remove nixpkgs channels which are not needed anymore
This commit is contained in:
parent
c5b5857a39
commit
bd674ce4eb
18 changed files with 41 additions and 102 deletions
51
flake.lock
51
flake.lock
|
@ -630,38 +630,6 @@
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs-legacy_2105": {
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1659914493,
|
|
||||||
"narHash": "sha256-lkA5X3VNMKirvA+SUzvEhfA7XquWLci+CGi505YFAIs=",
|
|
||||||
"owner": "nixos",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"rev": "022caabb5f2265ad4006c1fa5b1ebe69fb0c3faf",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "nixos",
|
|
||||||
"ref": "nixos-21.05",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"nixpkgs-legacy_2205": {
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1685573264,
|
|
||||||
"narHash": "sha256-Zffu01pONhs/pqH07cjlF10NnMDLok8ix5Uk4rhOnZQ=",
|
|
||||||
"owner": "nixos",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"rev": "380be19fbd2d9079f677978361792cb25e8a3635",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "nixos",
|
|
||||||
"ref": "nixos-22.05",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"nixpkgs-legacy_2211": {
|
"nixpkgs-legacy_2211": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1688392541,
|
"lastModified": 1688392541,
|
||||||
|
@ -678,22 +646,6 @@
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs-legacy_2305": {
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1704290814,
|
|
||||||
"narHash": "sha256-LWvKHp7kGxk/GEtlrGYV68qIvPHkU9iToomNFGagixU=",
|
|
||||||
"owner": "nixos",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"rev": "70bdadeb94ffc8806c0570eb5c2695ad29f0e421",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "nixos",
|
|
||||||
"ref": "nixos-23.05",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"nixpkgs-legacy_2311": {
|
"nixpkgs-legacy_2311": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1717530100,
|
"lastModified": 1717530100,
|
||||||
|
@ -950,10 +902,7 @@
|
||||||
"nixos-anywhere": "nixos-anywhere",
|
"nixos-anywhere": "nixos-anywhere",
|
||||||
"nixos-hardware": "nixos-hardware",
|
"nixos-hardware": "nixos-hardware",
|
||||||
"nixpkgs": "nixpkgs_5",
|
"nixpkgs": "nixpkgs_5",
|
||||||
"nixpkgs-legacy_2105": "nixpkgs-legacy_2105",
|
|
||||||
"nixpkgs-legacy_2205": "nixpkgs-legacy_2205",
|
|
||||||
"nixpkgs-legacy_2211": "nixpkgs-legacy_2211",
|
"nixpkgs-legacy_2211": "nixpkgs-legacy_2211",
|
||||||
"nixpkgs-legacy_2305": "nixpkgs-legacy_2305",
|
|
||||||
"nixpkgs-legacy_2311": "nixpkgs-legacy_2311",
|
"nixpkgs-legacy_2311": "nixpkgs-legacy_2311",
|
||||||
"overviewer": "overviewer",
|
"overviewer": "overviewer",
|
||||||
"permown": "permown",
|
"permown": "permown",
|
||||||
|
|
23
flake.nix
23
flake.nix
|
@ -22,10 +22,7 @@
|
||||||
};
|
};
|
||||||
|
|
||||||
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
|
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
|
||||||
nixpkgs-legacy_2105.url = "github:nixos/nixpkgs/nixos-21.05";
|
|
||||||
nixpkgs-legacy_2205.url = "github:nixos/nixpkgs/nixos-22.05";
|
|
||||||
nixpkgs-legacy_2211.url = "github:nixos/nixpkgs/nixos-22.11";
|
nixpkgs-legacy_2211.url = "github:nixos/nixpkgs/nixos-22.11";
|
||||||
nixpkgs-legacy_2305.url = "github:nixos/nixpkgs/nixos-23.05";
|
|
||||||
nixpkgs-legacy_2311.url = "github:nixos/nixpkgs/nixos-23.11";
|
nixpkgs-legacy_2311.url = "github:nixos/nixpkgs/nixos-23.11";
|
||||||
nixos-hardware.url = "github:nixos/nixos-hardware";
|
nixos-hardware.url = "github:nixos/nixos-hardware";
|
||||||
nixos-anywhere.url = "github:nix-community/nixos-anywhere";
|
nixos-anywhere.url = "github:nix-community/nixos-anywhere";
|
||||||
|
@ -112,10 +109,7 @@
|
||||||
, nixos-anywhere
|
, nixos-anywhere
|
||||||
, nixos-hardware
|
, nixos-hardware
|
||||||
, nixpkgs
|
, nixpkgs
|
||||||
, nixpkgs-legacy_2105
|
|
||||||
, nixpkgs-legacy_2205
|
|
||||||
, nixpkgs-legacy_2211
|
, nixpkgs-legacy_2211
|
||||||
, nixpkgs-legacy_2305
|
|
||||||
, nixpkgs-legacy_2311
|
, nixpkgs-legacy_2311
|
||||||
, overviewer
|
, overviewer
|
||||||
, permown
|
, permown
|
||||||
|
@ -147,15 +141,14 @@
|
||||||
];
|
];
|
||||||
overlays = [
|
overlays = [
|
||||||
(_self: _super: {
|
(_self: _super: {
|
||||||
# todo : remove this, we are on unstable in the future
|
legacy_2211 = import nixpkgs-legacy_2211 {
|
||||||
unstable = import nixpkgs {
|
inherit system;
|
||||||
|
config.allowUnfree = true;
|
||||||
|
};
|
||||||
|
legacy_2311 = import nixpkgs-legacy_2311 {
|
||||||
inherit system;
|
inherit system;
|
||||||
config.allowUnfree = true;
|
config.allowUnfree = true;
|
||||||
};
|
};
|
||||||
legacy_2205 = import nixpkgs-legacy_2205 { inherit system; };
|
|
||||||
legacy_2211 = import nixpkgs-legacy_2211 { inherit system; };
|
|
||||||
legacy_2305 = import nixpkgs-legacy_2305 { inherit system; };
|
|
||||||
legacy_2311 = import nixpkgs-legacy_2311 { inherit system; };
|
|
||||||
polygon-art = polygon-art.packages.${system};
|
polygon-art = polygon-art.packages.${system};
|
||||||
landingpage = landingpage.packages.${system}.plain;
|
landingpage = landingpage.packages.${system}.plain;
|
||||||
kmonad = kmonad.packages.${system}.kmonad;
|
kmonad = kmonad.packages.${system}.kmonad;
|
||||||
|
@ -224,7 +217,7 @@
|
||||||
];
|
];
|
||||||
})
|
})
|
||||||
# configure nix
|
# configure nix
|
||||||
({ pkgs, ... }:
|
({ pkgs, lib, ... }:
|
||||||
{
|
{
|
||||||
nix.settings.substituters = [ "https://cache.nixos.org/" ];
|
nix.settings.substituters = [ "https://cache.nixos.org/" ];
|
||||||
nix.settings.experimental-features = [ "nix-command" "flakes" ];
|
nix.settings.experimental-features = [ "nix-command" "flakes" ];
|
||||||
|
@ -232,6 +225,10 @@
|
||||||
# no channesl needed this way
|
# no channesl needed this way
|
||||||
nix.nixPath = [ "nixpkgs=${pkgs.path}" ];
|
nix.nixPath = [ "nixpkgs=${pkgs.path}" ];
|
||||||
documentation.nixos.enable = true;
|
documentation.nixos.enable = true;
|
||||||
|
|
||||||
|
boot.loader.systemd-boot.configurationLimit = lib.mkDefault 10;
|
||||||
|
boot.loader.generic-extlinux-compatible.configurationLimit = lib.mkDefault 10;
|
||||||
|
boot.loader.grub.configurationLimit = lib.mkDefault 10;
|
||||||
})
|
})
|
||||||
# some modules I always use
|
# some modules I always use
|
||||||
permown.nixosModules.permown
|
permown.nixosModules.permown
|
||||||
|
|
|
@ -10,7 +10,7 @@
|
||||||
|
|
||||||
# only needed if you have an UHK
|
# only needed if you have an UHK
|
||||||
hardware.keyboard.uhk.enable = true;
|
hardware.keyboard.uhk.enable = true;
|
||||||
environment.systemPackages = [ pkgs.unstable.uhk-agent ];
|
environment.systemPackages = [ pkgs.uhk-agent ];
|
||||||
users.users.mainUser.extraGroups = [ "input" ];
|
users.users.mainUser.extraGroups = [ "input" ];
|
||||||
|
|
||||||
services.xserver = {
|
services.xserver = {
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
with lib;
|
with lib;
|
||||||
|
|
||||||
let
|
let
|
||||||
obs-cmd = pkgs.unstable.rustPlatform.buildRustPackage
|
obs-cmd = pkgs.rustPlatform.buildRustPackage
|
||||||
rec {
|
rec {
|
||||||
pname = "obs-cmd";
|
pname = "obs-cmd";
|
||||||
version = "v0.15.2";
|
version = "v0.15.2";
|
||||||
|
@ -128,8 +128,8 @@ in
|
||||||
boot.extraModulePackages = [ pkgs.linuxPackages.v4l2loopback ];
|
boot.extraModulePackages = [ pkgs.linuxPackages.v4l2loopback ];
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
unstable.youtube-dl
|
youtube-dl
|
||||||
unstable.yt-dlp
|
yt-dlp
|
||||||
mplayer
|
mplayer
|
||||||
mpv
|
mpv
|
||||||
mpvReview
|
mpvReview
|
||||||
|
@ -140,7 +140,7 @@ in
|
||||||
|
|
||||||
|
|
||||||
# obs studio stuff
|
# obs studio stuff
|
||||||
unstable.obs-cli
|
obs-cli
|
||||||
v4l-utils
|
v4l-utils
|
||||||
obs-cmd
|
obs-cmd
|
||||||
|
|
||||||
|
|
|
@ -38,7 +38,7 @@ in
|
||||||
(mkIf config.components.monitor.opentelemetry.enable {
|
(mkIf config.components.monitor.opentelemetry.enable {
|
||||||
services.opentelemetry-collector = {
|
services.opentelemetry-collector = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.unstable.opentelemetry-collector-contrib;
|
package = pkgs.opentelemetry-collector-contrib;
|
||||||
};
|
};
|
||||||
})
|
})
|
||||||
|
|
||||||
|
|
|
@ -12,7 +12,7 @@ with lib;
|
||||||
(pkgs.writers.writeBashBin "heygpt" ''
|
(pkgs.writers.writeBashBin "heygpt" ''
|
||||||
export OPENAI_API_BASE="https://api.openai.com/v1"
|
export OPENAI_API_BASE="https://api.openai.com/v1"
|
||||||
export OPENAI_API_KEY=$(pass openai/apikey)
|
export OPENAI_API_KEY=$(pass openai/apikey)
|
||||||
${lib.getExe pkgs.unstable.heygpt} "$@"
|
${lib.getExe pkgs.heygpt} "$@"
|
||||||
'')
|
'')
|
||||||
(pkgs.writers.writeBashBin "heygpt-models" ''
|
(pkgs.writers.writeBashBin "heygpt-models" ''
|
||||||
export OPENAI_API_KEY=$(pass openai/apikey)
|
export OPENAI_API_KEY=$(pass openai/apikey)
|
||||||
|
|
|
@ -372,7 +372,7 @@ let
|
||||||
createDashboard = { json, name }:
|
createDashboard = { json, name }:
|
||||||
let configuration = pkgs.writeText "config.yml" (builtins.toJSON json);
|
let configuration = pkgs.writeText "config.yml" (builtins.toJSON json);
|
||||||
in pkgs.writers.writeBashBin name ''
|
in pkgs.writers.writeBashBin name ''
|
||||||
${pkgs.unstable.wtf}/bin/wtfutil --config=${toString configuration}
|
${pkgs.wtf}/bin/wtfutil --config=${toString configuration}
|
||||||
'';
|
'';
|
||||||
|
|
||||||
in
|
in
|
||||||
|
@ -387,7 +387,7 @@ in
|
||||||
services.upower.enable = true;
|
services.upower.enable = true;
|
||||||
|
|
||||||
environment.systemPackages = [
|
environment.systemPackages = [
|
||||||
pkgs.unstable.wtf
|
pkgs.wtf
|
||||||
(createDashboard {
|
(createDashboard {
|
||||||
json = qJson;
|
json = qJson;
|
||||||
name = "q";
|
name = "q";
|
||||||
|
|
|
@ -31,9 +31,9 @@ with lib;
|
||||||
killall
|
killall
|
||||||
nix-tree
|
nix-tree
|
||||||
|
|
||||||
unstable.vulnix
|
vulnix
|
||||||
(writers.writeBashBin "vulnix-system" ''
|
(writers.writeBashBin "vulnix-system" ''
|
||||||
${unstable.vulnix}/bin/vulnix --profile /nix/var/nix/profiles/system
|
${vulnix}/bin/vulnix --profile /nix/var/nix/profiles/system
|
||||||
'')
|
'')
|
||||||
];
|
];
|
||||||
|
|
||||||
|
|
|
@ -36,8 +36,8 @@
|
||||||
enable = true;
|
enable = true;
|
||||||
enableBashIntegration = true;
|
enableBashIntegration = true;
|
||||||
enableZshIntegration = true;
|
enableZshIntegration = true;
|
||||||
#package = pkgs.unstable.atuin;
|
#package = pkgs.atuin;
|
||||||
package = pkgs.unstable.atuin.overrideAttrs (_old: {
|
package = pkgs.atuin.overrideAttrs (_old: {
|
||||||
# as cursed as doing mitigations=off in the kernel command line
|
# as cursed as doing mitigations=off in the kernel command line
|
||||||
patches = [ "${assets}/0001-make-atuin-on-zfs-fast-again.patch" ];
|
patches = [ "${assets}/0001-make-atuin-on-zfs-fast-again.patch" ];
|
||||||
});
|
});
|
||||||
|
|
|
@ -10,22 +10,21 @@ with lib;
|
||||||
home.packages = [
|
home.packages = [
|
||||||
|
|
||||||
# general
|
# general
|
||||||
unstable.jetbrains.idea-ultimate
|
jetbrains.idea-ultimate
|
||||||
#vscode
|
#vscode
|
||||||
|
|
||||||
jetbrains.mps
|
jetbrains.mps
|
||||||
|
jetbrains.datagrip
|
||||||
unstable.jetbrains.datagrip
|
|
||||||
|
|
||||||
# Rust
|
# Rust
|
||||||
# ----
|
# ----
|
||||||
unstable.jetbrains.clion
|
jetbrains.clion
|
||||||
gcc
|
gcc
|
||||||
rustup
|
rustup
|
||||||
|
|
||||||
# Python
|
# Python
|
||||||
# ------
|
# ------
|
||||||
unstable.jetbrains.pycharm-professional
|
jetbrains.pycharm-professional
|
||||||
|
|
||||||
# planing
|
# planing
|
||||||
((ganttproject-bin.override {
|
((ganttproject-bin.override {
|
||||||
|
@ -87,14 +86,14 @@ with lib;
|
||||||
miller
|
miller
|
||||||
|
|
||||||
# nomad
|
# nomad
|
||||||
unstable.nomad
|
nomad
|
||||||
unstable.vault
|
vault
|
||||||
unstable.consul
|
consul
|
||||||
wander
|
wander
|
||||||
|
|
||||||
# terraform
|
# terraform
|
||||||
unstable.terragrunt
|
terragrunt
|
||||||
unstable.terraform
|
terraform
|
||||||
terraform-docs
|
terraform-docs
|
||||||
awscli2
|
awscli2
|
||||||
|
|
||||||
|
@ -102,7 +101,7 @@ with lib;
|
||||||
python3Full
|
python3Full
|
||||||
pipenv
|
pipenv
|
||||||
|
|
||||||
unstable.mdbook
|
mdbook
|
||||||
|
|
||||||
nodePackages.prettier
|
nodePackages.prettier
|
||||||
shfmt
|
shfmt
|
||||||
|
|
|
@ -42,7 +42,7 @@ with lib;
|
||||||
|
|
||||||
nginx-config-formatter
|
nginx-config-formatter
|
||||||
|
|
||||||
unstable.yt-dlp
|
yt-dlp
|
||||||
|
|
||||||
OSCAR
|
OSCAR
|
||||||
|
|
||||||
|
|
|
@ -74,7 +74,7 @@ in
|
||||||
taskwarrior-hooks
|
taskwarrior-hooks
|
||||||
(pkgs.writeShellScriptBin "tsak" ''${pkgs.taskwarrior}/bin/task "$@"'')
|
(pkgs.writeShellScriptBin "tsak" ''${pkgs.taskwarrior}/bin/task "$@"'')
|
||||||
|
|
||||||
unstable.vit
|
vit
|
||||||
(pkgs.writers.writeBashBin "active" "${taskwarrior-tui}/bin/taskwarrior-tui -r active")
|
(pkgs.writers.writeBashBin "active" "${taskwarrior-tui}/bin/taskwarrior-tui -r active")
|
||||||
(pkgs.writers.writeBashBin "todo" "${taskwarrior-tui}/bin/taskwarrior-tui -r todo")
|
(pkgs.writers.writeBashBin "todo" "${taskwarrior-tui}/bin/taskwarrior-tui -r todo")
|
||||||
|
|
||||||
|
|
|
@ -19,7 +19,7 @@ with lib;
|
||||||
|
|
||||||
bitwarden
|
bitwarden
|
||||||
|
|
||||||
unstable.yt-dlp
|
yt-dlp
|
||||||
|
|
||||||
# office
|
# office
|
||||||
pdfarranger
|
pdfarranger
|
||||||
|
|
|
@ -5,9 +5,9 @@
|
||||||
youtube-dl
|
youtube-dl
|
||||||
ipset # for sshguard
|
ipset # for sshguard
|
||||||
|
|
||||||
unstable.vulnix
|
vulnix
|
||||||
(pkgs.writers.writeBashBin "vulnix-system" ''
|
(pkgs.writers.writeBashBin "vulnix-system" ''
|
||||||
${pkgs.unstable.vulnix}/bin/vulnix --profile /nix/var/nix/profiles/system
|
${pkgs.vulnix}/bin/vulnix --profile /nix/var/nix/profiles/system
|
||||||
'')
|
'')
|
||||||
|
|
||||||
];
|
];
|
||||||
|
|
|
@ -26,7 +26,7 @@ in
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
Type = "simple";
|
Type = "simple";
|
||||||
WorkingDirectory = "/srv/audiobookshelf";
|
WorkingDirectory = "/srv/audiobookshelf";
|
||||||
ExecStart = "${unstable.audiobookshelf}/bin/audiobookshelf --port ${toString port}";
|
ExecStart = "${audiobookshelf}/bin/audiobookshelf --port ${toString port}";
|
||||||
ExecReload = "${util-linux}/bin/kill -HUP $MAINPID";
|
ExecReload = "${util-linux}/bin/kill -HUP $MAINPID";
|
||||||
Restart = "always";
|
Restart = "always";
|
||||||
User = config.users.users.audiobookshelf.name;
|
User = config.users.users.audiobookshelf.name;
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
{ config, pkgs, assets, ... }: {
|
{ config, pkgs, assets, ... }: {
|
||||||
services.atuin = {
|
services.atuin = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.unstable.atuin.overrideAttrs (_old: {
|
package = pkgs.atuin.overrideAttrs (_old: {
|
||||||
# as cursed as doing mitigations=off in the kernel command line
|
# as cursed as doing mitigations=off in the kernel command line
|
||||||
patches = [ "${assets}/0001-make-atuin-on-zfs-fast-again.patch" ];
|
patches = [ "${assets}/0001-make-atuin-on-zfs-fast-again.patch" ];
|
||||||
});
|
});
|
||||||
|
|
|
@ -3,6 +3,6 @@
|
||||||
services.vault = {
|
services.vault = {
|
||||||
enable = true;
|
enable = true;
|
||||||
#adress = "chungus.private:8200";
|
#adress = "chungus.private:8200";
|
||||||
package = pkgs.unstable.vault;
|
package = pkgs.vault;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -34,12 +34,6 @@
|
||||||
#environment.variables.NIX_PATH = lib.mkForce "/var/src";
|
#environment.variables.NIX_PATH = lib.mkForce "/var/src";
|
||||||
nix.nixPath = [ "nixpkgs=${pkgs.path}" ];
|
nix.nixPath = [ "nixpkgs=${pkgs.path}" ];
|
||||||
|
|
||||||
# how much configurations should be kept?
|
|
||||||
boot.loader.systemd-boot.configurationLimit = lib.mkDefault 3;
|
|
||||||
boot.loader.generic-extlinux-compatible.configurationLimit = lib.mkDefault 3;
|
|
||||||
boot.loader.grub.configurationLimit = lib.mkDefault 3;
|
|
||||||
|
|
||||||
|
|
||||||
# Machines should be fast by default
|
# Machines should be fast by default
|
||||||
# ----------------------------------
|
# ----------------------------------
|
||||||
powerManagement.cpuFreqGovernor = lib.mkOverride 1001 "ondemand";
|
powerManagement.cpuFreqGovernor = lib.mkOverride 1001 "ondemand";
|
||||||
|
|
Loading…
Reference in a new issue