mirror of
				https://github.com/materusPL/nixos-config
				synced 2025-11-04 06:20:27 +01:00 
			
		
		
		
	Compare commits
	
		
			8 Commits
		
	
	
		
			448e1c58ae
			...
			1f822e8211
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 1f822e8211 | |||
| f8acddeb2c | |||
| d4b7c80be6 | |||
| 7135b53f7d | |||
| 879c876721 | |||
| 79bc6c72df | |||
| c5602cebbf | |||
| ed1b629386 | 
@ -29,4 +29,9 @@
 | 
			
		||||
  materus.profile.fonts.enable = true;
 | 
			
		||||
  materus.profile.steam.enable = true;
 | 
			
		||||
 | 
			
		||||
  services.logind.extraConfig  = ''
 | 
			
		||||
    NAutoVTs=4
 | 
			
		||||
    ReserveVT=4
 | 
			
		||||
  '';
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -4,6 +4,19 @@
 | 
			
		||||
    WIREGUARD_PRIVATEKEY="${config.sops.placeholder.wireguard}"
 | 
			
		||||
  '';
 | 
			
		||||
 | 
			
		||||
  networking.firewall = {
 | 
			
		||||
   logReversePathDrops = false;
 | 
			
		||||
   # wireguard trips rpfilter up
 | 
			
		||||
   extraCommands = ''
 | 
			
		||||
     ip46tables -t mangle -I nixos-fw-rpfilter -p udp -m udp --sport ${materusArg.wireguard.port} -j RETURN
 | 
			
		||||
     ip46tables -t mangle -I nixos-fw-rpfilter -p udp -m udp --dport ${materusArg.wireguard.port} -j RETURN
 | 
			
		||||
   '';
 | 
			
		||||
   extraStopCommands = ''
 | 
			
		||||
     ip46tables -t mangle -D nixos-fw-rpfilter -p udp -m udp --sport ${materusArg.wireguard.port} -j RETURN || true
 | 
			
		||||
     ip46tables -t mangle -D nixos-fw-rpfilter -p udp -m udp --dport ${materusArg.wireguard.port} -j RETURN || true
 | 
			
		||||
   '';
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  networking.useDHCP = lib.mkDefault true;
 | 
			
		||||
  networking.hostName = "materusPC";
 | 
			
		||||
  networking.wireless.iwd.enable = true;
 | 
			
		||||
@ -23,6 +36,7 @@
 | 
			
		||||
      uri = "http://nmcheck.gnome.org/check_network_status.txt";
 | 
			
		||||
    };
 | 
			
		||||
  };
 | 
			
		||||
  
 | 
			
		||||
 | 
			
		||||
  networking.networkmanager.ensureProfiles.environmentFiles = [
 | 
			
		||||
    config.sops.templates."networkmanager.env".path
 | 
			
		||||
 | 
			
		||||
@ -76,7 +76,6 @@
 | 
			
		||||
      "libvirt"
 | 
			
		||||
      "libvirtd"
 | 
			
		||||
      "podman"
 | 
			
		||||
      "lxd"
 | 
			
		||||
    ];
 | 
			
		||||
    shell = pkgs.zsh;
 | 
			
		||||
    description = "Mateusz Słodkowicz";
 | 
			
		||||
 | 
			
		||||
										
											Binary file not shown.
										
									
								
							@ -1,4 +1,4 @@
 | 
			
		||||
ireguard: ENC[AES256_GCM,data:wBeMFAZ1Dib84bIzQ3m0DiVpz92ZqvJiDz+IXV5rLtJ3OjpNFqbiTSVZnlU=,iv:mJqbXafDv0FqUlY1s69DXbcN7Sd+rxas7IPefFKsMNE=,tag:Ic94bnY0MULfow70KkBWmA==,type:str]
 | 
			
		||||
wireguard: ENC[AES256_GCM,data:fFQKj78HGLDmslDST+usAZxWDanHkUORBgIeOb7lQN4EPXdz6mQODHhn1ek=,iv:/BbbiFlfk8fMX4yFgVXuYkxitbRJqai5PHku2wZUFw4=,tag:cutoXkApljbB3bgSvaS1LQ==,type:str]
 | 
			
		||||
nextcloud-adminpass: ENC[AES256_GCM,data:5vohRPEcJJ8gIRro38O73ufSYYEp1DXpBgjCPdPnMcg=,iv:STh3k5wUwx3AfSDTPCXhuXbPb3d+Vi1cAaQN2a9eW1w=,tag:Ef/Z2Idvl6575Jvs2GDJ8A==,type:str]
 | 
			
		||||
jwt: ENC[AES256_GCM,data:1Qn7DaBZr8vEa8VZiv2BpwePPOBYRTdHEiDv0asUbvhCtfHvhG4mX5/plyRPlQok6FLEjEzKZTEdnvyyOtFEgA==,iv:kqfHkEr0jkKAro9gQup6CeopQnjfMGhEqbVL81wnDgc=,tag:gP/WACy5cOzzmQOh1v8wsQ==,type:str]
 | 
			
		||||
lldap-database: ENC[AES256_GCM,data:rNLS4WwvqRd3TFWDXaf8UmDTRsHZNPPS,iv:URV4Oz4ik2vHb03+Zh7ND+AbozSmoXpxENpvad4yvRI=,tag:6TbuMCnHwtTaG5mMWVN/mQ==,type:str]
 | 
			
