diff options
author | sefidel <contact@sefidel.net> | 2023-04-16 10:15:26 +0900 |
---|---|---|
committer | sefidel <contact@sefidel.net> | 2023-04-16 10:23:42 +0900 |
commit | 7e540898987e54c3ad5065007f7f8c9ccf054582 (patch) | |
tree | de0e377f97b95de6efc6f61e0a9db44c55e7acd5 | |
parent | 7a98c19703db745bfd13eae653269ec0e92b5706 (diff) | |
download | infra-7e540898987e54c3ad5065007f7f8c9ccf054582.tar.gz infra-7e540898987e54c3ad5065007f7f8c9ccf054582.zip |
chore(flake): bump
-rw-r--r-- | flake.lock | 18 | ||||
-rw-r--r-- | modules/security.nix | 6 |
2 files changed, 12 insertions, 12 deletions
diff --git a/flake.lock b/flake.lock index 17aad40..9c1c941 100644 --- a/flake.lock +++ b/flake.lock @@ -187,11 +187,11 @@ "nixpkgs-stable": "nixpkgs-stable" }, "locked": { - "lastModified": 1681008913, - "narHash": "sha256-6C4BknF+cwCnl/A2fFdlAnc3LMV7f7XqOL09UhLZ9tA=", + "lastModified": 1681209176, + "narHash": "sha256-wyQokPpkNZnsl/bVf8m1428tfA0hJ0w/qexq4EizhTc=", "owner": "Mic92", "repo": "sops-nix", - "rev": "ddc6f124cb9be22d2ba066064c28bc19039a6bce", + "rev": "00d5fd73756d424de5263b92235563bc06f2c6e1", "type": "github" }, "original": { @@ -202,11 +202,11 @@ }, "unstable": { "locked": { - "lastModified": 1681126633, - "narHash": "sha256-evQ3Ct/yJDSHej16Hiq+JfxRjgm9FXu/2LBxsyorGdE=", + "lastModified": 1681465517, + "narHash": "sha256-EasJh15/jcJNAHtq2SGbiADRXteURAnQbj1NqBoKkzU=", "owner": "nixos", "repo": "nixpkgs", - "rev": "db24d86dd8a4769c50d6b7295e81aa280cd93f35", + "rev": "abe7316dd51a313ce528972b104f4f04f56eefc4", "type": "github" }, "original": { @@ -218,11 +218,11 @@ }, "unstable-small": { "locked": { - "lastModified": 1681168436, - "narHash": "sha256-e6bUQ73zjps8EUEPF6Fz+4G84MapeHjy4OGorULv0c4=", + "lastModified": 1681559998, + "narHash": "sha256-bGa3v5qKM+dPyEP4Keyt/LR/S+HhRVbfI5LRAm5T5co=", "owner": "nixos", "repo": "nixpkgs", - "rev": "2d79f0ccbd2a418f1582b7a97a57683403512188", + "rev": "280b1cdc1ea37bb477be1dada5d753f0246759a8", "type": "github" }, "original": { diff --git a/modules/security.nix b/modules/security.nix index d845393..410b270 100644 --- a/modules/security.nix +++ b/modules/security.nix @@ -8,11 +8,11 @@ # mount /tmp in ram. This makes temp file management faster # on ssd systems, and volatile! Because it's wiped on reboot. - boot.tmpOnTmpfs = false; - boot.tmpOnTmpfsSize = "80%"; + boot.tmp.useTmpfs = false; + boot.tmp.tmpfsSize = "80%"; # Purge /tmp on boot. (fallback option) - boot.cleanTmpDir = lib.mkDefault (!config.boot.tmpOnTmpfs); + boot.tmp.cleanOnBoot = lib.mkDefault (!config.boot.tmp.useTmpfs); boot.kernel.sysctl = { # The Magic SysRq key is a key combo that allows users connected to the |