1
0
mirror of https://github.com/kmein/niveum synced 2026-03-16 10:11:08 +01:00

1 Commits

Author SHA1 Message Date
github-actions[bot]
a36c29a679 flake.lock: Update
Flake lock file updates:

• Updated input 'agenix':
    'github:ryantm/agenix/fcdea223397448d35d9b31f798479227e80183f6?narHash=sha256-wyT7Pl6tMFbFrs8Lk/TlEs81N6L%2BVSybPfiIgzU8lbQ%3D' (2025-11-08)
  → 'github:ryantm/agenix/b027ee29d959fda4b60b57566d64c98a202e0feb?narHash=sha256-9VnK6Oqai65puVJ4WYtCTvlJeXxMzAp/69HhQuTdl/I%3D' (2026-02-04)
• Updated input 'fenix':
    'github:nix-community/fenix/b2344f384a82db1410ab09769eb8c4a820de667f?narHash=sha256-0dPzo1ElvAIZ0RwEwx5FfqAUiFj22K9QJOU9stiMCrw%3D' (2026-01-31)
  → 'github:nix-community/fenix/e4c413b9546d6c9e6426b33b4d6de1a49a375024?narHash=sha256-8XbJXrhMFhLgoBrjFIJx5XJi%2BSD%2B7/gbvaIXCuqy9Z0%3D' (2026-02-28)
• Updated input 'fenix/rust-analyzer-src':
    'github:rust-lang/rust-analyzer/eb0588812b041ebbf2645555f2a4df3bcd853c6d?narHash=sha256-ax6cH54Nc20QuxlHNC8RMt1P8quMECY4gaACFAdd5ec%3D' (2026-01-30)
  → 'github:rust-lang/rust-analyzer/8494a8b3b769c17e8594d811012cc1b0fab090c7?narHash=sha256-DkjUvrEnnhHjOcjMx6aXfYGIZ0PWmcYzvVayhRj1r4M%3D' (2026-02-27)
• Updated input 'home-manager':
    'github:nix-community/home-manager/366d78c2856de6ab3411c15c1cb4fb4c2bf5c826?narHash=sha256-tNqCP/%2B2%2BpeAXXQ2V8RwsBkenlfWMERb%2BUy6xmevyhM%3D' (2026-01-28)
  → 'github:nix-community/home-manager/9b9142b5fe214c2adabe86257c33e022372b7c96?narHash=sha256-TL3%2BckbOTILXrR0qSK3dJj2BJ0S5yz/YSsUF1oEgd9g%3D' (2026-02-28)
• Updated input 'llm-agents':
    'github:numtide/llm-agents.nix/bbd22c02ac546b7ba07147eb14194128b44ff209?narHash=sha256-hvlg7rTzAmfX2HW0GgrVGvbXoNioTK0bidbRv42QEhY%3D' (2026-02-15)
  → 'github:numtide/llm-agents.nix/45656c46d998310ea6306a0036d581bf77091213?narHash=sha256-1f5WHVW5jwO0TEBZNIK3GkgkwTqBaUFrNCf0WQ4/sM8%3D' (2026-03-01)
• Updated input 'llm-agents/blueprint':
    'github:numtide/blueprint/c7da5c70ad1c9b60b6f5d4f674fbe205d48d8f6c?narHash=sha256-zI%2B7cbMI4wMIR57jMjDSEsVb3grapTnURDxxJPYFIW0%3D' (2026-01-25)
  → 'github:numtide/blueprint/06ee7190dc2620ea98af9eb225aa9627b68b0e33?narHash=sha256-bLqwib%2BrtyBRRVBWhMuBXPCL/OThfokA%2Bj6%2BuH7jDGU%3D' (2026-02-18)
