]> Git — Sourcephile - julm/julm-nix.git/commitdiff
nix: update to nixos-24.05 main
authorJulien Moutinho <julm+julm-nix@sourcephile.fr>
Tue, 28 May 2024 18:19:42 +0000 (20:19 +0200)
committerJulien Moutinho <julm+julm-nix@sourcephile.fr>
Tue, 28 May 2024 20:52:46 +0000 (22:52 +0200)
16 files changed:
flake.lock
flake.nix
home-manager/profiles/gnupg.nix
home-manager/profiles/sharing.nix
homes/julm/hosts/losurdo.nix
homes/julm/hosts/oignon.nix
hosts/aubergine/networking.nix
hosts/courge.nix
hosts/oignon.nix
hosts/patate.nix
nixos/profiles/graphical.nix
nixos/profiles/lang-fr.nix
nixos/profiles/networking/remote.nix
nixos/profiles/system.nix
nixos/profiles/zfs.nix
nixpkgs/patches.nix

index 00ed24c8cf3a157af92dee1d2c1696c43fed3982..6351a05317471e0ca73921cde7420bb413f6ee99 100644 (file)
         ]
       },
       "locked": {
-        "lastModified": 1715381426,
-        "narHash": "sha256-wPuqrAQGdv3ISs74nJfGb+Yprm23U/rFpcHFFNWgM94=",
+        "lastModified": 1716736833,
+        "narHash": "sha256-rNObca6dm7Qs524O4st8VJH6pZ/Xe1gxl+Rx6mcWYo0=",
         "owner": "nix-community",
         "repo": "home-manager",
-        "rev": "ab5542e9dbd13d0100f8baae2bc2d68af901f4b4",
+        "rev": "a631666f5ec18271e86a5cde998cba68c33d9ac6",
         "type": "github"
       },
       "original": {
         "owner": "nix-community",
-        "ref": "release-23.11",
+        "ref": "release-24.05",
         "repo": "home-manager",
         "type": "github"
       }
     },
     "nixpkgs": {
       "locked": {
-        "lastModified": 1712310679,
-        "narHash": "sha256-XgC/a/giEeNkhme/AV1ToipoZ/IVm1MV2ntiK4Tm+pw=",
+        "lastModified": 1716793392,
+        "narHash": "sha256-ex3nO87EEQhshXd19QSVW5UIXL0pbPuew4q8TdEJQBY=",
         "owner": "NixOS",
         "repo": "nixpkgs",
-        "rev": "72da83d9515b43550436891f538ff41d68eecc7f",
+        "rev": "67a8b308bae9c26be660ccceff3e53a65e01afe1",
         "type": "github"
       },
       "original": {
         "owner": "NixOS",
-        "ref": "nixos-23.11",
+        "ref": "nixos-24.05",
         "repo": "nixpkgs",
         "type": "github"
       }
index cb196cb978556590231b886a9ae5a6a23830b234..7d04d2fa0757bdb633c617e4ef83c2eb6f6ee77e 100644 (file)
--- a/flake.nix
+++ b/flake.nix
     doom-emacs.flake = false;
     doom-emacs.url = "github:hlissner/doom-emacs";
     home-manager.inputs.nixpkgs.follows = "nixpkgs";
-    home-manager.url = "github:nix-community/home-manager/release-23.11";
+    home-manager.url = "github:nix-community/home-manager/release-24.05";
     nix-formatter-pack.inputs.nixpkgs.follows = "nixpkgs";
     nix-formatter-pack.url = "github:Gerschtli/nix-formatter-pack";
-    nixpkgs.url = "github:NixOS/nixpkgs/nixos-23.11";
+    nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.05";
     git-hooks.inputs.nixpkgs.follows = "nixpkgs";
     git-hooks.inputs.nixpkgs-stable.follows = "nixpkgs";
     git-hooks.url = "github:cachix/git-hooks.nix";
index 9d333c10effa19b9658171995de4652bef9b07ca..18f666213eea4f06ba2a7dceb812ef544fe0cb86 100644 (file)
@@ -9,8 +9,7 @@
     enable = true;
     enableSshSupport = true;
     enableExtraSocket = true;
-    pinentryFlavor = lib.mkDefault (if nixosConfig.services.xserver.enable then "gtk2" else "curses");
-    #pinentryPackage = lib.mkDefault (if nixosConfig.services.xserver.enable then pkgs.pinentry-gtk2 else pkgs.pinentry-curses);
+    pinentryPackage = lib.mkDefault (if nixosConfig.services.xserver.enable then pkgs.pinentry-gtk2 else pkgs.pinentry-curses);
   };
   programs.gpg.enable = true;
   programs.gpg.settings = {
index 1a6b86e5de3420ab4fd5173b5567db71256467de..a01468bd717bdd2d5be2522adf9b65e2707d644e 100644 (file)
@@ -3,7 +3,7 @@
   home.packages = [
     pkgs.croc
     pkgs.sshfs
-    pkgs.stig
+    #pkgs.stig
     #pkgs.transmission-gtk
   ] ++ lib.optionals nixosConfig.services.xserver.enable [
     pkgs.amule
index fa7385d755d77dc1e7e54bdc2d809849ae9515cf..458e05ae38f01422712d4b35ccbd69cb5e46f94a 100644 (file)
     ../../../home-manager/profiles/firefox.nix
     ../../../home-manager/profiles/xmonad.nix
   ];
-  services.gpg-agent.pinentryFlavor = lib.mkForce "curses";
-  #services.gpg-agent.pinentryPackage = lib.mkForce pkgs.pinentry-curses;
+  services.gpg-agent.pinentryPackage = lib.mkForce pkgs.pinentry-curses;
   home.packages = [
     pkgs.evince
     pkgs.wine
-    pkgs.stig
+    #pkgs.stig
     #pkgs.blender
     #pkgs.freecad
     #pkgs.mastodon-archive
index 7231166df0fb35aff1b1bb38aac6da29d8abe5d5..0df03f5624ba3f889dd34d750c57598fe9da8ad8 100644 (file)
@@ -56,7 +56,7 @@
     pkgs.neverball
     pkgs.tuxpaint
     pkgs.xsane
-    pkgs.stig
+    #pkgs.stig
     pkgs.gthumb
     pkgs.thunderbird
     #pkgs.chromium
index 2f3eec7ec9e7fdb22dad6cc2cea704b300f7583d..e1d6955230e61b66f5d7f24b8a3191658708dd20 100644 (file)
@@ -40,7 +40,7 @@ with (import networking/names-and-numbers.nix);
   services.avahi = {
     enable = true;
     openFirewall = true;
-    nssmdns = true;
+    nssmdns4 = true;
     publish = {
       enable = true;
       addresses = true;
index 41aec60e748658f0314819b5abe362e95d2eb94b..d42f87caf62bbb9f329638f3ce28019d491eb8bf 100644 (file)
     desktopManager = {
       gnome.enable = true;
     };
-    displayManager = {
-      defaultSession = "gnome";
-      gdm.enable = true;
-      autoLogin = {
-        user = config.users.users.mo.name;
-      };
+  };
+
+  services.displayManager = {
+    defaultSession = "gnome";
+    gdm.enable = true;
+    autoLogin = {
+      user = config.users.users.mo.name;
     };
   };
 
