From 885329094ed4ac2193c6fd35f763cafe80a405e0 Mon Sep 17 00:00:00 2001 From: Stefan Junker Date: Sun, 18 Aug 2024 14:26:31 +0200 Subject: [PATCH 1/6] graphical-fullblown: remove lapce and helix as i'm not using them --- nix/home-manager/configuration/graphical-fullblown.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/nix/home-manager/configuration/graphical-fullblown.nix b/nix/home-manager/configuration/graphical-fullblown.nix index 79be77f..ef47a83 100644 --- a/nix/home-manager/configuration/graphical-fullblown.nix +++ b/nix/home-manager/configuration/graphical-fullblown.nix @@ -141,8 +141,8 @@ in { nethogs # Code Editing and Programming - pkgsUnstable.lapce - pkgsUnstable.helix + # TODO(remove or use): pkgsUnstable.lapce + # TODO(remve or use): pkgsUnstable.helix # Image/Graphic/Design Tools gnome.eog From a105680d8bd071b3ff71cd41a9946d53ddf26168 Mon Sep 17 00:00:00 2001 From: Stefan Junker Date: Thu, 22 Aug 2024 14:31:32 +0200 Subject: [PATCH 2/6] feat(router0-dmz0): add another set of DNS servers --- nix/os/devices/router0-dmz0/configuration.nix | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/nix/os/devices/router0-dmz0/configuration.nix b/nix/os/devices/router0-dmz0/configuration.nix index a84a298..4d82178 100644 --- a/nix/os/devices/router0-dmz0/configuration.nix +++ b/nix/os/devices/router0-dmz0/configuration.nix @@ -1143,8 +1143,11 @@ in { "2a01:4f8:151:34aa::198" "2a01:4f8:141:316d::117" - # cloudflare and google - # "9.9.9.9" "8.8.8.8" "1.1.1.1" + # https://dismail.de/info.html#dns + "116.203.32.217" + "2a01:4f8:1c1b:44aa::1" + "159.69.114.157" + "2a01:4f8:c17:739a::2" ]; domain = From a21c2f544c9053d547dcc6d5c1fc8c37f5d1bb39 Mon Sep 17 00:00:00 2001 From: Stefan Junker Date: Thu, 22 Aug 2024 14:33:00 +0200 Subject: [PATCH 3/6] chore: cleanup and refactor --- flake.nix | 12 +- nix/os/devices/steveej-x13s/default.nix | 2 +- nix/os/devices/steveej-x13s/flake.nix | 54 +++--- nix/os/devices/voodoo/.gitignore | 1 - nix/os/devices/voodoo/configuration.nix | 85 --------- nix/os/devices/voodoo/default.nix | 35 ---- nix/os/devices/voodoo/flake.lock | 225 ------------------------ nix/os/devices/voodoo/flake.nix | 81 --------- 8 files changed, 35 insertions(+), 460 deletions(-) delete mode 100644 nix/os/devices/voodoo/.gitignore delete mode 100644 nix/os/devices/voodoo/configuration.nix delete mode 100644 nix/os/devices/voodoo/default.nix delete mode 100644 nix/os/devices/voodoo/flake.lock delete mode 100644 nix/os/devices/voodoo/flake.nix diff --git a/flake.nix b/flake.nix index a63a5c2..9b68e10 100644 --- a/flake.nix +++ b/flake.nix @@ -185,22 +185,23 @@ # "justyna-p300" # "srv0-dmz0" - # # "router0-dmz0" + # "router0-dmz0" "router0-ifog" "router0-hosthatch" "sj-srv1" "hstk0" - - # "retro" ]); + flake.lib = { + inherit withSystem; + }; + # this makes nixos-anywhere work flake.nixosConfigurations = let colmenaHive = (inputs.colmena.lib.makeHive self.outputs.colmena).nodes; router0-dmz0 = (inputs.get-flake ./nix/os/devices/router0-dmz0).nixosConfigurations; - retro = (inputs.get-flake ./nix/os/devices/retro).nixosConfigurations; in ( colmenaHive // { @@ -210,9 +211,6 @@ # nixos-rebuild switch --flake .\#router0-dmz0_cross --build-host localhost --target-host root@192.168.10.1 router0-dmz0_cross = router0-dmz0.cross; - # nixos-install --flake .