feat: upgrade to 25.11 #112

closed
opened by a.starrysky.fyi targeting main from private/minion/push-oqywmpqruopz
Changed files
+248 -251
packetmix
homes
npins
packages
OpenLinkHub
vs-launcher
systems
common
corsair
espanso
freshlybakedcake+personal
midnight
niri
shorthair
teal
-1
packetmix/homes/catppuccin/catppuccin.nix
··· 6 { 7 imports = [ 8 project.inputs.catppuccin.result.homeModules.catppuccin 9 - "${project.inputs.home-manager-unstable.src}/modules/programs/vivid.nix" # Needed for latest catppuccin... 10 ]; 11 config.catppuccin.enable = true; 12 config.catppuccin.delta.enable = lib.mkForce false;
··· 6 { 7 imports = [ 8 project.inputs.catppuccin.result.homeModules.catppuccin 9 ]; 10 config.catppuccin.enable = true; 11 config.catppuccin.delta.enable = lib.mkForce false;
+4
packetmix/homes/coded/games.nix
···
··· 1 + { project, ... }: 2 + { 3 + home.packages = [ project.packages.vs-launcher.result."x86_64-linux" ]; 4 + }
+2 -1
packetmix/homes/niri/niri.nix
··· 7 config, 8 pkgs, 9 lib, 10 ... 11 }: 12 { ··· 63 settings = { 64 xwayland-satellite = { 65 enable = true; 66 - path = "${pkgs.xwayland-satellite}/bin/xwayland-satellite"; 67 }; 68 environment.NIXOS_OZONE_WL = "1"; 69
··· 7 config, 8 pkgs, 9 lib, 10 + system, 11 ... 12 }: 13 { ··· 64 settings = { 65 xwayland-satellite = { 66 enable = true; 67 + path = "${project.inputs.nixos-unstable.result.${system}.xwayland-satellite}/bin/xwayland-satellite"; 68 }; 69 environment.NIXOS_OZONE_WL = "1"; 70
-2
packetmix/homes/niri/quickshell.nix
··· 10 ... 11 }: 12 { 13 - imports = [ "${project.inputs.home-manager-unstable.src}/modules/programs/quickshell.nix" ]; 14 - 15 programs.quickshell = { 16 enable = true; 17
··· 10 ... 11 }: 12 { 13 programs.quickshell = { 14 enable = true; 15
+121 -20
packetmix/npins/default.nix
··· 9 */ 10 # Generated by npins. Do not modify; will be overwritten regularly 11 let 12 - data = builtins.fromJSON (builtins.readFile ./sources.json); 13 - version = data.version; 14 15 # https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/lists.nix#L295 16 range = ··· 21 22 # https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/strings.nix#L269 23 stringAsChars = f: s: concatStrings (map f (stringToCharacters s)); 24 - concatMapStrings = f: list: concatStrings (map f list); 25 concatStrings = builtins.concatStringsSep ""; 26 27 # If the environment variable NPINS_OVERRIDE_${name} is set, then use ··· 48 49 mkSource = 50 name: spec: 51 assert spec ? type; 52 let 53 path = 54 if spec.type == "Git" then 55 - mkGitSource spec 56 else if spec.type == "GitRelease" then 57 - mkGitSource spec 58 else if spec.type == "PyPi" then 59 - mkPyPiSource spec 60 else if spec.type == "Channel" then 61 - mkChannelSource spec 62 else if spec.type == "Tarball" then 63 - mkTarballSource spec 64 else 65 builtins.throw "Unknown source type ${spec.type}"; 66 in 67 spec // { outPath = mayOverride name path; }; 68 69 mkGitSource = 70 { 71 repository, 72 revision, 73 url ? null, 74 submodules, 75 hash, 76 - branch ? null, 77 ... 78 }: 79 assert repository ? type; 80 # At the moment, either it is a plain git repository (which has an url), or it is a GitHub/GitLab repository 81 # In the latter case, there we will always be an url to the tarball 82 if url != null && !submodules then 83 - builtins.fetchTarball { 84 inherit url; 85 sha256 = hash; 86 } ··· 107 "${if matched == null then "source" else builtins.head matched}${appendShort}"; 108 name = urlToName url revision; 109 in 110 - builtins.fetchGit { 111 rev = revision; 112 narHash = hash; 113 ··· 115 }; 116 117 mkPyPiSource = 118 - { url, hash, ... }: 119 - builtins.fetchurl { 120 inherit url; 121 sha256 = hash; 122 }; 123 124 mkChannelSource = 125 - { url, hash, ... }: 126 - builtins.fetchTarball { 127 inherit url; 128 sha256 = hash; 129 }; 130 131 mkTarballSource = 132 { 133 url, 134 locked_url ? url, 135 hash, 136 ... 137 }: 138 - builtins.fetchTarball { 139 url = locked_url; 140 sha256 = hash; 141 }; 142 in 143 - if version == 6 then 144 - builtins.mapAttrs mkSource data.pins 145 - else 146 - throw "Unsupported format version ${toString version} in sources.json. Try running `npins upgrade`"
