diff --git a/exprs/overlay.nix b/exprs/overlay.nix index 3156758..2befade 100644 --- a/exprs/overlay.nix +++ b/exprs/overlay.nix @@ -23,11 +23,6 @@ inputs: final: prev: { env = old.env // { VENCORD_REMOTE = "Vendicated/Vencord"; VENCORD_HASH = inputs.vencord.shortRev; - ESBUILD_BINARY_PATH = prev.lib.getExe prev.esbuild; # 0.25.1 - }; - - pnpmDeps = old.pnpmDeps.overrideAttrs { - outputHash = "sha256-hO6QKRr4jTfesRDAEGcpFeJmGTGLGMw6EgIvD23DNzw="; }; }); } diff --git a/flake.lock b/flake.lock index cfe70ba..6ec2d51 100644 --- a/flake.lock +++ b/flake.lock @@ -92,11 +92,11 @@ ] }, "locked": { - "lastModified": 1743550720, - "narHash": "sha256-hIshGgKZCgWh6AYJpJmRgFdR3WUbkY04o82X05xqQiY=", + "lastModified": 1741352980, + "narHash": "sha256-+u2UunDA4Cl5Fci3m7S643HzKmIDAe+fiXrLqYsR2fs=", "owner": "hercules-ci", "repo": "flake-parts", - "rev": "c621e8422220273271f52058f618c94e405bb0f5", + "rev": "f4330d22f1c5d2ba72d3d22df5597d123fdb60a9", "type": "github" }, "original": { @@ -132,11 +132,11 @@ ] }, "locked": { - "lastModified": 1743556466, - "narHash": "sha256-rvU79DJ6rPDxiH0sTp686Vlm+JewwAZPGcwt8OfHJbM=", + "lastModified": 1743482579, + "narHash": "sha256-u81nqA4UuRatKDkzUuIfVYdLMw8birEy+99oXpdyXhY=", "owner": "nix-community", "repo": "home-manager", - "rev": "5ee44bc7c2e853f144390a12ebe5174ad7e3b9e0", + "rev": "c21383b556609ce1ad901aa08b4c6fbd9e0c7af0", "type": "github" }, "original": { @@ -220,11 +220,11 @@ }, "nixpkgs": { "locked": { - "lastModified": 1743448293, - "narHash": "sha256-bmEPmSjJakAp/JojZRrUvNcDX2R5/nuX6bm+seVaGhs=", + "lastModified": 1743315132, + "narHash": "sha256-6hl6L/tRnwubHcA4pfUUtk542wn2Om+D4UnDhlDW9BE=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "77b584d61ff80b4cef9245829a6f1dfad5afdfa3", + "rev": "52faf482a3889b7619003c0daec593a1912fddc1", "type": "github" }, "original": { @@ -335,11 +335,11 @@ "vencord": { "flake": false, "locked": { - "lastModified": 1743565755, - "narHash": "sha256-n5xkOy0CCRKROuicm8rg5tDpvldaSwOvXAsXgBGEXXQ=", + "lastModified": 1742560481, + "narHash": "sha256-WzmRz0wf/Ss90FmXXp6gaylC0k/k/QkFaFddlnLo+Xk=", "owner": "Vendicated", "repo": "Vencord", - "rev": "93f98cee2c4820135acbb010ca4abb17c7f5c064", + "rev": "b3bff83dd5040950c55e09bed9e47a60490f81d8", "type": "github" }, "original": { diff --git a/systems/vesuvio/nitter.nix b/systems/vesuvio/nitter.nix index fc4a75e..74ae5fa 100644 --- a/systems/vesuvio/nitter.nix +++ b/systems/vesuvio/nitter.nix @@ -1,23 +1,39 @@ { + pkgs, config, _utils, ... }: let accounts = _utils.setupSingleSecret config "nitterAccounts" { }; + + nitterUpdated = pkgs.nitter.overrideAttrs { + version = "0-unstable-2025-02-26"; + src = pkgs.fetchFromGitHub { + owner = "zedeus"; + repo = "nitter"; + rev = "41fa47bfbf3917e9b3ac4f7b49c89a75a7a2bd44"; + hash = "sha256-cmYlmzCJl1405TuYExGw3AOmjdY0r7ObmmLCAom+Fyw="; + }; + }; in { imports = [ accounts.generate ]; services.nitter = { enable = true; - sessionsFile = accounts.path; + package = nitterUpdated; + guestAccounts = accounts.path; server = { hostname = "nit.uku.moe"; port = 8081; }; }; + systemd.services.nitter.environment = { + NITTER_SESSIONS_FILE = "%d/guestAccountsFile"; + }; + services.nginx.virtualHosts."nit.uku.moe" = { forceSSL = true; enableACME = true;