\#retro_cross - retro_cross = retro.cross; - steveej-x13s_cross = (inputs.get-flake ./nix/os/devices/steveej-x13s).nixosConfigurations.cross; steveej-x13s-rmvbl_cross = (inputs.get-flake ./nix/os/devices/steveej-x13s-rmvbl).nixosConfigurations.cross; } diff --git a/nix/os/devices/steveej-x13s/default.nix b/nix/os/devices/steveej-x13s/default.nix index fa66cf4..e6d8ece 100644 --- a/nix/os/devices/steveej-x13s/default.nix +++ b/nix/os/devices/steveej-x13s/default.nix @@ -30,7 +30,7 @@ # nixpkgs.pkgs = nodeFlake.inputs.nixpkgs.legacyPackages.${system}; imports = [ - (repoFlake + "/nix/os/devices/${nodeName}/configuration.nix") + ./configuration.nix ]; }; } diff --git a/nix/os/devices/steveej-x13s/flake.nix b/nix/os/devices/steveej-x13s/flake.nix index 6b8ed7e..5104910 100644 --- a/nix/os/devices/steveej-x13s/flake.nix +++ b/nix/os/devices/steveej-x13s/flake.nix @@ -34,24 +34,31 @@ nixpkgs, ... }: let - targetPlatform = "aarch64-linux"; - buildPlatform = "x86_64-linux"; + nativeSystem = "aarch64-linux"; + nodeName = "steveej-x13s"; + + pkgs = nixpkgs.legacyPackages.${nativeSystem}; + pkgsCross = import self.inputs.nixpkgs { + system = "x86_64-linux"; + crossSystem = { + config = "aarch64-unknown-linux-gnu"; + }; + }; + repoFlake = get-flake ../../../..; - mkNixosConfiguration = { - nodeName, - extraModules ? [], - ... - } @ attrs: + mkNixosConfiguration = {extraModules ? [], ...} @ attrs: nixpkgs.lib.nixosSystem ( nixpkgs.lib.attrsets.recursiveUpdate attrs { specialArgs = (import ./default.nix { - system = targetPlatform; - inherit nodeName repoFlake; + system = nativeSystem; + inherit nodeName; + inherit repoFlake; + repoFlakeWithSystem = repoFlake.lib.withSystem; nodeFlake = self; }) .meta @@ -60,7 +67,13 @@ modules = [ - # repoFlake.nixosModules.hardware-x13s + ./configuration.nix + + # flake registry + { + nixpkgs.overlays = builtins.attrValues self.overlays; + nix.registry.nixpkgs.flake = nixpkgs; + } ] ++ extraModules; } @@ -70,30 +83,21 @@ inherit mkNixosConfiguration; }; - nixosConfigurations = let - nodeName = "steveej-x13s"; - in { + overlays = {}; + + nixosConfigurations = { native = mkNixosConfiguration { - inherit nodeName; - system = targetPlatform; - extraModules = [ - ./configuration.nix - ]; + system = nativeSystem; }; cross = mkNixosConfiguration { - inherit nodeName; extraModules = [ - ./configuration.nix - { - nixpkgs.buildPlatform.system = buildPlatform; - nixpkgs.hostPlatform.system = targetPlatform; + nixpkgs.buildPlatform.system = "x86_64-linux"; + nixpkgs.hostPlatform.system = nativeSystem; } ]; }; }; - packages.${targetPlatform} = { - }; }; } diff --git a/nix/os/devices/voodoo/.gitignore b/nix/os/devices/voodoo/.gitignore deleted file mode 100644 index b2be92b..0000000 --- a/nix/os/devices/voodoo/.gitignore +++ /dev/null @@ -1 +0,0 @@ -result diff --git a/nix/os/devices/voodoo/configuration.nix b/nix/os/devices/voodoo/configuration.nix deleted file mode 100644 index d6ae93c..0000000 --- a/nix/os/devices/voodoo/configuration.nix +++ /dev/null @@ -1,85 +0,0 @@ -{ - repoFlake, - pkgs, - lib, - config, - nodeFlake, - nodeName, - localDomainName, - system, - ... -}: let -in { - imports = [ - # repoFlake.inputs.sops-nix.nixosModules.sops - - # ../../profiles/common/user.nix - - { - nix.nixPath = [ - "nixpkgs=${pkgs.path}" - ]; - - nix.settings.experimental-features = [ - "nix-command" - "flakes" - ]; - - nix.settings.max-jobs = lib.mkDefault "auto"; - nix.settings.cores = lib.mkDefault 