··· 9 */ 10 # Generated by npins. Do not modify; will be overwritten regularly 11 let 12 + # Backwards-compatibly make something that previously didn't take any arguments take some 13 + # The function must return an attrset, and will unfortunately be eagerly evaluated 14 + # Same thing, but it catches eval errors on the default argument so that one may still call it with other arguments 15 + mkFunctor = 16 + fn: 17 + let 18 + e = builtins.tryEval (fn { }); 19 + in 20 + (if e.success then e.value else { error = fn { }; }) // { __functor = _self: fn; }; 21 22 # https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/lists.nix#L295 23 range = ··· 28 29 # https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/strings.nix#L269 30 stringAsChars = f: s: concatStrings (map f (stringToCharacters s)); 31 concatStrings = builtins.concatStringsSep ""; 32 33 # If the environment variable NPINS_OVERRIDE_${name} is set, then use ··· 54 55 mkSource = 56 name: spec: 57 + { 58 + pkgs ? null, 59 + }: 60 assert spec ? type; 61 let 62 + # Unify across builtin and pkgs fetchers. 63 + # `fetchGit` requires a wrapper because of slight API differences. 64 + fetchers = 65 + if pkgs == null then 66 + { 67 + inherit (builtins) fetchTarball fetchurl; 68 + # For some fucking reason, fetchGit has a different signature than the other builtin fetchers … 69 + fetchGit = args: (builtins.fetchGit args).outPath; 70 + } 71 + else 72 + { 73 + fetchTarball = 74 + { 75 + url, 76 + sha256, 77 + }: 78 + pkgs.fetchzip { 79 + inherit url sha256; 80 + extension = "tar"; 81 + }; 82 + inherit (pkgs) fetchurl; 83 + fetchGit = 84 + { 85 + url, 86 + submodules, 87 + rev, 88 + name, 89 + narHash, 90 + }: 91 + pkgs.fetchgit { 92 + inherit url rev name; 93 + fetchSubmodules = submodules; 94 + hash = narHash; 95 + }; 96 + }; 97 + 98 + # Dispatch to the correct code path based on the type 99 path = 100 if spec.type == "Git" then 101 + mkGitSource fetchers spec 102 else if spec.type == "GitRelease" then 103 + mkGitSource fetchers spec 104 else if spec.type == "PyPi" then 105 + mkPyPiSource fetchers spec 106 else if spec.type == "Channel" then 107 + mkChannelSource fetchers spec 108 else if spec.type == "Tarball" then 109 + mkTarballSource fetchers spec 110 + else if spec.type == "Container" then 111 + mkContainerSource pkgs spec 112 else 113 builtins.throw "Unknown source type ${spec.type}"; 114 in 115 spec // { outPath = mayOverride name path; }; 116 117 mkGitSource = 118 + { 119 + fetchTarball, 120 + fetchGit, 121 + ... 122 + }: 123 { 124 repository, 125 revision, 126 url ? null, 127 submodules, 128 hash, 129 ... 130 }: 131 assert repository ? type; 132 # At the moment, either it is a plain git repository (which has an url), or it is a GitHub/GitLab repository 133 # In the latter case, there we will always be an url to the tarball 134 if url != null && !submodules then 135 + fetchTarball { 136 inherit url; 137 sha256 = hash; 138 } ··· 159 "${if matched == null then "source" else builtins.head matched}${appendShort}"; 160 name = urlToName url revision; 161 in 162 + fetchGit { 163 rev = revision; 164 narHash = hash; 165 ··· 167 }; 168 169 mkPyPiSource = 170 + { fetchurl, ... }: 171 + { 172 + url, 173 + hash, 174 + ... 175 + }: 176 + fetchurl { 177 inherit url; 178 sha256 = hash; 179 }; 180 181 mkChannelSource = 182 + { fetchTarball, ... }: 183 + { 184 + url, 185 + hash, 186 + ... 187 + }: 188 + fetchTarball { 189 inherit url; 190 sha256 = hash; 191 }; 192 193 mkTarballSource = 194 + { fetchTarball, ... }: 195 { 196 url, 197 locked_url ? url, 198 hash, 199 ... 200 }: 201 + fetchTarball { 202 url = locked_url; 203 sha256 = hash; 204 }; 205 + 206 + mkContainerSource = 207 + pkgs: 208 + { 209 + image_name, 210 + image_tag, 211 + image_digest, 212 + ... 