		||||
@ -33,8 +33,8 @@ sops:
 | 
			
		||||
            eFN4VVdUMkVjcTVWNFdLM0xtbExLdncK6LYUufWzIcd2jFyEeZDypo0xkJQ4z91F
 | 
			
		||||
            ULyGxJLLWl6/inYXtxHNdxIIPfwW+5yppBAbXaOgvABi1E7tf1JZcA==
 | 
			
		||||
            -----END AGE ENCRYPTED FILE-----
 | 
			
		||||
    lastmodified: "2024-09-10T12:55:49Z"
 | 
			
		||||
    mac: ENC[AES256_GCM,data:/YXB4vQxd5+ZZrkqKFVYIcNJF4j8PricarHyi0ESi4HXr00Efnat+NnoM74Sy/ukrKIJOKBKVVWmmEW8uFCK4H+kJrMkdagALhsjMkeMSB23cmP8nLbCus5QPhX3bSpkZwYNuspmEYN1cQCHvaLC5Eus+YIi92L+KqHsWJS71iM=,iv:OIwGUDG63wbaxCaLpkior76Ckyql2c4was4PXEc1miY=,tag:lwM1QRCEc6zX9a+yv0mN8A==,type:str]
 | 
			
		||||
    lastmodified: "2024-09-13T18:29:55Z"
 | 
			
		||||
    mac: ENC[AES256_GCM,data:djOmSpNrZoFgUK4JlueCUpZtvHldVEsH90ASO+strLJ7wd1MEFdQaYyNonvTaUUzJQkUncyX3cXdO9Aoj9B6CPSKAuSKE7LRScCCXn+OezwUB5d5m/jLy4KmRhtADO0QHap4+/3fXzOupsHyZpVMIjwUw4tJ9MZMT8iMtbaHv2A=,iv:x4RaxRelUOyyTWpTLFRik92TibE+2mFctz/OYHvBoZA=,tag:S9dIzTc7rVBSFXUISuEDAQ==,type:str]
 | 
			
		||||
    pgp:
 | 
			
		||||
        - created_at: "2024-03-21T18:15:00Z"
 | 
			
		||||
          enc: |-
 | 
			
		||||
 | 
			
		||||
@ -7,12 +7,13 @@
 | 
			
		||||
      cfg = config.waffentragerService.jellyfin;
 | 
			
		||||
    in
 | 
			
		||||
    lib.mkIf cfg.enable {
 | 
			
		||||
      services.jellyfin = {
 | 
			
		||||
      services.jellyfin = rec {
 | 
			
		||||
        enable = true;
 | 
			
		||||
        openFirewall = true;
 | 
			
		||||
        user = "materus";
 | 
			
		||||
        group = "nextcloud";
 | 
			
		||||
        dataDir = config.waffentragerService.elements.jellyfinDir;
 | 
			
		||||
        cacheDir = "${dataDir}/cache";
 | 
			
		||||
      };
 | 
			
		||||
      /*
 | 
			
		||||
      services.jellyseerr = {
 | 
			
		||||
@ -20,30 +21,129 @@
 | 
			
		||||
        openFirewall = true;
 | 
			
		||||
      };*/
 | 
			
		||||
 | 
			
		||||
      services.nginx.virtualHosts = {
 | 
			
		||||
        "noot.materus.pl" = {
 | 
			
		||||
          sslTrustedCertificate = "/var/lib/mnt_acme/materus.pl/chain.pem";
 | 
			
		||||
          sslCertificateKey = "/var/lib/mnt_acme/materus.pl/key.pem";
 | 
			
		||||
          sslCertificate = "/var/lib/mnt_acme/materus.pl/fullchain.pem";
 | 
			
		||||
          addSSL = true;
 | 
			
		||||
          http2 = false;
 | 
			
		||||
          http3 = true;
 | 
			
		||||
          locations."/" = {
 | 
			
		||||
            proxyPass = "http://127.0.0.1:8096";
 | 
			
		||||
      services.nginx = {
 | 
			
		||||
        appendHttpConfig = ''
 | 
			
		||||
          map $request_uri $h264Level { ~(h264-level=)(.+?)& $2; }
 | 
			
		||||
          map $request_uri $h264Profile { ~(h264-profile=)(.+?)& $2; }
 | 
			
		||||
        '';
 | 
			
		||||
        proxyCachePath."jellyfin" = {
 | 
			
		||||
          enable = true;
 | 
			
		||||
          maxSize = "1g";
 | 
			
		||||
          levels = "1:2";
 | 
			
		||||
          keysZoneName = "jellyfin";
 | 
			
		||||
          keysZoneSize = "100m";
 | 
			
		||||
          inactive = "1d";
 | 
			
		||||
          useTempPath = false;
 | 
			
		||||
 | 
			
		||||
        };
 | 
			
		||||
        virtualHosts = {
 | 
			
		||||
          "noot.materus.pl" = {
 | 
			
		||||
            extraConfig = ''
 | 
			
		||||
              client_max_body_size 2G;
 | 
			
		||||
              include ${config.services.nginx.package}/conf/fastcgi.conf;
 | 
			
