treewide: apply deadnix / statix

This commit is contained in:
notohh 2023-06-11 02:08:06 -04:00
parent 1c5c91f38e
commit e691a90e7f
Signed by: notohh
GPG key ID: BD47506D475EE86D
37 changed files with 32 additions and 64 deletions

View file

@ -1,4 +1,4 @@
{...}: { _: {
programs.direnv = { programs.direnv = {
enable = true; enable = true;
enableNushellIntegration = true; enableNushellIntegration = true;

View file

@ -1,4 +1,4 @@
{...}: { _: {
programs.git = { programs.git = {
enable = true; enable = true;
delta.enable = true; delta.enable = true;

View file

@ -1,4 +1,4 @@
{...}: { _: {
programs.helix = { programs.helix = {
themes.catppuccin_mocha = let themes.catppuccin_mocha = let
transparent = "none"; transparent = "none";

View file

@ -1,4 +1,4 @@
{...}: { _: {
programs.lazygit = { programs.lazygit = {
enable = true; enable = true;
settings = { settings = {

View file

@ -1,4 +1,4 @@
{...}: { _: {
programs.lf = { programs.lf = {
enable = true; enable = true;
settings = { settings = {

View file

@ -1,4 +1,4 @@
{...}: { _: {
programs.librewolf = { programs.librewolf = {
enable = true; enable = true;
settings = { settings = {

View file

@ -1,4 +1,4 @@
{...}: { _: {
services.mako = { services.mako = {
enable = true; enable = true;
icons = true; icons = true;

View file

@ -1,4 +1,4 @@
{...}: { _: {
programs.nushell = { programs.nushell = {
enable = true; enable = true;
configFile.source = ./config.nu; configFile.source = ./config.nu;

View file

@ -1,4 +1,4 @@
{...}: { _: {
wayland.windowManager.hyprland.extraConfig = '' wayland.windowManager.hyprland.extraConfig = ''
monitor = HDMI-A-1,1920x1080,5760x0,1 #right monitor = HDMI-A-1,1920x1080,5760x0,1 #right

View file

@ -1,4 +1,4 @@
{...}: { _: {
programs.wezterm = { programs.wezterm = {
enable = true; enable = true;
extraConfig = '' extraConfig = ''

View file

@ -1,4 +1,4 @@
{...}: { _: {
programs.zathura = { programs.zathura = {
enable = true; enable = true;
extraConfig = '' extraConfig = ''

View file

@ -1,4 +1,4 @@
{...}: { _: {
home.file.".config/zellij/snowflake.kdl".text = '' home.file.".config/zellij/snowflake.kdl".text = ''
layout { layout {
tab name="main" { tab name="main" {

View file

@ -1,7 +1,6 @@
{ {
config, config,
lib, lib,
pkgs,
modulesPath, modulesPath,
... ...
}: { }: {

View file

@ -1,4 +1,4 @@
{pkgs, ...}: { {...}: {
imports = [ imports = [
./hardware-configuration.nix ./hardware-configuration.nix
./services ./services

View file

@ -1,7 +1,5 @@
{ {
config,
lib, lib,
pkgs,
modulesPath, modulesPath,
... ...
}: { }: {

View file

@ -1,4 +1,4 @@
{...}: { _: {
services.radarr = { services.radarr = {
enable = true; enable = true;
openFirewall = true; openFirewall = true;

View file

@ -1,8 +1,4 @@
{ {...}: {
config,
pkgs,
...
}: {
imports = [ imports = [
./hardware-configuration.nix ./hardware-configuration.nix
./services ./services

View file

@ -1,7 +1,5 @@
{ {
config,
lib, lib,
pkgs,
modulesPath, modulesPath,
... ...
}: { }: {

View file

@ -1,8 +1,4 @@
{ {...}: {
config,
pkgs,
...
}: {
imports = [ imports = [
../../home ../../home
]; ];

View file

@ -1,4 +1,4 @@
{...}: { _: {
sops.secrets.foundry-username = {}; sops.secrets.foundry-username = {};
sops.secrets.foundry-password = {}; sops.secrets.foundry-password = {};
virtualisation.oci-containers.containers.foundryvtt = { virtualisation.oci-containers.containers.foundryvtt = {

View file

@ -1,4 +1,4 @@
{...}: { _: {
services.grafana = { services.grafana = {
enable = true; enable = true;
settings = { settings = {

View file

@ -1,4 +1,4 @@
{...}: { _: {
virtualisation.oci-containers.containers.homepage = { virtualisation.oci-containers.containers.homepage = {
image = "ghcr.io/benphelps/homepage"; image = "ghcr.io/benphelps/homepage";
volumes = [ volumes = [

