treewide: fix eval fallout from nixpkgs bump

This commit is contained in:
Luke Granger-Brown 2022-03-11 14:56:55 +00:00
parent 8e65f7f0cc
commit 34fa21a171
6 changed files with 42 additions and 42 deletions

View file

@ -14,7 +14,7 @@ in
{ {
heptapod-runner = pkgs.gitlab-runner.overrideAttrs (oldAttrs: rec { heptapod-runner = pkgs.gitlab-runner.overrideAttrs (oldAttrs: rec {
inherit version; inherit version;
buildInputs = oldAttrs.buildInputs ++ [ pkgs.makeWrapper ]; buildInputs = (oldAttrs.buildInputs or []) ++ [ pkgs.makeWrapper ];
src = newSrc; src = newSrc;
patches = [ ./fix-shell-path.patch ]; patches = [ ./fix-shell-path.patch ];
}); });

View file

@ -24,6 +24,7 @@ let
configuration = { configuration = {
imports = [ value ]; imports = [ value ];
config._module.args.pkgs = lib.mkForce pkgs;
config.nixpkgs.config = pkgs.config; config.nixpkgs.config = pkgs.config;
config.home.sessionVariablesExtra = '' config.home.sessionVariablesExtra = ''
export PATH="$HOME/.nix-profile/bin''${PATH:+:}$PATH" export PATH="$HOME/.nix-profile/bin''${PATH:+:}$PATH"

View file

@ -119,45 +119,45 @@ in {
}; };
services.matrix-synapse = { services.matrix-synapse = {
enable = true; enable = true;
server_name = "zxcvbnm.ninja"; settings = {
macaroon_secret_key = machineSecrets.matrix.macaroonSecretKey; server_name = "zxcvbnm.ninja";
registration_shared_secret = machineSecrets.matrix.registrationSecret; url_preview_enabled = true;
turn_uris = [ url_preview_ip_range_blacklist = [
"turns:matrix.zxcvbnm.ninja:3478?transport=udp" "127.0.0.0/8"
"turns:matrix.zxcvbnm.ninja:3478?transport=tcp" "10.0.0.0/8"
"turn:matrix.zxcvbnm.ninja:3478?transport=udp" "172.16.0.0/12"
"turn:matrix.zxcvbnm.ninja:3478?transport=tcp" "192.168.0.0/16"
]; "100.64.0.0/10"
turn_shared_secret = machineSecrets.turnSecret; "169.254.0.0/16"
public_baseurl = "https://matrix.zxcvbnm.ninja/"; "::1/128"
url_preview_enabled = true; "fe80::/64"
url_preview_ip_range_blacklist = [ "fc00::/7"
"127.0.0.0/8" ];
"10.0.0.0/8" listeners = [{
"172.16.0.0/12" port = 8008;
"192.168.0.0/16" bind_addresses = [ "::1" ];
"100.64.0.0/10" type = "http";
"169.254.0.0/16" tls = false;
"::1/128" x_forwarded = true;
"fe80::/64" resources = [{
"fc00::/7" names = [ "client" "federation" ];
]; compress = false;
listeners = [{ }];
port = 8008;
bind_address = "::1";
type = "http";
tls = false;
x_forwarded = true;
resources = [{
names = [ "client" "federation" ];
compress = false;
}]; }];
}]; turn_uris = [
extraConfig = '' "turns:matrix.zxcvbnm.ninja:3478?transport=udp"
form_secret: "${machineSecrets.matrix.formSecret}" "turns:matrix.zxcvbnm.ninja:3478?transport=tcp"
experimental_features: "turn:matrix.zxcvbnm.ninja:3478?transport=udp"
spaces_enabled: true "turn:matrix.zxcvbnm.ninja:3478?transport=tcp"
''; ];
experimental_features.spaces_enabled = true;
public_baseurl = "https://matrix.zxcvbnm.ninja/";
macaroon_secret_key = machineSecrets.matrix.macaroonSecretKey;
registration_shared_secret = machineSecrets.matrix.registrationSecret;
turn_shared_secret = machineSecrets.turnSecret;
form_secret = machineSecrets.matrix.formSecret;
};
}; };
# Users allowed to use SSL certificate for matrix.zxcvbnm.ninja. # Users allowed to use SSL certificate for matrix.zxcvbnm.ninja.

View file

@ -8,6 +8,7 @@ let
baseModule = name: { ... }: { baseModule = name: { ... }: {
_module.args = args // { _module.args = args // {
rebuilder = rebuilder name; rebuilder = rebuilder name;
pkgs = lib.mkForce pkgs;
}; };
}; };
systemFor = systemName: config: systemFor = systemName: config:

View file

@ -28,8 +28,6 @@ in
alsa.support32Bit = true; alsa.support32Bit = true;
jack.enable = true; jack.enable = true;
pulse.enable = true; pulse.enable = true;
media-session.enable = true;
}; };
security.rtkit.enable = true; security.rtkit.enable = true;

View file

@ -42,7 +42,7 @@ in
depot.nix.pkgs.common-updater-scripts depot.nix.pkgs.common-updater-scripts
go go
gopls gopls
goimports gotools
graphicsmagick-imagemagick-compat graphicsmagick-imagemagick-compat
vault vault
youtube-dl youtube-dl