run statix
This commit is contained in:
parent
d23c1c8ca8
commit
91a99a631c
18
flake.lock
18
flake.lock
|
@ -61,11 +61,11 @@
|
|||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1644255659,
|
||||
"narHash": "sha256-VuPFOttrBRTOJqPY5yboxVdk1xZjSSlOSDDbBCMKioo=",
|
||||
"lastModified": 1644346464,
|
||||
"narHash": "sha256-hS8hwbr/PflMIfTWTmB7Xo5jIrsWhSAqtz5XXxPa0zQ=",
|
||||
"owner": "nix-community",
|
||||
"repo": "home-manager",
|
||||
"rev": "1ca6293c8fb1dbe13c48fe518440c288256cd562",
|
||||
"rev": "e2aa1f598674aa9c06f28f5db60b89f37f1e961b",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
@ -83,11 +83,11 @@
|
|||
"utils": "utils_2"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1644320655,
|
||||
"narHash": "sha256-Xi/I1Ms/eyup4ch1rxT9s+gurDLMCnk6HeKgeTKJOnE=",
|
||||
"lastModified": 1644329428,
|
||||
"narHash": "sha256-psoRS7PQe4hMO72BBvSKy2PJWzNZkJp2zV0LKXGZfSM=",
|
||||
"owner": "ChaotiCryptidz",
|
||||
"repo": "musicutil",
|
||||
"rev": "676e66dde66505d4410675e60fa274b672254d55",
|
||||
"rev": "86f4865ac74572d43026b19551420f8d0de2b5bb",
|
||||
"type": "gitlab"
|
||||
},
|
||||
"original": {
|
||||
|
@ -98,11 +98,11 @@
|
|||
},
|
||||
"nixpkgs": {
|
||||
"locked": {
|
||||
"lastModified": 1644193945,
|
||||
"narHash": "sha256-FqPyne57rnbvFfgL5OacS1w85/2NAZo59jqhhhcobek=",
|
||||
"lastModified": 1644359234,
|
||||
"narHash": "sha256-u/sBnRgrFrn9W8gZMS6vN3ZnJsoTvbws968TpqwlDJQ=",
|
||||
"owner": "nixos",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "fbd030fb2d8dc9fedcb45e57cbce5e9e064bfb6c",
|
||||
"rev": "c5051e2b5fe9fab43a64f0e0d06b62c81a890b90",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }: {
|
||||
_: {
|
||||
programs.ssh.enable = true;
|
||||
programs.ssh.matchBlocks = {
|
||||
"lappy" = {
|
||||
|
|
|
@ -58,9 +58,7 @@
|
|||
{ command = "${pkgs.waybar}/bin/waybar"; }
|
||||
];
|
||||
|
||||
output = {
|
||||
"*" = { bg = "~/.local/share/wallpaper.jpg fill"; };
|
||||
};
|
||||
output = { "*" = { bg = "~/.local/share/wallpaper.jpg fill"; }; };
|
||||
input = { "*" = { xkb_layout = "gb"; }; };
|
||||
|
||||
fonts = {
|
||||
|
@ -120,10 +118,9 @@
|
|||
"exec ${pactl} set-sink-volume @DEFAULT_SINK@ +5%";
|
||||
"XF86AudioLowerVolume" =
|
||||
"exec ${pactl} set-sink-volume @DEFAULT_SINK@ -5%";
|
||||
"XF86AudioMute" =
|
||||
"exec ${pactl}pactl set-sink-mute @DEFAULT_SINK@ toggle";
|
||||
"XF86AudioMute" = "exec ${pactl} set-sink-mute @DEFAULT_SINK@ toggle";
|
||||
"XF86AudioMicMute" =
|
||||
"exec ${pactl} set-source-mute $(pacmd list-sources |awk '/* index:/{print $3}') toggle";
|
||||
"exec ${pactl} set-source-mute @DEFAULT_SOURCE@ toggle";
|
||||
"XF86MonBrightnessDown" = "exec sudo xbacklight -time 1 -dec +5";
|
||||
"XF86MonBrightnessUp" = "exec sudo xbacklight -time 1 -inc +5";
|
||||
"Print" =
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }: {
|
||||
_: {
|
||||
programs.waybar = {
|
||||
enable = true;
|
||||
settings = [{
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }: {
|
||||
_: {
|
||||
programs.zsh.profileExtra = ''
|
||||
# If running from tty1 start sway
|
||||
if [ "$(tty)" = "/dev/tty1" ]; then
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }: {
|
||||
_: {
|
||||
services.invidious = {
|
||||
enable = true;
|
||||
port = 3000;
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }: {
|
||||
_: {
|
||||
security.acme = {
|
||||
defaults = { email = "chaoticryptidz@owo.monster"; };
|
||||
acceptTerms = true;
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }: {
|
||||
_: {
|
||||
services.quassel = {
|
||||
enable = true;
|
||||
interfaces = [ "0.0.0.0" ];
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }:
|
||||
_:
|
||||
let
|
||||
backupUser = "root";
|
||||
backupPaths = [ "/var/lib/postgresql" "/var/lib/vault" "/var/lib/acme" ];
|
||||
|
@ -10,7 +10,7 @@ in {
|
|||
services.restic.backups.hetzner-vm = {
|
||||
user = backupUser;
|
||||
paths = backupPaths;
|
||||
timerConfig = timerConfig;
|
||||
inherit timerConfig;
|
||||
repository = "b2:Backups-HetznerVM:/";
|
||||
passwordFile = "/secrets/restic-password";
|
||||
environmentFile = "/secrets/restic-env";
|
||||
|
@ -18,7 +18,7 @@ in {
|
|||
services.restic.backups.cassie-hetzner-vm = {
|
||||
user = backupUser;
|
||||