• Updated input 'llm-agents/nixpkgs':
    'github:NixOS/nixpkgs/2343bbb58f99267223bc2aac4fc9ea301a155a16?narHash=sha256-LovWTGDwXhkfCOmbgLVA10bvsi/P8eDDpRudgk68HA8%3D' (2026-02-11)
  → 'github:NixOS/nixpkgs/bcc4a9d9533c033d806a46b37dc444f9b0da49dd?narHash=sha256-K7Dg9TQ0mOcAtWTO/FX/FaprtWQ8BmEXTpLIaNRhEwU%3D' (2026-02-18)
• Updated input 'nix-index-database':
    'github:nix-community/nix-index-database/82befcf7dc77c909b0f2a09f5da910ec95c5b78f?narHash=sha256-d3NBA9zEtBu2JFMnTBqWj7Tmi7R5OikoU2ycrdhQEws%3D' (2025-12-09)
  → 'github:nix-community/nix-index-database/8f590b832326ab9699444f3a48240595954a4b10?narHash=sha256-/phvMgr1yutyAMjKnZlxkVplzxHiz60i4rc%2BgKzpwhg%3D' (2026-02-22)
• Updated input 'nix-topology':
    'github:oddlama/nix-topology/a15cac71d3399a4c2d1a3482ae62040a3a0aa07f?narHash=sha256-x3eMpPQhZwEDunyaUos084Hx41XwYTi2uHY4Yc4YNlk%3D' (2026-01-21)
  → 'github:oddlama/nix-topology/b493b9b970388d79129ce1a92a6b060c9305386f?narHash=sha256-gFyFAFYYoNsvd6heI0XtDMIa4pnykjwDljS7dQm45uE%3D' (2026-02-24)
• Updated input 'nixos-hardware':
    'github:NixOS/nixos-hardware/a351494b0e35fd7c0b7a1aae82f0afddf4907aa8?narHash=sha256-QEDtctEkOsbx8nlFh4yqPEOtr4tif6KTqWwJ37IM2ds%3D' (2026-01-25)
  → 'github:NixOS/nixos-hardware/41c6b421bdc301b2624486e11905c9af7b8ec68e?narHash=sha256-qwcDBtrRvJbrrnv1lf/pREQi8t2hWZxVAyeMo7/E9sw%3D' (2026-02-24)
• Updated input 'nixpkgs':
    'github:NixOS/nixpkgs/fa83fd837f3098e3e678e6cf017b2b36102c7211?narHash=sha256-e7VO/kGLgRMbWtpBqdWl0uFg8Y2XWFMdz0uUJvlML8o%3D' (2026-01-28)
  → 'github:NixOS/nixpkgs/1267bb4920d0fc06ea916734c11b0bf004bbe17e?narHash=sha256-7DaQVv4R97cii/Qdfy4tmDZMB2xxtyIvNGSwXBBhSmo%3D' (2026-02-25)
• Updated input 'nixpkgs-unstable':
    'github:NixOS/nixpkgs/00c21e4c93d963c50d4c0c89bfa84ed6e0694df2?narHash=sha256-AYqlWrX09%2BHvGs8zM6ebZ1pwUqjkfpnv8mewYwAo%2BiM%3D' (2026-02-04)
  → 'github:NixOS/nixpkgs/dd9b079222d43e1943b6ebd802f04fd959dc8e61?narHash=sha256-I45esRSssFtJ8p/gLHUZ1OUaaTaVLluNkABkk6arQwE%3D' (2026-02-27)
• Updated input 'nur':
    'github:nix-community/NUR/c74b53b75a4219cdecea1194a95e36a222981860?narHash=sha256-n3YYhO6VpGadtVOiL/eAxnm9JBC6GfXsJfj8O6V/JvU%3D' (2026-01-31)
