diff options
author | Gregor Kleen <gkleen@yggdrasil.li> | 2025-03-22 13:04:06 +0100 |
---|---|---|
committer | Gregor Kleen <gkleen@yggdrasil.li> | 2025-03-22 13:04:06 +0100 |
commit | 2f3d52e6f54752ebe8eee86c789badfa87d2dd1f (patch) | |
tree | fe7cdcb008c8218a06089385d2eb26ebd4b27ca4 | |
parent | 5af0209ca7f9e3ad965831ef3f7adedf58f0acb5 (diff) | |
download | nixos-2f3d52e6f54752ebe8eee86c789badfa87d2dd1f.tar nixos-2f3d52e6f54752ebe8eee86c789badfa87d2dd1f.tar.gz nixos-2f3d52e6f54752ebe8eee86c789badfa87d2dd1f.tar.bz2 nixos-2f3d52e6f54752ebe8eee86c789badfa87d2dd1f.tar.xz nixos-2f3d52e6f54752ebe8eee86c789badfa87d2dd1f.zip |
...
-rw-r--r-- | _sources/generated.json | 14 | ||||
-rw-r--r-- | _sources/generated.nix | 14 | ||||
-rw-r--r-- | flake.lock | 52 | ||||
-rw-r--r-- | flake.nix | 7 | ||||
-rw-r--r-- | hosts/surtr/email/default.nix | 2 |
5 files changed, 46 insertions, 43 deletions
diff --git a/_sources/generated.json b/_sources/generated.json index 80194b7f..c1af7cc8 100644 --- a/_sources/generated.json +++ b/_sources/generated.json | |||
@@ -99,7 +99,7 @@ | |||
99 | }, | 99 | }, |
100 | "mako": { | 100 | "mako": { |
101 | "cargoLocks": null, | 101 | "cargoLocks": null, |
102 | "date": "2025-03-07", | 102 | "date": "2025-03-21", |
103 | "extract": null, | 103 | "extract": null, |
104 | "name": "mako", | 104 | "name": "mako", |
105 | "passthru": null, | 105 | "passthru": null, |
@@ -109,13 +109,13 @@ | |||
109 | "fetchSubmodules": false, | 109 | "fetchSubmodules": false, |
110 | "leaveDotGit": false, | 110 | "leaveDotGit": false, |
111 | "name": null, | 111 | "name": null, |
112 | "rev": "91a1fc482b1ef8c45a64e38f13e0b23e84155f32", | 112 | "rev": "2a06a341efae601431a6944f94cfe4965a46cb44", |
113 | "sha256": "sha256-i91WGv1O5OZ0338/F2nkXUZ7xLD3N9Zxloeq3sDt04w=", | 113 | "sha256": "sha256-QH2rxJcNiurHFEtkmq6Ki15k11b6ft6WYiZKbGs7SS0=", |
114 | "sparseCheckout": [], | 114 | "sparseCheckout": [], |
115 | "type": "git", | 115 | "type": "git", |
116 | "url": "https://github.com/emersion/mako" | 116 | "url": "https://github.com/emersion/mako" |
117 | }, | 117 | }, |
118 | "version": "91a1fc482b1ef8c45a64e38f13e0b23e84155f32" | 118 | "version": "2a06a341efae601431a6944f94cfe4965a46cb44" |
119 | }, | 119 | }, |
120 | "mpv-autosave": { | 120 | "mpv-autosave": { |
121 | "cargoLocks": null, | 121 | "cargoLocks": null, |
@@ -456,10 +456,10 @@ | |||
456 | "pinned": false, | 456 | "pinned": false, |
457 | "src": { | 457 | "src": { |
458 | "name": null, | 458 | "name": null, |
459 | "sha256": "sha256-8zynbfLk2zGIDy/kCNRPUFjZ8TUBWxPlBhDfvngkW+o=", | 459 | "sha256": "sha256-W89HsolyVOo4FpNajd5H0kO/9VZ4LM7WsWorhea2gro=", |
460 | "type": "url", | 460 | "type": "url", |
461 | "url": "https://pypi.org/packages/source/y/yt_dlp/yt_dlp-2025.2.19.tar.gz" | 461 | "url": "https://pypi.org/packages/source/y/yt_dlp/yt_dlp-2025.3.21.tar.gz" |
462 | }, | 462 | }, |
463 | "version": "2025.2.19" | 463 | "version": "2025.3.21" |
464 | } | 464 | } |
465 | } \ No newline at end of file | 465 | } \ No newline at end of file |
diff --git a/_sources/generated.nix b/_sources/generated.nix index 0dcedc0e..b0cf46e5 100644 --- a/_sources/generated.nix +++ b/_sources/generated.nix | |||
@@ -61,17 +61,17 @@ | |||
61 | }; | 61 | }; |
62 | mako = { | 62 | mako = { |
63 | pname = "mako"; | 63 | pname = "mako"; |
