chore: apply lints
This commit is contained in:
parent
ec1b31cabc
commit
2411c0b496
16 changed files with 42 additions and 47 deletions
|
@ -23,7 +23,7 @@ inputs: let
|
||||||
inherit inputs;
|
inherit inputs;
|
||||||
inherit self;
|
inherit self;
|
||||||
}
|
}
|
||||||
(args.specialArgs or {});
|
args.specialArgs or {};
|
||||||
modules = concatLists [
|
modules = concatLists [
|
||||||
# This is used to pre-emptively set the hostPlatform for nixpkgs.
|
# This is used to pre-emptively set the hostPlatform for nixpkgs.
|
||||||
# Also, we set the system hostname here.
|
# Also, we set the system hostname here.
|
||||||
|
|
|
@ -9,21 +9,23 @@
|
||||||
i18n.defaultLocale = "en_US.UTF-8";
|
i18n.defaultLocale = "en_US.UTF-8";
|
||||||
console.keyMap = "uk";
|
console.keyMap = "uk";
|
||||||
security.polkit.enable = true;
|
security.polkit.enable = true;
|
||||||
programs.nix-ld.enable = false;
|
|
||||||
boot.kernelPackages = pkgs.linuxPackages_xanmod_latest;
|
boot.kernelPackages = pkgs.linuxPackages_xanmod_latest;
|
||||||
services = {
|
services = {
|
||||||
fstrim.enable = lib.mkDefault true;
|
fstrim.enable = lib.mkDefault true;
|
||||||
thermald.enable = true;
|
thermald.enable = true;
|
||||||
};
|
};
|
||||||
programs.zsh = {
|
programs = {
|
||||||
enable = true;
|
nix-ld.enable = false;
|
||||||
enableBashCompletion = true;
|
zsh = {
|
||||||
|
enable = true;
|
||||||
|
enableBashCompletion = true;
|
||||||
|
};
|
||||||
|
gnupg.agent = {
|
||||||
|
enable = true;
|
||||||
|
pinentryPackage = pkgs.pinentry-qt;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
programs.gnupg.agent = {
|
|
||||||
enable = true;
|
|
||||||
pinentryPackage = pkgs.pinentry-qt;
|
|
||||||
};
|
|
||||||
modules = {
|
modules = {
|
||||||
wms.wayland.enable = true;
|
wms.wayland.enable = true;
|
||||||
desktops.hyprland.enable = false;
|
desktops.hyprland.enable = false;
|
||||||
|
|
|
@ -6,10 +6,12 @@
|
||||||
}: {
|
}: {
|
||||||
imports = [(modulesPath + "/installer/scan/not-detected.nix")];
|
imports = [(modulesPath + "/installer/scan/not-detected.nix")];
|
||||||
|
|
||||||
boot.initrd.availableKernelModules = ["xhci_pci" "ahci" "nvme" "usbhid" "sd_mod"];
|
boot = {
|
||||||
boot.initrd.kernelModules = [];
|
initrd.availableKernelModules = ["xhci_pci" "ahci" "nvme" "usbhid" "sd_mod"];
|
||||||
boot.kernelModules = [];
|
initrd.kernelModules = [];
|
||||||
boot.extraModulePackages = [];
|
kernelModules = [];
|
||||||
|
extraModulePackages = [];
|
||||||
|
};
|
||||||
|
|
||||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||||
|
|
|
@ -60,7 +60,7 @@
|
||||||
# 1:1 taken from raf's custom kernel, check out his config for this.
|
# 1:1 taken from raf's custom kernel, check out his config for this.
|
||||||
.overrideAttrs (oa: {
|
.overrideAttrs (oa: {
|
||||||
prePatch =
|
prePatch =
|
||||||
(oa.prePatch or "")
|
oa.prePatch or ""
|
||||||
+ ''
|
+ ''
|
||||||
# bragging rights
|
# bragging rights
|
||||||
echo "Replacing localversion with custom suffix"
|
echo "Replacing localversion with custom suffix"
|
||||||
|
|
|
@ -7,10 +7,12 @@
|
||||||
(modulesPath + "/profiles/qemu-guest.nix")
|
(modulesPath + "/profiles/qemu-guest.nix")
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.initrd.availableKernelModules = ["xhci_pci" "virtio_scsi" "sr_mod"];
|
boot = {
|
||||||
boot.initrd.kernelModules = [];
|
initrd.availableKernelModules = ["xhci_pci" "virtio_scsi" "sr_mod"];
|
||||||
boot.kernelModules = [];
|
initrd.kernelModules = [];
|
||||||
boot.extraModulePackages = [];
|
kernelModules = [];
|
||||||
|
extraModulePackages = [];
|
||||||
|
};
|
||||||
|
|
||||||
swapDevices = [];
|
swapDevices = [];
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,5 @@
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: let
|
}: {
|
||||||
in {
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,8 +3,7 @@
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: let
|
}: {
|
||||||
in {
|
|
||||||
environment.systemPackages = builtins.attrValues {
|
environment.systemPackages = builtins.attrValues {
|
||||||
inherit (pkgs) fuzzel;
|
inherit (pkgs) fuzzel;
|
||||||
};
|
};
