diff --git a/flake.lock b/flake.lock index 199d796..a75a2be 100644 --- a/flake.lock +++ b/flake.lock @@ -162,16 +162,16 @@ }, "nixpkgs": { "locked": { - "lastModified": 1730963269, - "narHash": "sha256-rz30HrFYCHiWEBCKHMffHbMdWJ35hEkcRVU0h7ms3x0=", + "lastModified": 1731755305, + "narHash": "sha256-v5P3dk5JdiT+4x69ZaB18B8+Rcu3TIOrcdG4uEX7WZ8=", "owner": "nixos", "repo": "nixpkgs", - "rev": "83fb6c028368e465cd19bb127b86f971a5e41ebc", + "rev": "057f63b6dc1a2c67301286152eb5af20747a9cb4", "type": "github" }, "original": { "owner": "nixos", - "ref": "nixos-24.05", + "ref": "nixos-24.11", "repo": "nixpkgs", "type": "github" } diff --git a/flake.nix b/flake.nix index 979e9fc..b0f3750 100644 --- a/flake.nix +++ b/flake.nix @@ -8,7 +8,7 @@ nix-pre-commit-hooks.url = "github:cachix/pre-commit-hooks.nix/master"; nix-pre-commit-hooks.inputs.nixpkgs.follows = "nixpkgs"; - nixpkgs.url = "github:nixos/nixpkgs/nixos-24.05"; + nixpkgs.url = "github:nixos/nixpkgs/nixos-24.11"; nixos-hardware.url = "github:nixos/nixos-hardware/master"; diff --git a/machines/raven/services/nextcloud.nix b/machines/raven/services/nextcloud.nix index 5661520..8d746bd 100644 --- a/machines/raven/services/nextcloud.nix +++ b/machines/raven/services/nextcloud.nix @@ -47,7 +47,7 @@ in oidc_login = pkgs.fetchNextcloudApp { license = "agpl3Plus"; url = "https://github.com/pulsejet/nextcloud-oidc-login/releases/download/v3.2.0/oidc_login.tar.gz"; - sha256 = "sha256-0wAbTjVEZCXcob982eMaXkCgdR5fN60O2Q8vCpzIo+w="; + sha256 = "sha256-DrbaKENMz2QJfbDKCMrNGEZYpUEvtcsiqw9WnveaPZA="; }; }; extraAppsEnable = true; diff --git a/machines/raven/services/unifi-controller.nix b/machines/raven/services/unifi-controller.nix index 6befce2..8fdb5a9 100644 --- a/machines/raven/services/unifi-controller.nix +++ b/machines/raven/services/unifi-controller.nix @@ -1,13 +1,11 @@ { config, pkgs, ... }: -let - promCfg = config.services.prometheus; -in { services.unifi = { enable = true; openFirewall = true; unifiPackage = pkgs.unifi8; + mongodbPackage = pkgs.mongodb-6_0; }; networking.firewall.allowedTCPPorts = [ 8443 ]; diff --git a/modules/pipewire.nix b/modules/pipewire.nix index 9531e64..93405ed 100644 --- a/modules/pipewire.nix +++ b/modules/pipewire.nix @@ -1,7 +1,6 @@ { pkgs, ... }: { - sound.enable = true; hardware.pulseaudio.enable = false; services.pipewire = { diff --git a/shell.nix b/shell.nix index e7b19d8..197dbd6 100644 --- a/shell.nix +++ b/shell.nix @@ -5,7 +5,7 @@ pkgs.mkShell { nativeBuildInputs = with pkgs; [ (pkgs.writeShellScriptBin "nix" '' - exec -a nix ${pkgs.nixUnstable}/bin/nix --experimental-features "nix-command flakes" "$@" + exec -a nix ${pkgs.nixVersions.stable}/bin/nix --experimental-features "nix-command flakes" "$@" '') ]; }