diff --git a/.envrc b/.envrc
index 95ed6fb..9222bda 100644
--- a/.envrc
+++ b/.envrc
@@ -1,10 +1,8 @@
-if ! has nix_direnv_version || ! nix_direnv_version 2.2.1; then
- source_url "https://raw.githubusercontent.com/nix-community/nix-direnv/2.2.1/direnvrc" "sha256-zelF0vLbEl5uaqrfIzbgNzJWGmLzCmYAkInj/LNxvKs="
+if ! has nix_direnv_version || ! nix_direnv_version 2.4.0; then
+ source_url "https://raw.githubusercontent.com/nix-community/nix-direnv/2.4.0/direnvrc" "sha256-XQzUAvL6pysIJnRJyR7uVpmUSZfc7LSgWQwq/4mBr1U="
fi
+nix_direnv_watch_file ./flake/checks.nix
+nix_direnv_watch_file ./flake/dev-shells.nix
+
use flake
-
-watch_file ./flake/checks.nix
-watch_file ./flake/dev-shells.nix
-
-eval "$shellHooks"
diff --git a/flake.lock b/flake.lock
index 3d28d8d..cd8218c 100644
--- a/flake.lock
+++ b/flake.lock
@@ -11,11 +11,11 @@
]
},
"locked": {
- "lastModified": 1690228878,
- "narHash": "sha256-9Xe7JV0krp4RJC9W9W9WutZVlw6BlHTFMiUP/k48LQY=",
+ "lastModified": 1695384796,
+ "narHash": "sha256-TYlE4B0ktPtlJJF9IFxTWrEeq+XKG8Ny0gc2FGEAdj0=",
"owner": "ryantm",
"repo": "agenix",
- "rev": "d8c973fd228949736dedf61b7f8cc1ece3236792",
+ "rev": "1f677b3e161d3bdbfd08a939e8f25de2568e0ef4",
"type": "github"
},
"original": {
@@ -131,11 +131,11 @@
]
},
"locked": {
- "lastModified": 1694585439,
- "narHash": "sha256-70BlfEsdURx5f8sioj8JuM+R4/SZFyE8UYrULMknxlI=",
+ "lastModified": 1695738267,
+ "narHash": "sha256-LTNAbTQ96xSj17xBfsFrFS9i56U2BMLpD0BduhrsVkU=",
"owner": "nix-community",
"repo": "home-manager",
- "rev": "a0ddf43b6268f1717afcda54133dea30435eb178",
+ "rev": "0f4e5b4999fd6a42ece5da8a3a2439a50e48e486",
"type": "github"
},
"original": {
@@ -145,13 +145,29 @@
"type": "github"
}
},
+ "impermanence": {
+ "locked": {
+ "lastModified": 1694622745,
+ "narHash": "sha256-z397+eDhKx9c2qNafL1xv75lC0Q4nOaFlhaU1TINqb8=",
+ "owner": "nix-community",
+ "repo": "impermanence",
+ "rev": "e9643d08d0d193a2e074a19d4d90c67a874d932e",
+ "type": "github"
+ },
+ "original": {
+ "owner": "nix-community",
+ "ref": "master",
+ "repo": "impermanence",
+ "type": "github"
+ }
+ },
"nixpkgs": {
"locked": {
- "lastModified": 1694422566,
- "narHash": "sha256-lHJ+A9esOz9vln/3CJG23FV6Wd2OoOFbDeEs4cMGMqc=",
+ "lastModified": 1695644571,