		||||
              include ${config.services.nginx.package}/conf/fastcgi_params;
 | 
			
		||||
              proxy_http_version 1.1;
 | 
			
		||||
              proxy_set_header    Host                $host;
 | 
			
		||||
              proxy_set_header    X-Real-IP           $remote_addr;
 | 
			
		||||
              proxy_set_header    X-Forwarded-Ssl     on;
 | 
			
		||||
              proxy_set_header    X-Forwarded-For     $proxy_add_x_forwarded_for;
 | 
			
		||||
              proxy_set_header    X-Forwarded-Proto   $scheme;
 | 
			
		||||
 | 
			
		||||
              client_max_body_size 20M;
 | 
			
		||||
              add_header X-Frame-Options "SAMEORIGIN";
 | 
			
		||||
              add_header X-XSS-Protection "0"; # Do NOT enable. This is obsolete/dangerous
 | 
			
		||||
              add_header X-Content-Type-Options "nosniff";
 | 
			
		||||
              add_header Permissions-Policy "accelerometer=(), ambient-light-sensor=(), battery=(), bluetooth=(), camera=(), clipboard-read=(), display-capture=(), document-domain=(), encrypted-media=(), gamepad=(), geolocation=(), gyroscope=(), hid=(), idle-detection=(), interest-cohort=(), keyboard-map=(), local-fonts=(), magnetometer=(), microphone=(), payment=(), publickey-credentials-get=(), serial=(), sync-xhr=(), usb=(), xr-spatial-tracking=()" always;
 | 
			
		||||
            '';
 | 
			
		||||
          };
 | 
			
		||||
            sslTrustedCertificate = "/var/lib/mnt_acme/materus.pl/chain.pem";
 | 
			
		||||
            sslCertificateKey = "/var/lib/mnt_acme/materus.pl/key.pem";
 | 
			
		||||
            sslCertificate = "/var/lib/mnt_acme/materus.pl/fullchain.pem";
 | 
			
		||||
            addSSL = true;
 | 
			
		||||
            http2 = false;
 | 
			
		||||
            http3 = true;
 | 
			
		||||
            locations."~ /Items/(.*)/Images" = {
 | 
			
		||||
              proxyPass = "http://127.0.0.1:8096";
 | 
			
		||||
              extraConfig = ''
 | 
			
		||||
                proxy_set_header Host $host;
 | 
			
		||||
                proxy_set_header X-Real-IP $remote_addr;
 | 
			
		||||
                proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
 | 
			
		||||
                proxy_set_header X-Forwarded-Proto $scheme;
 | 
			
		||||
                proxy_set_header X-Forwarded-Protocol $scheme;
 | 
			
		||||
                proxy_set_header X-Forwarded-Host $http_host;
 | 
			
		||||
 | 
			
		||||
                proxy_cache jellyfin;
 | 
			
		||||
                proxy_cache_revalidate on;
 | 
			
		||||
                proxy_cache_lock on;
 | 
			
		||||
              '';
 | 
			
		||||
            };
 | 
			
		||||
            locations."~ ^/web/htmlVideoPlayer-plugin.[0-9a-z]+.chunk.js$" = {
 | 
			
		||||
              proxyPass = "http://127.0.0.1:8096";
 | 
			
		||||
              extraConfig = ''
 | 
			
		||||
                proxy_set_header Accept-Encoding "";
 | 
			
		||||
 | 
			
		||||
                sub_filter_types *;
 | 
			
		||||
                sub_filter 'return u=30' 'return u=600';
 | 
			
		||||
                sub_filter 'return u=6' 'return u=60';
 | 
			
		||||
                sub_filter 'maxBufferLength:u' 'maxBufferLength:u,maxBufferSize:180000000';
 | 
			
		||||
                sub_filter_once on;
 | 
			
		||||
              '';
 | 
			
		||||
            };
 | 
			
		||||
            locations."~* ^/Videos/(.*)/(?!live)" = {
 | 
			
		||||
              proxyPass = "http://127.0.0.1:8096";
 | 
			
		||||
              extraConfig = ''
 | 
			
		||||
                # Set size of a slice (this amount will be always requested from the backend by nginx)
 | 
			
		||||
                # Higher value means more latency, lower more overhead
 | 
			
		||||
                # This size is independent of the size clients/browsers can request
 | 
			
		||||
                slice 2m;
 | 
			
		||||
 | 
			
		||||
                proxy_cache jellyfin;
 | 
			
		||||
                proxy_cache_valid 200 206 301 302 30d;
 | 
			
		||||
                proxy_ignore_headers Expires Cache-Control Set-Cookie X-Accel-Expires;
 | 
			
		||||
                proxy_cache_use_stale error timeout invalid_header updating http_500 http_502 http_503 http_504;
 | 
			
		||||
                proxy_connect_timeout 15s;
 | 
			
		||||
                proxy_http_version 1.1;
 | 
			
		||||
                proxy_set_header Connection "";
 | 
			
		||||
                # Transmit slice range to the backend
 | 
			
		||||
                proxy_set_header Range $slice_range;
 | 
			
		||||
 | 
			
		||||
                # This saves bandwidth between the proxy and jellyfin, as a file is only downloaded one time instead of multiple times when multiple clients want to at the same time
 | 
			
