treewide: fix eval fallout from nixpkgs bump
This commit is contained in:
parent
8e65f7f0cc
commit
34fa21a171
6 changed files with 42 additions and 42 deletions
|
@ -14,7 +14,7 @@ in
|
||||||
{
|
{
|
||||||
heptapod-runner = pkgs.gitlab-runner.overrideAttrs (oldAttrs: rec {
|
heptapod-runner = pkgs.gitlab-runner.overrideAttrs (oldAttrs: rec {
|
||||||
inherit version;
|
inherit version;
|
||||||
buildInputs = oldAttrs.buildInputs ++ [ pkgs.makeWrapper ];
|
buildInputs = (oldAttrs.buildInputs or []) ++ [ pkgs.makeWrapper ];
|
||||||
src = newSrc;
|
src = newSrc;
|
||||||
patches = [ ./fix-shell-path.patch ];
|
patches = [ ./fix-shell-path.patch ];
|
||||||
});
|
});
|
||||||
|
|
|
@ -24,6 +24,7 @@ let
|
||||||
|
|
||||||
configuration = {
|
configuration = {
|
||||||
imports = [ value ];
|
imports = [ value ];
|
||||||
|
config._module.args.pkgs = lib.mkForce pkgs;
|
||||||
config.nixpkgs.config = pkgs.config;
|
config.nixpkgs.config = pkgs.config;
|
||||||
config.home.sessionVariablesExtra = ''
|
config.home.sessionVariablesExtra = ''
|
||||||
export PATH="$HOME/.nix-profile/bin''${PATH:+:}$PATH"
|
export PATH="$HOME/.nix-profile/bin''${PATH:+:}$PATH"
|
||||||
|
|
|
@ -119,45 +119,45 @@ in {
|
||||||
};
|
};
|
||||||
services.matrix-synapse = {
|
services.matrix-synapse = {
|
||||||
enable = true;
|
enable = true;
|
||||||
server_name = "zxcvbnm.ninja";
|
settings = {
|
||||||
macaroon_secret_key = machineSecrets.matrix.macaroonSecretKey;
|
server_name = "zxcvbnm.ninja";
|
||||||
registration_shared_secret = machineSecrets.matrix.registrationSecret;
|
url_preview_enabled = true;
|
||||||
turn_uris = [
|
url_preview_ip_range_blacklist = [
|
||||||
"turns:matrix.zxcvbnm.ninja:3478?transport=udp"
|
"127.0.0.0/8"
|
||||||
"turns:matrix.zxcvbnm.ninja:3478?transport=tcp"
|
"10.0.0.0/8"
|
||||||
"turn:matrix.zxcvbnm.ninja:3478?transport=udp"
|
"172.16.0.0/12"
|
||||||
"turn:matrix.zxcvbnm.ninja:3478?transport=tcp"
|
"192.168.0.0/16"
|
||||||
];
|
"100.64.0.0/10"
|
||||||
turn_shared_secret = machineSecrets.turnSecret;
|
"169.254.0.0/16"
|
||||||
public_baseurl = "https://matrix.zxcvbnm.ninja/";
|
"::1/128"
|
||||||
url_preview_enabled = true;
|
"fe80::/64"
|
||||||
url_preview_ip_range_blacklist = [
|
"fc00::/7"
|
||||||
"127.0.0.0/8"
|
];
|
||||||
"10.0.0.0/8"
|
listeners = [{
|
||||||
"172.16.0.0/12"
|
port = 8008;
|
||||||
"192.168.0.0/16"
|
bind_addresses = [ "::1" ];
|
||||||
"100.64.0.0/10"
|
type = "http";
|
||||||
"169.254.0.0/16"
|
tls = false;
|
||||||
"::1/128"
|
x_forwarded = true;
|
||||||
"fe80::/64"
|
resources = [{
|
||||||
"fc00::/7"
|
names = [ "client" "federation" ];
|
||||||
];
|
compress = false;
|
||||||
listeners = [{
|
}];
|
||||||
port = 8008;
|
|
||||||
bind_address = "::1";
|
|
||||||
type = "http";
|
|
||||||
tls = false;
|
|
||||||
x_forwarded = true;
|
|
||||||
resources = [{
|
|
||||||
names = [ "client" "federation" ];
|
|
||||||
compress = false;
|
|
||||||
}];
|
}];
|
||||||
}];
|
turn_uris = [
|
||||||
extraConfig = ''
|
"turns:matrix.zxcvbnm.ninja:3478?transport=udp"
|
||||||
form_secret: "${machineSecrets.matrix.formSecret}"
|
"turns:matrix.zxcvbnm.ninja:3478?transport=tcp"
|
||||||
experimental_features:
|
"turn:matrix.zxcvbnm.ninja:3478?transport=udp"
|
||||||
spaces_enabled: true
|
"turn:matrix.zxcvbnm.ninja:3478?transport=tcp"
|
||||||
'';
|
];
|
||||||
|
experimental_features.spaces_enabled = true;
|
||||||
|
public_baseurl = "https://matrix.zxcvbnm.ninja/";
|
||||||
|
|
||||||
|
macaroon_secret_key = machineSecrets.matrix.macaroonSecretKey;
|
||||||
|
registration_shared_secret = machineSecrets.matrix.registrationSecret;
|
||||||
|
turn_shared_secret = machineSecrets.turnSecret;
|
||||||
|
form_secret = machineSecrets.matrix.formSecret;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# Users allowed to use SSL certificate for matrix.zxcvbnm.ninja.
|
# Users allowed to use SSL certificate for matrix.zxcvbnm.ninja.
|
||||||
|
|
|
@ -8,6 +8,7 @@ let
|
||||||
baseModule = name: { ... }: {
|
baseModule = name: { ... }: {
|
||||||
_module.args = args // {
|
_module.args = args // {
|
||||||
rebuilder = rebuilder name;
|
rebuilder = rebuilder name;
|
||||||
|
pkgs = lib.mkForce pkgs;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
systemFor = systemName: config:
|
systemFor = systemName: config:
|
||||||
|
|
|
@ -28,8 +28,6 @@ in
|
||||||
alsa.support32Bit = true;
|
alsa.support32Bit = true;
|
||||||
jack.enable = true;
|
jack.enable = true;
|
||||||
pulse.enable = true;
|
pulse.enable = true;
|
||||||
|
|
||||||
media-session.enable = true;
|
|
||||||
};
|
};
|
||||||
security.rtkit.enable = true;
|
security.rtkit.enable = true;
|
||||||
|
|
||||||
|
|
|
@ -42,7 +42,7 @@ in
|
||||||
depot.nix.pkgs.common-updater-scripts
|
depot.nix.pkgs.common-updater-scripts
|
||||||
go
|
go
|
||||||
gopls
|
gopls
|
||||||
goimports
|
gotools
|
||||||
graphicsmagick-imagemagick-compat
|
graphicsmagick-imagemagick-compat
|
||||||
vault
|
vault
|
||||||
youtube-dl
|
youtube-dl
|
||||||
|
|
Loading…
Reference in a new issue