run statix

This commit is contained in:
ChaotiCryptidz 2022-02-10 10:37:09 +00:00
parent d23c1c8ca8
commit 91a99a631c
24 changed files with 42 additions and 44 deletions

View file

@ -61,11 +61,11 @@
]
},
"locked": {
"lastModified": 1644255659,
"narHash": "sha256-VuPFOttrBRTOJqPY5yboxVdk1xZjSSlOSDDbBCMKioo=",
"lastModified": 1644346464,
"narHash": "sha256-hS8hwbr/PflMIfTWTmB7Xo5jIrsWhSAqtz5XXxPa0zQ=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "1ca6293c8fb1dbe13c48fe518440c288256cd562",
"rev": "e2aa1f598674aa9c06f28f5db60b89f37f1e961b",
"type": "github"
},
"original": {
@ -83,11 +83,11 @@
"utils": "utils_2"
},
"locked": {
"lastModified": 1644320655,
"narHash": "sha256-Xi/I1Ms/eyup4ch1rxT9s+gurDLMCnk6HeKgeTKJOnE=",
"lastModified": 1644329428,
"narHash": "sha256-psoRS7PQe4hMO72BBvSKy2PJWzNZkJp2zV0LKXGZfSM=",
"owner": "ChaotiCryptidz",
"repo": "musicutil",
"rev": "676e66dde66505d4410675e60fa274b672254d55",
"rev": "86f4865ac74572d43026b19551420f8d0de2b5bb",
"type": "gitlab"
},
"original": {
@ -98,11 +98,11 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1644193945,
"narHash": "sha256-FqPyne57rnbvFfgL5OacS1w85/2NAZo59jqhhhcobek=",
"lastModified": 1644359234,
"narHash": "sha256-u/sBnRgrFrn9W8gZMS6vN3ZnJsoTvbws968TpqwlDJQ=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "fbd030fb2d8dc9fedcb45e57cbce5e9e064bfb6c",
"rev": "c5051e2b5fe9fab43a64f0e0d06b62c81a890b90",
"type": "github"
},
"original": {

View file

@ -1,4 +1,4 @@
{ ... }: {
_: {
programs.ssh.enable = true;
programs.ssh.matchBlocks = {
"lappy" = {

View file

@ -58,9 +58,7 @@
{ command = "${pkgs.waybar}/bin/waybar"; }
];
output = {
"*" = { bg = "~/.local/share/wallpaper.jpg fill"; };
};
output = { "*" = { bg = "~/.local/share/wallpaper.jpg fill"; }; };
input = { "*" = { xkb_layout = "gb"; }; };
fonts = {
@ -120,10 +118,9 @@
"exec ${pactl} set-sink-volume @DEFAULT_SINK@ +5%";
"XF86AudioLowerVolume" =
"exec ${pactl} set-sink-volume @DEFAULT_SINK@ -5%";
"XF86AudioMute" =
"exec ${pactl}pactl set-sink-mute @DEFAULT_SINK@ toggle";
"XF86AudioMute" = "exec ${pactl} set-sink-mute @DEFAULT_SINK@ toggle";
"XF86AudioMicMute" =
"exec ${pactl} set-source-mute $(pacmd list-sources |awk '/* index:/{print $3}') toggle";
"exec ${pactl} set-source-mute @DEFAULT_SOURCE@ toggle";
"XF86MonBrightnessDown" = "exec sudo xbacklight -time 1 -dec +5";
"XF86MonBrightnessUp" = "exec sudo xbacklight -time 1 -inc +5";
"Print" =

View file

@ -1,4 +1,4 @@
{ ... }: {
_: {
programs.waybar = {
enable = true;
settings = [{

View file

@ -1,4 +1,4 @@
{ ... }: {
_: {
programs.zsh.profileExtra = ''
# If running from tty1 start sway
if [ "$(tty)" = "/dev/tty1" ]; then

View file

@ -1,4 +1,4 @@
{ ... }: {
_: {
services.invidious = {
enable = true;
port = 3000;

View file

@ -1,4 +1,4 @@
{ ... }: {
_: {
security.acme = {
defaults = { email = "chaoticryptidz@owo.monster"; };
acceptTerms = true;

View file

@ -1,4 +1,4 @@
{ ... }: {
_: {
services.quassel = {
enable = true;
interfaces = [ "0.0.0.0" ];