64 | version = "91a1fc482b1ef8c45a64e38f13e0b23e84155f32"; | 64 | version = "2a06a341efae601431a6944f94cfe4965a46cb44"; |
65 | src = fetchgit { | 65 | src = fetchgit { |
66 | url = "https://github.com/emersion/mako"; | 66 | url = "https://github.com/emersion/mako"; |
67 | rev = "91a1fc482b1ef8c45a64e38f13e0b23e84155f32"; | 67 | rev = "2a06a341efae601431a6944f94cfe4965a46cb44"; |
68 | fetchSubmodules = false; | 68 | fetchSubmodules = false; |
69 | deepClone = false; | 69 | deepClone = false; |
70 | leaveDotGit = false; | 70 | leaveDotGit = false; |
71 | sparseCheckout = [ ]; | 71 | sparseCheckout = [ ]; |
72 | sha256 = "sha256-i91WGv1O5OZ0338/F2nkXUZ7xLD3N9Zxloeq3sDt04w="; | 72 | sha256 = "sha256-QH2rxJcNiurHFEtkmq6Ki15k11b6ft6WYiZKbGs7SS0="; |
73 | }; | 73 | }; |
74 | date = "2025-03-07"; | 74 | date = "2025-03-21"; |
75 | }; | 75 | }; |
76 | mpv-autosave = { | 76 | mpv-autosave = { |
77 | pname = "mpv-autosave"; | 77 | pname = "mpv-autosave"; |
@@ -278,10 +278,10 @@ | |||
278 | }; | 278 | }; |
279 | yt-dlp = { | 279 | yt-dlp = { |
280 | pname = "yt-dlp"; | 280 | pname = "yt-dlp"; |
281 | version = "2025.2.19"; | 281 | version = "2025.3.21"; |
282 | src = fetchurl { | 282 | src = fetchurl { |
283 | url = "https://pypi.org/packages/source/y/yt_dlp/yt_dlp-2025.2.19.tar.gz"; | 283 | url = "https://pypi.org/packages/source/y/yt_dlp/yt_dlp-2025.3.21.tar.gz"; |
284 | sha256 = "sha256-8zynbfLk2zGIDy/kCNRPUFjZ8TUBWxPlBhDfvngkW+o="; | 284 | sha256 = "sha256-W89HsolyVOo4FpNajd5H0kO/9VZ4LM7WsWorhea2gro="; |
285 | }; | 285 | }; |
286 | }; | 286 | }; |
287 | } | 287 | } |
@@ -397,11 +397,11 @@ | |||
397 | "xwayland-satellite-unstable": "xwayland-satellite-unstable" | 397 | "xwayland-satellite-unstable": "xwayland-satellite-unstable" |
398 | }, | 398 | }, |
399 | "locked": { | 399 | "locked": { |
400 | "lastModified": 1742108116, | 400 | "lastModified": 1742636890, |
401 | "narHash": "sha256-NrV9ysEfSbeRUPo0jdCBeesuNLTVrpHGXg40snH1YGE=", | 401 | "narHash": "sha256-FDMxPw/9LNkH9N+FBbUO7gRX70rrp/347YSTkkxBq9I=", |
402 | "owner": "sodiboo", | 402 | "owner": "sodiboo", |
403 | "repo": "niri-flake", | 403 | "repo": "niri-flake", |
404 | "rev": "824f10012de455a1d0ef795a605f28948ee10467", | 404 | "rev": "93d595a2484ee3c7a55a2b4cbb0660ad280eeb9b", |
405 | "type": "github" | 405 | "type": "github" |
406 | }, | 406 | }, |
407 | "original": { | 407 | "original": { |
@@ -431,11 +431,11 @@ | |||
431 | "niri-unstable": { | 431 | "niri-unstable": { |
432 | "flake": false, | 432 | "flake": false, |
433 | "locked": { | 433 | "locked": { |
434 | "lastModified": 1742103165, | 434 | "lastModified": 1742631227, |
435 | "narHash": "sha256-zAzMwvozlS2gmqdhrgeMz0PNp3kRDkwxIEfqWT3Hj6g=", | 435 | "narHash": "sha256-iignxt2VAXMbJuzwJ4+k4T++vduDyhO5BTGi9PDd8fE=", |
436 | "owner": "YaLTeR", | 436 | "owner": "YaLTeR", |
437 | "repo": "niri", | 437 | "repo": "niri", |
438 | "rev": "287480b541e85b13ff6419d372f82fa8e42c603c", | 438 | "rev": "f95d5a82df89d3f09e818091a853b3608eaa5831", |
439 | "type": "github" | 439 | "type": "github" |
440 | }, | 440 | }, |
441 | "original": { | 441 | "original": { |
@@ -472,11 +472,11 @@ | |||
472 | ] | 472 | ] |
473 | }, | 473 | }, |
474 | "locked": { | 474 | "locked": { |
475 | "lastModified": 1742096597, | 475 | "lastModified": 1742174123, |