  → 'github:nix-community/NUR/7bf299ddf8a26872aa45acc49a4424bd17237072?narHash=sha256-lqwxrCp2ZgAjlYRKbT%2BbkvXmxZSibCyB3ee96HwLV34%3D' (2026-03-01)
• Updated input 'opencrow':
    'github:pinpox/opencrow/9ec2d17e6c9d45b22b9cca3174b6b1a75758d8f6?narHash=sha256-CGAS5ISs%2Bh6GNQwaOLycfbcFRkN0legi/hdDov4Obfk%3D' (2026-02-20)
  → 'github:pinpox/opencrow/bb555b7796ec1842e0295462736ee7a956abc676?narHash=sha256-Fi0zLX0hGm2eAQJ0d0FTb2y%2BKuCcM8zjkzkEyZB4fUI%3D' (2026-02-28)
• Added input 'panoptikon':
    'git+https://code.kmein.de/kfm/panoptikon?ref=refs/heads/main&rev=30e15d8f95693ba82d2d93ef9acbc1ceb65ef430' (2026-02-21)
• Added input 'panoptikon/nixpkgs':
    'github:NixOS/nixpkgs/0182a361324364ae3f436a63005877674cf45efb?narHash=sha256-0NBlEBKkN3lufyvFegY4TYv5mCNHbi5OmBDrzihbBMQ%3D' (2026-02-17)
• Updated input 'stockholm':
    'github:krebs/stockholm/0122ded2137e568e771e753c0c3a17b1b20d9ca7?narHash=sha256-k558r83lvHbqDlEFEf3zCX1/WuMNgnp1bjMbwMhg5wM%3D' (2026-01-21)
  → 'github:krebs/stockholm/bab362d0f6fcde28ac41716ca15cc552d4659ec5?narHash=sha256-1srlGKTtf0a2nfH78MohqNtkcvLSuEIEVccPD4WJCZk%3D' (2026-02-23)
• Updated input 'stylix':
    'github:danth/stylix/413e927522d65ca8a37b283f4e88ada4865971dd?narHash=sha256-J2jDCqzdtUxKVstC/zwy4TaSYgUxyzInGZ1qU7W2LaE%3D' (2026-01-31)
  → 'github:danth/stylix/ebb238f14d6f930068be4718472da3105fd5d3bf?narHash=sha256-RzBpBwn93GWxLjacTte%2Bngwwg0L/BVOg4G/sSIeK3Rw%3D' (2026-02-22)
• Updated input 'treefmt-nix':
    'github:numtide/treefmt-nix/28b19c5844cc6e2257801d43f2772a4b4c050a1b?narHash=sha256-8aAYwyVzSSwIhP2glDhw/G0i5%2BwOrren3v6WmxkVonM%3D' (2026-01-29)
  → 'github:numtide/treefmt-nix/337a4fe074be1042a35086f15481d763b8ddc0e7?narHash=sha256-wQ6NJSuFqAEmIg2VMnLdCnUc0b7vslUohqqGGD%2BFyxk%3D' (2026-02-04)
• Updated input 'wrappers':
    'github:lassulus/wrappers/241f2f7dfcac0dbb2338105bdba7f03f412c5847?narHash=sha256-gzTvuaJZaymgxQC4rOZ9HlMRRWHVF2moEEaTnCG556A%3D' (2026-02-05)
  → 'github:lassulus/wrappers/4e12f430ae705d9bbb591ca9c51cbccbee050a23?narHash=sha256-dqkfxxpIiIs4wdWhT4lfQi1lfA0CgIftPiYGvw0tUOk%3D' (2026-02-26)
2026-03-01 01:43:20 +00:00
12 changed files with 97 additions and 132 deletions