213 + }: 214 + if pkgs == null then 215 + builtins.throw "container sources require passing in a Nixpkgs value: https://github.com/andir/npins/blob/master/README.md#using-the-nixpkgs-fetchers" 216 + else 217 + pkgs.dockerTools.pullImage { 218 + imageName = image_name; 219 + imageDigest = image_digest; 220 + finalImageTag = image_tag; 221 + }; 222 in 223 + mkFunctor ( 224 + { 225 + input ? ./sources.json, 226 + }: 227 + let 228 + data = 229 + if builtins.isPath input then 230 + # while `readFile` will throw an error anyways if the path doesn't exist, 231 + # we still need to check beforehand because *our* error can be caught but not the one from the builtin 232 + # *piegames sighs* 233 + if builtins.pathExists input then 234 + builtins.fromJSON (builtins.readFile input) 235 + else 236 + throw "Input path ${toString input} does not exist" 237 + else if builtins.isAttrs input then 238 + input 239 + else 240 + throw "Unsupported input type ${builtins.typeOf input}, must be a path or an attrset"; 241 + version = data.version; 242 + in 243 + if version == 7 then 244 + builtins.mapAttrs (name: spec: mkFunctor (mkSource name spec)) data.pins 245 + else 246 + throw "Unsupported format version ${toString version} in sources.json. Try running `npins upgrade`" 247 + )
+75 -62
packetmix/npins/sources.json
··· 61 }, 62 "branch": "main", 63 "submodules": false, 64 - "revision": "c518cf4f62659d9cf585da6f29b67f8a77d0fbc0", 65 - "url": "https://github.com/bluesky-social/atproto/archive/c518cf4f62659d9cf585da6f29b67f8a77d0fbc0.tar.gz", 66 - "hash": "sha256-fW9BKtG9vptNYzCh/AWf8m9QoPEGX6najSFlAekElHA=" 67 }, 68 "catppuccin": { 69 "type": "Git", ··· 88 }, 89 "branch": "master", 90 "submodules": false, 91 - "revision": "8395ec4576cf54411d974675d26f64208acdcee0", 92 - "url": "https://gitlab.collabora.com/api/v4/projects/collabora%2Fgtimelog/repository/archive.tar.gz?sha=8395ec4576cf54411d974675d26f64208acdcee0", 93 - "hash": "sha256-M9pCF+XVf5ylxgq0BSUn5Vkg1HZ6i88LDiUDM4Y1Ghs=" 94 }, 95 "copyparty": { 96 "type": "GitRelease", ··· 103 "version_upper_bound": null, 104 "release_prefix": null, 105 "submodules": false, 106 - "version": "v1.19.17", 107 - "revision": "e2a15a3a922514efe97afc4afa043cd7c4619ad1", 108 - "url": "https://api.github.com/repos/9001/copyparty/tarball/refs/tags/v1.19.17", 109 - "hash": "sha256-Rb6Lq2CW+LrIH8M4sCPA8k12GX7xNUWK4I+xeByLl+M=" 110 }, 111 "headscale": { 112 "type": "Git", ··· 117 }, 118 "branch": "main", 119 "submodules": false, 120 - "revision": "8010cc574ea309728f5c7d3fd1cb08252f0111f5", 121 - "url": "https://github.com/juanfont/headscale/archive/8010cc574ea309728f5c7d3fd1cb08252f0111f5.tar.gz", 122 - "hash": "sha256-lQhaw7SVV+qBEZnH8u+gsEwqIByFlZQyjDJ3RbW7uzM=" 123 }, 124 "home-manager": { 125 "type": "Git", ··· 128 "owner": "nix-community", 129 "repo": "home-manager" 130 }, 131 - "branch": "release-25.05", 132 "submodules": false, 133 - "revision": "3b955f5f0a942f9f60cdc9cacb7844335d0f21c3", 134 - "url": "https://github.com/nix-community/home-manager/archive/3b955f5f0a942f9f60cdc9cacb7844335d0f21c3.tar.gz", 135 - "hash": "sha256-uhzsV0Q0I9j2y/rfweWeGif5AWe0MGrgZ/3TjpDYdGA=" 136 }, 137 "home-manager-unstable": { 138 "type": "Git", ··· 143 }, 144 "branch": "master", 145 "submodules": false, 146 - "revision": "189c21cf879669008ccf06e78a553f17e88d8ef0", 147 - "url": "https://github.com/nix-community/home-manager/archive/189c21cf879669008ccf06e78a553f17e88d8ef0.tar.gz", 148 - "hash": "sha256-nZh6uvc71nVNaf/y+wesnjwsmJ6IZZUnP2EzpZe48To=" 149 }, 150 "impermanence": { 151 "type": "Git", ··· 171 "version_upper_bound": null, 172 "release_prefix": null, 173 "submodules": false, 174 - "version": "v0.4.2", 175 - "revision": "f0212638a2ec787a7841882f4477d40ae24f0a5d", 176 - "url": "https://api.github.com/repos/nix-community/lanzaboote/tarball/refs/tags/v0.4.2", 177 - "hash": "sha256-AEEDktApTEZ5PZXNDkry2YV2k6t0dTgLPEmAZbnigXU=" 178 }, 179 "lix": { 180 "type": "Git", ··· 186 }, 187 "branch": "main", 188 "submodules": false, 189 - "revision": "2d2cd7ac03311bddb9645a7ab82c7e78edccbaa0", 190 - "url": "https://git.lix.systems/lix-project/lix/archive/2d2cd7ac03311bddb9645a7ab82c7e78edccbaa0.tar.gz", 191 - "hash": "sha256-jUn34QOaXqguaH+WwB2xWRHlmelvzJfFuEcQrC1cwK0=" 192 }, 193 "lix-module": { 194 "type": "Git", ··· 200 }, 201 "branch": "main", 202 "submodules": false, 203 - "revision": "7c31a18259b8358ac196cf803a26967c0fa1d3e4", 204 - "url": "https://git.lix.systems/lix-project/nixos-module/archive/7c31a18259b8358ac196cf803a26967c0fa1d3e4.tar.gz", 205 - "hash": "sha256-n5dRAIC3/78drQtFxmQRrBLd6TKfotUnX7GWu0mAcSg=" 206 }, 207 "lua-multipart": { 208 "type": "GitRelease", ··· 221 "hash": "sha256-CWQf76/SQEHYX0Xv1UudA4RJtZsMpLY+IU8vjlqnsQY=" 222 }, 223 "nilla": { 224 - "type": "GitRelease", 