		||||
                # The first client will trigger the download, the other clients will have to wait until the slice is cached
 | 
			
		||||
                # Esp. practical during SyncPlay
 | 
			
		||||
                proxy_cache_lock on;
 | 
			
		||||
                proxy_cache_lock_age 60s;
 | 
			
		||||
 | 
			
		||||
                proxy_cache_key "jellyvideo$uri?MediaSourceId=$arg_MediaSourceId&VideoCodec=$arg_VideoCodec&AudioCodec=$arg_AudioCodec&AudioStreamIndex=$arg_AudioStreamIndex&VideoBitrate=$arg_VideoBitrate&AudioBitrate=$arg_AudioBitrate&SubtitleMethod=$arg_SubtitleMethod&TranscodingMaxAudioChannels=$arg_TranscodingMaxAudioChannels&RequireAvc=$arg_RequireAvc&SegmentContainer=$arg_SegmentContainer&MinSegments=$arg_MinSegments&BreakOnNonKeyFrames=$arg_BreakOnNonKeyFrames&h264-profile=$h264Profile&h264-level=$h264Level&slicerange=$slice_range";
 | 
			
		||||
 | 
			
		||||
              '';
 | 
			
		||||
            };
 | 
			
		||||
            locations."/" = {
 | 
			
		||||
              proxyPass = "http://127.0.0.1:8096";
 | 
			
		||||
              extraConfig = ''
 | 
			
		||||
                proxy_pass_request_headers on;
 | 
			
		||||
 | 
			
		||||
                proxy_set_header Host $host;
 | 
			
		||||
 | 
			
		||||
                proxy_set_header X-Real-IP $remote_addr;
 | 
			
		||||
                proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
 | 
			
		||||
                proxy_set_header X-Forwarded-Proto $scheme;
 | 
			
		||||
                proxy_set_header X-Forwarded-Host $http_host;
 | 
			
		||||
 | 
			
		||||
                proxy_set_header Upgrade $http_upgrade;
 | 
			
		||||
                proxy_set_header Connection $http_connection;
 | 
			
		||||
                
 | 
			
		||||
 | 
			
		||||
              '';
 | 
			
		||||
            };
 | 
			
		||||
            locations."/socket" = {
 | 
			
		||||
              proxyPass = "http://127.0.0.1:8096";
 | 
			
		||||
              extraConfig = ''
 | 
			
		||||
                proxy_pass_request_headers on;
 | 
			
		||||
 | 
			
		||||
                proxy_http_version 1.1;
 | 
			
		||||
                proxy_set_header Upgrade $http_upgrade;
 | 
			
		||||
                proxy_set_header Connection "upgrade";
 | 
			
		||||
                proxy_set_header Host $host;
 | 
			
		||||
                proxy_set_header X-Real-IP $remote_addr;
 | 
			
		||||
                proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
 | 
			
		||||
                proxy_set_header X-Forwarded-Proto $scheme;
 | 
			
		||||
                proxy_set_header X-Forwarded-Protocol $scheme;
 | 
			
		||||
                proxy_set_header X-Forwarded-Host $http_host;
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
              '';
 | 
			
		||||
            };
 | 
			
		||||
 | 
			
		||||
          };
 | 
			
		||||
        };
 | 
			
		||||
      };
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,4 @@
 | 
			
		||||
{ materusArg, config, lib, ... }:
 | 
			
		||||
{ materusArg, config, lib, pkgs, ... }:
 | 
			
		||||
{
 | 
			
		||||
  options.waffentragerService.nginx.enable = materusArg.pkgs.lib.mkBoolOpt false "Enable nginx";
 | 
			
		||||
 | 
			
		||||
@ -14,6 +14,16 @@
 | 
			
		||||
        recommendedTlsSettings = true;
 | 
			
		||||
        recommendedOptimisation = true;
 | 
			
		||||
        recommendedGzipSettings = true;
 | 
			
		||||
        package = pkgs.tengine;
 | 
			
		||||
        virtualHosts."default" = {
 | 
			
		||||
          sslTrustedCertificate = "/var/lib/mnt_acme/materus.pl/chain.pem";
 | 
			
		||||
          sslCertificateKey = "/var/lib/mnt_acme/materus.pl/key.pem";
 | 
			
		||||
          sslCertificate = "/var/lib/mnt_acme/materus.pl/fullchain.pem";
 | 
			
		||||
          forceSSL = true;
 | 
			
		||||
          http2 = false;
 | 
			
		||||
          default = true;
 | 
			
		||||
          locations."/" = { extraConfig = ''deny all;''; };
 | 
			
		||||
        };
 | 
			
		||||
      };
 | 
			
		||||
 | 
			
		||||
      systemd.services.nginx = {
 | 
			
		||||
 | 
			
		||||
@ -33,6 +33,7 @@ with materusArg.pkgs.lib;
 | 
			
		||||
    (discord.override { nss = nss_latest; withOpenASAR = true; withTTS = true; })
 | 
			
		||||
    tdesktop
 | 
			
		||||
    mpv
 | 
			
		||||
    syncplay
 | 
			
		||||
    ani-cli
 | 
			
		||||
    nextcloud-client
 | 
			
		||||
    spotify
 | 
			
		||||
 | 
			
		||||
@ -1,6 +1,6 @@
 | 
			
		||||
#/usr/bin/env bash
 | 
			
		||||
IFS=$'\n'
 | 
			
		||||
 | 
			
		||||
nix build nixpkgs\#imagemagick --no-link
 | 
			
		||||
CONVERT="$(nix eval nixpkgs\#imagemagick.outPath | tr -d '"')/bin/magick"
 | 
			
		||||
convert_cmd () {
 | 
			
		||||
if  ! command -v magick &> /dev/null; then $CONVERT "$@"; else convert "$@"; fi
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										140
									
								
								flake.lock
									
									
									
										generated
									
									
									