View File

@@ -26,6 +26,8 @@
})
];
services.getty.autologinOnce = lib.mkForce false;
# to run nspawn in nix sandbox
nix.settings = {
auto-allocate-uids = true;

View File

@@ -193,8 +193,6 @@ in
#krebs
pkgs.nur.repos.mic92.ircsink
cyberlocker-tools
kpaste
(haskellPackages.ghcWithHoogle (hs: [
hs.text

157
flake.lock generated
View File

@@ -12,11 +12,11 @@
"systems": "systems"
},
"locked": {
"lastModified": 1762618334,
"narHash": "sha256-wyT7Pl6tMFbFrs8Lk/TlEs81N6L+VSybPfiIgzU8lbQ=",
"lastModified": 1770165109,
"narHash": "sha256-9VnK6Oqai65puVJ4WYtCTvlJeXxMzAp/69HhQuTdl/I=",
"owner": "ryantm",
"repo": "agenix",
"rev": "fcdea223397448d35d9b31f798479227e80183f6",
"rev": "b027ee29d959fda4b60b57566d64c98a202e0feb",
"type": "github"
},
"original": {
@@ -122,11 +122,11 @@
"systems": "systems_2"
},
"locked": {
"lastModified": 1769353768,
"narHash": "sha256-zI+7cbMI4wMIR57jMjDSEsVb3grapTnURDxxJPYFIW0=",
"lastModified": 1771437256,
"narHash": "sha256-bLqwib+rtyBRRVBWhMuBXPCL/OThfokA+j6+uH7jDGU=",
"owner": "numtide",
"repo": "blueprint",
"rev": "c7da5c70ad1c9b60b6f5d4f674fbe205d48d8f6c",
"rev": "06ee7190dc2620ea98af9eb225aa9627b68b0e33",
"type": "github"
},
"original": {
@@ -189,11 +189,11 @@
"rust-analyzer-src": "rust-analyzer-src"
},
"locked": {
"lastModified": 1769842381,
"narHash": "sha256-0dPzo1ElvAIZ0RwEwx5FfqAUiFj22K9QJOU9stiMCrw=",
"lastModified": 1772261909,
"narHash": "sha256-8XbJXrhMFhLgoBrjFIJx5XJi+SD+7/gbvaIXCuqy9Z0=",
"owner": "nix-community",
"repo": "fenix",
"rev": "b2344f384a82db1410ab09769eb8c4a820de667f",
"rev": "e4c413b9546d6c9e6426b33b4d6de1a49a375024",
"type": "github"
},
"original": {
@@ -384,11 +384,11 @@
]
},
"locked": {
"lastModified": 1769580047,
"narHash": "sha256-tNqCP/+2+peAXXQ2V8RwsBkenlfWMERb+Uy6xmevyhM=",
"lastModified": 1772302941,
"narHash": "sha256-TL3+ckbOTILXrR0qSK3dJj2BJ0S5yz/YSsUF1oEgd9g=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "366d78c2856de6ab3411c15c1cb4fb4c2bf5c826",
"rev": "9b9142b5fe214c2adabe86257c33e022372b7c96",
"type": "github"
},
"original": {
@@ -405,11 +405,11 @@
"treefmt-nix": "treefmt-nix"
},
"locked": {
"lastModified": 1771167156,
"narHash": "sha256-hvlg7rTzAmfX2HW0GgrVGvbXoNioTK0bidbRv42QEhY=",
"lastModified": 1772328903,
"narHash": "sha256-1f5WHVW5jwO0TEBZNIK3GkgkwTqBaUFrNCf0WQ4/sM8=",
"owner": "numtide",
"repo": "llm-agents.nix",
"rev": "bbd22c02ac546b7ba07147eb14194128b44ff209",
"rev": "45656c46d998310ea6306a0036d581bf77091213",
"type": "github"
},
"original": {
@@ -464,24 +464,6 @@
"type": "github"
}
},
"meteora": {
"inputs": {
"nixpkgs": "nixpkgs_2"
},
"locked": {
"lastModified": 1772641269,
"narHash": "sha256-o8G09GrqHjZO9BYbsCvYds+baGxLC0PhhlGTllkHC54=",
"ref": "refs/heads/master",
"rev": "0b2255c2e4003b208f19153e6fb7e484544c4399",
"revCount": 1377,
"type": "git",
"url": "ssh://git@github.com/kmein/meteora.git"
},
"original": {
"type": "git",
"url": "ssh://git@github.com/kmein/meteora.git"
}
},
"naersk": {
"inputs": {
"fenix": [
@@ -534,11 +516,11 @@
]
},
"locked": {
"lastModified": 1765267181,
"narHash": "sha256-d3NBA9zEtBu2JFMnTBqWj7Tmi7R5OikoU2ycrdhQEws=",
"lastModified": 1771734689,
"narHash": "sha256-/phvMgr1yutyAMjKnZlxkVplzxHiz60i4rc+gKzpwhg=",
"owner": "nix-community",
"repo": "nix-index-database",
"rev": "82befcf7dc77c909b0f2a09f5da910ec95c5b78f",