0; - } - - { - services.openssh.enable = true; - services.openssh.settings.PermitRootLogin = "yes"; - - # users.commonUsers = { - # enable = true; - # enableNonRoot = false; - # rootPasswordFile = config.sops.secrets.passwords-root.path; - # }; - - users.users.root.password = "voodoo"; - - # sops.defaultSopsFile = ../../../../secrets/${nodeName}/secrets.yaml; - # sops.defaultSopsFormat = "yaml"; - - # sops.secrets.passwords-root.neededForUsers = true; - } - ]; - - networking = { - hostName = nodeName; - useNetworkd = false; - useDHCP = true; - firewall.enable = false; - }; - - system.stateVersion = "23.11"; - - # We exclude a number of modules included in the default list. A non-insignificant amount do - # not apply to embedded hardware like this, so simply skip the defaults. - # - # Custom kernel is required as a lot of MTK components misbehave when built as modules. - # They fail to load properly, leaving the system without working ethernet, they'll oops on - # remove. MTK-DSA parts and PCIe were observed to do this. - - # boot.initrd.includeDefaultModules = false; - # boot.initrd.kernelModules = ["rfkill" "cfg80211" "mt7915e"]; - # boot.initrd.availableKernelModules = ["nvme"]; - - hardware.enableRedistributableFirmware = false; - - # Extlinux compatible with custom uboot patches in this repo, which also provide unique - # MAC addresses instead of the non-unique one that gets used by a lot of MTK devices... - boot.loader.grub.enable = true; - - environment.systemPackages = [ - # pkgs.pciutils - ]; - - fileSystems."/".label = "voodoo_root"; - boot.loader.grub.devices = [ - "/dev/disk/by-id/usb-ST313640_A_20171021-0" - ]; -} diff --git a/nix/os/devices/voodoo/default.nix b/nix/os/devices/voodoo/default.nix deleted file mode 100644 index e43dbc4..0000000 --- a/nix/os/devices/voodoo/default.nix +++ /dev/null @@ -1,35 +0,0 @@ -{ - system ? "i586-linux", - nodeName, - repoFlake, - nodeFlake, - localDomainName ? "internal", - ... -}: { - meta.nodeSpecialArgs.${nodeName} = { - inherit repoFlake nodeName nodeFlake system; - packages' = repoFlake.packages.${system}; - nodePackages' = nodeFlake.packages.${system}; - - inherit localDomainName; - }; - - meta.nodeNixpkgs.${nodeName} = - import nodeFlake.inputs.nixpkgs.outPath - { - inherit system; - }; - - ${nodeName} = { - deployment.targetHost = "${nodeName}.${localDomainName}"; - deployment.replaceUnknownProfiles = true; - - # nixpkgs.pkgs = nodeFlake.inputs.nixpkgs.legacyPackages.${system}; - - imports = [ - ./configuration.nix - ]; - - networking.hostName = nodeName; - }; -} diff --git a/nix/os/devices/voodoo/flake.lock b/nix/os/devices/voodoo/flake.lock deleted file mode 100644 index 089ad5e..0000000 --- a/nix/os/devices/voodoo/flake.lock +++ /dev/null @@ -1,225 +0,0 @@ -{ - "nodes": { - "bpir3": { - "inputs": { - "nixpkgs": [ - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1703603768, - "narHash": "sha256-ZViXHNt7ClqNtlRO9iot+LxiSbBvZi/RR+/6Q7W6UV8=", - "owner": "steveej-forks", - "repo": "nixos-bpir3", - "rev": "47cb545b92c136d1482a66b940c4719c40eb5fe3", - "type": "github" - }, - "original": { - "owner": "steveej-forks", - "ref": "linux-6.6", - "repo": "nixos-bpir3", - "type": "github" - } - }, - "dependencyDagOfSubmodule": { - "inputs": { - "nixpkgs": [ - "nixos-nftables-firewall", - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1656615370, - "narHash": "sha256-IZDqz1aSySoqf1qtVQg+oJMHfC4IlT55Zoa7EkjvPug=", - "owner": "thelegy", - "repo": "nix-dependencyDagOfSubmodule", - "rev": "98eb563d80b35acafbfc1abb9ccee569c1efb19c", - "type": "github" - }, - "original": { - "owner": "thelegy", - "repo": "nix-dependencyDagOfSubmodule", - "type": "github" - } - }, - "disko": { - "inputs": { - "nixpkgs": [ - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1703532766, - "narHash": "sha256-ojjW3cuNmqL5uqDWohwLoO8dYpheM5+AfgsNmGIMwG8=", - "owner": "nix-community", - "repo": "disko", - "rev": "1b191113874dee97796749bb21eac3d84735c70a", - "type": "github" - }, - "original": { - "owner": "nix-community", - "repo": "disko", - "type": "github" - } - }, - "get-flake": { - "locked": { - "lastModified": 1694475786, - "narHash": "sha256-s5wDmPooMUNIAAsxxCMMh9g68AueGg63DYk2hVZJbc8=", - "owner": "ursi", - "repo": "get-flake", - "rev": "ac54750e3b95dab6ec0726d77f440efe6045bec1", - "type": "github" - }, - "original": { - "owner": "ursi", - "repo": "get-flake", - "type": "github" - } - }, - "home-manager": { - "inputs": { - "nixpkgs": [ - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1703527373, - "narHash": "sha256-AjypRssRtS6F3xkf7rE3/bXkIF2WJOZLbTIspjcE1zM=", - "owner": "nix-community", - "repo": "home-manager", - "rev": "80679ea5074ab7190c4cce478c600057cfb5edae", - "type": "github" - }, - "original": { - "owner": "nix-community", - "ref": "master", - "repo": "home-manager", - "type": "github" - } - }, - "hostapd": { - "flake": false, - "locked": { - "lastModified": 1703346062, - "narHash": "sha256-SHSBKIgKc5zEGhKDT2v+yGERTJHf8pe+9ZPUwJBTJKQ=", - "ref": "refs/heads/main", - "rev": "196d6c83b9cb7d298fdc92684dc37115348b159e", - "revCount": 19119, - "type": "git", - "url": "git://w1.fi/hostap.git?branch=main" - }, - "original": { - "type": "git", - "url": "git://w1.fi/hostap.git?branch=main" - } - }, - "nixos-nftables-firewall": { - "inputs": { - "dependencyDagOfSubmodule": "dependencyDagOfSubmodule", - "nixpkgs": [ - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1703279052, - "narHash": "sha256-0rbG/9SwaWtXT7ZuifMq+7wvfxDpZrjr0zdMcM4KK+E=", - "owner": "thelegy", - "repo": "nixos-nftables-firewall", - "rev": "3bf23aeb346e772d157816e6b72a742a6c97db80", - "type": "github" - }, - "original": { - "owner": "thelegy", - "repo": "nixos-nftables-firewall", - "type": "github" - } - }, - "nixos-stable": { - "locked": { - "lastModified": 1703068421, - "narHash": "sha256-WSw5Faqlw75McIflnl5v7qVD/B3S2sLh+968bpOGrWA=", - "owner": "NixOS", - "repo": "nixpkgs", - "rev": "d65bceaee0fb1e64363f7871bc43dc1c6ecad99f", - "type": "github" - }, - "original": { - "owner": "NixOS", - "ref": "nixos-23.11", - "repo": "nixpkgs", - "type": "github" - } - }, - "nixpkgs": { - "locked": { - "lastModified": 1703255338, - "narHash": "sha256-Z6wfYJQKmDN9xciTwU3cOiOk+NElxdZwy/FiHctCzjU=", - "owner": "nixos", - "repo": "nixpkgs", - "rev": "6df37dc6a77654682fe9f071c62b4242b5342e04", - "type": "github" - }, - "original": { - "owner": "nixos", - "ref": "nixos-unstable", - "repo": "nixpkgs", - "type": "github" - } - }, - "openwrt": { - "flake": false, - "locked": { - "lastModified": 1691699580, - "narHash": "sha256-CV+ufXPEr5Nz2O2FBnnuPeHNsFQ7c5s0uW39u/q3cUo=", - "ref": "main", - "rev": "847984c773d819d5579d5abae4b80a4983103ed9", - "revCount": 