225 "repository": { 226 "type": "GitHub", 227 "owner": "nilla-nix", 228 "repo": "nilla" 229 }, 230 - "pre_releases": true, 231 - "version_upper_bound": null, 232 - "release_prefix": null, 233 "submodules": false, 234 - "version": "v0.0.0-alpha.14", 235 - "revision": "2e98ae315a592ad6b6de44670514c048dcc88dc7", 236 - "url": "https://api.github.com/repos/nilla-nix/nilla/tarball/refs/tags/v0.0.0-alpha.14", 237 - "hash": "sha256-15lwhWcMonJH6UholMMHDc+p2BoSpGA4AYGrsXQA9Do=" 238 }, 239 "nilla-cli": { 240 "type": "Git", ··· 245 }, 246 "branch": "main", 247 "submodules": false, 248 - "revision": "6c6c42eaae3d095de6d1b47396c8b74ea57cb442", 249 - "url": "https://github.com/nilla-nix/cli/archive/6c6c42eaae3d095de6d1b47396c8b74ea57cb442.tar.gz", 250 - "hash": "sha256-0+d6LZfofBG+4OxnZcFaNg2ycgj1zcOJQUcPL1TEaSc=" 251 }, 252 "nilla-home": { 253 "type": "GitRelease", ··· 287 }, 288 "branch": "main", 289 "submodules": false, 290 - "revision": "f851a923137c0a54719412146fd63d24b3214e60", 291 - "url": "https://github.com/sodiboo/niri-flake/archive/f851a923137c0a54719412146fd63d24b3214e60.tar.gz", 292 - "hash": "sha256-E2ySTu/oK7cYBdAI3tlGP9zVjF4mZgWJ1OZInBCMb00=" 293 }, 294 "nix-index-database": { 295 "type": "Git", ··· 300 }, 301 "branch": "main", 302 "submodules": false, 303 - "revision": "5024e1901239a76b7bf94a4cd27f3507e639d49e", 304 - "url": "https://github.com/nix-community/nix-index-database/archive/5024e1901239a76b7bf94a4cd27f3507e639d49e.tar.gz", 305 - "hash": "sha256-xmU8kAsRprJiTGBTaGrwmjBP3AMA9ltlrxHKFuy5JWc=" 306 }, 307 "nix-monitored": { 308 "type": "Git", ··· 320 "nixos-unstable": { 321 "type": "Channel", 322 "name": "nixos-unstable", 323 - "url": "https://releases.nixos.org/nixos/unstable/nixos-25.11pre880095.5e2a59a5b1a8/nixexprs.tar.xz", 324 - "hash": "sha256-u0JUo46QSoXnjLaezAM75wRNuxVMVbm5OxHH122TeTY=" 325 }, 326 "nixpkgs": { 327 "type": "Channel", 328 - "name": "nixos-25.05", 329 - "url": "https://releases.nixos.org/nixos/25.05/nixos-25.05.811497.33c6dca0c0cb/nixexprs.tar.xz", 330 - "hash": "sha256-Z7kbKnORypPkJ74r6sHA2RQH1XATHLWiGgZVrli0scY=" 331 }, 332 "npins": { 333 "type": "Git", ··· 363 }, 364 "branch": "master", 365 "submodules": false, 366 - "revision": "7d1888abf8c5b82692476a9de2137a024d484771", 367 "url": null, 368 - "hash": "sha256-WD/UFUMcXMV/3tqD4h2tPaQH1KDlsJ00M+T4N/xkAGs=" 369 }, 370 "treefmt-nix": { 371 "type": "Git", ··· 376 }, 377 "branch": "main", 378 "submodules": false, 379 - "revision": "f56b1934f5f8fcab8deb5d38d42fd692632b47c2", 380 - "url": "https://github.com/numtide/treefmt-nix/archive/f56b1934f5f8fcab8deb5d38d42fd692632b47c2.tar.gz", 381 - "hash": "sha256-ZRVs8UqikBa4Ki3X4KCnMBtBW0ux1DaT35tgsnB1jM4=" 382 }, 383 "walker": { 384 "type": "GitRelease", ··· 391 "version_upper_bound": null, 392 "release_prefix": null, 393 "submodules": false, 394 - "version": "v2.5.5", 395 - "revision": "ff292cb12c4816ce21dab47cd9894b8046b16a93", 396 - "url": "https://api.github.com/repos/abenz1267/walker/tarball/refs/tags/v2.5.5", 397 - "hash": "sha256-xc0yW9OhLTppjkaWWCWG9q4BVJZbhnLqLniLeMkcTvM=" 398 } 399 }, 400 - "version": 6 401 }
··· 61 }, 62 "branch": "main", 63 "submodules": false, 64 + "revision": "3628cebfbb04ba49f326bbf411a2d15de2900302", 65 + "url": "https://github.com/bluesky-social/atproto/archive/3628cebfbb04ba49f326bbf411a2d15de2900302.tar.gz", 66 + "hash": "sha256-5udskm8sOQ73VukP6bweE0rNxW8YG9so8Gk93x9Dzzs=" 67 }, 68 "catppuccin": { 69 "type": "Git", ··· 88 }, 89 "branch": "master", 90 "submodules": false, 91 + "revision": "1be9d9f7e844831f221b67a46a55fc47a164e416", 92 + "url": "https://gitlab.collabora.com/api/v4/projects/collabora%2Fgtimelog/repository/archive.tar.gz?sha=1be9d9f7e844831f221b67a46a55fc47a164e416", 93 + "hash": "sha256-v5WEa7M0mmrxdU1l7nIqyrMaVy2jiJNnXHLiHnw2xIc=" 94 }, 95 "copyparty": { 96 "type": "GitRelease", ··· 103 "version_upper_bound": null, 104 "release_prefix": null, 105 "submodules": false, 106 + "version": "v1.19.20", 107 + "revision": "450cd86dc1e98b98ab131fc9417c83289165a507", 108 + "url": "https://api.github.com/repos/9001/copyparty/tarball/refs/tags/v1.19.20", 109 + "hash": "sha256-/Wm8hZvdGfYWdTOF+dgTPX8DGuSKLhGw4qC4crf1dAo=" 110 }, 111 "headscale": { 112 "type": "Git", ··· 117 }, 118 "branch": "main", 119 "submodules": false, 120 + "revision": "21af106f68fa38f37d80c9ac91a336a4f53bc074", 121 + "url": "https://github.com/juanfont/headscale/archive/21af106f68fa38f37d80c9ac91a336a4f53bc074.tar.gz", 122 + "hash": "sha256-EGLIiL/80bf6e5P5oDcG7zw7fMpOK5jIALd8rmu6Jv8=" 123 }, 124 "home-manager": { 125 "type": "Git", ··· 128 "owner": "nix-community", 129 "repo": "home-manager" 130 }, 131 + "branch": "release-25.11", 132 "submodules": false, 133 + "revision": "d3135ab747fd9dac250ffb90b4a7e80634eacbe9", 134 + "url": "https://github.com/nix-community/home-manager/archive/d3135ab747fd9dac250ffb90b4a7e80634eacbe9.tar.gz", 135 + "hash": "sha256-/r9/1KamvbHJx6I40H4HsSXnEcBAkj46ZwibhBx9kg0=" 136 }, 137 "home-manager-unstable": { 138 "type": "Git", ··· 143 }, 144 "branch": "master", 145 "submodules": false, 146 + "revision": "827f2a23373a774a8805f84ca5344654c31f354b", 147 + "url": "https://github.com/nix-community/home-manager/archive/827f2a23373a774a8805f84ca5344654c31f354b.tar.gz", 148 + "hash": "sha256-RYHN8O/Aja59XDji6WSJZPkJpYVUfpSkyH+PEupBJqM=" 149 }, 150 "impermanence": { 151 "type": "Git", ··· 171 "version_upper_bound": null, 172 "release_prefix": null, 173 "submodules": false, 174 + "version": "v0.4.3", 175 + "revision": "65a4aa3d4dccf50f22c0190c7ee660de51c586f2", 176 + "url": "https://api.github.com/repos/nix-community/lanzaboote/tarball/refs/tags/v0.4.3", 177 + "hash": "sha256-If6vQ+KvtKs3ARBO9G3l+4wFSCYtRBrwX1z+I+B61wQ=" 178 }, 179 "lix": { 180 "type": "Git", ··· 186 }, 187 "branch": "main", 188 "submodules": false, 189 + "revision": "2fa40c9de49e47c1f59dd32bf99227884bad3a2d", 190 + "url": "https://git.lix.systems/lix-project/lix/archive/2fa40c9de49e47c1f59dd32bf99227884bad3a2d.tar.gz", 191 + "hash": "sha256-2SAAMUhS1rH2J0elOJZLAbU6KjQ1r6vEWrRFeIaVDzM=" 192 }, 193 "lix-module": { 194 "type": "Git", ··· 200 }, 201 "branch": "main", 202 "submodules": false, 203 + "revision": "c47f62187601ea2991b79a9bacdbfdf76cd29fbe", 204 + "url": "https://git.lix.systems/lix-project/nixos-module/archive/c47f62187601ea2991b79a9bacdbfdf76cd29fbe.tar.gz", 205 + "hash": "sha256-FvuAw56NIVJpS3Kr8Wv9PpU4eehZMcdIVkxjStuYmqc=" 206 }, 207 "lua-multipart": { 208 "type": "GitRelease", ··· 221 "hash": "sha256-CWQf76/SQEHYX0Xv1UudA4RJtZsMpLY+IU8vjlqnsQY=" 222 }, 223 "nilla": { 224 + "type": "Git", 225 "repository": { 226 "type": "GitHub", 227 "owner": "nilla-nix", 228 "repo": "nilla" 229 }, 230 + "branch": "private/coded/push-nzprlvpltxyl", 231 "submodules": false, 232 + "revision": "2f8b8c68efc4d81637be344d1b01462291a45e05", 233 + "url": "https://github.com/nilla-nix/nilla/archive/2f8b8c68efc4d81637be344d1b01462291a45e05.tar.gz", 234 + "hash": "sha256-VLlP6L8uvgEjb1ZZXdc4P3NAs5PcgIjpGm8LvaObrLY=" 235 }, 236 "nilla-cli": { 237 "type": "Git", ··· 242 }, 243 "branch": "main", 244 "submodules": false, 245 + "revision": "aa042dbd9152c99e5a8db51bcf87306737423b9e", 246 + "url": "https://github.com/nilla-nix/cli/archive/aa042dbd9152c99e5a8db51bcf87306737423b9e.tar.gz", 247 + "hash": "sha256-cPdYYXhCsDllVgq+gs5Wqhb41bFtKWHlkTvjOJv7its=" 248 }, 249 "nilla-home": { 250 "type": "GitRelease", ··· 284 }, 285 "branch": "main", 286 "submodules": false, 287 + "revision": "d06ab0308d797dc4b2f9025d5952cca90afd11a7", 288 + "url": "https://github.com/sodiboo/niri-flake/archive/d06ab0308d797dc4b2f9025d5952cca90afd11a7.tar.gz", 289 + "hash": "sha256-e1SOJYHe5IbKFIOpWswB/4nIog1Zx5iXA4YB49XTFxE=" 290 }, 291 "nix-index-database": { 292 "type": "Git", ··· 297 }, 298 "branch": "main", 299 "submodules": false, 300 + "revision": "15c5451c63f4c612874a43846bfe3fa828b03eee", 301 + "url": "https://github.com/nix-community/nix-index-database/archive/15c5451c63f4c612874a43846bfe3fa828b03eee.tar.gz", 302 + "hash": "sha256-C9F1C31ys0V7mnp4EcDy7L1cLZw/sCTEXqqTtGnvu08=" 303 }, 304 "nix-monitored": { 305 "type": "Git", ··· 317 "nixos-unstable": { 318 "type": "Channel", 319 "name": "nixos-unstable", 320 + "url": "https://releases.nixos.org/nixos/unstable/nixos-26.05pre912002.1306659b587d/nixexprs.tar.xz", 321 + "hash": "sha256-2BzIb1uB1hPl5fKGsMc+xj2DrSYmpRLcKdCq0UHdLwI=" 322 }, 323 "nixpkgs": { 324 "type": "Channel", 325 + "name": "nixos-25.11", 326 + "url": "https://releases.nixos.org/nixos/25.11/nixos-25.11.1948.c6f52ebd45e5/nixexprs.tar.xz", 