Move stuff back to stable nixpkgs

This commit is contained in:
Natsu Kagami 2023-06-11 07:20:43 +02:00
parent 6306d0d927
commit 5bfa0c6402
Signed by: nki
GPG key ID: 7306B3D3C3AD6E51
12 changed files with 45 additions and 25 deletions

View file

@ -282,11 +282,11 @@
"kakoune": { "kakoune": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1682328035, "lastModified": 1685850592,
"narHash": "sha256-vH7xc39HBpMl6At5SSnfda0Qgpo282CcUfM7W2MZOIk=", "narHash": "sha256-cNJ27N4JSOrHXSYYJhitrrclNRGCR4typnS5uLGXWX0=",
"owner": "mawww", "owner": "mawww",
"repo": "kakoune", "repo": "kakoune",
"rev": "a4918f934ceb8c36ab398c0c973174ac17fc8600", "rev": "caf6f6ff7ef336f821b0fef2f4493aa6650e967d",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -399,11 +399,11 @@
}, },
"nixpkgs-unstable": { "nixpkgs-unstable": {
"locked": { "locked": {
"lastModified": 1683442750, "lastModified": 1686398752,
"narHash": "sha256-IiJ0WWW6OcCrVFl1ijE+gTaP0ChFfV6dNkJR05yStmw=", "narHash": "sha256-nGWNQVhSw4VSL+S0D0cbrNR9vs9Bq7rlYR+1K5f5j6w=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "eb751d65225ec53de9cf3d88acbf08d275882389", "rev": "a30520bf8eabf8a5c37889d661e67a2dbcaa59e6",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -44,10 +44,7 @@ with lib; {
services.mpris-proxy.enable = true; services.mpris-proxy.enable = true;
# Owncloud # Owncloud
services.owncloud-client = { services.owncloud-client.enable = true;
enable = true;
package = pkgs.unstable.owncloud-client;
};
}); });
} }

View file

@ -1,5 +1,39 @@
{ config, pkgs, lib, ... }: { config, pkgs, lib, ... }:
let
texlab = pkgs.rustPlatform.buildRustPackage rec {
pname = "texlab";
version = "5.7.0";
src = pkgs.fetchFromGitHub {
owner = "latex-lsp";
repo = "texlab";
rev = "refs/tags/v${version}";
sha256 = "sha256-GvORAPbQOdVpz4yY66b3OObewU98V26cZ6nrJ35nlkg=";
};
cargoSha256 = "sha256-b7v3ODOjY5BQCzVqlLCNUOaZS95AvIvyjOeas2XfRjM=";
outputs = [ "out" "man" ];
nativeBuildInputs = with pkgs; [ installShellFiles help2man ];
buildInputs = lib.optionals pkgs.stdenv.isDarwin (with pkgs; [
libiconv
Security
CoreServices
]);
# When we cross compile we cannot run the output executable to
# generate the man page
postInstall = ''
# TexLab builds man page separately in CI:
# https://github.com/latex-lsp/texlab/blob/v5.7.0/.github/workflows/publish.yml#L127-L131
help2man --no-info "$out/bin/texlab" > texlab.1
installManPage texlab.1
'';
};
in
{ {
imports = [ imports = [
./kakoune/kak.nix ./kakoune/kak.nix
@ -78,6 +112,8 @@
BAT_THEME = "GitHub"; BAT_THEME = "GitHub";
# Editor # Editor
EDITOR = "kak"; EDITOR = "kak";
# PATH Overrides
PATH = "${config.home.homeDirectory}/.bin/overrides:$PATH";
}; };
home.sessionPath = [ home.sessionPath = [
@ -142,6 +178,5 @@
jq.enable = true; jq.enable = true;
nushell.enable = true; nushell.enable = true;
nushell.package = pkgs.unstable.nushell;
}; };
} }

View file

@ -15,7 +15,6 @@
programs.fish = { programs.fish = {
enable = true; enable = true;
package = pkgs.unstable.fish;
functions = { functions = {
# Simplify nix usage! # Simplify nix usage!
nx = { nx = {