								
							
							
						
						
									
										140
									
								
								flake.lock
									
									
									
										generated
									
									
									
								
							@ -159,11 +159,11 @@
 | 
			
		||||
        "nixpkgs-stable": "nixpkgs-stable"
 | 
			
		||||
      },
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1725267572,
 | 
			
		||||
        "narHash": "sha256-s5+GUIs8OewO1McYn3bhMz31Q+Xl0WRxUTKp+lPZLno=",
 | 
			
		||||
        "lastModified": 1726305199,
 | 
			
		||||
        "narHash": "sha256-TuLybRSsT1+AKuX0wgqaZg8LVrjDphQhWRxL0Cyt3ug=",
 | 
			
		||||
        "owner": "nix-community",
 | 
			
		||||
        "repo": "emacs-overlay",
 | 
			
		||||
        "rev": "2f7c7275d542f59760bd307e5805572cee65ae37",
 | 
			
		||||
        "rev": "c8644c5d59fee9a24a1be146bb6ce5b41d23592e",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -186,11 +186,11 @@
 | 
			
		||||
        "nixpkgs-stable": "nixpkgs-stable_3"
 | 
			
		||||
      },
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1725267572,
 | 
			
		||||
        "narHash": "sha256-s5+GUIs8OewO1McYn3bhMz31Q+Xl0WRxUTKp+lPZLno=",
 | 
			
		||||
        "lastModified": 1726305199,
 | 
			
		||||
        "narHash": "sha256-TuLybRSsT1+AKuX0wgqaZg8LVrjDphQhWRxL0Cyt3ug=",
 | 
			
		||||
        "owner": "nix-community",
 | 
			
		||||
        "repo": "emacs-overlay",
 | 
			
		||||
        "rev": "2f7c7275d542f59760bd307e5805572cee65ae37",
 | 
			
		||||
        "rev": "c8644c5d59fee9a24a1be146bb6ce5b41d23592e",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -329,11 +329,11 @@
 | 
			
		||||
        ]
 | 
			
		||||
      },
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1720042825,
 | 
			
		||||
        "narHash": "sha256-A0vrUB6x82/jvf17qPCpxaM+ulJnD8YZwH9Ci0BsAzE=",
 | 
			
		||||
        "lastModified": 1725703823,
 | 
			
		||||
        "narHash": "sha256-tDgM4d8mLK0Hd6YMB2w1BqMto1XBXADOzPEaLl10VI4=",
 | 
			
		||||
        "owner": "nix-community",
 | 
			
		||||
        "repo": "home-manager",
 | 
			
		||||
        "rev": "e1391fb22e18a36f57e6999c7a9f966dc80ac073",
 | 
			
		||||
        "rev": "208df2e558b73b6a1f0faec98493cb59a25f62ba",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -351,11 +351,11 @@
 | 
			
		||||
        ]
 | 
			
		||||
      },
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1725180166,
 | 
			
		||||
        "narHash": "sha256-fzssXuGR/mCeGbzM1ExaTqDz7QDGta3WA4jJsZyRruo=",
 | 
			
		||||
        "lastModified": 1726308872,
 | 
			
		||||
        "narHash": "sha256-d4vwO5N4RsLnCY7k5tY9xbdYDWQsY3RDMeUoIa4ms2A=",
 | 
			
		||||
        "owner": "nix-community",
 | 
			
		||||
        "repo": "home-manager",
 | 
			
		||||
        "rev": "471e3eb0a114265bcd62d11d58ba8d3421ee68eb",
 | 
			
		||||
        "rev": "6c1a461a444e6ccb3f3e42bb627b510c3a722a57",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -370,10 +370,10 @@
 | 
			
		||||
        "nixpkgs": "nixpkgs"
 | 
			
		||||
      },
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1720042825,
 | 
			
		||||
        "narHash": "sha256-A0vrUB6x82/jvf17qPCpxaM+ulJnD8YZwH9Ci0BsAzE=",
 | 
			
		||||
        "path": "/nix/store/hxhym8c5xz6dxkl3d9yppiwlnzk3khn7-source",
 | 
			
		||||
        "rev": "e1391fb22e18a36f57e6999c7a9f966dc80ac073",
 | 
			
		||||
        "lastModified": 1725703823,
 | 
			
		||||
        "narHash": "sha256-tDgM4d8mLK0Hd6YMB2w1BqMto1XBXADOzPEaLl10VI4=",
 | 
			
