"doom-emacs": {
"flake": false,
"locked": {
- "lastModified": 1643252771,
- "narHash": "sha256-T1H4uXm0dwDBxa+3aYE+xl/6hiW4VXX0ax6DEGvy25Y=",
+ "lastModified": 1647913749,
+ "narHash": "sha256-JlPq+PAJW00rDFOSdLYCdd+nnQzNkjztK2zXAS2S2zY=",
"owner": "hlissner",
"repo": "doom-emacs",
- "rev": "ff4609835a4c47312b3d685e09330034d6f4c8a4",
+ "rev": "aed2972d7400834210759727117c50de34826db9",
"type": "github"
},
"original": {
},
"emacs-overlay": {
"locked": {
- "lastModified": 1643252190,
- "narHash": "sha256-V774e49jTUgdsHRfkPDNsH4BHT4hxbhCYkayLEwOHdM=",
+ "lastModified": 1648290468,
+ "narHash": "sha256-Mibv/7lr2QxNwydU0WP1VDC0GMu6Xn0E5Yez73xDjQE=",
"owner": "nix-community",
"repo": "emacs-overlay",
- "rev": "8e5d094f0a82b37c24e77577c46f1787887f5af8",
+ "rev": "adf05412cca0a492c2465ac5de719954834c449e",
"type": "github"
},
"original": {
},
"flake-utils": {
"locked": {
- "lastModified": 1642700792,
- "narHash": "sha256-XqHrk7hFb+zBvRg6Ghl+AZDq03ov6OshJLiSWOoX5es=",
+ "lastModified": 1644229661,
+ "narHash": "sha256-1YdnJAsNy69bpcjuoKdOYQX0YxZBiCYZo4Twxerqv7k=",
"owner": "numtide",
"repo": "flake-utils",
- "rev": "846b2ae0fc4cc943637d3d1def4454213e203cba",
+ "rev": "3cecb5b042f7f209c56ffd8371b2711a290ec797",
"type": "github"
},
"original": {
]
},
"locked": {
- "lastModified": 1639329010,
- "narHash": "sha256-k9OXwR06419/s0FAnRalUs24+8EI6GepGaatAXhBc+0=",
+ "lastModified": 1648283590,
+ "narHash": "sha256-OjoAiY2XWr2ah73rY+kvEYLF+q40S/X61tUC0JPuCKw=",
"owner": "nix-community",
"repo": "home-manager",
- "rev": "3d46c011d2cc2c9ca24d9b803e9daf156d9429ea",
+ "rev": "8afee75d0d1cb054cfeddfdc9f7193adc7741c95",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "home-manager",
- "rev": "3d46c011d2cc2c9ca24d9b803e9daf156d9429ea",
"type": "github"
}
},
},
"nixpkgs": {
"locked": {
- "lastModified": 1643221379,
- "narHash": "sha256-ctMJZA++yYzbRCEHFb5ydukKdPgaGY0vCZSlbkFCW6o=",
+ "lastModified": 1646497237,
+ "narHash": "sha256-Ccpot1h/rV8MgcngDp5OrdmLTMaUTbStZTR5/sI7zW0=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "ad79594d1e2fea66bf7d5faeec6ef35319596031",
+ "rev": "062a0c5437b68f950b081bbfc8a699d57a4ee026",
"type": "github"
},
"original": {
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "ad79594d1e2fea66bf7d5faeec6ef35319596031",
+ "rev": "062a0c5437b68f950b081bbfc8a699d57a4ee026",
"type": "github"
}
},
extraOptions = ''
secret-key-files = ${private}/${hostName}/nix/binary-cache/priv.pem
'';
- trustedUsers = [ config.users.users."julm".name ];
- binaryCaches = [
- #"http://nix-localcache.losurdo.wg"
- "ssh://nix-ssh@losurdo.wg?priority=30"
- ];
- binaryCachePublicKeys = map lib.readFile [
- ../private/shared/nix/losurdo.pub
- ];
+ settings = {
+ trusted-users = [ config.users.users."julm".name ];
+ substituters = [
+ #"http://nix-localcache.losurdo.wg"
+ "ssh://nix-ssh@losurdo.wg?priority=30"
+ ];
+ trusted-public-keys = map lib.readFile [
+ ../private/shared/nix/losurdo.pub
+ ];
+ };
nixPath = lib.mkForce [ "nixpkgs=${inputs.nixpkgs}" ];
};
#environment.etc."nixpkgs".source = pkgs.path;
#environment.etc."nixpkgs-overlays".source = inputs.self + "/nixpkgs";
-nix.allowedUsers = [ config.users.users."nix-ssh".name ];
+nix.settings.allowed-users = [ config.users.users."nix-ssh".name ];
nix.sshServe = {
enable = true;
keys = map lib.readFile [
];
in {
"/mnt/losurdo" = {
- device = "${pkgs.sshfsFuse}/bin/sshfs#julm@losurdo.wg:/";
+ device = "${pkgs.sshfs-fuse}/bin/sshfs#julm@losurdo.wg:/";
fsType = "fuse";
inherit options;
};
"/mnt/mermet" = {
- device = "${pkgs.sshfsFuse}/bin/sshfs#julm@mermet.wg:/";
+ device = "${pkgs.sshfs-fuse}/bin/sshfs#julm@mermet.wg:/";
fsType = "fuse";
inherit options;
};
};
nix = {
- trustedUsers = [ config.users.users."sevy".name ];
- binaryCaches = [
- #"ssh://nix-ssh@losurdo.wg?priority=30"
- "ssh://nix-ssh@oignon.wg?priority=10"
- ];
- binaryCachePublicKeys = map lib.readFile [
- ../private/shared/nix/losurdo.pub
- ../private/shared/nix/oignon.pub
- ];
+ settings = {
+ trusted-users = [ config.users.users."sevy".name ];
+ substituters = [
+ #"ssh://nix-ssh@losurdo.wg?priority=30"
+ "ssh://nix-ssh@oignon.wg?priority=10"
+ ];
+ trusted-public-keys = map lib.readFile [
+ ../private/shared/nix/losurdo.pub
+ ../private/shared/nix/oignon.pub
+ ];
+ };
};
environment.systemPackages = [