index 46d366690b3c18eec33d5ed247c457001256643d..69acc142c526ae471cff573328cd110e46c7cb79 100644 (file)
         }
       ];
     };
-    displayManager = {
-      defaultSession = "home-manager";
-      #defaultSession = "none+xmonad";
-      #defaultSession = "mate";
-      #defaultSession = "cinnamon";
-      autoLogin = {
-        user = config.users.users.julm.name;
-      };
+  };
+
+  services.displayManager = {
+    defaultSession = "home-manager";
+    #defaultSession = "none+xmonad";
+    #defaultSession = "mate";
+    #defaultSession = "cinnamon";
+    autoLogin = {
+      user = config.users.users.julm.name;
     };
   };
 
index b5ee3b3126fceb7447aacf95b2829b9b24e95907..e47909861f46446e4591ea64c0c089d8b61bfe78 100644 (file)
       xfce.enable = true;
       xterm.enable = false;
     };
-    displayManager = {
-      defaultSession = "mate";
-      autoLogin = {
-        user = config.users.users.sevy.name;
-      };
+  };
+
+  services.displayManager = {
+    defaultSession = "mate";
+    autoLogin = {
+      user = config.users.users.sevy.name;
     };
   };
 
index 324397917109ab7a80a2ef711f4244eae8f88b74..e23fac757408914ecd476a44755b4f721899c612 100644 (file)
@@ -25,9 +25,9 @@ with lib;
   services.gvfs.enable = mkDefault true;
   services.avahi.enable = mkDefault true;
 