paths = backupPaths;
|
||||
timerConfig = timerConfig;
|
||||
inherit timerConfig;
|
||||
repository = "b2:Cryptidz-Backup:HetznerVM";
|
||||
passwordFile = "/secrets/restic-password-cassie";
|
||||
environmentFile = "/secrets/restic-env-cassie";
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }: {
|
||||
_: {
|
||||
services.vsftpd = {
|
||||
enable = true;
|
||||
extraConfig = ''
|
||||
|
|
|
@ -13,7 +13,7 @@ in {
|
|||
services.hostapd = {
|
||||
enable = true;
|
||||
interface = wifiInterface;
|
||||
ssid = ssid;
|
||||
inherit ssid;
|
||||
wpaPassphrase = password;
|
||||
};
|
||||
|
||||
|
@ -33,7 +33,7 @@ in {
|
|||
networking.nat = {
|
||||
enable = true;
|
||||
internalIPs = [ "192.168.2.0/24" ];
|
||||
externalInterface = externalInterface;
|
||||
inherit externalInterface;
|
||||
};
|
||||
|
||||
services.dnsmasq = {
|
||||
|
|
|
@ -1 +1 @@
|
|||
{ ... }: { }
|
||||
_: { }
|
||||
|
|
|
@ -1 +1 @@
|
|||
{ ... }: { }
|
||||
_: { }
|
||||
|
|
|
@ -1 +1 @@
|
|||
{ ... }: { boot.tmpOnTmpfs = true; }
|
||||
_: { boot.tmpOnTmpfs = true; }
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }: {
|
||||
_: {
|
||||
hardware.bluetooth.enable = true;
|
||||
services.blueman.enable = true;
|
||||
}
|
||||
|
|
|
@ -1 +1 @@
|
|||
{ ... }: { services.usbmuxd.enable = true; }
|
||||
_: { services.usbmuxd.enable = true; }
|
||||
|
|
3
profiles/gui/environments/kde/default.nix
Normal file
3
profiles/gui/environments/kde/default.nix
Normal file
|
@ -0,0 +1,3 @@
|
|||
_: {
|
||||
|
||||
}
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }: {
|
||||
_: {
|
||||
security.rtkit.enable = true;
|
||||
services.pipewire = {
|
||||
enable = true;
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
{ ... }: {
|
||||
_: {
|
||||
hardware.pulseaudio.daemon.config = { default-sample-rate = "48000"; };
|
||||
}
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }: {
|
||||
_: {
|
||||
hardware.pulseaudio = {
|
||||
extraConfig = ''
|
||||
load-module module-native-protocol-tcp auth-anonymous=1 auth-ip-acl=127.0.0.1;192.168.1.0/24;100.115.10.34
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }: {
|
||||
_: {
|
||||
hardware.pulseaudio = {
|
||||
extraConfig = ''
|
||||
load-module module-rtp-recv latency_msec=5000 sap_address=0.0.0.0
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }: {
|
||||
_: {
|
||||
services.tailscale.enable = true;
|
||||
networking.firewall.trustedInterfaces = [ "tailscale0" ];
|
||||
}
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ ... }: {
|
||||
_: {
|
||||
services.tor = {
|
||||
enable = true;
|
||||
client.enable = true;
|
||||
|
|
10
tree.nix
10
tree.nix
|
@ -8,7 +8,7 @@ let
|
|||
realPath = toString path;
|
||||
dirContents = builtins.readDir path;
|
||||
isDirectory = entry: dirContents."${entry}" == "directory";
|
||||
isHidden = entry: hasPrefix "." entry;
|
||||
isHidden = hasPrefix ".";
|
||||
isDir = entry: _: (isDirectory entry) && !(isHidden entry);
|
||||
directories = filterAttrs isDir dirContents;
|
||||
isNixFile = entry: _:
|
||||
|
@ -16,9 +16,7 @@ let
|
|||
in result != null && builtins.length result > 0;
|
||||
nixFiles = filterAttrs isNixFile dirContents;
|
||||
getPath = entry: "${realPath}/${entry}";
|
||||
getPaths = entries:
|
||||
mapAttrs' (n: v: nameValuePair (removeSuffix ".nix" n) (getPath n))
|
||||
entries;
|
||||
getPaths = mapAttrs' (n: v: nameValuePair (removeSuffix ".nix" n) (getPath n));
|
||||
nixFilePaths = getPaths nixFiles;
|
||||
dirPaths = getPaths directories;
|
||||
recursedPaths = mapAttrs (_: fullPath:
|
||||
|
@ -87,7 +85,7 @@ let
|
|||
f (path ++ [ name ]) value;
|
||||
in mapAttrs g set;
|
||||
in recurse [ ] set;
|
||||
getPathString = path: concatStringsSep "/" path;
|
||||
getPathString = concatStringsSep "/";
|
||||
getConfig = path: default: configTreeModule.${getPathString path} or default;
|
||||
revtail = path: sublist 0 (length path - 1) path;
|
||||
getConfigRecursive = path:
|
||||
|
@ -103,7 +101,7 @@ let
|
|||
processFunctor = prev:
|
||||
prev // {
|
||||
__functor = self:
|
||||
{ ... }: {
|
||||
_: {
|
||||
imports =
|
||||
attrValues (removeAttrs prev leafConfig.functor.excludes)
|
||||
++ leafConfig.functor.external;
|
||||
|
|
Loading…
Reference in a new issue