58166, - "type": "git", - "url": "https://github.com/openwrt/openwrt.git" - }, - "original": { - "ref": "main", - "rev": "847984c773d819d5579d5abae4b80a4983103ed9", - "type": "git", - "url": "https://github.com/openwrt/openwrt.git" - } - }, - "root": { - "inputs": { - "bpir3": "bpir3", - "disko": "disko", - "get-flake": "get-flake", - "home-manager": "home-manager", - "hostapd": "hostapd", - "nixos-nftables-firewall": "nixos-nftables-firewall", - "nixpkgs": "nixpkgs", - "openwrt": "openwrt", - "srvos": "srvos" - } - }, - "srvos": { - "inputs": { - "nixos-stable": "nixos-stable", - "nixpkgs": [ - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1703469109, - "narHash": "sha256-hTQJ9uV43Vt8UXwervEj9mbDoQSN1mD3lwwPChG8jy8=", - "owner": "numtide", - "repo": "srvos", - "rev": "52d07db520046c4775f1047e68a05dcb53bba9ec", - "type": "github" - }, - "original": { - "owner": "numtide", - "repo": "srvos", - "type": "github" - } - } - }, - "root": "root", - "version": 7 -} diff --git a/nix/os/devices/voodoo/flake.nix b/nix/os/devices/voodoo/flake.nix deleted file mode 100644 index 7e94241..0000000 --- a/nix/os/devices/voodoo/flake.nix +++ /dev/null @@ -1,81 +0,0 @@ -{ - inputs = { - nixpkgs.url = "github:nixos/nixpkgs/nixos-23.11"; - - get-flake.url = "github:ursi/get-flake"; - - disko.inputs.nixpkgs.follows = "nixpkgs"; - srvos.url = "github:numtide/srvos"; - srvos.inputs.nixpkgs.follows = "nixpkgs"; - }; - - outputs = { - self, - get-flake, - nixpkgs, - ... - }: let - targetPlatform = "i686-linux"; - buildPlatform = "x86_64-linux"; - nodeName = "voodoo"; - - pkgs = nixpkgs.legacyPackages.${targetPlatform}; - pkgsCross = import self.inputs.nixpkgs { - system = buildPlatform; - crossSystem = { - config = "pentium2-unknown-linux-gnu"; - }; - }; - - mkNixosConfiguration = {extraModules ? [], ...} @ attrs: - nixpkgs.lib.nixosSystem ( - nixpkgs.lib.attrsets.recursiveUpdate - attrs - { - specialArgs = - (import ./default.nix { - system = targetPlatform; - inherit nodeName; - - repoFlake = get-flake ../../../..; - nodeFlake = self; - }) - .meta - .nodeSpecialArgs - .${nodeName}; - - modules = - [ - ./configuration.nix - - # flake registry - { - nix.registry.nixpkgs.flake = nixpkgs; - } - - { - nixpkgs.overlays = [ - (final: previous: {}) - ]; - } - ] - ++ extraModules; - } - ); - in { - nixosConfigurations = { - native = mkNixosConfiguration { - system = targetPlatform; - }; - - cross = mkNixosConfiguration { - extraModules = [ - { - nixpkgs.buildPlatform.system = buildPlatform; - nixpkgs.hostPlatform.system = targetPlatform; - } - ]; - }; - }; - }; -} From 8d99d23d8ac260ba69f31ae7c69c1e8b6ba03c63 Mon Sep 17 00:00:00 2001 From: Stefan Junker Date: Thu, 22 Aug 2024 14:33:12 +0200 Subject: [PATCH 4/6] chromium: phantom wallet extension --- nix/home-manager/programs/chromium.nix | 3 +++ 1 file changed, 3 insertions(+) diff --git a/nix/home-manager/programs/chromium.nix b/nix/home-manager/programs/chromium.nix index e48456e..712eb42 100644 --- a/nix/home-manager/programs/chromium.nix +++ b/nix/home-manager/programs/chromium.nix @@ -50,6 +50,9 @@ # rabby wallet {id = "acmacodkjbdgmoleebolmdjonilkdbch";} + # phantom wallet + {id = "bfnaelmomeimhlpmgjnjophhpkkoljpa";} + # Vimium C {id = "hfjbmagddngcpeloejdejnfgbamkjaeg";} From dc30b07bf99776b8d4cdfa244580940a34d90466 Mon Sep 17 00:00:00 2001 From: Stefan Junker Date: Thu, 22 Aug 2024 14:33:39 +0200 Subject: [PATCH 5/6] sj-srv1: configure libvirt and external filesystem --- nix/os/devices/sj-srv1/system.nix | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/nix/os/devices/sj-srv1/system.nix b/nix/os/devices/sj-srv1/system.nix index b862faa..bd23a9e 100644 --- a/nix/os/devices/sj-srv1/system.nix +++ b/nix/os/devices/sj-srv1/system.nix @@ -121,6 +121,14 @@ }; }; + virtualisation.libvirtd = { + enable = true; + onShutdown = "shutdown"; + parallelShutdown = 3; + }; + + fileSystems."