View file

@ -1,4 +1,4 @@
{ ... }:
_:
let
backupUser = "root";
backupPaths = [ "/var/lib/postgresql" "/var/lib/vault" "/var/lib/acme" ];
@ -10,7 +10,7 @@ in {
services.restic.backups.hetzner-vm = {
user = backupUser;
paths = backupPaths;
timerConfig = timerConfig;
inherit timerConfig;
repository = "b2:Backups-HetznerVM:/";
passwordFile = "/secrets/restic-password";
environmentFile = "/secrets/restic-env";
@ -18,7 +18,7 @@ in {
services.restic.backups.cassie-hetzner-vm = {
user = backupUser;
paths = backupPaths;
timerConfig = timerConfig;
inherit timerConfig;
repository = "b2:Cryptidz-Backup:HetznerVM";
passwordFile = "/secrets/restic-password-cassie";
environmentFile = "/secrets/restic-env-cassie";

View file

@ -1,4 +1,4 @@
{ ... }: {
_: {
services.vsftpd = {
enable = true;
extraConfig = ''

View file

@ -13,7 +13,7 @@ in {
services.hostapd = {
enable = true;
interface = wifiInterface;
ssid = ssid;
inherit ssid;
wpaPassphrase = password;
};
@ -33,7 +33,7 @@ in {
networking.nat = {
enable = true;
internalIPs = [ "192.168.2.0/24" ];
externalInterface = externalInterface;
inherit externalInterface;
};
services.dnsmasq = {

View file

@ -1 +1 @@
{ ... }: { }
_: { }

View file

@ -1 +1 @@
{ ... }: { }
_: { }

View file

@ -1 +1 @@
{ ... }: { boot.tmpOnTmpfs = true; }
_: { boot.tmpOnTmpfs = true; }

View file

@ -1,4 +1,4 @@
{ ... }: {
_: {
hardware.bluetooth.enable = true;
services.blueman.enable = true;
}

View file

@ -1 +1 @@
{ ... }: { services.usbmuxd.enable = true; }
_: { services.usbmuxd.enable = true; }

View file

@ -0,0 +1,3 @@
_: {
}

View file

@ -1,4 +1,4 @@
{ ... }: {
_: {
security.rtkit.enable = true;
services.pipewire = {
enable = true;

View file

@ -1,3 +1,3 @@
{ ... }: {
_: {
hardware.pulseaudio.daemon.config = { default-sample-rate = "48000"; };
}

View file

@ -1,4 +1,4 @@
{ ... }: {
_: {
hardware.pulseaudio = {
extraConfig = ''
load-module module-native-protocol-tcp auth-anonymous=1 auth-ip-acl=127.0.0.1;192.168.1.0/24;100.115.10.34

View file

@ -1,4 +1,4 @@
{ ... }: {
_: {
hardware.pulseaudio = {
extraConfig = ''
load-module module-rtp-recv latency_msec=5000 sap_address=0.0.0.0

View file

@ -1,4 +1,4 @@
{ ... }: {
_: {
services.tailscale.enable = true;
networking.firewall.trustedInterfaces = [ "tailscale0" ];
}

View file

@ -1,4 +1,4 @@
{ ... }: {
_: {
services.tor = {
enable = true;
client.enable = true;

View file

@ -8,7 +8,7 @@ let
realPath = toString path;
dirContents = builtins.readDir path;
isDirectory = entry: dirContents."${entry}" == "directory";
isHidden = entry: hasPrefix "." entry;
isHidden = hasPrefix ".";
isDir = entry: _: (isDirectory entry) && !(isHidden entry);
directories = filterAttrs isDir dirContents;
isNixFile = entry: _:
@ -16,9 +16,7 @@ let
in result != null && builtins.length result > 0;
nixFiles = filterAttrs isNixFile dirContents;
getPath = entry: "${realPath}/${entry}";
getPaths = entries:
mapAttrs' (n: v: nameValuePair (removeSuffix ".nix" n) (getPath n))
entries;
getPaths = mapAttrs' (n: v: nameValuePair (removeSuffix ".nix" n) (getPath n));
nixFilePaths = getPaths nixFiles;
dirPaths = getPaths directories;
recursedPaths = mapAttrs (_: fullPath:
@ -87,7 +85,7 @@ let
f (path ++ [ name ]) value;
in mapAttrs g set;
in recurse [ ] set;
getPathString = path: concatStringsSep "/" path;
getPathString = concatStringsSep "/";
getConfig = path: default: configTreeModule.${getPathString path} or default;
revtail = path: sublist 0 (length path - 1) path;
getConfigRecursive = path:
@ -103,7 +101,7 @@ let
processFunctor = prev:
prev // {
__functor = self:
{ ... }: {
_: {
imports =
attrValues (removeAttrs prev leafConfig.functor.excludes)
++ leafConfig.functor.external;