summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGregor Kleen <gkleen@yggdrasil.li>2025-03-22 13:04:06 +0100
committerGregor Kleen <gkleen@yggdrasil.li>2025-03-22 13:04:06 +0100
commit2f3d52e6f54752ebe8eee86c789badfa87d2dd1f (patch)
treefe7cdcb008c8218a06089385d2eb26ebd4b27ca4
parent5af0209ca7f9e3ad965831ef3f7adedf58f0acb5 (diff)
downloadnixos-2f3d52e6f54752ebe8eee86c789badfa87d2dd1f.tar
nixos-2f3d52e6f54752ebe8eee86c789badfa87d2dd1f.tar.gz
nixos-2f3d52e6f54752ebe8eee86c789badfa87d2dd1f.tar.bz2
nixos-2f3d52e6f54752ebe8eee86c789badfa87d2dd1f.tar.xz
nixos-2f3d52e6f54752ebe8eee86c789badfa87d2dd1f.zip
...
-rw-r--r--_sources/generated.json14
-rw-r--r--_sources/generated.nix14
-rw-r--r--flake.lock52
-rw-r--r--flake.nix7
-rw-r--r--hosts/surtr/email/default.nix2
5 files changed, 46 insertions, 43 deletions
diff --git a/_sources/generated.json b/_sources/generated.json
index 80194b7f..c1af7cc8 100644
--- a/_sources/generated.json
+++ b/_sources/generated.json
@@ -99,7 +99,7 @@
99 }, 99 },
100 "mako": { 100 "mako": {
101 "cargoLocks": null, 101 "cargoLocks": null,
102 "date": "2025-03-07", 102 "date": "2025-03-21",
103 "extract": null, 103 "extract": null,
104 "name": "mako", 104 "name": "mako",
105 "passthru": null, 105 "passthru": null,
@@ -109,13 +109,13 @@
109 "fetchSubmodules": false, 109 "fetchSubmodules": false,
110 "leaveDotGit": false, 110 "leaveDotGit": false,
111 "name": null, 111 "name": null,
112 "rev": "91a1fc482b1ef8c45a64e38f13e0b23e84155f32", 112 "rev": "2a06a341efae601431a6944f94cfe4965a46cb44",
113 "sha256": "sha256-i91WGv1O5OZ0338/F2nkXUZ7xLD3N9Zxloeq3sDt04w=", 113 "sha256": "sha256-QH2rxJcNiurHFEtkmq6Ki15k11b6ft6WYiZKbGs7SS0=",
114 "sparseCheckout": [], 114 "sparseCheckout": [],
115 "type": "git", 115 "type": "git",
116 "url": "https://github.com/emersion/mako" 116 "url": "https://github.com/emersion/mako"
117 }, 117 },
118 "version": "91a1fc482b1ef8c45a64e38f13e0b23e84155f32" 118 "version": "2a06a341efae601431a6944f94cfe4965a46cb44"
119 }, 119 },
120 "mpv-autosave": { 120 "mpv-autosave": {
121 "cargoLocks": null, 121 "cargoLocks": null,
@@ -456,10 +456,10 @@
456 "pinned": false, 456 "pinned": false,
457 "src": { 457 "src": {
458 "name": null, 458 "name": null,
459 "sha256": "sha256-8zynbfLk2zGIDy/kCNRPUFjZ8TUBWxPlBhDfvngkW+o=", 459 "sha256": "sha256-W89HsolyVOo4FpNajd5H0kO/9VZ4LM7WsWorhea2gro=",
460 "type": "url", 460 "type": "url",
461 "url": "https://pypi.org/packages/source/y/yt_dlp/yt_dlp-2025.2.19.tar.gz" 461 "url": "https://pypi.org/packages/source/y/yt_dlp/yt_dlp-2025.3.21.tar.gz"
462 }, 462 },
463 "version": "2025.2.19" 463 "version": "2025.3.21"
464 } 464 }
465} \ No newline at end of file 465} \ No newline at end of file
diff --git a/_sources/generated.nix b/_sources/generated.nix
index 0dcedc0e..b0cf46e5 100644
--- a/_sources/generated.nix
+++ b/_sources/generated.nix
@@ -61,17 +61,17 @@
61 }; 61 };
62 mako = { 62 mako = {
63 pname = "mako"; 63 pname = "mako";
64 version = "91a1fc482b1ef8c45a64e38f13e0b23e84155f32"; 64 version = "2a06a341efae601431a6944f94cfe4965a46cb44";
