Compare commits

..

8 Commits

Author SHA1 Message Date
Alexander Heldt
19a0c3d97d wip 2024-12-01 13:39:11 +01:00
Alexander Heldt
189cd4fe35 wip 2024-12-01 10:22:45 +01:00
Alexander Heldt
b19d28c442 test-vm: Add WHIB backend 2024-12-01 10:22:05 +01:00
Alexander Heldt
105aed70b4 Update README with documentation about the test-vm 2024-12-01 10:20:11 +01:00
Alexander Heldt
506f0574de test-vm: Resize terminal to host terminal size 2024-12-01 10:20:11 +01:00
Alexander Heldt
943db9b011 test-vm: Add alias of shutting down the VM 2024-12-01 10:20:11 +01:00
Alexander Heldt
045bfd269b test-vm: Auto login a user and assume its sudo 2024-12-01 10:20:11 +01:00
Alexander Heldt
b922b286b4 test-vm: Increase disk size 2024-12-01 10:20:11 +01:00
5 changed files with 43 additions and 26 deletions

48
flake.lock generated
View File

@@ -53,11 +53,11 @@
"nixpkgs-stable": "nixpkgs-stable" "nixpkgs-stable": "nixpkgs-stable"
}, },
"locked": { "locked": {
"lastModified": 1734599675, "lastModified": 1732784553,
"narHash": "sha256-jTfIoLxbVK3r6rFHKs0JS8WEYrmp0AGomzGaPTDZvrE=", "narHash": "sha256-S3PiqgTS8ST07ihFDL2cPExoxHcd9I8ITecpgMz+s4M=",
"owner": "nix-community", "owner": "nix-community",
"repo": "emacs-overlay", "repo": "emacs-overlay",
"rev": "df40078d8d4f3f0439e52a3f3e44af0005e6072e", "rev": "fb81e75180369a888db920df8f6097fbf2f603e9",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -94,11 +94,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1734622158, "lastModified": 1732793095,
"narHash": "sha256-h/fdzqlCqSa2ZCIqtDc9kshCJm6kQIoKuO0MSSmAX4A=", "narHash": "sha256-6TrknJ8CpvSSF4gviQSeD+wyj3siRcMvdBKhOXkEMKU=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "832920a60833533eaabcc93ab729801bf586fa0c", "rev": "2f7739d01080feb4549524e8f6927669b61c6ee3",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -114,11 +114,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1733056338, "lastModified": 1730743354,
"narHash": "sha256-sp14z0mrqrtmouz1+bU4Jh8/0xi+xwQHF2l7mhGSSVU=", "narHash": "sha256-gU4NySYyXeAzVaF5bI6BKmj2CdgiwGFnuPjXUId3Dx0=",
"owner": "hyprwm", "owner": "hyprwm",
"repo": "contrib", "repo": "contrib",
"rev": "d7c55140f1785b8d9fef351f1cd2a4c9e1eaa466", "rev": "792f6b83dc719214e0e2a0b380c34f147b28ece2",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -134,11 +134,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1733912267, "lastModified": 1732782112,
"narHash": "sha256-I3ubew5jt8YZ27AOtIodRAYo0aew6wxY8UkWCSqz6B4=", "narHash": "sha256-8rxzWGOVyijmE2ojWJxPEWqtUQ7i/lA5TvLoklwI4qw=",
"owner": "viperML", "owner": "viperML",
"repo": "nh", "repo": "nh",
"rev": "6a69a145b0c7dbd5616bbded512b8bf8b5d2f8a4", "rev": "24293d624556d32bd502c440b352e4fef4eeab6d",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -164,11 +164,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1734352517, "lastModified": 1732483221,
"narHash": "sha256-mfv+J/vO4nqmIOlq8Y1rRW8hVsGH3M+I2ESMjhuebDs=", "narHash": "sha256-kF6rDeCshoCgmQz+7uiuPdREVFuzhIorGOoPXMalL2U=",
"owner": "nixos", "owner": "nixos",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "b12e314726a4226298fe82776b4baeaa7bcf3dcd", "rev": "45348ad6fb8ac0e8415f6e5e96efe47dd7f39405",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -180,11 +180,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1734424634, "lastModified": 1732521221,
"narHash": "sha256-cHar1vqHOOyC7f1+tVycPoWTfKIaqkoe1Q6TnKzuti4=", "narHash": "sha256-2ThgXBUXAE1oFsVATK1ZX9IjPcS4nKFOAjhPNKuiMn0=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "d3c42f187194c26d9f0309a8ecc469d6c878ce33", "rev": "4633a7c72337ea8fd23a4f2ba3972865e3ec685d",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -196,16 +196,16 @@
}, },
"nixpkgs-stable": { "nixpkgs-stable": {
"locked": { "locked": {
"lastModified": 1734323986, "lastModified": 1732632634,
"narHash": "sha256-m/lh6hYMIWDYHCAsn81CDAiXoT3gmxXI9J987W5tZrE=", "narHash": "sha256-+G7n/ZD635aN0sEXQLynU7pWMd3PKDM7yBIXvYmjABQ=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "394571358ce82dff7411395829aa6a3aad45b907", "rev": "6f6076c37180ea3a916f84928cf3a714c5207a30",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "NixOS", "owner": "NixOS",
"ref": "nixos-24.11", "ref": "nixos-24.05",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }
@@ -267,8 +267,8 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1734695939, "lastModified": 1733056232,
"narHash": "sha256-CzASZ/7siZWTV1JS+sKdYVBLyQdLUPoZdQugtr48CwI=", "narHash": "sha256-TlGxaIEzV+4dithjWT4xtl/yOgayHIqZqj7okKufF8E=",
"path": "/home/alex/code/own/whib", "path": "/home/alex/code/own/whib",
"type": "path" "type": "path"
}, },