"rev": "8f590b832326ab9699444f3a48240595954a4b10",
"type": "github"
},
"original": {
@@ -555,11 +537,11 @@
]
},
"locked": {
"lastModified": 1769018862,
"narHash": "sha256-x3eMpPQhZwEDunyaUos084Hx41XwYTi2uHY4Yc4YNlk=",
"lastModified": 1771963727,
"narHash": "sha256-gFyFAFYYoNsvd6heI0XtDMIa4pnykjwDljS7dQm45uE=",
"owner": "oddlama",
"repo": "nix-topology",
"rev": "a15cac71d3399a4c2d1a3482ae62040a3a0aa07f",
"rev": "b493b9b970388d79129ce1a92a6b060c9305386f",
"type": "github"
},
"original": {
@@ -592,11 +574,11 @@
},
"nixos-hardware": {
"locked": {
"lastModified": 1769302137,
"narHash": "sha256-QEDtctEkOsbx8nlFh4yqPEOtr4tif6KTqWwJ37IM2ds=",
"lastModified": 1771969195,
"narHash": "sha256-qwcDBtrRvJbrrnv1lf/pREQi8t2hWZxVAyeMo7/E9sw=",
"owner": "NixOS",
"repo": "nixos-hardware",
"rev": "a351494b0e35fd7c0b7a1aae82f0afddf4907aa8",
"rev": "41c6b421bdc301b2624486e11905c9af7b8ec68e",
"type": "github"
},
"original": {
@@ -607,11 +589,11 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1770843696,
"narHash": "sha256-LovWTGDwXhkfCOmbgLVA10bvsi/P8eDDpRudgk68HA8=",
"lastModified": 1771423170,
"narHash": "sha256-K7Dg9TQ0mOcAtWTO/FX/FaprtWQ8BmEXTpLIaNRhEwU=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "2343bbb58f99267223bc2aac4fc9ea301a155a16",
"rev": "bcc4a9d9533c033d806a46b37dc444f9b0da49dd",
"type": "github"
},
"original": {
@@ -654,11 +636,11 @@
},
"nixpkgs-unstable": {
"locked": {
"lastModified": 1770197578,
"narHash": "sha256-AYqlWrX09+HvGs8zM6ebZ1pwUqjkfpnv8mewYwAo+iM=",
"lastModified": 1772198003,
"narHash": "sha256-I45esRSssFtJ8p/gLHUZ1OUaaTaVLluNkABkk6arQwE=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "00c21e4c93d963c50d4c0c89bfa84ed6e0694df2",
"rev": "dd9b079222d43e1943b6ebd802f04fd959dc8e61",
"type": "github"
},
"original": {
@@ -670,27 +652,11 @@
},
"nixpkgs_2": {
"locked": {
"lastModified": 1772479524,
"narHash": "sha256-u7nCaNiMjqvKpE+uZz9hE7pgXXTmm5yvdtFaqzSzUQI=",
"lastModified": 1772047000,
"narHash": "sha256-7DaQVv4R97cii/Qdfy4tmDZMB2xxtyIvNGSwXBBhSmo=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "4215e62dc2cd3bc705b0a423b9719ff6be378a43",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_3": {
"locked": {
"lastModified": 1769598131,
"narHash": "sha256-e7VO/kGLgRMbWtpBqdWl0uFg8Y2XWFMdz0uUJvlML8o=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "fa83fd837f3098e3e678e6cf017b2b36102c7211",
"rev": "1267bb4920d0fc06ea916734c11b0bf004bbe17e",
"type": "github"
},
"original": {
@@ -700,7 +666,7 @@
"type": "github"
}
},
"nixpkgs_4": {
"nixpkgs_3": {
"locked": {
"lastModified": 1771369470,
"narHash": "sha256-0NBlEBKkN3lufyvFegY4TYv5mCNHbi5OmBDrzihbBMQ=",
@@ -724,11 +690,11 @@
]
},
"locked": {
"lastModified": 1769867112,
"narHash": "sha256-n3YYhO6VpGadtVOiL/eAxnm9JBC6GfXsJfj8O6V/JvU=",
"lastModified": 1772326810,
"narHash": "sha256-lqwxrCp2ZgAjlYRKbT+bkvXmxZSibCyB3ee96HwLV34=",
"owner": "nix-community",
"repo": "NUR",
"rev": "c74b53b75a4219cdecea1194a95e36a222981860",
"rev": "7bf299ddf8a26872aa45acc49a4424bd17237072",
"type": "github"
},
"original": {
@@ -772,11 +738,11 @@
]
},
"locked": {
"lastModified": 1771622489,
"narHash": "sha256-CGAS5ISs+h6GNQwaOLycfbcFRkN0legi/hdDov4Obfk=",
"lastModified": 1772243521,
"narHash": "sha256-Fi0zLX0hGm2eAQJ0d0FTb2y+KuCcM8zjkzkEyZB4fUI=",