476 | "narHash": "sha256-CUy00dj513aIvtN2NGiDKLCVEQSz4xHWSDf229EiJdU=", | 476 | "narHash": "sha256-pDNzMoR6m1ZSJToZQ6XDTLVSdzIzmFl1b8Pc3f7iV6Y=", |
477 | "owner": "Mic92", | 477 | "owner": "Mic92", |
478 | "repo": "nix-index-database", | 478 | "repo": "nix-index-database", |
479 | "rev": "5c77c6d6f2e8cc6007c2b1a4df1a507834404a67", | 479 | "rev": "2cfb4e1ca32f59dd2811d7a6dd5d4d1225f0955c", |
480 | "type": "github" | 480 | "type": "github" |
481 | }, | 481 | }, |
482 | "original": { | 482 | "original": { |
@@ -508,11 +508,11 @@ | |||
508 | }, | 508 | }, |
509 | "nixos-hardware": { | 509 | "nixos-hardware": { |
510 | "locked": { | 510 | "locked": { |
511 | "lastModified": 1741792691, | 511 | "lastModified": 1742631601, |
512 | "narHash": "sha256-f0BVt1/cvA0DQ/q3rB+HY4g4tKksd03ZkzI4xehC2Ew=", | 512 | "narHash": "sha256-yJ3OOAmsGAxSl0bTmKUp3+cEYtSS+V6hUPK2rYhIPr8=", |
513 | "owner": "NixOS", | 513 | "owner": "NixOS", |
514 | "repo": "nixos-hardware", | 514 | "repo": "nixos-hardware", |
515 | "rev": "e1f12151258b12c567f456d8248e4694e9390613", | 515 | "rev": "380ed15bcd6440606c6856db44a99140d422b46f", |
516 | "type": "github" | 516 | "type": "github" |
517 | }, | 517 | }, |
518 | "original": { | 518 | "original": { |
@@ -630,11 +630,11 @@ | |||
630 | }, | 630 | }, |
631 | "nixpkgs-stable_2": { | 631 | "nixpkgs-stable_2": { |
632 | "locked": { | 632 | "locked": { |
633 | "lastModified": 1741862977, | 633 | "lastModified": 1742512142, |
634 | "narHash": "sha256-prZ0M8vE/ghRGGZcflvxCu40ObKaB+ikn74/xQoNrGQ=", | 634 | "narHash": "sha256-8XfURTDxOm6+33swQJu/hx6xw1Tznl8vJJN5HwVqckg=", |
635 | "owner": "NixOS", | 635 | "owner": "NixOS", |
636 | "repo": "nixpkgs", | 636 | "repo": "nixpkgs", |
637 | "rev": "cdd2ef009676ac92b715ff26630164bb88fec4e0", | 637 | "rev": "7105ae3957700a9646cc4b766f5815b23ed0c682", |
638 | "type": "github" | 638 | "type": "github" |
639 | }, | 639 | }, |
640 | "original": { | 640 | "original": { |
@@ -678,11 +678,11 @@ | |||
678 | }, | 678 | }, |
679 | "nixpkgs_2": { | 679 | "nixpkgs_2": { |
680 | "locked": { | 680 | "locked": { |
681 | "lastModified": 1742069588, | 681 | "lastModified": 1742422364, |
682 | "narHash": "sha256-C7jVfohcGzdZRF6DO+ybyG/sqpo1h6bZi9T56sxLy+k=", | 682 | "narHash": "sha256-mNqIplmEohk5jRkqYqG19GA8MbQ/D4gQSK0Mu4LvfRQ=", |
683 | "owner": "NixOS", | 683 | "owner": "NixOS", |
684 | "repo": "nixpkgs", | 684 | "repo": "nixpkgs", |
685 | "rev": "c80f6a7e10b39afcc1894e02ef785b1ad0b0d7e5", | 685 | "rev": "a84ebe20c6bc2ecbcfb000a50776219f48d134cc", |
686 | "type": "github" | 686 | "type": "github" |
687 | }, | 687 | }, |
688 | "original": { | 688 | "original": { |
@@ -748,11 +748,11 @@ | |||
748 | "treefmt-nix": "treefmt-nix" | 748 | "treefmt-nix": "treefmt-nix" |
749 | }, | 749 | }, |
750 | "locked": { | 750 | "locked": { |
751 | "lastModified": 1741790785, | 751 | "lastModified": 1742397518, |
752 | "narHash": "sha256-nzgO/ZCSBzWjbMkYDxG+yl9Z2eGbCgQu06Oku3ir5D4=", | 752 | "narHash": "sha256-nzgO/ZCSBzWjbMkYDxG+yl9Z2eGbCgQu06Oku3ir5D4=", |
753 | "owner": "nix-community", | 753 | "owner": "nix-community", |
754 | "repo": "poetry2nix", | 754 | "repo": "poetry2nix", |
755 | "rev": "f842aae3a72ef764e38eaf3e75aa435fb9861bba", | 755 | "rev": "b9a98080beff0903a5e5fe431f42cde1e3e50d6b", |
756 | "type": "github" | 756 | "type": "github" |
