treewide: apply deadnix / statix

This commit is contained in:
notohh 2023-06-11 02:08:06 -04:00
parent 1c5c91f38e
commit e691a90e7f
Signed by: notohh
GPG key ID: BD47506D475EE86D
37 changed files with 32 additions and 64 deletions

View file

@ -1,4 +1,4 @@
{...}: {
_: {
programs.direnv = {
enable = true;
enableNushellIntegration = true;

View file

@ -1,4 +1,4 @@
{...}: {
_: {
programs.git = {
enable = true;
delta.enable = true;

View file

@ -1,4 +1,4 @@
{...}: {
_: {
programs.helix = {
themes.catppuccin_mocha = let
transparent = "none";

View file

@ -1,4 +1,4 @@
{...}: {
_: {
programs.lazygit = {
enable = true;
settings = {

View file

@ -1,4 +1,4 @@
{...}: {
_: {
programs.lf = {
enable = true;
settings = {

View file

@ -1,4 +1,4 @@
{...}: {
_: {
programs.librewolf = {
enable = true;
settings = {

View file

@ -1,4 +1,4 @@
{...}: {
_: {
services.mako = {
enable = true;
icons = true;

View file

@ -1,4 +1,4 @@
{...}: {
_: {
programs.nushell = {
enable = true;
configFile.source = ./config.nu;

View file

@ -1,4 +1,4 @@
{...}: {
_: {
wayland.windowManager.hyprland.extraConfig = ''
monitor = HDMI-A-1,1920x1080,5760x0,1 #right

View file

@ -1,4 +1,4 @@
{...}: {
_: {
programs.wezterm = {
enable = true;
extraConfig = ''

View file

@ -1,4 +1,4 @@
{...}: {
_: {
programs.zathura = {
enable = true;
extraConfig = ''

View file

@ -1,4 +1,4 @@
{...}: {
_: {
home.file.".config/zellij/snowflake.kdl".text = ''
layout {
tab name="main" {

View file

@ -1,7 +1,6 @@
{
config,
lib,
pkgs,
modulesPath,
...
}: {

View file

@ -1,4 +1,4 @@
{pkgs, ...}: {
{...}: {
imports = [
./hardware-configuration.nix
./services

View file

@ -1,7 +1,5 @@
{
config,
lib,
pkgs,
modulesPath,
...
}: {

View file

@ -1,4 +1,4 @@
{...}: {
_: {
services.radarr = {
enable = true;
openFirewall = true;

View file

@ -1,8 +1,4 @@
{
config,
pkgs,
...
}: {
{...}: {
imports = [
./hardware-configuration.nix
./services

View file

@ -1,7 +1,5 @@
{
config,
lib,
pkgs,
modulesPath,
...
}: {

View file

@ -1,8 +1,4 @@
{
config,
pkgs,
...
}: {
{...}: {
imports = [
../../home
];

View file

@ -1,4 +1,4 @@
{...}: {
_: {
sops.secrets.foundry-username = {};
sops.secrets.foundry-password = {};
virtualisation.oci-containers.containers.foundryvtt = {

View file

@ -1,4 +1,4 @@
{...}: {
_: {
services.grafana = {
enable = true;
settings = {

View file

@ -1,4 +1,4 @@
{...}: {
_: {
virtualisation.oci-containers.containers.homepage = {
image = "ghcr.io/benphelps/homepage";
volumes = [

View file

@ -1,4 +1,4 @@
{...}: {
_: {
services.jellyfin = {
enable = true;
openFirewall = true;

View file

@ -1,4 +1,4 @@
{...}: {
_: {
services.prometheus = {
enable = true;
scrapeConfigs = [

View file

@ -1,8 +1,4 @@
{
pkgs,
config,
...
}: {
{pkgs, ...}: {
sops.secrets.rusty-auth-token = {};
environment.systemPackages = with pkgs; [rustypaste];

View file

@ -1,4 +1,4 @@
{...}: {
_: {
virtualisation.oci-containers.containers.searxng = {
image = "searxng/searxng";
volumes = [

View file

@ -1,4 +1,4 @@
{...}: {
_: {
virtualisation.oci-containers.containers.stash = {
image = "stashapp/stash";
environment = {

View file

@ -1,14 +1,10 @@
{config, ...}: {
_: {
sops.secrets.cloudflare-api-key = {};
networking.firewall.allowedTCPPorts = [80 443];
systemd.user.services.traefik.after = ["docker.service"];
systemd.services.traefik = {
environment = {
CLOUDFLARE_EMAIL = "jch0tm2e@notohh.dev";
};
serviceConfig = {
EnvironmentFile = config.sops.secrets.cloudflare-api-key.path;
};
};
services.traefik = {
enable = true;

View file

@ -1,10 +1,6 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{
config,
lib,
pkgs,
modulesPath,
...
}: {
@ -45,14 +41,7 @@
{device = "/dev/disk/by-uuid/2f5e2c64-99b8-4fa0-943c-c9dd45c84fdc";}
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.enp2s0.useDHCP = lib.mkDefault true;
# networking.interfaces.enp3s0.useDHCP = lib.mkDefault true;
# networking.interfaces.wlp5s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
powerManagement.cpuFreqGovernor = lib.mkDefault "performance";

View file

@ -21,6 +21,7 @@
username = "notoh";
homeDirectory = "/home/notoh";
packages = with pkgs; [
brave
webcord
discord
spotify-player

View file

@ -1,4 +1,4 @@
{pkgs, ...}: {
{...}: {
imports = [
./hardware-configuration.nix
./services

View file

@ -1,7 +1,6 @@
{
config,
lib,
pkgs,
modulesPath,
...
}: {

View file

@ -1,4 +1,4 @@
{...}: {
_: {
virtualisation.oci-containers.containers.kanboard = {
image = "kanboard/kanboard";
ports = [

View file

@ -1,4 +1,4 @@
{...}: {
_: {
services.greetd = {
enable = true;
settings = rec {

View file

@ -1,4 +1,4 @@
{...}: {
_: {
networking = {
networkmanager.enable = true;
nameservers = ["192.168.1.221"];

View file

@ -1,4 +1,4 @@
{...}: {
_: {
sops = {
defaultSopsFile = ../secrets/secrets.yaml;
age.keyFile = "/home/notoh/.config/sops/age/keys.txt";

View file

@ -1,4 +1,4 @@
{...}: {
_: {
home.file.".local/bin/lock" = {
executable = true;
text = ''