fix(*): adapt to nixos-24.05 changes

This commit is contained in:
steveej 2024-06-01 21:46:09 +02:00
parent ae86a8b860
commit 4c18f0a7ab
12 changed files with 56 additions and 27 deletions

19
flake.lock generated
View file

@ -619,6 +619,22 @@
"type": "github" "type": "github"
} }
}, },
"nixpkgs-2405": {
"locked": {
"lastModified": 1717144377,
"narHash": "sha256-F/TKWETwB5RaR8owkPPi+SPJh83AQsm6KrQAlJ8v/uA=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "805a384895c696f802a9bf5bf4720f37385df547",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-24.05",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs-lib": { "nixpkgs-lib": {
"locked": { "locked": {
"dir": "lib", "dir": "lib",
@ -825,11 +841,12 @@
"nix-vscode-extensions": "nix-vscode-extensions", "nix-vscode-extensions": "nix-vscode-extensions",
"nixos-anywhere": "nixos-anywhere", "nixos-anywhere": "nixos-anywhere",
"nixpkgs": [ "nixpkgs": [
"nixpkgs-2311" "nixpkgs-2405"
], ],
"nixpkgs-2211": "nixpkgs-2211", "nixpkgs-2211": "nixpkgs-2211",
"nixpkgs-2305": "nixpkgs-2305", "nixpkgs-2305": "nixpkgs-2305",
"nixpkgs-2311": "nixpkgs-2311", "nixpkgs-2311": "nixpkgs-2311",
"nixpkgs-2405": "nixpkgs-2405",
"nixpkgs-unstable": "nixpkgs-unstable", "nixpkgs-unstable": "nixpkgs-unstable",
"nixpkgs-vscodium": "nixpkgs-vscodium", "nixpkgs-vscodium": "nixpkgs-vscodium",
"nixpkgs-wayland": "nixpkgs-wayland", "nixpkgs-wayland": "nixpkgs-wayland",

View file

@ -11,8 +11,9 @@
radicalePkgs.follows = "nixpkgs-2211"; radicalePkgs.follows = "nixpkgs-2211";
nixpkgs-2305.url = "github:nixos/nixpkgs/nixos-23.05"; nixpkgs-2305.url = "github:nixos/nixpkgs/nixos-23.05";
nixpkgs-2311.url = "github:nixos/nixpkgs/nixos-23.11"; nixpkgs-2311.url = "github:nixos/nixpkgs/nixos-23.11";
nixpkgs-2405.url = "github:nixos/nixpkgs/nixos-24.05";
nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable"; nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable";
nixpkgs.follows = "nixpkgs-2311"; nixpkgs.follows = "nixpkgs-2405";
flake-parts.url = "github:hercules-ci/flake-parts"; flake-parts.url = "github:hercules-ci/flake-parts";
get-flake.url = "github:ursi/get-flake"; get-flake.url = "github:ursi/get-flake";

View file

@ -23,7 +23,7 @@ in {
# Hidden=true # Hidden=true
# ''; # '';
services.gpg-agent.pinentryFlavor = "gnome3"; services.gpg-agent.pinentryPackage = pkgs.pinentry-gnome3;
dconf.settings = let dconf.settings = let
manualKeybindings = [ manualKeybindings = [

View file

@ -36,7 +36,7 @@ in {
enable = true; enable = true;
}; };
services.gpg-agent.pinentryFlavor = "gnome3"; services.gpg-agent.pinentryPackage = pkgs.pinentry-gnome3;
home.packages = [ home.packages = [
pkgs.swayidle pkgs.swayidle

View file

@ -4,17 +4,9 @@
config, config,
... ...
}: { }: {
home.packages = home.packages = [
[ pkgs.gcr
pkgs.gcr ];
]
++ (
if config.services.gpg-agent.pinentryFlavor == "gtk2"
then [pkgs.pinentry-gtk2]
else if config.services.gpg-agent.pinentryFlavor == "gnome3"
then [pkgs.pinentry-gnome]
else []
);
programs.gpg.enable = true; programs.gpg.enable = true;
services.gpg-agent = { services.gpg-agent = {
@ -22,7 +14,7 @@
enableScDaemon = true; enableScDaemon = true;
enableSshSupport = true; enableSshSupport = true;
grabKeyboardAndMouse = true; grabKeyboardAndMouse = true;
pinentryFlavor = lib.mkDefault "gtk2"; pinentryPackage = lib.mkDefault pkgs.pinentry-gtk2;
extraConfig = '' extraConfig = ''
no-allow-external-cache no-allow-external-cache
''; '';

