diff --git a/flake.lock b/flake.lock index 785ad38..f4190ad 100644 --- a/flake.lock +++ b/flake.lock @@ -7,11 +7,11 @@ ] }, "locked": { - "lastModified": 1723986931, - "narHash": "sha256-Fy+KEvDQ+Hc8lJAV3t6leXhZJ2ncU5/esxkgt3b8DEY=", + "lastModified": 1725180166, + "narHash": "sha256-fzssXuGR/mCeGbzM1ExaTqDz7QDGta3WA4jJsZyRruo=", "owner": "nix-community", "repo": "home-manager", - "rev": "2598861031b78aadb4da7269df7ca9ddfc3e1671", + "rev": "471e3eb0a114265bcd62d11d58ba8d3421ee68eb", "type": "github" }, "original": { @@ -38,11 +38,11 @@ }, "nixos-hardware": { "locked": { - "lastModified": 1724067415, - "narHash": "sha256-WJBAEFXAtA41RMpK8mvw0cQ62CJkNMBtzcEeNIJV7b0=", + "lastModified": 1724878143, + "narHash": "sha256-UjpKo92iZ25M05kgSOw/Ti6VZwpgdlOa73zHj8OcaDk=", "owner": "NixOS", "repo": "nixos-hardware", - "rev": "b09c46430ffcf18d575acf5c339b38ac4e1db5d2", + "rev": "95c3dfe6ef2e96ddc1ccdd7194e3cda02ca9a8ef", "type": "github" }, "original": { @@ -54,11 +54,11 @@ }, "nixpkgs": { "locked": { - "lastModified": 1723991338, - "narHash": "sha256-Grh5PF0+gootJfOJFenTTxDTYPidA3V28dqJ/WV7iis=", + "lastModified": 1724819573, + "narHash": "sha256-GnR7/ibgIH1vhoy8cYdmXE6iyZqKqFxQSVkFgosBh6w=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "8a3354191c0d7144db9756a74755672387b702ba", + "rev": "71e91c409d1e654808b2621f28a327acfdad8dc2", "type": "github" }, "original": { diff --git a/flake.nix b/flake.nix index e523373..ff05c37 100644 --- a/flake.nix +++ b/flake.nix @@ -3,6 +3,7 @@ inputs = { nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable"; + # nixpkgs.url = "github:NixOS/nixpkgs/gnome"; # nixpkgs.url = "github:LyesSaadi/nixpkgs/unstablegnome47"; home-manager.url = "github:nix-community/home-manager"; home-manager.inputs.nixpkgs.follows = "nixpkgs"; diff --git a/general/networking.nix b/general/networking.nix index 6ba1903..a1b92be 100644 --- a/general/networking.nix +++ b/general/networking.nix @@ -30,6 +30,12 @@ ''; }; + # Captive portals + programs.captive-browser = { + enable = true; + interface = "wlp9s0"; + }; + # Firewall networking.firewall.allowedTCPPorts = [ 24872 8998 ]; networking.firewall.allowedUDPPorts = [ 24872 8998 ]; diff --git a/general/system.nix b/general/system.nix index 70cf9a1..83b2a57 100644 --- a/general/system.nix +++ b/general/system.nix @@ -28,7 +28,7 @@ auth required ${pkgs.fprintd}/lib/security/pam_fprintd.so auth optional pam_permit.so auth required pam_env.so - auth [success=ok default=1] ${pkgs.gnome.gdm}/lib/security/pam_gdm.so + auth [success=ok default=1] ${pkgs.gdm}/lib/security/pam_gdm.so auth optional ${pkgs.gnome-keyring}/lib/security/pam_gnome_keyring.so account include login diff --git a/general/user/packages.nix b/general/user/packages.nix index ee0d8b1..cdf6d0c 100644 --- a/general/user/packages.nix +++ b/general/user/packages.nix @@ -124,7 +124,7 @@ in { # Containers & VMs toolbox distrobox - gnome.gnome-boxes + gnome-boxes # Office libreoffice diff --git a/specific/lyes-pc/configuration.nix b/specific/lyes-pc/configuration.nix index 917e6b9..b53d291 100644 --- a/specific/lyes-pc/configuration.nix +++ b/specific/lyes-pc/configuration.nix @@ -115,7 +115,14 @@ "--no-suite" "fprintd" ]; }); - libsrtp = prev.libsrtp.overrideAttrs (_: { doCheck = false; }); + libsrtp = prev.libsrtp.overrideAttrs (_: { + mesonFlags = [ + "-Dcrypto-library=openssl" + "-Dcrypto-library-kdf=disabled" + "-Ddoc=disabled" + "-Dtests=disabled" + ]; + }); # # haskellPackages.crypton = pkgs.haskell.lib.overrideCabal prev.crypton (_: { doCheck = false; }); # # haskellPackages.cryptonite = pkgs.haskell.lib.overrideCabal prev.cryptonite (_: { doCheck = false; }); }) ];