
inputs.nixpkgs.follows = "nixpkgs";
};
dream2nix.url = "github:nix-community/dream2nix";
nixThePlanet.url = "github:MatthewCroughan/NixThePlanet"; # not following nixpkgs on purpose
nixThePlanet = {
url = "github:MatthewCroughan/NixThePlanet/";
inputs.nixpkgs.follows = "nixpkgs";
};
nixDarwin = {
url = "github:LnL7/nix-darwin";
};
nix-on-droid.url = "github:nix-community/nix-on-droid";
lix = {
url = "git+https://git@git.lix.systems/lix-project/lix"; # FIXME update
url = "git+https://git@git.lix.systems/lix-project/lix?rev=f6077314fa6aff862758095bb55fe844e9162a1d"; # FIXME update
flake = false;
};
lix-module = {

View file

@ -1,6 +1,7 @@
{ pkgs, lib, ... }:
{ pkgs, ... }:
{
home.packages = [ pkgs.element-desktop ];
# home.packages = [pkgs.schildichat-desktop];
home.packages = [ pkgs.element-desktop-wayland ];
systemd.user.services.element-desktop = {
Install.WantedBy = [ "graphical-session.target" ];
@ -11,7 +12,8 @@
};
Service = {
ExecStart = lib.getExe pkgs.element-desktop;
# ExecStart = "${pkgs.schildichat-desktop}/bin/schildichat-desktop"; # TODO I preferred SchildiChat but it was removed from nixpkgs becuase unsafe
ExecStart = "${pkgs.element-desktop-wayland}/bin/element-desktop";
Restart = "on-failure";
RestartSec = 3;
};

View file

@ -46,7 +46,6 @@ in
nodejs_20
qadwaitadecorations
kdePackages.qtwayland
copilot-node-server
]
++ (with hunspellDicts; [
en_US-large

View file

@ -171,13 +171,6 @@
(indent-bars-prefer-character 't) ;; so it works also in terminal
)
(use-package copilot
:custom
(copilot-max-char -1)
(copilot-indent-offset-warning-disable 't)
:hook (prog-mode org-mode)
:bind (("C-<tab>" . copilot-accept-completion)))
(use-package diredfl
:config (diredfl-global-mode))
@ -515,15 +508,6 @@
(eglot-ensure))))
:mode "\\.py\\'")
(use-package solidity-mode
:hook ((solidity-mode . (lambda ()
(require 'eglot)
(add-to-list 'eglot-server-programs
'(solidity-mode . ("nomicfoundation-solidity-language-server" "--stdio")))
(eglot-ensure))))
:mode "\\.sol\\'")
(use-package typescript-ts-mode
:hook ((typescript-ts-mode . (lambda ()
(require 'eglot)

View file

@ -41,8 +41,7 @@ in
extraConfig.url = {
"ssh://git@github.com/".insteadOf = "https://github.com/";
# Workaround for https://github.com/rust-lang/cargo/issues/3381#issuecomment-1193730972
"https://github.com/rust-lang/crates.io-index".insteadOf =
"https://github.com/rust-lang/crates.io-index";
"https://github.com/rust-lang/crates.io-index".insteadOf = "https://github.com/rust-lang/crates.io-index";
"https://github.com/RustSec/advisory-db".insteadOf = "https://github.com/RustSec/advisory-db";
};

View file

@ -36,8 +36,7 @@ in
",l" = ''config-cycle spellcheck.languages [" it-IT "] [" en-US "]'';
};
insert = {
"<Ctrl-p>" =
''spawn --userscript qute-pass --dmenu-invocation '${pkgs.fuzzel}/bin/fuzzel --background-color=253559cc --border-radius=5 --border-width=0 -d' --password-only --unfiltered'';
"<Ctrl-p>" = ''spawn --userscript qute-pass --dmenu-invocation '${pkgs.fuzzel}/bin/fuzzel --background-color=253559cc --border-radius=5 --border-width=0 -d' --password-only --unfiltered'';
};
};
settings = {

View file

@ -110,8 +110,7 @@
in
lib.mkOptionDefault {
"${modifier}+x" = "exec emacsclient -c";
"${modifier}+y" =
"exec ${pkgs.waypipe}/bin/waypipe --compress lz4=10 ssh mothership.fleet emacsclient -c";
"${modifier}+y" = "exec ${pkgs.waypipe}/bin/waypipe --compress lz4=10 ssh mothership.fleet emacsclient -c";
"${modifier}+b" = "exec qutebrowser";
"${modifier}+s" = "exec ${screenshotScript}";
# "${modifier}+g" = "exec ${screenrecordingScript}"; # FIXME

View file

@ -16,7 +16,7 @@
};
Service = {
ExecStart = "${lib.getExe' pkgs.coreutils "sleep"} 5 && ${lib.getExe pkgs.tremotesf} --minimized";
ExecStart = "${lib.getExe pkgs.tremotesf} --minimized";
Restart = "on-failure";
RestartSec = 3;
};