"owner": "pinpox",
"repo": "opencrow",
"rev": "9ec2d17e6c9d45b22b9cca3174b6b1a75758d8f6",
"rev": "bb555b7796ec1842e0295462736ee7a956abc676",
"type": "github"
},
"original": {
@@ -787,14 +753,14 @@
},
"panoptikon": {
"inputs": {
"nixpkgs": "nixpkgs_4"
"nixpkgs": "nixpkgs_3"
},
"locked": {
"lastModified": 1771686951,
"narHash": "sha256-+s19xrH0kVVDT48TtpulmuWFMagi/ysjWL+PjKcmF/k=",
"lastModified": 1771688635,
"narHash": "sha256-tKmjgdeoQV5W96Chr2B5WOFXC70FvcfxhNCmBT1YZUY=",
"ref": "refs/heads/main",
"rev": "8868eb8736c3395186fa410c040e0000abca56bd",
"revCount": 3,
"rev": "30e15d8f95693ba82d2d93ef9acbc1ceb65ef430",
"revCount": 4,
"type": "git",
"url": "https://code.kmein.de/kfm/panoptikon"
},
@@ -827,13 +793,12 @@
"llm-agents": "llm-agents",
"menstruation-backend": "menstruation-backend",
"menstruation-telegram": "menstruation-telegram",
"meteora": "meteora",
"naersk": "naersk",
"niphas": "niphas",
"nix-index-database": "nix-index-database",
"nix-topology": "nix-topology",
"nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs_3",
"nixpkgs": "nixpkgs_2",
"nixpkgs-old": "nixpkgs-old",
"nixpkgs-unstable": "nixpkgs-unstable",
"nur": "nur",
@@ -854,11 +819,11 @@
"rust-analyzer-src": {
"flake": false,
"locked": {
"lastModified": 1769786006,
"narHash": "sha256-ax6cH54Nc20QuxlHNC8RMt1P8quMECY4gaACFAdd5ec=",
"lastModified": 1772178959,
"narHash": "sha256-DkjUvrEnnhHjOcjMx6aXfYGIZ0PWmcYzvVayhRj1r4M=",
"owner": "rust-lang",
"repo": "rust-analyzer",
"rev": "eb0588812b041ebbf2645555f2a4df3bcd853c6d",
"rev": "8494a8b3b769c17e8594d811012cc1b0fab090c7",
"type": "github"
},
"original": {
@@ -903,11 +868,11 @@
]
},
"locked": {
"lastModified": 1769038106,
"narHash": "sha256-k558r83lvHbqDlEFEf3zCX1/WuMNgnp1bjMbwMhg5wM=",
"lastModified": 1771846963,
"narHash": "sha256-1srlGKTtf0a2nfH78MohqNtkcvLSuEIEVccPD4WJCZk=",
"owner": "krebs",
"repo": "stockholm",
"rev": "0122ded2137e568e771e753c0c3a17b1b20d9ca7",
"rev": "bab362d0f6fcde28ac41716ca15cc552d4659ec5",
"type": "github"
},
"original": {
@@ -937,11 +902,11 @@
"tinted-zed": "tinted-zed"
},
"locked": {
"lastModified": 1769829895,
"narHash": "sha256-J2jDCqzdtUxKVstC/zwy4TaSYgUxyzInGZ1qU7W2LaE=",
"lastModified": 1771788390,
"narHash": "sha256-RzBpBwn93GWxLjacTte+ngwwg0L/BVOg4G/sSIeK3Rw=",
"owner": "danth",
"repo": "stylix",
"rev": "413e927522d65ca8a37b283f4e88ada4865971dd",
"rev": "ebb238f14d6f930068be4718472da3105fd5d3bf",
"type": "github"
},
"original": {
@@ -1194,11 +1159,11 @@
]
},
"locked": {
"lastModified": 1769691507,
"narHash": "sha256-8aAYwyVzSSwIhP2glDhw/G0i5+wOrren3v6WmxkVonM=",
"lastModified": 1770228511,
"narHash": "sha256-wQ6NJSuFqAEmIg2VMnLdCnUc0b7vslUohqqGGD+Fyxk=",
"owner": "numtide",
"repo": "treefmt-nix",
"rev": "28b19c5844cc6e2257801d43f2772a4b4c050a1b",
"rev": "337a4fe074be1042a35086f15481d763b8ddc0e7",
"type": "github"
},
"original": {
@@ -1271,11 +1236,11 @@
]
},
"locked": {
"lastModified": 1770311206,
"narHash": "sha256-gzTvuaJZaymgxQC4rOZ9HlMRRWHVF2moEEaTnCG556A=",
"lastModified": 1772137435,
"narHash": "sha256-dqkfxxpIiIs4wdWhT4lfQi1lfA0CgIftPiYGvw0tUOk=",
"owner": "lassulus",
"repo": "wrappers",
"rev": "241f2f7dfcac0dbb2338105bdba7f03f412c5847",
"rev": "4e12f430ae705d9bbb591ca9c51cbccbee050a23",
"type": "github"
},
"original": {