65 src = fetchgit { 65 src = fetchgit {
66 url = "https://github.com/emersion/mako"; 66 url = "https://github.com/emersion/mako";
67 rev = "91a1fc482b1ef8c45a64e38f13e0b23e84155f32"; 67 rev = "2a06a341efae601431a6944f94cfe4965a46cb44";
68 fetchSubmodules = false; 68 fetchSubmodules = false;
69 deepClone = false; 69 deepClone = false;
70 leaveDotGit = false; 70 leaveDotGit = false;
71 sparseCheckout = [ ]; 71 sparseCheckout = [ ];
72 sha256 = "sha256-i91WGv1O5OZ0338/F2nkXUZ7xLD3N9Zxloeq3sDt04w="; 72 sha256 = "sha256-QH2rxJcNiurHFEtkmq6Ki15k11b6ft6WYiZKbGs7SS0=";
73 }; 73 };
74 date = "2025-03-07"; 74 date = "2025-03-21";
75 }; 75 };
76 mpv-autosave = { 76 mpv-autosave = {
77 pname = "mpv-autosave"; 77 pname = "mpv-autosave";
@@ -278,10 +278,10 @@
278 }; 278 };
279 yt-dlp = { 279 yt-dlp = {
280 pname = "yt-dlp"; 280 pname = "yt-dlp";
281 version = "2025.2.19"; 281 version = "2025.3.21";
282 src = fetchurl { 282 src = fetchurl {
283 url = "https://pypi.org/packages/source/y/yt_dlp/yt_dlp-2025.2.19.tar.gz"; 283 url = "https://pypi.org/packages/source/y/yt_dlp/yt_dlp-2025.3.21.tar.gz";
284 sha256 = "sha256-8zynbfLk2zGIDy/kCNRPUFjZ8TUBWxPlBhDfvngkW+o="; 284 sha256 = "sha256-W89HsolyVOo4FpNajd5H0kO/9VZ4LM7WsWorhea2gro=";
285 }; 285 };
286 }; 286 };
287} 287}
diff --git a/flake.lock b/flake.lock
index 4f3e02a1..593f8eee 100644
--- a/flake.lock
+++ b/flake.lock
@@ -397,11 +397,11 @@
397 "xwayland-satellite-unstable": "xwayland-satellite-unstable" 397 "xwayland-satellite-unstable": "xwayland-satellite-unstable"
398 }, 398 },
399 "locked": { 399 "locked": {
400 "lastModified": 1742108116, 400 "lastModified": 1742636890,
401 "narHash": "sha256-NrV9ysEfSbeRUPo0jdCBeesuNLTVrpHGXg40snH1YGE=", 401 "narHash": "sha256-FDMxPw/9LNkH9N+FBbUO7gRX70rrp/347YSTkkxBq9I=",
402 "owner": "sodiboo", 402 "owner": "sodiboo",
403 "repo": "niri-flake", 403 "repo": "niri-flake",
404 "rev": "824f10012de455a1d0ef795a605f28948ee10467", 404 "rev": "93d595a2484ee3c7a55a2b4cbb0660ad280eeb9b",
405 "type": "github" 405 "type": "github"
406 }, 406 },
407 "original": { 407 "original": {
@@ -431,11 +431,11 @@
431 "niri-unstable": { 431 "niri-unstable": {
432 "flake": false, 432 "flake": false,
433 "locked": { 433 "locked": {
434 "lastModified": 1742103165, 434 "lastModified": 1742631227,
435 "narHash": "sha256-zAzMwvozlS2gmqdhrgeMz0PNp3kRDkwxIEfqWT3Hj6g=", 435 "narHash": "sha256-iignxt2VAXMbJuzwJ4+k4T++vduDyhO5BTGi9PDd8fE=",
436 "owner": "YaLTeR", 436 "owner": "YaLTeR",
437 "repo": "niri", 437 "repo": "niri",
438 "rev": "287480b541e85b13ff6419d372f82fa8e42c603c", 438 "rev": "f95d5a82df89d3f09e818091a853b3608eaa5831",
439 "type": "github" 439 "type": "github"
440 }, 440 },
441 "original": { 441 "original": {
@@ -472,11 +472,11 @@
472 ] 472 ]
473 }, 473 },
474 "locked": { 474 "locked": {
475 "lastModified": 1742096597, 475 "lastModified": 1742174123,
476 "narHash": "sha256-CUy00dj513aIvtN2NGiDKLCVEQSz4xHWSDf229EiJdU=", 476 "narHash": "sha256-pDNzMoR6m1ZSJToZQ6XDTLVSdzIzmFl1b8Pc3f7iV6Y=",