+ "narHash": "sha256-asS9dCCdlt1lPq0DLwkVBbVoEKuEuz+Zi3DG7pR/RxA=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "3a2786eea085f040a66ecde1bc3ddc7099f6dbeb",
+ "rev": "6500b4580c2a1f3d0f980d32d285739d8e156d92",
"type": "github"
},
"original": {
@@ -163,11 +179,11 @@
},
"nur": {
"locked": {
- "lastModified": 1694601892,
- "narHash": "sha256-rGK2Y9vQJQ+v729LfpvTuxDfTE7ns2g34XAPSr9+Z0E=",
+ "lastModified": 1695824843,
+ "narHash": "sha256-c1Z+y9oUXOkcU8gVBCyaujUqYLpYoI2b6L9Cq4ywOcA=",
"owner": "nix-community",
"repo": "NUR",
- "rev": "71a739d93f1e95967e9d641623cbb97d0c8b801a",
+ "rev": "8349f3e37cf21a9da032a2fdb8e7ac45366d01f3",
"type": "github"
},
"original": {
@@ -192,11 +208,11 @@
]
},
"locked": {
- "lastModified": 1694364351,
- "narHash": "sha256-oadhSCqopYXxURwIA6/Anpe5IAG11q2LhvTJNP5zE6o=",
+ "lastModified": 1695576016,
+ "narHash": "sha256-71KxwRhTfVuh7kNrg3/edNjYVg9DCyKZl2QIKbhRggg=",
"owner": "cachix",
"repo": "pre-commit-hooks.nix",
- "rev": "4f883a76282bc28eb952570afc3d8a1bf6f481d7",
+ "rev": "cb770e93516a1609652fa8e945a0f310e98f10c0",
"type": "github"
},
"original": {
@@ -212,6 +228,7 @@
"flake-parts": "flake-parts",
"futils": "futils",
"home-manager": "home-manager",
+ "impermanence": "impermanence",
"nixpkgs": "nixpkgs",
"nur": "nur",
"pre-commit-hooks": "pre-commit-hooks"
diff --git a/flake.nix b/flake.nix
index 8e46ea3..7970759 100644
--- a/flake.nix
+++ b/flake.nix
@@ -39,6 +39,13 @@
};
};
+ impermanence = {
+ type = "github";
+ owner = "nix-community";
+ repo = "impermanence";
+ ref = "master";
+ };
+
nixpkgs = {
type = "github";
owner = "NixOS";
diff --git a/home/calibre/default.nix b/home/calibre/default.nix
index e0f2069..6edf654 100644
--- a/home/calibre/default.nix
+++ b/home/calibre/default.nix
@@ -9,7 +9,7 @@ in
config = lib.mkIf cfg.enable {
home.packages = with pkgs; [
- calibre # NOTE: relies on my overlay to add necessary plug-in dependencies
+ calibre
];
};
}
diff --git a/home/comma/default.nix b/home/comma/default.nix
index cc6a0ad..60de863 100644
--- a/home/comma/default.nix
+++ b/home/comma/default.nix
@@ -5,25 +5,11 @@ in
{
options.my.home.comma = with lib; {
enable = my.mkDisableOption "comma configuration";
-
- pkgsFlake = mkOption {
- type = types.str;
- default = "pkgs";
- example = "nixpkgs";
- description = ''
- Which flake from the registry should be used with
- nix shell.