View File

@@ -28,7 +28,6 @@
wrappers.url = "github:lassulus/wrappers";
llm-agents.url = "github:numtide/llm-agents.nix";
opencrow.url = "github:pinpox/opencrow";
meteora.url = "git+ssh://git@github.com/kmein/meteora.git";
voidrice.flake = false;
@@ -97,7 +96,6 @@
stylix,
voidrice,
wetter,
meteora,
...
}:
let
@@ -304,7 +302,6 @@
autorenkalender = autorenkalender.packages.${prev.stdenv.hostPlatform.system}.default;
onomap = scripts.packages.${prev.stdenv.hostPlatform.system}.onomap;
tinc-graph = tinc-graph.packages.${prev.stdenv.hostPlatform.system}.tinc-graph;
meteora-website = meteora.packages.${prev.stdenv.hostPlatform.system}.website;
# krebs
brainmelter = prev.callPackage packages/brainmelter.nix { };
@@ -516,7 +513,7 @@
++ profiles.desktop
++ [
systems/manakish/configuration.nix
nixos-hardware.nixosModules.lenovo-thinkpad-x220
nixos-hardware.nixosModules.lenovo-thinkpad-x230
];
};
kabsa = nixpkgs.lib.nixosSystem {
@@ -527,7 +524,7 @@
++ profiles.desktop
++ [
systems/kabsa/configuration.nix
nixos-hardware.nixosModules.lenovo-thinkpad-x230
nixos-hardware.nixosModules.lenovo-thinkpad-x220
];
};
fatteh = nixpkgs.lib.nixosSystem {