View file

@ -1,4 +1,4 @@
{...}: { _: {
services.jellyfin = { services.jellyfin = {
enable = true; enable = true;
openFirewall = true; openFirewall = true;

View file

@ -1,4 +1,4 @@
{...}: { _: {
services.prometheus = { services.prometheus = {
enable = true; enable = true;
scrapeConfigs = [ scrapeConfigs = [

View file

@ -1,8 +1,4 @@
{ {pkgs, ...}: {
pkgs,
config,
...
}: {
sops.secrets.rusty-auth-token = {}; sops.secrets.rusty-auth-token = {};
environment.systemPackages = with pkgs; [rustypaste]; environment.systemPackages = with pkgs; [rustypaste];

View file

@ -1,4 +1,4 @@
{...}: { _: {
virtualisation.oci-containers.containers.searxng = { virtualisation.oci-containers.containers.searxng = {
image = "searxng/searxng"; image = "searxng/searxng";
volumes = [ volumes = [

View file

@ -1,4 +1,4 @@
{...}: { _: {
virtualisation.oci-containers.containers.stash = { virtualisation.oci-containers.containers.stash = {
image = "stashapp/stash"; image = "stashapp/stash";
environment = { environment = {

View file

@ -1,14 +1,10 @@
{config, ...}: { _: {
sops.secrets.cloudflare-api-key = {}; sops.secrets.cloudflare-api-key = {};
networking.firewall.allowedTCPPorts = [80 443]; networking.firewall.allowedTCPPorts = [80 443];
systemd.user.services.traefik.after = ["docker.service"];
systemd.services.traefik = { systemd.services.traefik = {
environment = { environment = {
CLOUDFLARE_EMAIL = "jch0tm2e@notohh.dev"; CLOUDFLARE_EMAIL = "jch0tm2e@notohh.dev";
}; };
serviceConfig = {
EnvironmentFile = config.sops.secrets.cloudflare-api-key.path;
};
}; };
services.traefik = { services.traefik = {
enable = true; enable = true;

View file

@ -1,10 +1,6 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ {
config, config,
lib, lib,
pkgs,
modulesPath, modulesPath,
... ...
}: { }: {
@ -45,14 +41,7 @@
{device = "/dev/disk/by-uuid/2f5e2c64-99b8-4fa0-943c-c9dd45c84fdc";} {device = "/dev/disk/by-uuid/2f5e2c64-99b8-4fa0-943c-c9dd45c84fdc";}
]; ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true; networking.useDHCP = lib.mkDefault true;
# networking.interfaces.enp2s0.useDHCP = lib.mkDefault true;
# networking.interfaces.enp3s0.useDHCP = lib.mkDefault true;
# networking.interfaces.wlp5s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
powerManagement.cpuFreqGovernor = lib.mkDefault "performance"; powerManagement.cpuFreqGovernor = lib.mkDefault "performance";

View file

@ -21,6 +21,7 @@
username = "notoh"; username = "notoh";
homeDirectory = "/home/notoh"; homeDirectory = "/home/notoh";
packages = with pkgs; [ packages = with pkgs; [
brave
webcord webcord
discord discord
spotify-player spotify-player

View file

@ -1,4 +1,4 @@
{pkgs, ...}: { {...}: {
imports = [ imports = [
./hardware-configuration.nix ./hardware-configuration.nix
./services ./services

View file

@ -1,7 +1,6 @@
{ {
config, config,
lib, lib,
pkgs,
modulesPath, modulesPath,
... ...
}: { }: {

View file

@ -1,4 +1,4 @@
{...}: { _: {
virtualisation.oci-containers.containers.kanboard = { virtualisation.oci-containers.containers.kanboard = {
image = "kanboard/kanboard"; image = "kanboard/kanboard";
ports = [ ports = [

View file

@ -1,4 +1,4 @@
{...}: { _: {
services.greetd = { services.greetd = {
enable = true; enable = true;
settings = rec { settings = rec {

View file

@ -1,4 +1,4 @@
{...}: { _: {
networking = { networking = {
networkmanager.enable = true; networkmanager.enable = true;
nameservers = ["192.168.1.221"]; nameservers = ["192.168.1.221"];

View file

@ -1,4 +1,4 @@
{...}: { _: {
sops = { sops = {
defaultSopsFile = ../secrets/secrets.yaml; defaultSopsFile = ../secrets/secrets.yaml;
age.keyFile = "/home/notoh/.config/sops/age/keys.txt"; age.keyFile = "/home/notoh/.config/sops/age/keys.txt";

View file

@ -1,4 +1,4 @@
{...}: { _: {
home.file.".local/bin/lock" = { home.file.".local/bin/lock" = {
executable = true; executable = true;
text = '' text = ''