View file

@ -62,7 +62,6 @@
}; };
}; };
nki.programs.kitty.enable = true; nki.programs.kitty.enable = true;
nki.programs.kitty.package = pkgs.unstable.kitty; # 0.27 fixes crash on sway 1.8
nki.programs.kitty.fontSize = 14; nki.programs.kitty.fontSize = 14;
# Yellow light! # Yellow light!
@ -80,7 +79,6 @@
# mpd stuff # mpd stuff
services.mpd.musicDirectory = "${config.home.homeDirectory}/Music"; services.mpd.musicDirectory = "${config.home.homeDirectory}/Music";
services.mpd-discord-rpc.enable = true; services.mpd-discord-rpc.enable = true;
services.mpd-discord-rpc.package = pkgs.unstable.mpd-discord-rpc;
services.mpd-mpris.enable = true; services.mpd-mpris.enable = true;
# ncmpcpp # ncmpcpp
programs.ncmpcpp.enable = true; programs.ncmpcpp.enable = true;

View file

@ -3,7 +3,7 @@
let let
kakounePkg = kakounePkg =
pkgs.kakoune.override { pkgs.kakoune.override {
kakoune = with lib; pkgs.unstable.gcc11Stdenv.mkDerivation rec { kakoune = with lib; pkgs.stdenv.mkDerivation rec {
pname = "kakoune-unwrapped"; pname = "kakoune-unwrapped";
version = "r${builtins.substring 0 6 pkgs.sources.kakoune.rev}"; version = "r${builtins.substring 0 6 pkgs.sources.kakoune.rev}";
src = pkgs.sources.kakoune; src = pkgs.sources.kakoune;

View file

@ -10,7 +10,7 @@ in
basePackage = mkOption { basePackage = mkOption {
type = types.package; type = types.package;
default = pkgs.unstable.discord; default = pkgs.discord;
description = "The base Discord package that will get patched"; description = "The base Discord package that will get patched";
}; };

View file

@ -9,7 +9,6 @@ in
enable = mkEnableOption "Dump certs onto a given directory "; enable = mkEnableOption "Dump certs onto a given directory ";
package = mkOption { package = mkOption {
type = types.package; type = types.package;
default = pkgs.unstable.traefik-certs-dumper;
description = "The certs dumper package to use"; description = "The certs dumper package to use";
}; };
destination = mkOption { destination = mkOption {

View file

@ -94,7 +94,6 @@
sops.secrets.heisenbridge = { owner = "heisenbridge"; }; sops.secrets.heisenbridge = { owner = "heisenbridge"; };
sops.secrets.matrix-discord-bridge = { mode = "0644"; }; sops.secrets.matrix-discord-bridge = { mode = "0644"; };
cloud.conduit.enable = true; cloud.conduit.enable = true;
cloud.conduit.package = pkgs.unstable.matrix-conduit;
cloud.conduit.instances = { cloud.conduit.instances = {
"nkagami" = { "nkagami" = {
host = "m.nkagami.me"; host = "m.nkagami.me";
@ -158,10 +157,6 @@
envFile = config.sops.secrets.youmubot-env.path; envFile = config.sops.secrets.youmubot-env.path;
}; };
# Writefreely on nki
# cloud.writefreely.enable = true;
# cloud.writefreely.package = pkgs.unstable.writefreely;
# Authentik # Authentik
sops.secrets.authentik-env = { }; sops.secrets.authentik-env = { };
cloud.authentik.enable = true; cloud.authentik.enable = true;

View file

@ -85,7 +85,6 @@ in
services.gitea = { services.gitea = {
enable = true; enable = true;
package = pkgs.unstable.gitea;
inherit user; inherit user;

View file

@ -25,7 +25,6 @@ rec {
services.headscale = { services.headscale = {
enable = true; enable = true;
package = pkgs.unstable.headscale;
inherit port; inherit port;
settings = { settings = {

View file

@ -24,7 +24,6 @@ in
nki.services.writefreely = { nki.services.writefreely = {
inherit host user; inherit host user;
enable = true; enable = true;
package = pkgs.unstable.writefreely;
group = user; group = user;