327 + "hash": "sha256-Rgx3RPys4DTsfZPBbJa2QpJGbjnWVC7V2Rlviyp4qMI=" 328 }, 329 "npins": { 330 "type": "Git", ··· 360 }, 361 "branch": "master", 362 "submodules": false, 363 + "revision": "3eb9cefd98d13ab9864abb2e394fc41f89ffd923", 364 "url": null, 365 + "hash": "sha256-lRTZLRcqWpVf6CzJmvg+ggp/YWWasT4u2lFKIiIopoM=" 366 }, 367 "treefmt-nix": { 368 "type": "Git", ··· 373 }, 374 "branch": "main", 375 "submodules": false, 376 + "revision": "5b4ee75aeefd1e2d5a1cc43cf6ba65eba75e83e4", 377 + "url": "https://github.com/numtide/treefmt-nix/archive/5b4ee75aeefd1e2d5a1cc43cf6ba65eba75e83e4.tar.gz", 378 + "hash": "sha256-AlEObg0syDl+Spi4LsZIBrjw+snSVU4T8MOeuZJUJjM=" 379 + }, 380 + "vs-launcher": { 381 + "type": "GitRelease", 382 + "repository": { 383 + "type": "GitHub", 384 + "owner": "XurxoMF", 385 + "repo": "vs-launcher" 386 + }, 387 + "pre_releases": false, 388 + "version_upper_bound": null, 389 + "release_prefix": null, 390 + "submodules": false, 391 + "version": "1.5.8", 392 + "revision": "2068a31948396ca7c0a1b0efbc805ba7e99cdd96", 393 + "url": "https://api.github.com/repos/XurxoMF/vs-launcher/tarball/refs/tags/1.5.8", 394 + "hash": "sha256-SYpZSFyavD19sGuQhUrmVAbzx2Hs5nupsu2DkCymT4w=" 395 }, 396 "walker": { 397 "type": "GitRelease", ··· 404 "version_upper_bound": null, 405 "release_prefix": null, 406 "submodules": false, 407 + "version": "v2.10.0", 408 + "revision": "ce131301bbbdecde37bf76bf8478e8af06ff3792", 409 + "url": "https://api.github.com/repos/abenz1267/walker/tarball/refs/tags/v2.10.0", 410 + "hash": "sha256-72+WE0RGSW8TgzPijHU6TtLWfMb0G7ojraM5UifTLVg=" 411 } 412 }, 413 + "version": 7 414 }
+4
packetmix/packages/OpenLinkHub/default.nix
··· 14 cp ${prev.src}/database/rgb.json $out/var/lib/OpenLinkHub/database 15 echo "{}" >> $out/var/lib/OpenLinkHub/database/scheduler.json 16 cp -r ${prev.src}/database/keyboard $out/var/lib/OpenLinkHub/database 17 18 mkdir -p $out/lib/udev/rules.d 19 cp ${prev.src}/99-openlinkhub.rules $out/lib/udev/rules.d
··· 14 cp ${prev.src}/database/rgb.json $out/var/lib/OpenLinkHub/database 15 echo "{}" >> $out/var/lib/OpenLinkHub/database/scheduler.json 16 cp -r ${prev.src}/database/keyboard $out/var/lib/OpenLinkHub/database 17 + cp -r ${prev.src}/database/lcd $out/var/lib/OpenLinkHub/database 18 + cp -r ${prev.src}/database/language $out/var/lib/OpenLinkHub/database 19 + cp -r ${prev.src}/database/nexus $out/var/lib/OpenLinkHub/database 20 + cp -r ${prev.src}/database/external $out/var/lib/OpenLinkHub/database 21 22 mkdir -p $out/lib/udev/rules.d 23 cp ${prev.src}/99-openlinkhub.rules $out/lib/udev/rules.d
+1
packetmix/packages/default.nix
··· 16 ./OpenLinkHub 17 ./scriptfs 18 ./treefmt 19 ]; 20 }
··· 16 ./OpenLinkHub 17 ./scriptfs 18 ./treefmt 19 + ./vs-launcher 20 ]; 21 }
+26
packetmix/packages/vs-launcher/default.nix
···
··· 1 + # SPDX-FileCopyrightText: 2025 FreshlyBakedCake 2 + # 3 + # SPDX-License-Identifier: MIT 4 + let 5 + pins = import ../../npins; 6 + in 7 + { config, ... }: { 8 + config.packages.vs-launcher = { 9 + systems = [ "x86_64-linux" ]; 10 + 11 + package = let 12 + 13 + in { appimageTools, fetchurl }: 14 + let 15 + version = pins.vs-launcher.version; 16 + pname = "vs-launcher"; 17 + src = fetchurl { 18 + url = "https://github.com/XurxoMF/vs-launcher/releases/download/${version}/vs-launcher-${version}.AppImage"; 19 + sha256 = "sha256-WohOevunsop8cSg1E+GuUJpYHRfj7XtJEC0xH16A4Hg="; 20 + }; 21 + in appimageTools.wrapType2 { 22 + inherit pname version src; 23 + extraPkgs = pkgs: [ pkgs.dotnet-runtime ]; 24 + }; 25 + }; 26 + }
+1 -1
packetmix/systems/common/inputs.nix
··· 26 builtins.storePath value.result 27 else 28 builtins.storePath value.src; 29 - }) project.inputs; 30 }
··· 26 builtins.storePath value.result 27 else 28 builtins.storePath value.src; 29 + }) (lib.attrsets.filterAttrs (n: _: n != "__functor") project.inputs); 30 }
+7 -1
packetmix/systems/corsair/openlinkhub.nix
··· 46 [ -f ${path}/database/scheduler.json ] || cp ${pkg}/var/lib/OpenLinkHub/schduler.json ${path}/database/scheduler.json 47 mkdir -p ${path}/database/temperatures 48 mkdir -p ${path}/database/profiles 49 50 - cp -r ${pkg}/var/lib/OpenLinkHub/database/keyboard ${path}/database/keyboard 51 52 [ -L ${path}/static ] || ln -s ${pkg}/var/lib/OpenLinkHub/static ${path}/static 53 [ -L ${path}/web ] || ln -s ${pkg}/var/lib/OpenLinkHub/web ${path}/web