477 "owner": "Mic92", 477 "owner": "Mic92",
478 "repo": "nix-index-database", 478 "repo": "nix-index-database",
479 "rev": "5c77c6d6f2e8cc6007c2b1a4df1a507834404a67", 479 "rev": "2cfb4e1ca32f59dd2811d7a6dd5d4d1225f0955c",
480 "type": "github" 480 "type": "github"
481 }, 481 },
482 "original": { 482 "original": {
@@ -508,11 +508,11 @@
508 }, 508 },
509 "nixos-hardware": { 509 "nixos-hardware": {
510 "locked": { 510 "locked": {
511 "lastModified": 1741792691, 511 "lastModified": 1742631601,
512 "narHash": "sha256-f0BVt1/cvA0DQ/q3rB+HY4g4tKksd03ZkzI4xehC2Ew=", 512 "narHash": "sha256-yJ3OOAmsGAxSl0bTmKUp3+cEYtSS+V6hUPK2rYhIPr8=",
513 "owner": "NixOS", 513 "owner": "NixOS",
514 "repo": "nixos-hardware", 514 "repo": "nixos-hardware",
515 "rev": "e1f12151258b12c567f456d8248e4694e9390613", 515 "rev": "380ed15bcd6440606c6856db44a99140d422b46f",
516 "type": "github" 516 "type": "github"
517 }, 517 },
518 "original": { 518 "original": {
@@ -630,11 +630,11 @@
630 }, 630 },
631 "nixpkgs-stable_2": { 631 "nixpkgs-stable_2": {
632 "locked": { 632 "locked": {
633 "lastModified": 1741862977, 633 "lastModified": 1742512142,
634 "narHash": "sha256-prZ0M8vE/ghRGGZcflvxCu40ObKaB+ikn74/xQoNrGQ=", 634 "narHash": "sha256-8XfURTDxOm6+33swQJu/hx6xw1Tznl8vJJN5HwVqckg=",
635 "owner": "NixOS", 635 "owner": "NixOS",
636 "repo": "nixpkgs", 636 "repo": "nixpkgs",
637 "rev": "cdd2ef009676ac92b715ff26630164bb88fec4e0", 637 "rev": "7105ae3957700a9646cc4b766f5815b23ed0c682",
638 "type": "github" 638 "type": "github"
639 }, 639 },
640 "original": { 640 "original": {
@@ -678,11 +678,11 @@
678 }, 678 },
679 "nixpkgs_2": { 679 "nixpkgs_2": {
680 "locked": { 680 "locked": {
681 "lastModified": 1742069588, 681 "lastModified": 1742422364,
682 "narHash": "sha256-C7jVfohcGzdZRF6DO+ybyG/sqpo1h6bZi9T56sxLy+k=", 682 "narHash": "sha256-mNqIplmEohk5jRkqYqG19GA8MbQ/D4gQSK0Mu4LvfRQ=",
683 "owner": "NixOS", 683 "owner": "NixOS",
684 "repo": "nixpkgs", 684 "repo": "nixpkgs",
685 "rev": "c80f6a7e10b39afcc1894e02ef785b1ad0b0d7e5", 685 "rev": "a84ebe20c6bc2ecbcfb000a50776219f48d134cc",
686 "type": "github" 686 "type": "github"
687 }, 687 },
688 "original": { 688 "original": {
@@ -748,11 +748,11 @@
748 "treefmt-nix": "treefmt-nix" 748 "treefmt-nix": "treefmt-nix"
749 }, 749 },
750 "locked": { 750 "locked": {
751 "lastModified": 1741790785, 751 "lastModified": 1742397518,
752 "narHash": "sha256-nzgO/ZCSBzWjbMkYDxG+yl9Z2eGbCgQu06Oku3ir5D4=", 752 "narHash": "sha256-nzgO/ZCSBzWjbMkYDxG+yl9Z2eGbCgQu06Oku3ir5D4=",
753 "owner": "nix-community", 753 "owner": "nix-community",
754 "repo": "poetry2nix", 754 "repo": "poetry2nix",
755 "rev": "f842aae3a72ef764e38eaf3e75aa435fb9861bba", 755 "rev": "b9a98080beff0903a5e5fe431f42cde1e3e50d6b",
756 "type": "github" 756 "type": "github"
757 }, 757 },
758 "original": { 758 "original": {
@@ -891,11 +891,11 @@
891 ] 891 ]
892 }, 892 },
893 "locked": { 893 "locked": {
894 "lastModified": 1741861888, 894 "lastModified": 1742595978,