757 | }, | 757 | }, |
758 | "original": { | 758 | "original": { |
@@ -891,11 +891,11 @@ | |||
891 | ] | 891 | ] |
892 | }, | 892 | }, |
893 | "locked": { | 893 | "locked": { |
894 | "lastModified": 1741861888, | 894 | "lastModified": 1742595978, |
895 | "narHash": "sha256-ynOgXAyToeE1UdLNfrUn/hL7MN0OpIS2BtNdLjpjPf0=", | 895 | "narHash": "sha256-05onsoMrLyXE4XleDCeLC3bXnC4nyUbKWInGwM7v6hU=", |
896 | "owner": "Mic92", | 896 | "owner": "Mic92", |
897 | "repo": "sops-nix", | 897 | "repo": "sops-nix", |
898 | "rev": "d016ce0365b87d848a57c12ffcfdc71da7a2b55f", | 898 | "rev": "b7756921b002de60fb66782effad3ce8bdb5b25d", |
899 | "type": "github" | 899 | "type": "github" |
900 | }, | 900 | }, |
901 | "original": { | 901 | "original": { |
@@ -1000,11 +1000,11 @@ | |||
1000 | "xwayland-satellite-unstable": { | 1000 | "xwayland-satellite-unstable": { |
1001 | "flake": false, | 1001 | "flake": false, |
1002 | "locked": { | 1002 | "locked": { |
1003 | "lastModified": 1742083780, | 1003 | "lastModified": 1742475924, |
1004 | "narHash": "sha256-cVLagXvI4jFbCe76tpvAWA2N2WF94Pl0PpgsGp2P6rM=", | 1004 | "narHash": "sha256-xe3tfHp1aisnUVrCbn1axwpeJzcrSOvQNn1bZt6k5DM=", |
1005 | "owner": "Supreeeme", | 1005 | "owner": "Supreeeme", |
1006 | "repo": "xwayland-satellite", | 1006 | "repo": "xwayland-satellite", |
1007 | "rev": "f9ec97b007547ad80147404335ed22e880dbd69d", | 1007 | "rev": "1d98ee089c8bad414a346028a7a0f539ad7cfb9d", |
1008 | "type": "github" | 1008 | "type": "github" |
1009 | }, | 1009 | }, |
1010 | "original": { | 1010 | "original": { |
@@ -298,7 +298,7 @@ | |||
298 | forAllUsers = genAttrs (unique (map accountUserName (attrNames self.nixosModules.accounts))); | 298 | forAllUsers = genAttrs (unique (map accountUserName (attrNames self.nixosModules.accounts))); |
299 | 299 | ||
300 | activateNixosConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (mapAttrs' (hostName: nixosConfig: nameValuePair "${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${nixosConfig.config.system.build.toplevel}/bin/switch-to-configuration"; } else null)) self.nixosConfigurations)); | 300 | activateNixosConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (mapAttrs' (hostName: nixosConfig: nameValuePair "${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${nixosConfig.config.system.build.toplevel}/bin/switch-to-configuration"; } else null)) self.nixosConfigurations)); |
301 | startVMs = forAllSystems (system: pkgs: mapAttrs' (hostName: nixosConfig: nameValuePair "run-${hostName}-vm" { type = "app"; program = "${nixosConfig.config.system.build.vm}/bin/run-${hostName}-vm"; }) (nixImport rec { dir = ./hosts; _import = mkNixosConfiguration [ { config.virtualisation.host.pkgs = pkgs; } ] dir; })); | 301 | # startVMs = forAllSystems (system: pkgs: mapAttrs' (hostName: nixosConfig: nameValuePair "run-${hostName}-vm" { type = "app"; program = "${nixosConfig.config.system.build.vm}/bin/run-${hostName}-vm"; }) (nixImport rec { dir = ./hosts; _import = mkNixosConfiguration [ { config.virtualisation.host.pkgs = pkgs; } ] dir; })); |
