feat(anki): use unstable anki

This commit is contained in:
buffet 2023-05-02 13:50:13 +02:00
parent 854a5f1e17
commit 2297667eb6
4 changed files with 35 additions and 6 deletions

View file

@ -36,7 +36,8 @@ in {
};
packages = with pkgs; [
anki-bin
unstable.anki
cargo
cargo-crev
cargo-limit

View file

@ -176,6 +176,22 @@
"type": "github"
}
},
"nixpkgs-unstable": {
"locked": {
"lastModified": 1682879489,
"narHash": "sha256-sASwo8gBt7JDnOOstnps90K1wxmVfyhsTPPNTGBPjjg=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "da45bf6ec7bbcc5d1e14d3795c025199f28e0de0",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nur": {
"locked": {
"lastModified": 1682970362,
@ -218,6 +234,7 @@
"home-manager": "home-manager",
"impermanence": "impermanence",
"nixpkgs": "nixpkgs",
"nixpkgs-unstable": "nixpkgs-unstable",
"nur": "nur",
"nvim-cmp-vlime": "nvim-cmp-vlime",
"rust-tools-nvim": "rust-tools-nvim",

View file

@ -2,6 +2,7 @@
inputs = {
impermanence.url = "github:nix-community/impermanence";
nixpkgs.url = "github:NixOS/nixpkgs/nixos-22.11";
nixpkgs-unstable.url = "github:NixOS/nixpkgs/nixos-unstable";
nur.url = "github:nix-community/NUR";
agenix = {
@ -56,14 +57,21 @@
};
};
outputs = {nixpkgs, ...} @ args: {
nixosConfigurations.fanya = nixpkgs.lib.nixosSystem {
outputs = {nixpkgs, nixpkgs-unstable, ...} @ args: {
nixosConfigurations.fanya =
let
system = "x86_64-linux";
overlay-unstable = final: prev: {
unstable = nixpkgs-unstable.legacyPackages.${prev.system};
};
in
nixpkgs.lib.nixosSystem {
inherit system;
specialArgs = args;
modules = [
./fanya.nix
(_: {nixpkgs.overlays = [(import ./overlay)];})
(_: {nixpkgs.overlays = [(import ./overlay) overlay-unstable];})
];
};
};

View file

@ -1,4 +1,4 @@
{nixpkgs, ...}: {
{nixpkgs, nixpkgs-unstable, ...}: {
imports = [
./hardware-configuration.nix
];
@ -34,7 +34,10 @@
};
nix = {
registry.nixpkgs.flake = nixpkgs;
registry = {
nixpkgs.flake = nixpkgs;
nixpkgs-unstable.flake = nixpkgs-unstable;
};
settings = {
auto-optimise-store = true;
trusted-users = ["root" "buffet"];