··· 46 [ -f ${path}/database/scheduler.json ] || cp ${pkg}/var/lib/OpenLinkHub/schduler.json ${path}/database/scheduler.json 47 mkdir -p ${path}/database/temperatures 48 mkdir -p ${path}/database/profiles 49 + mkdir -p ${path}/database/macros 50 + mkdir -p ${path}/database/led 51 52 + cp -r ${pkg}/var/lib/OpenLinkHub/database/keyboard ${path}/database 53 + cp -r ${pkg}/var/lib/OpenLinkHub/database/lcd ${path}/database 54 + cp -r ${pkg}/var/lib/OpenLinkHub/database/external ${path}/database 55 + cp -r ${pkg}/var/lib/OpenLinkHub/database/nexus ${path}/database 56 + cp -r ${pkg}/var/lib/OpenLinkHub/database/language ${path}/database 57 58 [ -L ${path}/static ] || ln -s ${pkg}/var/lib/OpenLinkHub/static ${path}/static 59 [ -L ${path}/web ] || ln -s ${pkg}/var/lib/OpenLinkHub/web ${path}/web
-2
packetmix/systems/espanso/espanso.nix
··· 8 enable = true; 9 package = if config.services.xserver.enable then pkgs.espanso else pkgs.espanso-wayland; 10 }; 11 - 12 - programs.espanso.capdacoverride.enable = !config.services.xserver.enable; 13 }
··· 8 enable = true; 9 package = if config.services.xserver.enable then pkgs.espanso else pkgs.espanso-wayland; 10 }; 11 }
-63
packetmix/systems/espanso/nixpkgs-328890--espanso-capdacoverride.nix
··· 1 - # SPDX-FileCopyrightText: 2025 Eelco Dolstra and the Nixpkgs/NixOS contributors 2 - # 3 - # SPDX-License-Identifier: MIT 4 - 5 - { 6 - config, 7 - lib, 8 - pkgs, 9 - ... 10 - }: 11 - 12 - let 13 - cfg = config.programs.espanso.capdacoverride; 14 - in 15 - { 16 - meta = { 17 - maintainers = with lib.maintainers; [ pitkling ]; 18 - }; 19 - 20 - options = { 21 - programs.espanso.capdacoverride = { 22 - enable = (lib.mkEnableOption "espanso-wayland overlay with DAC_OVERRIDE capability") // { 23 - description = '' 24 - Creates an espanso binary with the DAC_OVERRIDE capability (via `security.wrappers`) and overlays `pkgs.espanso-wayland` such that self-forks call the capability-enabled binary. 25 - Required for `pkgs.espanso-wayland` to work correctly if not run with root privileges. 26 - ''; 27 - }; 28 - 29 - package = lib.mkOption { 30 - type = lib.types.package // { 31 - check = package: lib.types.package.check package && (builtins.elem "wayland" package.buildFeatures); 32 - description = 33 - lib.types.package.description 34 - + " for espanso with wayland support (`package.builtFeatures` must contain `\"wayland\"`)"; 35 - }; 36 - default = pkgs._espanso-wayland-orig; 37 - defaultText = "pkgs.espanso-wayland (before applying the overlay)"; 38 - description = "The espanso-wayland package used as the base to generate the capability-enabled package."; 39 - }; 40 - }; 41 - }; 42 - 43 - config = lib.mkIf cfg.enable { 44 - nixpkgs.overlays = [ 45 - (_final: prev: { 46 - _espanso-wayland-orig = prev.espanso-wayland; 47 - espanso-wayland = 48 - pkgs.callPackage ./nixpkgs-328890--espanso-capdacoverride/espanso-capdacoverride.nix 49 - { 50 - capDacOverrideWrapperDir = "${config.security.wrapperDir}"; 51 - espanso = cfg.package; 52 - }; 53 - }) 54 - ]; 55 - 56 - security.wrappers."espanso-wayland" = { 57 - source = lib.getExe pkgs.espanso-wayland; 58 - capabilities = "cap_dac_override+p"; 59 - owner = "root"; 60 - group = "root"; 61 - }; 62 - }; 63 - }
···
-63
packetmix/systems/espanso/nixpkgs-328890--espanso-capdacoverride/espanso-capdacoverride.nix
··· 1 - # SPDX-FileCopyrightText: 2025 Eelco Dolstra and the Nixpkgs/NixOS contributors 2 - # 3 - # SPDX-License-Identifier: MIT 4 - 5 - { 6 - autoPatchelfHook, 7 - capDacOverrideWrapperDir, 8 - espanso, 9 - patchelfUnstable, # have to use patchelfUnstable to support --rename-dynamic-symbols 10 - stdenv, 11 - }: 12 - let 13 - inherit (espanso) version; 14 - pname = "${espanso.pname}-capdacoverride"; 15 - 16 - wrapperLibName = "wrapper-lib.so"; 17 - 18 - # On Wayland, Espanso requires the DAC_OVERRIDE capability. One can create a wrapper binary with this 19 - # capability using the `config.security.wrappers.