View File

@@ -35,6 +35,26 @@ writers.writeBashBin "mp3player-write" ''
exit 1
fi
TOTAL_SIZE=0
for f in "''${FILES[@]}"; do
if [ ! -f "$f" ]; then
echo "Warning: File '$f' does not exist, skipping."
continue
fi
FILE_SIZE=$(${lib.getExe' coreutils "stat"} --printf="%s" "$f")
TOTAL_SIZE=$((TOTAL_SIZE + FILE_SIZE / 2))
done
AVAILABLE=$(${lib.getExe' coreutils "df"} --output=avail "$MOUNT_POINT" | ${lib.getExe' coreutils "tail"} -n 1)
AVAILABLE=$((AVAILABLE * 1024))
if [ "$TOTAL_SIZE" -gt "$AVAILABLE" ]; then
echo "Error: Not enough space. Required: $TOTAL_SIZE bytes, Available: $AVAILABLE bytes"
exit 1
fi
echo "Enough space available. Starting conversion..."
sanitize_filename() {
local name
name=$(${lib.getExe' coreutils "basename"} "$1")

View File

@@ -2,7 +2,7 @@
{
lib,
writers,
poppler-utils,
poppler_utils,
tesseract,
coreutils,
}:
@@ -21,7 +21,7 @@ writers.writeDashBin "pdf-ocr" ''
cd "$tmpdir"
${lib.getExe' poppler-utils "pdftoppm"} -png "$pdf_path" pdf-ocr
${lib.getExe' poppler_utils "pdftoppm"} -png "$pdf_path" pdf-ocr
for png in pdf-ocr*.png; do
${lib.getExe tesseract} "$png" "$png.txt" 2>/dev/null
done

View File

@@ -18,7 +18,7 @@ let
];
outputHashMode = "recursive";
outputHashAlgo = "sha256";
outputHash = "sha256-+XaHU/Ale2YLQmdvfG73nG+tjRkWyb27bdLgI3JFLlU=";
outputHash = "sha256-YrrQ5m8XYKFNR2+dn97GYxKxcWPBndomPZsqKfwD6w0=";
impureEnvVars = [
"http_proxy"
"https_proxy"

Submodule secrets updated: 0c10b2e8bb...4fa163a68e

View File

@@ -1,5 +1,4 @@
secrets/alertmanager-token-reporters.age
secrets/anthropic-api-key.age
secrets/brevo-key.age
secrets/cifs-credentials-zodiac.age
secrets/copecart-ipn.age
@@ -55,7 +54,6 @@ secrets/matrix-token-lakai.age
secrets/matrix-token-lakai-env.age
secrets/maxmind-license-key.age
secrets/mega-password.age
secrets/meteora-auth.age
secrets/miniflux-api-token.age
secrets/miniflux-credentials.age
secrets/nextcloud-password-admin.age
@@ -63,11 +61,7 @@ secrets/nextcloud-password-database.age
secrets/nextcloud-password-fysi.age
secrets/nextcloud-password-kieran.age
secrets/onlyoffice-jwt-key.age
secrets/openclaw-gateway-token.age
secrets/openclaw-telegram-token.age
secrets/opencrow-gemini-key.age
secrets/opencrow-matrix-token.age
secrets/opencrow-openrouter-key.age
secrets/opencrow-soul.age
secrets/openweathermap-api-key.age
secrets/restic.age

View File

@@ -1,3 +1,4 @@
{ pkgs, ... }:
{
nixpkgs.config = {
allowUnfree = true;
@@ -21,7 +22,14 @@
};
};
services.ollama = {
enable = true;
acceleration = "cuda"; # Force it to use the MX150
package = pkgs.ollama-cuda;
};
nix.settings.system-features = [ "cuda" ];
nixpkgs.config.cudaCapabilities = [ "6.1" ];
programs.nix-required-mounts = {
enable = true;

View File

@@ -17,7 +17,6 @@
./wallabag.nix
./nethack.nix
./opencrow.nix
./meteora.nix
];
niveum.passport = {

View File

@@ -1,18 +0,0 @@
{ config, pkgs, ... }: {
age.secrets.meteora-auth = {
file = ../../secrets/meteora-auth.age;
owner = "nginx";
};
services.nginx = {
enable = true;
virtualHosts."meteora.xn--kiern-0qa.de" = {
forceSSL = true;
enableACME = true;
root = "${pkgs.meteora-website}";
locations."/" = {
basicAuthFile = config.age.secrets.meteora-auth.path;
};
};
};
}