+  services.libinput.enable = mkDefault true;
   services.xserver = {
     enable = mkDefault true;
-    libinput.enable = mkDefault true;
     exportConfiguration = mkDefault true; # link /usr/share/X11/ properly
     desktopManager = {
       session = [
@@ -42,7 +42,10 @@ with lib;
       ];
       xterm.enable = mkDefault false;
     };
-    displayManager.autoLogin.enable = mkDefault true;
+  };
+
+  services.displayManager = {
+    autoLogin.enable = mkDefault true;
   };
 
   services.xserver.gdk-pixbuf.modulePackages = [ pkgs.librsvg ];
index 546f61c86f14dd62badfc1c2d8d178a199edebcd..2c9b98f40d170a2d8efdf566a314a0f753676518 100644 (file)
@@ -8,8 +8,10 @@
   console.font = "Lat2-Terminus16";
   console.keyMap = lib.mkDefault "fr";
   services.xserver = {
-    layout = lib.mkDefault "fr";
-    xkbOptions = "eurosign:e, compose:menu, grp:alt_space_toggle";
+    xkb = {
+      layout = lib.mkDefault "fr";
+      options = "eurosign:e, compose:menu, grp:alt_space_toggle";
+    };
     libinput.enable = config.services.xserver.enable;
   };
 }
index 4b73cc7a094b23bab1c39e8bcc6bd04ad28c1760..b0f6b3695a01b2a38ce37733fc397992bab7e1db 100644 (file)
@@ -13,8 +13,7 @@ with lib;
   # sets this up as soon as the initrd.
   boot.kernelParams = [ "panic=10" ];
 
-  programs.gnupg.agent.pinentryFlavor = "curses";
-  #programs.gnupg.agent.pinentryPackage = pkgs.pinentry-curses;
+  programs.gnupg.agent.pinentryPackage = pkgs.pinentry-curses;
 
   systemd = {
     # Always try to start all the units (default.target)
index 9e8242e313af59fc80d2c4a10e8f2e16dbe8596a..9b16ed1a616e5060a10f9a2c584509fbd0915218 100644 (file)
@@ -28,8 +28,7 @@ with lib;
       ../../home-manager/options.nix
       ../../home-manager/profiles/essential.nix
     ];
-    services.gpg-agent.pinentryFlavor = "curses";
-    #services.gpg-agent.pinentryPackage = pkgs.pinentry-curses;
+    services.gpg-agent.pinentryPackage = pkgs.pinentry-curses;
   };
   nix = {
     settings.auto-optimise-store = mkDefault true;
@@ -70,7 +69,7 @@ with lib;
     enable = mkDefault true;
     enableRootSlice = mkDefault true;
     enableSystemSlice = mkDefault true;
-    enableUserServices = mkDefault true;
+    enableUserSlices = mkDefault true;
   };
   systemd.services.openssh = {
     serviceConfig = {
index 168744c72302f489ee271c5cf573812f875ddabf..17b41b01b6d46610a327a827d6910119e4bca769 100644 (file)
@@ -28,7 +28,7 @@
   boot.zfs.forceImportRoot = true;
   boot.zfs.requestEncryptionCredentials = lib.mkDefault [ "${hostName}/root" ];
 
-  boot.zfs.enableUnstable = false;
+  #boot.zfs.package = pkgs.zfs_unstable;
 
   # Enables periodic scrubbing of ZFS pools.
   services.zfs.autoScrub.enable = true;
index 544774eec5ea9bf22f936366887693bf9c535d62..576d0a3fdffb777d35fa00e9959edd7e67dac94e 100644 (file)
@@ -2,22 +2,7 @@
   {
     meta.description = "openvpn";
     url = "https://github.com/NixOS/nixpkgs/pull/109643.diff";
-    sha256 = "sha256-RWEVclcCLgb+Xna2G6BmtjEltH8IOE8diN+CnPhcJ+E=";
-  }
-  {
-    meta.description = "stig";
-    url = "https://github.com/NixOS/nixpkgs/pull/276014.diff";
-    sha256 = "sha256-SUftUE++06TqRmK88VxQKiI9NaJs7XtC8I97ScQHF/Y=";
-  }
-  {
-    meta.description = "dnscrypt-proxy2";
-    url = "https://github.com/NixOS/nixpkgs/pull/304810.diff";
-    sha256 = "sha256-YGQZibCIKz7YYS1bw2QNtHbJPWWV6nZqWwddWsAFK5Q=";
-  }
-  {
-    meta.description = "kernel-hardening-checker";
-    url = "https://github.com/NixOS/nixpkgs/pull/287537.diff";
-    sha256 = "sha256-0Dos8UlxTQXhdMoKoMFDUMsI5PlgHzCsXsvFSvAvW5Q=";
+    sha256 = "sha256-mfSsvQagvR+9ykppFs4CYG6RLJJRcklZ61D/tZ4OErY=";
   }
   /*
     {