302 | activateHomeManagerConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (listToAttrs (concatLists (mapAttrsToList (hostName: nixosConfig: mapAttrsToList (userName: userCfg: nameValuePair "${userName}@${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${userCfg.home.activationPackage}/activate"; } else null)) nixosConfig.config.home-manager.users) self.nixosConfigurations)))); | 302 | activateHomeManagerConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (listToAttrs (concatLists (mapAttrsToList (hostName: nixosConfig: mapAttrsToList (userName: userCfg: nameValuePair "${userName}@${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${userCfg.home.activationPackage}/activate"; } else null)) nixosConfig.config.home-manager.users) self.nixosConfigurations)))); |
303 | installerShells = system: pkgs: mapAttrs (installerName: config: pkgs.callPackage ./installer/shell.nix { | 303 | installerShells = system: pkgs: mapAttrs (installerName: config: pkgs.callPackage ./installer/shell.nix { |
304 | inherit system installerName config; | 304 | inherit system installerName config; |
@@ -346,7 +346,10 @@ | |||
346 | 346 | ||
347 | legacyPackages = forAllSystems (system: systemPkgs: systemPkgs.override { overlays = attrValues self.overlays; }); | 347 | legacyPackages = forAllSystems (system: systemPkgs: systemPkgs.override { overlays = attrValues self.overlays; }); |
348 | 348 | ||
349 | apps = foldr recursiveUpdate {} [startVMs activateNixosConfigurations activateHomeManagerConfigurations]; | 349 | apps = foldr recursiveUpdate {} [ |
350 | #startVMs | ||
351 | activateNixosConfigurations activateHomeManagerConfigurations | ||
352 | ]; | ||
350 | 353 | ||
351 | devShells = forAllSystems (system: systemPkgs: { default = import ./shell.nix ({ inherit system; } // inputs); } // installerShells system systemPkgs); | 354 | devShells = forAllSystems (system: systemPkgs: { default = import ./shell.nix ({ inherit system; } // inputs); } // installerShells system systemPkgs); |
352 | 355 | ||
diff --git a/hosts/surtr/email/default.nix b/hosts/surtr/email/default.nix index 4196a8bc..a85b76aa 100644 --- a/hosts/surtr/email/default.nix +++ b/hosts/surtr/email/default.nix | |||
@@ -484,6 +484,7 @@ in { | |||
484 | 484 | ||
485 | users.groups.${config.services.redis.servers.rspamd.user}.members = [ config.services.rspamd.user ]; | 485 | users.groups.${config.services.redis.servers.rspamd.user}.members = [ config.services.rspamd.user ]; |
486 | 486 | ||
487 | environment.systemPackages = with pkgs; [ dovecot_pigeonhole dovecot_fts_xapian ]; | ||
487 | services.dovecot2 = { | 488 | services.dovecot2 = { |
488 | enable = true; | 489 | enable = true; |
489 | enablePAM = false; | 490 | enablePAM = false; |
@@ -491,7 +492,6 @@ in { | |||
491 | sslServerKey = "/run/credentials/dovecot2.service/surtr.yggdrasil.li.key.pem"; | 492 | sslServerKey = "/run/credentials/dovecot2.service/surtr.yggdrasil.li.key.pem"; |
492 | sslCACert = toString ./ca/ca.crt; | 493 | sslCACert = toString ./ca/ca.crt; |
493 | mailLocation = "maildir:/var/lib/mail/%u/maildir:UTF-8:INDEX=/var/lib/dovecot/indices/%u"; | 494 | mailLocation = "maildir:/var/lib/mail/%u/maildir:UTF-8:INDEX=/var/lib/dovecot/indices/%u"; |
494 | modules = with pkgs; [ dovecot_pigeonhole dovecot_fts_xapian ]; | ||
495 | mailPlugins.globally.enable = [ "fts" "fts_xapian" ]; | 495 | mailPlugins.globally.enable = [ "fts" "fts_xapian" ]; |
496 | protocols = [ "lmtp" "sieve" ]; | 496 | protocols = [ "lmtp" "sieve" ]; |
497 | sieve = { | 497 | sieve = { |