View file

@ -287,6 +287,7 @@ in
_module.args = {
age = config.age or { };
fleetFlake = self;
pkgsStable = inputs.nixpkgsStable.legacyPackages.${pkgs.system};
};
};
}

View file

@ -39,6 +39,7 @@
"sunshine"
"mount-sisko"
"adb"
"guix"
"prometheus-exporters"
"promtail"
]

View file

@ -31,7 +31,6 @@
"paperless"
"syncthing"
"atticd"
"jellyfin"
]
++ [
./disko.nix

View file

@ -14,7 +14,8 @@
"vpn.aciceri.dev"
"photos.aciceri.dev"
"status.aciceri.dev"
"jelly.aciceri.dev"
"paper.aciceri.dev"
"cloud.aciceri.dev"
];
apiTokenFile = config.age.secrets.cloudflare-dyndns-api-token.path;
};

View file

@ -83,8 +83,7 @@ in
"git.aciceri.dev" = {
enableACME = true;
forceSSL = true;
locations."/".proxyPass =
"http://127.0.0.1:${builtins.toString config.services.forgejo.settings.server.HTTP_PORT}";
locations."/".proxyPass = "http://127.0.0.1:${builtins.toString config.services.forgejo.settings.server.HTTP_PORT}";
};
};
}

View file

@ -1,21 +1,7 @@
{ config, ... }:
{
services.jellyfin = {
enable = true;
openFirewall = true;
};
users.users.jellyfin.extraGroups = [ "transmission" ];
environment.persistence."/persist".directories = [
config.services.jellyfin.dataDir
];
services.nginx.virtualHosts = {
"jelly.aciceri.dev" = {
enableACME = true;
forceSSL = true;
locations."/".proxyPass = "http://127.0.0.1:8096";
};
};
}

View file

@ -29,8 +29,7 @@ in
"matrix.aciceri.dev" = {
forceSSL = true;
enableACME = true;
locations."/".proxyPass =
"http://127.0.0.1:${builtins.toString (lib.head config.services.matrix-synapse.settings.listeners).port}";
locations."/".proxyPass = "http://127.0.0.1:${builtins.toString (lib.head config.services.matrix-synapse.settings.listeners).port}";
locations."/_matrix".proxyPass = "http://localhost:8008";
locations."/_synapse/client".proxyPass = "http://localhost:8008";
};

View file

@ -1,11 +1,6 @@
{ pkgs, ... }:
{
services.mediatomb = {
enable = true;
# FIXME remove when fixed
package =
(builtins.getFlake "github:NixOs/nixpkgs/3ffbbdbac0566a0977da3d2657b89cbcfe9a173b")
.legacyPackages.${pkgs.stdenv.system}.gerbera;
openFirewall = true;
serverName = "Sisko";
mediaDirectories = [

View file

@ -24,8 +24,9 @@ in
};
};
services.openssh.knownHosts."${host}".publicKey =
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIICf9svRenC/PLKIL9nk6K/pxQgoiFC41wTNvoIncOxs";
services.openssh.knownHosts."${
host
}".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIICf9svRenC/PLKIL9nk6K/pxQgoiFC41wTNvoIncOxs";
services.postgresqlBackup = {
enable = true;

View file

@ -16,19 +16,15 @@
'';
};
systemd.services.nfs-server.preStart = ''
chmod -R 775 /export/hd/torrent
'';
services.webdav = {
enable = true;
settings = {
address = "0.0.0.0";
address = "10.1.1.2"; # accessible only in LAN, used by Kodi installed on the TV
port = 9999;
scope = "/mnt/hd/torrent";
modify = false;
auth = false;
auth = false; # TODO should we enable authentication? It's only reachable in LAN
debug = true;
users = [ ];
};

View file

@ -39,8 +39,8 @@
];
systemd.tmpfiles.rules = [
"d /mnt/hd/torrent 774 transmission transmission"
"d /mnt/hd/torrent/.incomplete 774 transmission transmission"
"d /mnt/hd/torrent 770 transmission transmission"
"d /mnt/hd/torrent/.incomplete 770 transmission transmission"
];
environment.persistence."/persist".directories = [

View file

@ -19,7 +19,7 @@ let
cp $f $out/"libtree-sitter-$(basename $f)"
done
'';
emacsWithoutPackages = pkgs'.emacs-unstable.override {
emacsWithoutPackages = pkgs'.emacs-git.override {
withSQLite3 = true;
withWebP = true;
withPgtk = true;

View file

@ -44,22 +44,6 @@ let
};
deps = [ elpaPackages.heap ];
};
copilot = buildEmacsPackage {
name = "copilot";
src = pkgs.fetchFromGitHub {
owner = "copilot-emacs";
repo = "copilot.el";
rev = "b7bff7b934837744688fd74191ecffb83b3bcc05";
hash = "sha256-MEsjXQIeiTI6NXN5rTW7HfFPC18IZnhAssma2BZa0ks=";
};
deps = with epkgs; [
s
dash
editorconfig
jsonrpc
f
];
};
};
# *List* containing emacs packages from (M)ELPA