/mnt/8078-532D".device = "/dev/disk/by-uuid/8078-532D"; + # This value determines the NixOS release from which the default # settings for stateful data, like file locations and database versions # on your system were taken. It‘s perfectly fine and recommended to leave From e1d4a1019a42f65fdb478bd28ba32162598279c9 Mon Sep 17 00:00:00 2001 From: Stefan Junker Date: Thu, 22 Aug 2024 14:34:01 +0200 Subject: [PATCH 6/6] feat(steveej-x13s): update and limit space usage on /boot --- nix/os/devices/steveej-x13s/configuration.nix | 2 ++ nix/os/devices/steveej-x13s/flake.lock | 24 +++++++++---------- 2 files changed, 14 insertions(+), 12 deletions(-) diff --git a/nix/os/devices/steveej-x13s/configuration.nix b/nix/os/devices/steveej-x13s/configuration.nix index 4f2a4e7..f10f307 100644 --- a/nix/os/devices/steveej-x13s/configuration.nix +++ b/nix/os/devices/steveej-x13s/configuration.nix @@ -198,6 +198,8 @@ boot = { loader.systemd-boot.enable = true; + loader.systemd-boot.configurationLimit = 5; + loader.efi.canTouchEfiVariables = lib.mkForce false; loader.efi.efiSysMountPoint = "/boot"; blacklistedKernelModules = ["wwan"]; diff --git a/nix/os/devices/steveej-x13s/flake.lock b/nix/os/devices/steveej-x13s/flake.lock index 9633bbc..8805ba8 100644 --- a/nix/os/devices/steveej-x13s/flake.lock +++ b/nix/os/devices/steveej-x13s/flake.lock @@ -28,11 +28,11 @@ ] }, "locked": { - "lastModified": 1722476845, - "narHash": "sha256-7gZ8uf3qOox8Vrwd+p9EhUHHLhhK8lis/5KcXGmIaow=", + "lastModified": 1723685519, + "narHash": "sha256-GkXQIoZmW2zCPp1YFtAYGg/xHNyFH/Mgm79lcs81rq0=", "owner": "nix-community", "repo": "disko", - "rev": "7e1b215a0a96efb306ad6440bf706d2b307dc267", + "rev": "276a0d055a720691912c6a34abb724e395c8e38a", "type": "github" }, "original": { @@ -171,11 +171,11 @@ "nixpkgs": "nixpkgs" }, "locked": { - "lastModified": 1722421086, - "narHash": "sha256-Po8GvfDt4O646w1IDIcRdiRIxnqVLv/OwBhr5nOazLw=", + "lastModified": 1722599161, + "narHash": "sha256-befejQIW6Tc6znCpEW4MrrTLT8c6kRszAmxvB+ojFJo=", "owner": "threefoldtech", "repo": "mycelium", - "rev": "e4d7be8556b259a2204f19d6a0537da3aa7d7a3e", + "rev": "c5ac0a8cf3341a53bb136bbbb42ede4f62041c24", "type": "github" }, "original": { @@ -270,11 +270,11 @@ }, "nixpkgs-unstable": { "locked": { - "lastModified": 1722421184, - "narHash": "sha256-/DJBI6trCeVnasdjUo9pbnodCLZcFqnVZiLUfqLH4jA=", + "lastModified": 1723637854, + "narHash": "sha256-med8+5DSWa2UnOqtdICndjDAEjxr5D7zaIiK4pn0Q7c=", "owner": "nixos", "repo": "nixpkgs", - "rev": "9f918d616c5321ad374ae6cb5ea89c9e04bf3e58", + "rev": "c3aa7b8938b17aebd2deecf7be0636000d62a2b9", "type": "github" }, "original": { @@ -302,11 +302,11 @@ }, "nixpkgs_3": { "locked": { - "lastModified": 1722372011, - "narHash": "sha256-B2xRiC3NEJy/82ugtareBkRqEkPGpMyjaLxaR8LBxNs=", + "lastModified": 1723688146, + "narHash": "sha256-sqLwJcHYeWLOeP/XoLwAtYjr01TISlkOfz+NG82pbdg=", "owner": "nixos", "repo": "nixpkgs", - "rev": "cf05eeada35e122770c5c14add958790fcfcbef5", + "rev": "c3d4ac725177c030b1e289015989da2ad9d56af0", "type": "github" }, "original": {