		||||
        "path": "/nix/store/bvmlcvi835al1d21d7alw8v1nl2yjs7l-source",
 | 
			
		||||
        "rev": "208df2e558b73b6a1f0faec98493cb59a25f62ba",
 | 
			
		||||
        "type": "path"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -394,11 +394,11 @@
 | 
			
		||||
        "nur": "nur"
 | 
			
		||||
      },
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1724428113,
 | 
			
		||||
        "narHash": "sha256-fd5WQ/zjYpWHf01IN/IaG8qMdWC3ydoGvfSEa3O7/Vs=",
 | 
			
		||||
        "lastModified": 1726256858,
 | 
			
		||||
        "narHash": "sha256-5lu9sJpfgezJ0VmQFJonS3/AHBJs2afePK0cWj9CvC4=",
 | 
			
		||||
        "owner": "materusPL",
 | 
			
		||||
        "repo": "Nixerus",
 | 
			
		||||
        "rev": "ab926c541b67726cd94b13118db8a6152ecaa6c3",
 | 
			
		||||
        "rev": "d5427e76c31bee2c56a05fb5d597d48d3d900418",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -421,11 +421,11 @@
 | 
			
		||||
        "nur": "nur_3"
 | 
			
		||||
      },
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1724428113,
 | 
			
		||||
        "narHash": "sha256-fd5WQ/zjYpWHf01IN/IaG8qMdWC3ydoGvfSEa3O7/Vs=",
 | 
			
		||||
        "lastModified": 1726256858,
 | 
			
		||||
        "narHash": "sha256-5lu9sJpfgezJ0VmQFJonS3/AHBJs2afePK0cWj9CvC4=",
 | 
			
		||||
        "owner": "materusPL",
 | 
			
		||||
        "repo": "Nixerus",
 | 
			
		||||
        "rev": "ab926c541b67726cd94b13118db8a6152ecaa6c3",
 | 
			
		||||
        "rev": "d5427e76c31bee2c56a05fb5d597d48d3d900418",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -437,11 +437,11 @@
 | 
			
		||||
    },
 | 
			
		||||
    "nixos-hardware": {
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1724878143,
 | 
			
		||||
        "narHash": "sha256-UjpKo92iZ25M05kgSOw/Ti6VZwpgdlOa73zHj8OcaDk=",
 | 
			
		||||
        "lastModified": 1725885300,
 | 
			
		||||
        "narHash": "sha256-5RLEnou1/GJQl+Wd+Bxaj7QY7FFQ9wjnFq1VNEaxTmc=",
 | 
			
		||||
        "owner": "NixOS",
 | 
			
		||||
        "repo": "nixos-hardware",
 | 
			
		||||
        "rev": "95c3dfe6ef2e96ddc1ccdd7194e3cda02ca9a8ef",
 | 
			
		||||
        "rev": "166dee4f88a7e3ba1b7a243edb1aca822f00680e",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -453,11 +453,11 @@
 | 
			
		||||
    },
 | 
			
		||||
    "nixos-hardware_2": {
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1724878143,
 | 
			
		||||
        "narHash": "sha256-UjpKo92iZ25M05kgSOw/Ti6VZwpgdlOa73zHj8OcaDk=",
 | 
			
		||||
        "lastModified": 1725885300,
 | 
			
		||||
        "narHash": "sha256-5RLEnou1/GJQl+Wd+Bxaj7QY7FFQ9wjnFq1VNEaxTmc=",
 | 
			
		||||
        "owner": "NixOS",
 | 
			
		||||
        "repo": "nixos-hardware",
 | 
			
		||||
        "rev": "95c3dfe6ef2e96ddc1ccdd7194e3cda02ca9a8ef",
 | 
			
		||||
        "rev": "166dee4f88a7e3ba1b7a243edb1aca822f00680e",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -485,11 +485,11 @@
 | 
			
		||||
    },
 | 
			
		||||
    "nixpkgs-stable": {
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1725001927,
 | 
			
		||||
        "narHash": "sha256-eV+63gK0Mp7ygCR0Oy4yIYSNcum2VQwnZamHxYTNi+M=",
 | 
			
		||||
        "lastModified": 1725930920,
 | 
			
		||||
        "narHash": "sha256-RVhD9hnlTT2nJzPHlAqrWqCkA7T6CYrP41IoVRkciZM=",
 | 
			
		||||
        "owner": "NixOS",
 | 
			
		||||
        "repo": "nixpkgs",
 | 
			
		||||
        "rev": "6e99f2a27d600612004fbd2c3282d614bfee6421",
 | 
			
		||||
        "rev": "44a71ff39c182edaf25a7ace5c9454e7cba2c658",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -501,11 +501,11 @@
 | 
			
		||||
    },
 | 
			
		||||
    "nixpkgs-stable_2": {
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1721524707,
 | 
			
		||||
        "narHash": "sha256-5NctRsoE54N86nWd0psae70YSLfrOek3Kv1e8KoXe/0=",
 | 
			
		||||
        "lastModified": 1725762081,
 | 
			
		||||
        "narHash": "sha256-vNv+aJUW5/YurRy1ocfvs4q/48yVESwlC/yHzjkZSP8=",
 | 
			
