diff --git a/overlays/unstable/goose.nix b/overlays/unstable/goose.nix index 556b55a..eb644fb 100644 --- a/overlays/unstable/goose.nix +++ b/overlays/unstable/goose.nix @@ -23,20 +23,20 @@ let meta.license = lib.licenses.unfree; }; in -rustPlatform.buildRustPackage { +rustPlatform.buildRustPackage rec { pname = "goose-cli"; - version = "1.0.17-2"; + version = "1.0.17"; src = fetchFromGitHub { owner = "block"; repo = "goose"; - #tag = "v${version}"; - rev = "167ac0efdc372ddbc80273c44d8497eafe0a901e"; - hash = "sha256-dWvqanbNvC4IX6ZRdTZhB0+T9vGNVxAEBj8DtPfN/VE="; + tag = "v${version}"; + #rev = "e7ad230957053dac7643701a69439ac19d5d2bf6"; + hash = "sha256-l/lcwTNUq2xJHh0MKhnDZjRJ/5cANbdar/Vusf38esQ="; }; useFetchCargoVendor = true; - cargoHash = "sha256-53W6gpt5eLw/WHMdEEWD4GmriHk2cAsNRzHv7niAb/0="; + cargoHash = "sha256-1xKWzgptnM1ZP0nQXILBoaKVwL2FyXpldTUIa1ITQO0="; nativeBuildInputs = [ pkg-config ]; @@ -59,10 +59,11 @@ rustPlatform.buildRustPackage { # need dbus-daemon "--skip=config::base::tests::test_multiple_secrets" "--skip=config::base::tests::test_secret_management" - "--skip=logging::tests::test_log_file_name::with_session_name_and_error_capture" # Observer should be Some with both init project keys set "--skip=tracing::langfuse_layer::tests::test_create_langfuse_observer" "--skip=providers::gcpauth::tests::test_token_refresh_race_condition" + ] + ++ lib.optionals stdenv.hostPlatform.isDarwin [ # Lazy instance has previously been poisoned "--skip=jetbrains::tests::test_capabilities" "--skip=jetbrains::tests::test_router_creation" diff --git a/systems/x86_64-linux/mx/coturn.nix b/systems/x86_64-linux/mx/coturn.nix index 45fb964..fd6b792 100644 --- a/systems/x86_64-linux/mx/coturn.nix +++ b/systems/x86_64-linux/mx/coturn.nix @@ -1,11 +1,12 @@ -{ pkgs -, lib -, config -, ... +{ + pkgs, + lib, + config, + ... }: { sops.secrets."coturn/static-auth-secret" = { - sopsFile = ../../../.secrets/hetzner/coturn.yaml; + sopsFile = ../../../.secrets/hetzner/coturn.yaml; # bring your own password file restartUnits = [ "coturn.service" ]; owner = "turnserver"; }; @@ -35,6 +36,7 @@ # get a certificate security.acme.certs.${config.services.coturn.realm} = { + # insert here the right configuration to obtain a certificate postRun = "systemctl restart coturn.service"; group = "turnserver"; };