<name>` framework. However, this is not enough: the 20 - # capability is required by a worker process of Espanso created by forking `/proc/self/exe`, which points 21 - # to the executable **without** the DAC_OVERRIDE capability. Thus, we inject a wrapper library into Espanso 22 - # that redirects requests to `/proc/self/exe` to the binary with the proper capabilities. 23 - wrapperLib = stdenv.mkDerivation { 24 - name = "${pname}-${version}-wrapper-lib"; 25 - 26 - dontUnpack = true; 27 - 28 - postPatch = '' 29 - substitute ${./wrapper-lib.c} lib.c --subst-var-by to "${capDacOverrideWrapperDir}/espanso-wayland" 30 - ''; 31 - 32 - buildPhase = '' 33 - runHook preBuild 34 - cc -fPIC -shared lib.c -o ${wrapperLibName} 35 - runHook postBuild 36 - ''; 37 - 38 - installPhase = '' 39 - runHook preInstall 40 - install -D -t $out/lib ${wrapperLibName} 41 - runHook postInstall 42 - ''; 43 - }; 44 - in 45 - espanso.overrideAttrs (previousAttrs: { 46 - inherit pname; 47 - 48 - buildInputs = previousAttrs.buildInputs ++ [ wrapperLib ]; 49 - 50 - nativeBuildInputs = previousAttrs.nativeBuildInputs ++ [ 51 - autoPatchelfHook 52 - patchelfUnstable 53 - ]; 54 - 55 - postInstall = '' 56 - echo readlink readlink_wrapper > readlink_name_map 57 - patchelf \ 58 - --rename-dynamic-symbols readlink_name_map \ 59 - --add-needed ${wrapperLibName} \ 60 - "$out/bin/espanso" 61 - '' 62 - + previousAttrs.postInstall; 63 - })
···
-26
packetmix/systems/espanso/nixpkgs-328890--espanso-capdacoverride/wrapper-lib.c
··· 1 - /* 2 - * SPDX-FileCopyrightText: 2025 Eelco Dolstra and the Nixpkgs/NixOS contributors 3 - * 4 - * SPDX-License-Identifier: MIT 5 - */ 6 - 7 - #include <stdio.h> 8 - #include <string.h> 9 - #include <unistd.h> 10 - 11 - static const char from[] = "/proc/self/exe"; 12 - static const char to[] = "@to@"; 13 - 14 - ssize_t readlink_wrapper(const char *restrict path, char *restrict buf, size_t bufsize) { 15 - if (strcmp(path, from) == 0) { 16 - printf("readlink_wrapper.c: Resolving readlink call to '%s' to '%s'\n", from, to); 17 - size_t to_length = strlen(to); 18 - if (to_length > bufsize) { 19 - to_length = bufsize; 20 - } 21 - memcpy(buf, to, to_length); 22 - return to_length; 23 - } else { 24 - return readlink(path, buf, bufsize); 25 - } 26 - }
···
+1 -1
packetmix/systems/freshlybakedcake+personal/kanidm.nix
··· 7 services.kanidm = { 8 enableClient = true; 9 10 - package = pkgs.kanidm_1_7; 11 12 clientSettings.uri = "https://idm.freshly.space"; 13 };
··· 7 services.kanidm = { 8 enableClient = true; 9 10 + package = pkgs.kanidm_1_8; 11 12 clientSettings.uri = "https://idm.freshly.space"; 13 };
+1 -1
packetmix/systems/midnight/spindle.nix
··· 13 14 networking.firewall.allowedTCPPorts = [ 1024 ]; 15 16 - services.tangled-spindle = { 17 enable = true; 18 server = { 19 listenAddr = "0.0.0.0:1024";
··· 13 14 networking.firewall.allowedTCPPorts = [ 1024 ]; 15 16 + services.tangled.spindle = { 17 enable = true; 18 server = { 19 listenAddr = "0.0.0.0:1024";
+1 -1
packetmix/systems/niri/niri.nix
··· 45 partOf = [ "graphical-session.target" ]; 46 serviceConfig = { 47 Type = "simple"; 48 - ExecStart = "${pkgs.libsForQt5.polkit-kde-agent}/libexec/polkit-kde-authentication-agent-1"; 49 Restart = "on-failure"; 50 RestartSec = 1; 51 TimeoutStopSec = 10;
··· 45 partOf = [ "graphical-session.target" ]; 46 serviceConfig = { 47 Type = "simple"; 48 + ExecStart = "${pkgs.kdePackages.polkit-kde-agent-1}/libexec/polkit-kde-authentication-agent-1"; 49 Restart = "on-failure"; 50 RestartSec = 1; 51 TimeoutStopSec = 10;
+3
packetmix/systems/shorthair/vr.nix
···
··· 1 + {pkgs}: { 2 + services.monado.enable = true; 3 + }
+1 -1
packetmix/systems/teal/kanidm.nix
··· 5 { pkgs, ... }: 6 { 7 services.kanidm = { 8 - package = pkgs.kanidm_1_7; 9 enableServer = true; 10 enableClient = true; 11 serverSettings = {
··· 5 { pkgs, ... }: 6 { 7 services.kanidm = { 8 + package = pkgs.kanidm_1_8; 9 enableServer = true; 10 enableClient = true; 11 serverSettings = {
-5
packetmix/systems/teal/pds.nix
··· 8 ... 9 }: 10 { 11 - disabledModules = [ "services/web-apps/pds.nix" ]; 12 - imports = [ 13 - "${project.inputs.nixos-unstable.src}/nixos/modules/services/web-apps/bluesky-pds.nix" 14 - ]; 15 - 16 nixpkgs.overlays = [ 17 (final: _prev: { 18 bluesky-pdsadmin = final.pdsadmin;
··· 8 ... 9 }: 10 { 11 nixpkgs.overlays = [ 12 (final: _prev: { 13 bluesky-pdsadmin = final.pdsadmin;