		||||
        "owner": "NixOS",
 | 
			
		||||
        "repo": "nixpkgs",
 | 
			
		||||
        "rev": "556533a23879fc7e5f98dd2e0b31a6911a213171",
 | 
			
		||||
        "rev": "dc454045f5b5d814e5862a6d057e7bb5c29edc05",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -517,11 +517,11 @@
 | 
			
		||||
    },
 | 
			
		||||
    "nixpkgs-stable_3": {
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1725001927,
 | 
			
		||||
        "narHash": "sha256-eV+63gK0Mp7ygCR0Oy4yIYSNcum2VQwnZamHxYTNi+M=",
 | 
			
		||||
        "lastModified": 1725930920,
 | 
			
		||||
        "narHash": "sha256-RVhD9hnlTT2nJzPHlAqrWqCkA7T6CYrP41IoVRkciZM=",
 | 
			
		||||
        "owner": "NixOS",
 | 
			
		||||
        "repo": "nixpkgs",
 | 
			
		||||
        "rev": "6e99f2a27d600612004fbd2c3282d614bfee6421",
 | 
			
		||||
        "rev": "44a71ff39c182edaf25a7ace5c9454e7cba2c658",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -533,11 +533,11 @@
 | 
			
		||||
    },
 | 
			
		||||
    "nixpkgs-stable_4": {
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1721524707,
 | 
			
		||||
        "narHash": "sha256-5NctRsoE54N86nWd0psae70YSLfrOek3Kv1e8KoXe/0=",
 | 
			
		||||
        "lastModified": 1725762081,
 | 
			
		||||
        "narHash": "sha256-vNv+aJUW5/YurRy1ocfvs4q/48yVESwlC/yHzjkZSP8=",
 | 
			
		||||
        "owner": "NixOS",
 | 
			
		||||
        "repo": "nixpkgs",
 | 
			
		||||
        "rev": "556533a23879fc7e5f98dd2e0b31a6911a213171",
 | 
			
		||||
        "rev": "dc454045f5b5d814e5862a6d057e7bb5c29edc05",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -549,11 +549,11 @@
 | 
			
		||||
    },
 | 
			
		||||
    "nixpkgs-stable_5": {
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1725001927,
 | 
			
		||||
        "narHash": "sha256-eV+63gK0Mp7ygCR0Oy4yIYSNcum2VQwnZamHxYTNi+M=",
 | 
			
		||||
        "lastModified": 1726062281,
 | 
			
		||||
        "narHash": "sha256-PyFVySdGj3enKqm8RQuo4v1KLJLmNLOq2yYOHsI6e2Q=",
 | 
			
		||||
        "owner": "NixOS",
 | 
			
		||||
        "repo": "nixpkgs",
 | 
			
		||||
        "rev": "6e99f2a27d600612004fbd2c3282d614bfee6421",
 | 
			
		||||
        "rev": "e65aa8301ba4f0ab8cb98f944c14aa9da07394f8",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -565,11 +565,11 @@
 | 
			
		||||
    },
 | 
			
		||||
    "nixpkgs_2": {
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1725103162,
 | 
			
		||||
        "narHash": "sha256-Ym04C5+qovuQDYL/rKWSR+WESseQBbNAe5DsXNx5trY=",
 | 
			
		||||
        "lastModified": 1726062873,
 | 
			
		||||
        "narHash": "sha256-IiA3jfbR7K/B5+9byVi9BZGWTD4VSbWe8VLpp9B/iYk=",
 | 
			
		||||
        "owner": "NixOS",
 | 
			
		||||
        "repo": "nixpkgs",
 | 
			
		||||
        "rev": "12228ff1752d7b7624a54e9c1af4b222b3c1073b",
 | 
			
		||||
        "rev": "4f807e8940284ad7925ebd0a0993d2a1791acb2f",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -581,10 +581,10 @@
 | 
			
		||||
    },
 | 
			
		||||
    "nur": {
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1723578304,
 | 
			
		||||
        "narHash": "sha256-p/G1yrUyJ84lh0JpBHXMwNuHWLKLLKSpdIufPJljvY4=",
 | 
			
		||||
        "path": "/nix/store/4bwi1xnp0wdss4kncd6sy1bx1d6a8r4w-source",
 | 
			
		||||
        "rev": "c7ba591cead34c21172cca76f1aabcb130c40508",
 | 
			
		||||
        "lastModified": 1726130808,
 | 
			
		||||
        "narHash": "sha256-RVunrPgmrED3m43ZwLdZuM0+zKtJIMyxr6j7yPwpwHg=",
 | 
			
		||||
        "path": "/nix/store/ymkmj47x7cb2kb286zy98xzmqm5nrl0v-source",
 | 
			
		||||
        "rev": "d286b1c8121d3f150815181a4b6b72f5353ab2db",
 | 
			
		||||
        "type": "path"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -594,11 +594,11 @@
 | 
			
		||||
    },
 | 
			
		||||
    "nur_2": {
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1725282210,
 | 
			
		||||
        "narHash": "sha256-z+eGHYNm3C68fY5QCp1qZdAdzSvNsJuYJ5BiLh9JrGo=",
 | 
			
		||||
        "lastModified": 1726311124,
 | 
			
		||||
        "narHash": "sha256-jzlUpw8li3BbKlpAcqyue5VYMKtjKiXZXyyaju/nnSo=",
 | 
			