View File

@@ -4,7 +4,7 @@
pkgs.noto-fonts pkgs.noto-fonts
pkgs.noto-fonts-cjk-sans pkgs.noto-fonts-cjk-sans
pkgs.noto-fonts-emoji pkgs.noto-fonts-emoji
pkgs.nerd-fonts.jetbrains-mono pkgs.nerdfonts
pkgs.liberation_ttf pkgs.liberation_ttf
]; ];
} }

View File

@@ -15,6 +15,20 @@ in
}; };
config = lib.mkIf enabled { config = lib.mkIf enabled {
nixpkgs.overlays =
let
buildGo122 = pkgs: pkg: pkg.override { buildGoModule = pkgs.buildGo122Module; };
in
[
(final: prev: {
go = prev.go_1_22;
gopls = buildGo122 prev prev.gopls;
go-tools = buildGo122 prev prev.go-tools;
govulncheck = buildGo122 prev prev.govulncheck;
gotestsum = buildGo122 prev prev.gotestsum;
})
];
home-manager.users.alex = { home-manager.users.alex = {
programs.go = { programs.go = {
enable = true; enable = true;

View File

@@ -1,4 +1,5 @@
{ {
pkgs,
lib, lib,
config, config,
... ...
@@ -14,6 +15,8 @@ in
}; };
config = lib.mkIf enabled { config = lib.mkIf enabled {
environment.systemPackages = [ pkgs.gnupg ];
services.whib-backend = { services.whib-backend = {
enable = true; enable = true;
domain = "whib-backend.local"; domain = "whib-backend.local";
@@ -26,7 +29,6 @@ in
password = "postgrespassword"; password = "postgrespassword";
backup = { backup = {
interval = "*-*-* **:**:00 UTC"; # Every minute, for testing
gpgPassphraseFile = ./whib-gpgPassfile; gpgPassphraseFile = ./whib-gpgPassfile;
backblazeBucket = "whib-postgres-backups"; backblazeBucket = "whib-postgres-backups";

View File

@@ -0,0 +1 @@
abc123