- '';
- };
};
config = lib.mkIf cfg.enable {
home.packages = with pkgs; [
ambroisie.comma
];
-
- home.sessionVariables = {
- COMMA_PKGS_FLAKE = cfg.pkgsFlake;
- };
};
}
diff --git a/home/xdg/default.nix b/home/xdg/default.nix
index 3fd8dc9..af9ec18 100644
--- a/home/xdg/default.nix
+++ b/home/xdg/default.nix
@@ -47,6 +47,7 @@ in
LESSHISTFILE = "${dataHome}/less/history";
LESSKEY = "${configHome}/less/lesskey";
PSQL_HISTORY = "${dataHome}/psql_history";
+ REPO_CONFIG_DIR = "${configHome}/repo";
REDISCLI_HISTFILE = "${dataHome}/redis/rediscli_history";
XCOMPOSECACHE = "${dataHome}/X11/xcompose";
};
diff --git a/hosts/homes/ambroisie@mousqueton/default.nix b/hosts/homes/ambroisie@mousqueton/default.nix
index f54453b..0bd2272 100644
--- a/hosts/homes/ambroisie@mousqueton/default.nix
+++ b/hosts/homes/ambroisie@mousqueton/default.nix
@@ -1,5 +1,5 @@
# Google Cloudtop configuration
-{ ... }:
+{ lib, pkgs, ... }:
{
# Google specific configuration
home.homeDirectory = "/usr/local/google/home/ambroisie";
@@ -13,6 +13,10 @@
LD_PRELOAD = "/lib/x86_64-linux-gnu/libnss_cache.so.2\${LD_PRELOAD:+:}$LD_PRELOAD";
};
+ programs.git.package = lib.mkForce pkgs.emptyDirectory;
+
+ services.gpg-agent.enable = lib.mkForce false;
+
# I use scripts that use the passthrough sequence often on this host
my.home.tmux.enablePassthrough = true;
}
diff --git a/hosts/nixos/porthos/secrets/matrix/sliding-sync-secret.age b/hosts/nixos/porthos/secrets/matrix/sliding-sync-secret.age
new file mode 100644
index 0000000..d375a35
--- /dev/null
+++ b/hosts/nixos/porthos/secrets/matrix/sliding-sync-secret.age
@@ -0,0 +1,9 @@
+age-encryption.org/v1
+-> ssh-ed25519 cKojmg N182xey8TWRVUWTRP16rT0zlhYZNr/pOZVR7YRnlIkk
+HVqAag55z1cKLgjR3WsUj2wvaVjxm169JcDRJGRvCVU
+-> ssh-ed25519 jPowng Dc+aaUTxDsMTY+oOst0SC3ldq1e6zX8F5A5uBL5RHhc
+JWZou6+VaFc5f2OLRIrmFFWg3Er6WSY+TloXU0mP1K8
+-> |9_9Aqh%-grease $ X8Mn|5 aKnl' fl" >&2
+ printf '%s\n' "Usage: rbw-pass [directory name] " >&2
}
error_out() {
diff --git a/templates/c++-cmake/.envrc b/templates/c++-cmake/.envrc
index 95ed6fb..ccf325e 100644
--- a/templates/c++-cmake/.envrc
+++ b/templates/c++-cmake/.envrc
@@ -1,10 +1,5 @@
-if ! has nix_direnv_version || ! nix_direnv_version 2.2.1; then
- source_url "https://raw.githubusercontent.com/nix-community/nix-direnv/2.2.1/direnvrc" "sha256-zelF0vLbEl5uaqrfIzbgNzJWGmLzCmYAkInj/LNxvKs="
+if ! has nix_direnv_version || ! nix_direnv_version 2.4.0; then
+ source_url "https://raw.githubusercontent.com/nix-community/nix-direnv/2.4.0/direnvrc" "sha256-XQzUAvL6pysIJnRJyR7uVpmUSZfc7LSgWQwq/4mBr1U="
fi
use flake
-
-watch_file ./flake/checks.nix
-watch_file ./flake/dev-shells.nix
-
-eval "$shellHooks"
diff --git a/templates/c++-meson/.envrc b/templates/c++-meson/.envrc
index 95ed6fb..ccf325e 100644
--- a/templates/c++-meson/.envrc
+++ b/templates/c++-meson/.envrc
@@ -1,10 +1,5 @@
-if ! has nix_direnv_version || ! nix_direnv_version 2.2.1; then
- source_url "https://raw.githubusercontent.com/nix-community/nix-direnv/2.2.1/direnvrc" "sha256-zelF0vLbEl5uaqrfIzbgNzJWGmLzCmYAkInj/LNxvKs="
+if ! has nix_direnv_version || ! nix_direnv_version 2.4.0; then
+ source_url "https://raw.githubusercontent.com/nix-community/nix-direnv/2.4.0/direnvrc" "sha256-XQzUAvL6pysIJnRJyR7uVpmUSZfc7LSgWQwq/4mBr1U="
fi
use flake
-
-watch_file ./flake/checks.nix
-watch_file ./flake/dev-shells.nix
-
-eval "$shellHooks"