895 "narHash": "sha256-ynOgXAyToeE1UdLNfrUn/hL7MN0OpIS2BtNdLjpjPf0=", 895 "narHash": "sha256-05onsoMrLyXE4XleDCeLC3bXnC4nyUbKWInGwM7v6hU=",
896 "owner": "Mic92", 896 "owner": "Mic92",
897 "repo": "sops-nix", 897 "repo": "sops-nix",
898 "rev": "d016ce0365b87d848a57c12ffcfdc71da7a2b55f", 898 "rev": "b7756921b002de60fb66782effad3ce8bdb5b25d",
899 "type": "github" 899 "type": "github"
900 }, 900 },
901 "original": { 901 "original": {
@@ -1000,11 +1000,11 @@
1000 "xwayland-satellite-unstable": { 1000 "xwayland-satellite-unstable": {
1001 "flake": false, 1001 "flake": false,
1002 "locked": { 1002 "locked": {
1003 "lastModified": 1742083780, 1003 "lastModified": 1742475924,
1004 "narHash": "sha256-cVLagXvI4jFbCe76tpvAWA2N2WF94Pl0PpgsGp2P6rM=", 1004 "narHash": "sha256-xe3tfHp1aisnUVrCbn1axwpeJzcrSOvQNn1bZt6k5DM=",
1005 "owner": "Supreeeme", 1005 "owner": "Supreeeme",
1006 "repo": "xwayland-satellite", 1006 "repo": "xwayland-satellite",
1007 "rev": "f9ec97b007547ad80147404335ed22e880dbd69d", 1007 "rev": "1d98ee089c8bad414a346028a7a0f539ad7cfb9d",
1008 "type": "github" 1008 "type": "github"
1009 }, 1009 },
1010 "original": { 1010 "original": {
diff --git a/flake.nix b/flake.nix
index 4e119e98..1cc9782c 100644
--- a/flake.nix
+++ b/flake.nix
@@ -298,7 +298,7 @@
298 forAllUsers = genAttrs (unique (map accountUserName (attrNames self.nixosModules.accounts))); 298 forAllUsers = genAttrs (unique (map accountUserName (attrNames self.nixosModules.accounts)));
299 299
300 activateNixosConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (mapAttrs' (hostName: nixosConfig: nameValuePair "${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${nixosConfig.config.system.build.toplevel}/bin/switch-to-configuration"; } else null)) self.nixosConfigurations)); 300 activateNixosConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (mapAttrs' (hostName: nixosConfig: nameValuePair "${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${nixosConfig.config.system.build.toplevel}/bin/switch-to-configuration"; } else null)) self.nixosConfigurations));
301 startVMs = forAllSystems (system: pkgs: mapAttrs' (hostName: nixosConfig: nameValuePair "run-${hostName}-vm" { type = "app"; program = "${nixosConfig.config.system.build.vm}/bin/run-${hostName}-vm"; }) (nixImport rec { dir = ./hosts; _import = mkNixosConfiguration [ { config.virtualisation.host.pkgs = pkgs; } ] dir; })); 301 # startVMs = forAllSystems (system: pkgs: mapAttrs' (hostName: nixosConfig: nameValuePair "run-${hostName}-vm" { type = "app"; program = "${nixosConfig.config.system.build.vm}/bin/run-${hostName}-vm"; }) (nixImport rec { dir = ./hosts; _import = mkNixosConfiguration [ { config.virtualisation.host.pkgs = pkgs; } ] dir; }));
302 activateHomeManagerConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (listToAttrs (concatLists (mapAttrsToList (hostName: nixosConfig: mapAttrsToList (userName: userCfg: nameValuePair "${userName}@${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${userCfg.home.activationPackage}/activate"; } else null)) nixosConfig.config.home-manager.users) self.nixosConfigurations)))); 302 activateHomeManagerConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (listToAttrs (concatLists (mapAttrsToList (hostName: nixosConfig: mapAttrsToList (userName: userCfg: nameValuePair "${userName}@${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${userCfg.home.activationPackage}/activate"; } else null)) nixosConfig.config.home-manager.users) self.nixosConfigurations))));
303 installerShells = system: pkgs: mapAttrs (installerName: config: pkgs.callPackage ./installer/shell.nix { 303 installerShells = system: pkgs: mapAttrs (installerName: config: pkgs.callPackage ./installer/shell.nix {
304 inherit system installerName config; 304 inherit system installerName config;
@@ -346,7 +346,10 @@
346 346
347 legacyPackages = forAllSystems (system: systemPkgs: systemPkgs.override { overlays = attrValues self.overlays; }); 347 legacyPackages = forAllSystems (system: systemPkgs: systemPkgs.override { overlays = attrValues self.overlays; });
348 348
349 apps = foldr recursiveUpdate {} [startVMs activateNixosConfigurations activateHomeManagerConfigurations]; 349 apps = foldr recursiveUpdate {} [
350 #startVMs
351 activateNixosConfigurations activateHomeManagerConfigurations
352 ];
350 353
351 devShells = forAllSystems (system: systemPkgs: { default = import ./shell.nix ({ inherit system; } // inputs); } // installerShells system systemPkgs); 354 devShells = forAllSystems (system: systemPkgs: { default = import ./shell.nix ({ inherit system; } // inputs); } // installerShells system systemPkgs);
352 355
diff --git a/hosts/surtr/email/default.nix b/hosts/surtr/email/default.nix
index 4196a8bc..a85b76aa 100644
--- a/hosts/surtr/email/default.nix
+++ b/hosts/surtr/email/default.nix
@@ -484,6 +484,7 @@ in {
484 484
485 users.groups.${config.services.redis.servers.rspamd.user}.members = [ config.services.rspamd.user ]; 485 users.groups.${config.services.redis.servers.rspamd.user}.members = [ config.services.rspamd.user ];
486 486
487 environment.systemPackages = with pkgs; [ dovecot_pigeonhole dovecot_fts_xapian ];
487 services.dovecot2 = { 488 services.dovecot2 = {
488 enable = true; 489 enable = true;
489 enablePAM = false; 490 enablePAM = false;
@@ -491,7 +492,6 @@ in {
491 sslServerKey = "/run/credentials/dovecot2.service/surtr.yggdrasil.li.key.pem"; 492 sslServerKey = "/run/credentials/dovecot2.service/surtr.yggdrasil.li.key.pem";
492 sslCACert = toString ./ca/ca.crt; 493 sslCACert = toString ./ca/ca.crt;
493 mailLocation = "maildir:/var/lib/mail/%u/maildir:UTF-8:INDEX=/var/lib/dovecot/indices/%u"; 494 mailLocation = "maildir:/var/lib/mail/%u/maildir:UTF-8:INDEX=/var/lib/dovecot/indices/%u";
494 modules = with pkgs; [ dovecot_pigeonhole dovecot_fts_xapian ];
495 mailPlugins.globally.enable = [ "fts" "fts_xapian" ]; 495 mailPlugins.globally.enable = [ "fts" "fts_xapian" ];
496 protocols = [ "lmtp" "sieve" ]; 496 protocols = [ "lmtp" "sieve" ];
497 sieve = { 497 sieve = {