		||||
        "owner": "nix-community",
 | 
			
		||||
        "repo": "NUR",
 | 
			
		||||
        "rev": "4f3ba94e14d4215a3471284fd05df08c95e6669d",
 | 
			
		||||
        "rev": "c3d547e38fbf32808f94f58e2b2852f1ad2bccf5",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -610,10 +610,10 @@
 | 
			
		||||
    },
 | 
			
		||||
    "nur_3": {
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1723578304,
 | 
			
		||||
        "narHash": "sha256-p/G1yrUyJ84lh0JpBHXMwNuHWLKLLKSpdIufPJljvY4=",
 | 
			
		||||
        "path": "/nix/store/4bwi1xnp0wdss4kncd6sy1bx1d6a8r4w-source",
 | 
			
		||||
        "rev": "c7ba591cead34c21172cca76f1aabcb130c40508",
 | 
			
		||||
        "lastModified": 1726130808,
 | 
			
		||||
        "narHash": "sha256-RVunrPgmrED3m43ZwLdZuM0+zKtJIMyxr6j7yPwpwHg=",
 | 
			
		||||
        "path": "/nix/store/ymkmj47x7cb2kb286zy98xzmqm5nrl0v-source",
 | 
			
		||||
        "rev": "d286b1c8121d3f150815181a4b6b72f5353ab2db",
 | 
			
		||||
        "type": "path"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -623,11 +623,11 @@
 | 
			
		||||
    },
 | 
			
		||||
    "nur_4": {
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1725282210,
 | 
			
		||||
        "narHash": "sha256-z+eGHYNm3C68fY5QCp1qZdAdzSvNsJuYJ5BiLh9JrGo=",
 | 
			
		||||
        "lastModified": 1726311124,
 | 
			
		||||
        "narHash": "sha256-jzlUpw8li3BbKlpAcqyue5VYMKtjKiXZXyyaju/nnSo=",
 | 
			
		||||
        "owner": "nix-community",
 | 
			
		||||
        "repo": "NUR",
 | 
			
		||||
        "rev": "4f3ba94e14d4215a3471284fd05df08c95e6669d",
 | 
			
		||||
        "rev": "c3d547e38fbf32808f94f58e2b2852f1ad2bccf5",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -639,10 +639,10 @@
 | 
			
		||||
    },
 | 
			
		||||
    "nur_5": {
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1724437005,
 | 
			
		||||
        "narHash": "sha256-BVB8Cn7FaCn2Kssj5CJe12xKFoOPuZmZRrShOVGMHSc=",
 | 
			
		||||
        "path": "/nix/store/2qa76bjwbjxw2p90slqrmir8c8c25i5y-source",
 | 
			
		||||
        "rev": "d298400a803182527b3cdc7c010b7ecbdaf0dbd6",
 | 
			
		||||
        "lastModified": 1726130808,
 | 
			
		||||
        "narHash": "sha256-RVunrPgmrED3m43ZwLdZuM0+zKtJIMyxr6j7yPwpwHg=",
 | 
			
		||||
        "path": "/nix/store/ymkmj47x7cb2kb286zy98xzmqm5nrl0v-source",
 | 
			
		||||
        "rev": "d286b1c8121d3f150815181a4b6b72f5353ab2db",
 | 
			
		||||
        "type": "path"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -687,11 +687,11 @@
 | 
			
		||||
        "nixpkgs-stable": "nixpkgs-stable_2"
 | 
			
		||||
      },
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1725201042,
 | 
			
		||||
        "narHash": "sha256-lj5pxOwidP0W//E7IvyhbhXrnEUW99I07+QpERnzTS4=",
 | 
			
		||||
        "lastModified": 1726218807,
 | 
			
		||||
        "narHash": "sha256-z7CoWbSOtsOz8TmRKDnobURkKfv6nPZCo3ayolNuQGc=",
 | 
			
		||||
        "owner": "Mic92",
 | 
			
		||||
        "repo": "sops-nix",
 | 
			
		||||
        "rev": "5db5921e40ae382d6716dce591ea23b0a39d96f7",
 | 
			
		||||
        "rev": "f30b1bac192e2dc252107ac8a59a03ad25e1b96e",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
@ -710,11 +710,11 @@
 | 
			
		||||
        "nixpkgs-stable": "nixpkgs-stable_4"
 | 
			
		||||
      },
 | 
			
		||||
      "locked": {
 | 
			
		||||
        "lastModified": 1725201042,
 | 
			
		||||
        "narHash": "sha256-lj5pxOwidP0W//E7IvyhbhXrnEUW99I07+QpERnzTS4=",
 | 
			
		||||
        "lastModified": 1726218807,
 | 
			
		||||
        "narHash": "sha256-z7CoWbSOtsOz8TmRKDnobURkKfv6nPZCo3ayolNuQGc=",
 | 
			
		||||
        "owner": "Mic92",
 | 
			
		||||
        "repo": "sops-nix",
 | 
			
		||||
        "rev": "5db5921e40ae382d6716dce591ea23b0a39d96f7",
 | 
			
		||||
        "rev": "f30b1bac192e2dc252107ac8a59a03ad25e1b96e",
 | 
			
		||||
        "type": "github"
 | 
			
		||||
      },
 | 
			
		||||
      "original": {
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user