|
||||||
|
|
|
@ -53,7 +53,7 @@
|
||||||
# The value clipboard will always copy text to the selection clipboard as well as the system clipboard.
|
# The value clipboard will always copy text to the selection clipboard as well as the system clipboard.
|
||||||
copy-on-select = "clipboard";
|
copy-on-select = "clipboard";
|
||||||
|
|
||||||
shell-integration = shell-integration;
|
inherit shell-integration;
|
||||||
command = getExe package;
|
command = getExe package;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -29,7 +29,7 @@ in {
|
||||||
http_port = port;
|
http_port = port;
|
||||||
|
|
||||||
root_url = "https://${domain}";
|
root_url = "https://${domain}";
|
||||||
domain = domain;
|
inherit domain;
|
||||||
enforce_domain = true;
|
enforce_domain = true;
|
||||||
};
|
};
|
||||||
database = {
|
database = {
|
||||||
|
|
|
@ -12,19 +12,12 @@ in {
|
||||||
config = mkIf cfg.enable {
|
config = mkIf cfg.enable {
|
||||||
services.kanata = {
|
services.kanata = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
keyboards.main = {
|
||||||
keyboards.daskeyboard = {
|
devices = [
|
||||||
devices = ["/dev/input/by-id/usb-Metadot_-_Das_Keyboard_Das_Keyboard-event-kbd"];
|
"/dev/input/by-id/usb-Metadot_-_Das_Keyboard_Das_Keyboard-event-kbd"
|
||||||
config = builtins.readFile (./. + "/main.kbd");
|
"/dev/input/by-path/platform-i8042-serio-0-event-kbd"
|
||||||
};
|
"/dev/input/by-id/usb-Dell_Dell_USB_Keyboard-event-kbd"
|
||||||
|
];
|
||||||
keyboards.laptop = {
|
|
||||||
devices = ["/dev/input/by-path/platform-i8042-serio-0-event-kbd"];
|
|
||||||
config = builtins.readFile (./. + "/main.kbd");
|
|
||||||
};
|
|
||||||
|
|
||||||
keyboards.dell-keyboard = {
|
|
||||||
devices = ["/dev/input/by-id/usb-Dell_Dell_USB_Keyboard-event-kbd"];
|
|
||||||
config = builtins.readFile (./. + "/main.kbd");
|
config = builtins.readFile (./. + "/main.kbd");
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -54,7 +54,7 @@ in {
|
||||||
efi.canTouchEfiVariables = true;
|
efi.canTouchEfiVariables = true;
|
||||||
timeout = mkDefault cfg.timeout;
|
timeout = mkDefault cfg.timeout;
|
||||||
systemd-boot = {
|
systemd-boot = {
|
||||||
enable = cfg.systemd-boot.enable;
|
inherit (cfg.systemd-boot) enable;
|
||||||
# INFO: Leaving this enabled is a security vulneratibility,
|
# INFO: Leaving this enabled is a security vulneratibility,
|
||||||
# since we can just start /bin/sh from there and get root access.
|
# since we can just start /bin/sh from there and get root access.
|
||||||
# Since I have FDE, this isn't _as_ critical, but it would still be
|
# Since I have FDE, this isn't _as_ critical, but it would still be
|
||||||
|
@ -64,7 +64,7 @@ in {
|
||||||
configurationLimit = 5;
|
configurationLimit = 5;
|
||||||
};
|
};
|
||||||
grub = {
|
grub = {
|
||||||
enable = cfg.grub.enable;
|
inherit (cfg.grub) enable;
|
||||||
efiSupport = true;
|
efiSupport = true;
|
||||||
device = "nodev";
|
device = "nodev";
|
||||||
configurationLimit = 5;
|
configurationLimit = 5;
|
||||||
|
|
|
@ -3,8 +3,7 @@
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: let
|
}: {
|
||||||
in {
|
|
||||||
networking = {
|
networking = {
|
||||||
# use nftables over iptables
|
# use nftables over iptables
|
||||||
nftables.enable = true;
|
nftables.enable = true;
|
||||||
|
|
|
@ -3,6 +3,5 @@
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: let
|
}: {
|
||||||
in {
|
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue