updates (untested)

This commit is contained in:
Chaos 2023-02-13 11:33:33 +00:00
parent 8b7aa5c3c1
commit 3ca23281eb
No known key found for this signature in database
5 changed files with 692 additions and 712 deletions

View file

@ -191,11 +191,11 @@
}, },
"nixpkgs-unstable": { "nixpkgs-unstable": {
"locked": { "locked": {
"lastModified": 1675763311, "lastModified": 1676110339,
"narHash": "sha256-bz0Q2H3mxsF1CUfk26Sl9Uzi8/HFjGFD/moZHz1HebU=", "narHash": "sha256-kOS/L8OOL2odpCOM11IevfHxcUeE0vnZUQ74EOiwXcs=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "fab09085df1b60d6a0870c8a89ce26d5a4a708c2", "rev": "e5530aba13caff5a4f41713f1265b754dc2abfd8",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -207,11 +207,11 @@
}, },
"nur": { "nur": {
"locked": { "locked": {
"lastModified": 1675950569, "lastModified": 1676281484,
"narHash": "sha256-v6p+D8e7GVcAlVoJGrAqjwjfAglKS9+GzbQFxd8d0Rc=", "narHash": "sha256-dWZXiud69G6LwzpFCaKFD4wpKarTRYY3605rLN9fw50=",
"owner": "nix-community", "owner": "nix-community",
"repo": "NUR", "repo": "NUR",
"rev": "1ed7701bc2f5c91454027067872037272812e7a3", "rev": "d44ab24d70b4e0080630730c42793fdff8ea0ace",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -46,22 +46,6 @@
networking.firewall.enable = true; networking.firewall.enable = true;
networking.firewall.allowPing = true; networking.firewall.allowPing = true;
nix.buildMachines = [
{
hostName = "hetzner-vm.servers.genderfucked.monster";
system = "x86_64-linux";
sshUser = "root";
sshKey = "/usb/ssh-keys/chaos.priv";
publicHostKey = "AAAAC3NzaC1lZDI1NTE5AAAAIMIt2ABqwHhMjz9r6atv4XuX58xEWeStkmXUwvMVGv4w";
maxJobs = 16;
speedFactor = 4;
supportedFeatures = ["nixos-test" "benchmark" "big-parallel" "kvm"];
mandatoryFeatures = [];
}
];
nix.distributedBuilds = true; # true;
nix.extraOptions = "builders-use-substitutes = true";
networking.hostName = "tablet"; networking.hostName = "tablet";
time.timeZone = "Europe/London"; time.timeZone = "Europe/London";

View file

@ -1,10 +1,4 @@
{ { fetchurl, fetchgit, linkFarm, runCommand, gnutar }: rec {
fetchurl,
fetchgit,
linkFarm,
runCommand,
gnutar,
}: rec {
offline_cache = linkFarm "offline" packages; offline_cache = linkFarm "offline" packages;
packages = [ packages = [
{ {
@ -1784,11 +1778,11 @@
}; };
} }
{ {
name = "_iconify_json___json_2.2.19.tgz"; name = "_iconify_json___json_2.2.20.tgz";
path = fetchurl { path = fetchurl {
name = "_iconify_json___json_2.2.19.tgz"; name = "_iconify_json___json_2.2.20.tgz";
url = "https://registry.yarnpkg.com/@iconify/json/-/json-2.2.19.tgz"; url = "https://registry.yarnpkg.com/@iconify/json/-/json-2.2.20.tgz";
sha512 = "u9GEiedZRmDAqbYa2A43KG5BQ6lYrFtwpoBm9CJuA7FyN4UUrf3qyaNvEaD9R+dfie8KXqqTa2hKEAoJ7F1McA=="; sha512 = "mi7rXIc+/un3+GuIZkHJrfgLL5jjrfG0UidRybYj8LLh2bdUV3P5mz0+a2O+bwE9V5hvbFGBekgt5rvSnQYGHQ==";
}; };
} }
{ {
@ -3080,11 +3074,11 @@
}; };
} }
{ {
name = "eslint___eslint_8.33.0.tgz"; name = "eslint___eslint_8.34.0.tgz";
path = fetchurl { path = fetchurl {
name = "eslint___eslint_8.33.0.tgz"; name = "eslint___eslint_8.34.0.tgz";
url = "https://registry.yarnpkg.com/eslint/-/eslint-8.33.0.tgz"; url = "https://registry.yarnpkg.com/eslint/-/eslint-8.34.0.tgz";
sha512 = "WjOpFQgKK8VrCnAtl8We0SUOy/oVZ5NHykyMiagV1M9r8IFpIJX7DduK6n1mpfhlG7T1NLWm2SuD8QB7KFySaA=="; sha512 = "1Z8iFsucw+7kSqXNZVslXS8Ioa4u2KM7GPwuKtkTFAqZ/cHMcEaR+1+Br0wLlot49cNxIiZk5wp8EAbPcYZxTg==";
}; };
} }
{ {
@ -5096,11 +5090,11 @@
}; };
} }
{ {
name = "vite_plugin_pwa___vite_plugin_pwa_0.14.3.tgz"; name = "vite_plugin_pwa___vite_plugin_pwa_0.14.4.tgz";
path = fetchurl { path = fetchurl {
name = "vite_plugin_pwa___vite_plugin_pwa_0.14.3.tgz"; name = "vite_plugin_pwa___vite_plugin_pwa_0.14.4.tgz";
url = "https://registry.yarnpkg.com/vite-plugin-pwa/-/vite-plugin-pwa-0.14.3.tgz"; url = "https://registry.yarnpkg.com/vite-plugin-pwa/-/vite-plugin-pwa-0.14.4.tgz";
sha512 = "o/CEzdHXamdSV4WJ6hp1EQNe+yVvoFf9b5q1nMhOSqKxaW7BaDqAHAwnq8jt21wakDmcaipnuF3/j78AzZJ6wg=="; sha512 = "M7Ct0so8OlouMkTWgXnl8W1xU95glITSKIe7qswZf1tniAstO2idElGCnsrTJ5NPNSx1XqfTCOUj8j94S6FD7Q==";
}; };
} }
{ {

View file

@ -1,7 +1,7 @@
{ {
"frontend": { "frontend": {
"rev": "55c0e51fa86d516b1c7a4d9b70dad0d0bcbe8131", "rev": "eebd27eee06283ea937a28eaec2891096d1b14d4",
"sha256": "sha256-AsvqRj/Kf+EXTiMm1ucsEnK+baNW23UskChauCpEZYA=" "sha256": "sha256-iVMsW+H068B/W965oPo3YnQGhEMI8CrLVpkG1kSm7rs="
}, },
"backend": { "backend": {
"rev": "e6f9bf884941b3a1bfe257ed3eb7f20fc1aa9dea", "rev": "e6f9bf884941b3a1bfe257ed3eb7f20fc1aa9dea",

View file

@ -1,8 +1,11 @@
{ {
config, config,
pkgs, pkgs,
tree,
... ...
}: { }: {
imports = with tree; [ profiles.sshd ];
config.boot = { config.boot = {
loader.systemd-boot.enable = false; loader.systemd-boot.enable = false;
@ -36,7 +39,6 @@
enable = true; enable = true;
port = 22; port = 22;
authorizedKeys = config.users.users.root.openssh.authorizedKeys.keys; authorizedKeys = config.users.users.root.openssh.authorizedKeys.keys;
ciphers = ["chacha20-poly1305@openssh.com" "aes256-gcm@openssh.com" "aes128-gcm@openssh.com" "aes256-ctr" "aes192-ctr" "aes128-ctr"];
hostKeys = ["/ssh_host_ed25519_key"]; hostKeys = ["/ssh_host_ed25519_key"];
}; };
postCommands = '' postCommands = ''