View file

@ -1,15 +1,17 @@
{ {
repoFlake, specialArgs,
hostAddress, hostAddress,
localAddress, localAddress,
imapsPort ? 993, imapsPort ? 993,
sievePort ? 4190, sievePort ? 4190,
autoStart ? false, autoStart ? false,
}: { }: {
inherit specialArgs;
config = { config = {
pkgs, pkgs,
config, config,
lib, lib,
repoFlake,
... ...
}: { }: {
system.stateVersion = "21.11"; # Did you read the comment? system.stateVersion = "21.11"; # Did you read the comment?
@ -21,6 +23,12 @@
../profiles/common/user.nix ../profiles/common/user.nix
]; ];
networking.firewall.enable = true;
networking.firewall.allowedTCPPorts = [
imapsPort
sievePort
];
# FIXME: find out how to use the `defaultSopsFile` so i don't have to specify each secret separately # FIXME: find out how to use the `defaultSopsFile` so i don't have to specify each secret separately
# sops.defaultSopsFile = ./mailserver_secrets.yaml; # sops.defaultSopsFile = ./mailserver_secrets.yaml;

View file

@ -1,10 +1,12 @@
{ {
specialArgs,
hostAddress, hostAddress,
localAddress, localAddress,
syncthingPort ? 22000, syncthingPort ? 22000,
syncthingLocalAnnouncePort ? 21027, syncthingLocalAnnouncePort ? 21027,
autoStart ? false, autoStart ? false,
}: { }: {
inherit specialArgs;
config = { config = {
config, config,
pkgs, pkgs,

View file

@ -1,5 +1,5 @@
{ {
repoFlake, specialArgs,
hostAddress, hostAddress,
localAddress, localAddress,
httpPort ? 80, httpPort ? 80,
@ -8,10 +8,12 @@
}: let }: let
domain = "www.stefanjunker.de"; domain = "www.stefanjunker.de";
in { in {
inherit specialArgs;
config = { config = {
config, config,
pkgs, pkgs,
lib, lib,
repoFlake,
... ...
}: { }: {
system.stateVersion = "22.05"; # Did you read the comment? system.stateVersion = "22.05"; # Did you read the comment?
@ -22,7 +24,11 @@ in {
repoFlake.inputs.sops-nix.nixosModules.sops repoFlake.inputs.sops-nix.nixosModules.sops
]; ];
networking.firewall.enable = false; networking.firewall.enable = true;
networking.firewall.allowedTCPPorts = [
httpPort
httpsPort
];
sops.age.sshKeyPaths = ["/etc/ssh/ssh_host_ed25519_key"]; sops.age.sshKeyPaths = ["/etc/ssh/ssh_host_ed25519_key"];
sops.secrets.hedgedoc_environment_file = { sops.secrets.hedgedoc_environment_file = {

View file

@ -58,7 +58,6 @@ in {
home.packages = [ home.packages = [
pkgs.nil pkgs.nil
pkgs.rnix-lsp
pkgs.nixd pkgs.nixd
pkgs.nixpkgs-fmt pkgs.nixpkgs-fmt
pkgs.alejandra pkgs.alejandra

View file

@ -3,6 +3,7 @@
lib, lib,
config, config,
repoFlake, repoFlake,
nodeFlake,
nodeName, nodeName,
... ...
}: { }: {
@ -73,7 +74,9 @@
containers = { containers = {
mailserver = import ../../containers/mailserver.nix { mailserver = import ../../containers/mailserver.nix {
inherit repoFlake; specialArgs = {
inherit repoFlake nodeFlake;
};
autoStart = true; autoStart = true;
@ -87,7 +90,9 @@
webserver = webserver =
import ../../containers/webserver.nix import ../../containers/webserver.nix
{ {
inherit repoFlake; specialArgs = {
inherit repoFlake nodeFlake;
};
autoStart = true; autoStart = true;
@ -99,6 +104,9 @@
}; };
syncthing = import ../../containers/syncthing.nix { syncthing = import ../../containers/syncthing.nix {
specialArgs = {
inherit repoFlake nodeFlake;
};
autoStart = true; autoStart = true;
hostAddress = "192.168.100.14"; hostAddress = "192.168.100.14";
@ -108,10 +116,6 @@
}; };
}; };
home-manager.users.steveej = import ../../../home-manager/configuration/text-minimal.nix {
inherit pkgs;
};
# This value determines the NixOS release from which the default # This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions # settings for stateful data, like file locations and database versions
# on your system were taken. Its perfectly fine and recommended to leave # on your system were taken. Its perfectly fine and recommended to leave

View file

@ -3,6 +3,7 @@
imports = [ imports = [
../../snippets/systemd-resolved.nix ../../snippets/systemd-resolved.nix
../../snippets/nix-settings.nix
# ../../modules/ddclient-ovh.nix # ../../modules/ddclient-ovh.nix
# ../../modules/ddclient-hetzner.nix # ../../modules/ddclient-hetzner.nix
]; ];

View file

@ -7,7 +7,6 @@
... ...
}: { }: {
imports = [ imports = [
"${nodeFlake.inputs.nixpkgs-unstable}/nixos/modules/services/networking/mycelium.nix"
]; ];
sops.secrets.mycelium-key = { sops.secrets.mycelium-key = {