Nix configurations for my homelab

update tangled

yemou.pink 6d319f69 e2746a2f

verified
Changed files
+43 -26
modules
services
+38 -21
flake.lock
···
{
"nodes": {
+
"actor-typeahead-src": {
+
"flake": false,
+
"locked": {
+
"lastModified": 1762835797,
+
"narHash": "sha256-heizoWUKDdar6ymfZTnj3ytcEv/L4d4fzSmtr0HlXsQ=",
+
"ref": "refs/heads/main",
+
"rev": "677fe7f743050a4e7f09d4a6f87bbf1325a06f6b",
+
"revCount": 6,
+
"type": "git",
+
"url": "https://tangled.org/@jakelazaroff.com/actor-typeahead"
+
},
+
"original": {
+
"type": "git",
+
"url": "https://tangled.org/@jakelazaroff.com/actor-typeahead"
+
}
+
},
"flake-compat": {
"flake": false,
"locked": {
···
},
"nixpkgs": {
"locked": {
-
"lastModified": 1763377333,
-
"narHash": "sha256-GtikA/H/igDjeLBq1J34N0ZtmsEO4g67B7UbBhLHXKo=",
+
"lastModified": 1763553727,
+
"narHash": "sha256-4aRqRkYHplWk0mrtoF5i3Uo73E3niOWiUZU8kmPm9hQ=",
"owner": "NixOS",
"repo": "nixpkgs",
-
"rev": "c0fad0156f3ee09c49be8afcf66d4ef61c46f9c6",
+
"rev": "094318ea16502a7a81ce90dd3638697020f030a2",
"type": "github"
},
"original": {
···
},
"nixpkgs-stable": {
"locked": {
-
"lastModified": 1763411310,
-
"narHash": "sha256-yRA5u7CxGbBcr9D/biN0dX5LbQvKPvE+BfYo4qNdWCY=",
+
"lastModified": 1763608124,
+
"narHash": "sha256-zlZnIcby+AdBREjjqOG7xLamvs2RljQ48dyUwYFD6oM=",
"owner": "NixOS",
"repo": "nixpkgs",
-
"rev": "125da908972a1f0c803cffce8de607e20a77d7ed",
+
"rev": "f6af808f2d4b1d2feb64ec2d9901b322e980938a",
"type": "github"
},
"original": {
···
},
"nixpkgs-unstable": {
"locked": {
-
"lastModified": 1763283776,
-
"narHash": "sha256-Y7TDFPK4GlqrKrivOcsHG8xSGqQx3A6c+i7novT85Uk=",
+
"lastModified": 1763421233,
+
"narHash": "sha256-Stk9ZYRkGrnnpyJ4eqt9eQtdFWRRIvMxpNRf4sIegnw=",
"owner": "NixOS",
"repo": "nixpkgs",
-
"rev": "50a96edd8d0db6cc8db57dab6bb6d6ee1f3dc49a",
+
"rev": "89c2b2330e733d6cdb5eae7b899326930c2c0648",
"type": "github"
},
"original": {
···
"rust-overlay": "rust-overlay"
},
"locked": {
-
"lastModified": 1763403324,
-
"narHash": "sha256-piGqnOdb5CJC8kVAjdFFvN9C/ImCNoi0Wkrt+0ulDig=",
+
"lastModified": 1763583727,
+
"narHash": "sha256-nhEg5l2h9fjqjFyBd+85laV6A3coUIN2UFhGoHJJxSI=",
"owner": "roc-lang",
"repo": "roc",
-
"rev": "6e50ca09fa8c0485cabe85b39a886228c80008ee",
+
"rev": "2fc3b7afb622fcc66d899975ba6a208e1c1d199e",
"type": "github"
},
"original": {
···
"nixpkgs": "nixpkgs_3"
},
"locked": {
-
"lastModified": 1763417348,
-
"narHash": "sha256-n5xDOeNN+smocQp3EMIc11IzBlR9wvvTIJZeL0g33Fs=",
+
"lastModified": 1763607916,
+
"narHash": "sha256-VefBA1JWRXM929mBAFohFUtQJLUnEwZ2vmYUNkFnSjE=",
"owner": "Mic92",
"repo": "sops-nix",
-
"rev": "3f66a7fb9626a9a9c077612ef10a0ce396286c7d",
+
"rev": "877bb495a6f8faf0d89fc10bd142c4b7ed2bcc0b",
"type": "github"
},
"original": {
···
},
"tangled": {
"inputs": {
+
"actor-typeahead-src": "actor-typeahead-src",
"flake-compat": "flake-compat_2",
"gomod2nix": "gomod2nix",
"htmx-src": "htmx-src",
···
"sqlite-lib-src": "sqlite-lib-src"
},
"locked": {
-
"lastModified": 1760875893,
-
"narHash": "sha256-t6OWN+7N4oeYhnfclOPyw0ZVsFrsWPXbXTGseyCKVMg=",
-
"ref": "refs/tags/v1.10.0-alpha",
-
"rev": "71d46921a8891ddf80417980d954b145be6cd213",
-
"revCount": 1546,
+
"lastModified": 1763627666,
+
"narHash": "sha256-t8UQ85/bPXrbFs3V/paFtQvv4lSrr2lszrdcgspuAaA=",
+
"ref": "refs/tags/v1.11.0-alpha",
+
"rev": "12ef7f8f63ee4a14a552ebed603802c79e4d72f8",
+
"revCount": 1678,
"type": "git",
"url": "https://tangled.org/tangled.org/core"
},
"original": {
-
"ref": "refs/tags/v1.10.0-alpha",
+
"ref": "refs/tags/v1.11.0-alpha",
"type": "git",
"url": "https://tangled.org/tangled.org/core"
}
+1 -1
flake.nix
···
};
roc-lang.url = "github:roc-lang/roc";
-
tangled.url = "git+https://tangled.org/tangled.org/core?ref=refs/tags/v1.10.0-alpha";
+
tangled.url = "git+https://tangled.org/tangled.org/core?ref=refs/tags/v1.11.0-alpha";
nixpkgs-pr432663-modrinth.url = "github:getchoo-contrib/nixpkgs?ref=pkgs/modrinth-app/0.10.3";
};
+4 -4
modules/services/tangled.nix
···
{
directory = "/var/lib/tangled";
mode = "0700";
-
user = config.services.tangled-knot.gitUser;
-
group = config.services.tangled-knot.gitUser;
+
user = config.services.tangled.knot.gitUser;
+
group = config.services.tangled.knot.gitUser;
}
];
services.openssh = {
ports = [ 22 ];
-
settings.AllowUsers = [ "${config.services.tangled-knot.gitUser}" ];
+
settings.AllowUsers = [ "${config.services.tangled.knot.gitUser}" ];
};
networking.firewall.allowedTCPPorts = [ 22 ];
-
services.tangled-knot = {
+
services.tangled.knot = {
enable = true;
openFirewall = false;
stateDir = "/var/lib/tangled";