chore: apply lints

This commit is contained in:
Bloxx12 2025-07-08 13:57:04 +02:00
commit 2411c0b496
Signed by: faukah
SSH key fingerprint: SHA256:Uj2AXqvtdCA4hn5Hq0ZonhIAyUqI1q4w2sMG3Z1TH7E
16 changed files with 42 additions and 47 deletions

View file

@ -23,7 +23,7 @@ inputs: let
inherit inputs; inherit inputs;
inherit self; inherit self;
} }
(args.specialArgs or {}); args.specialArgs or {};
modules = concatLists [ modules = concatLists [
# This is used to pre-emptively set the hostPlatform for nixpkgs. # This is used to pre-emptively set the hostPlatform for nixpkgs.
# Also, we set the system hostname here. # Also, we set the system hostname here.

View file

@ -9,21 +9,23 @@
i18n.defaultLocale = "en_US.UTF-8"; i18n.defaultLocale = "en_US.UTF-8";
console.keyMap = "uk"; console.keyMap = "uk";
security.polkit.enable = true; security.polkit.enable = true;
programs.nix-ld.enable = false;
boot.kernelPackages = pkgs.linuxPackages_xanmod_latest; boot.kernelPackages = pkgs.linuxPackages_xanmod_latest;
services = { services = {
fstrim.enable = lib.mkDefault true; fstrim.enable = lib.mkDefault true;
thermald.enable = true; thermald.enable = true;
}; };
programs.zsh = { programs = {
enable = true; nix-ld.enable = false;
enableBashCompletion = true; zsh = {
enable = true;
enableBashCompletion = true;
};
gnupg.agent = {
enable = true;
pinentryPackage = pkgs.pinentry-qt;
};
}; };
programs.gnupg.agent = {
enable = true;
pinentryPackage = pkgs.pinentry-qt;
};
modules = { modules = {
wms.wayland.enable = true; wms.wayland.enable = true;
desktops.hyprland.enable = false; desktops.hyprland.enable = false;

View file

@ -6,10 +6,12 @@
}: { }: {
imports = [(modulesPath + "/installer/scan/not-detected.nix")]; imports = [(modulesPath + "/installer/scan/not-detected.nix")];
boot.initrd.availableKernelModules = ["xhci_pci" "ahci" "nvme" "usbhid" "sd_mod"]; boot = {
boot.initrd.kernelModules = []; initrd.availableKernelModules = ["xhci_pci" "ahci" "nvme" "usbhid" "sd_mod"];
boot.kernelModules = []; initrd.kernelModules = [];
boot.extraModulePackages = []; kernelModules = [];
extraModulePackages = [];
};
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's # (the default) this is the recommended approach. When using systemd-networkd it's

View file

@ -60,7 +60,7 @@
# 1:1 taken from raf's custom kernel, check out his config for this. # 1:1 taken from raf's custom kernel, check out his config for this.
.overrideAttrs (oa: { .overrideAttrs (oa: {
prePatch = prePatch =
(oa.prePatch or "") oa.prePatch or ""
+ '' + ''
# bragging rights # bragging rights
echo "Replacing localversion with custom suffix" echo "Replacing localversion with custom suffix"

View file

@ -7,10 +7,12 @@
(modulesPath + "/profiles/qemu-guest.nix") (modulesPath + "/profiles/qemu-guest.nix")
]; ];
boot.initrd.availableKernelModules = ["xhci_pci" "virtio_scsi" "sr_mod"]; boot = {
boot.initrd.kernelModules = []; initrd.availableKernelModules = ["xhci_pci" "virtio_scsi" "sr_mod"];
boot.kernelModules = []; initrd.kernelModules = [];
boot.extraModulePackages = []; kernelModules = [];
extraModulePackages = [];
};
swapDevices = []; swapDevices = [];

View file

@ -3,6 +3,5 @@
lib, lib,
pkgs, pkgs,
... ...
}: let }: {
in {
} }

View file

@ -3,8 +3,7 @@
lib, lib,
pkgs, pkgs,
... ...
}: let }: {
in {
environment.systemPackages = builtins.attrValues { environment.systemPackages = builtins.attrValues {
inherit (pkgs) fuzzel; inherit (pkgs) fuzzel;
}; };

View file

@ -53,7 +53,7 @@
# The value clipboard will always copy text to the selection clipboard as well as the system clipboard. # The value clipboard will always copy text to the selection clipboard as well as the system clipboard.
copy-on-select = "clipboard"; copy-on-select = "clipboard";
shell-integration = shell-integration; inherit shell-integration;
command = getExe package; command = getExe package;
}; };

View file

@ -29,7 +29,7 @@ in {
http_port = port; http_port = port;
root_url = "https://${domain}"; root_url = "https://${domain}";
domain = domain; inherit domain;
enforce_domain = true; enforce_domain = true;
}; };
database = { database = {

View file

@ -12,19 +12,12 @@ in {
config = mkIf cfg.enable { config = mkIf cfg.enable {
services.kanata = { services.kanata = {
enable = true; enable = true;
keyboards.main = {
keyboards.daskeyboard = { devices = [
devices = ["/dev/input/by-id/usb-Metadot_-_Das_Keyboard_Das_Keyboard-event-kbd"]; "/dev/input/by-id/usb-Metadot_-_Das_Keyboard_Das_Keyboard-event-kbd"
config = builtins.readFile (./. + "/main.kbd"); "/dev/input/by-path/platform-i8042-serio-0-event-kbd"
}; "/dev/input/by-id/usb-Dell_Dell_USB_Keyboard-event-kbd"
];
keyboards.laptop = {
devices = ["/dev/input/by-path/platform-i8042-serio-0-event-kbd"];
config = builtins.readFile (./. + "/main.kbd");
};
keyboards.dell-keyboard = {
devices = ["/dev/input/by-id/usb-Dell_Dell_USB_Keyboard-event-kbd"];
config = builtins.readFile (./. + "/main.kbd"); config = builtins.readFile (./. + "/main.kbd");
}; };
}; };

View file

@ -54,7 +54,7 @@ in {
efi.canTouchEfiVariables = true; efi.canTouchEfiVariables = true;
timeout = mkDefault cfg.timeout; timeout = mkDefault cfg.timeout;
systemd-boot = { systemd-boot = {
enable = cfg.systemd-boot.enable; inherit (cfg.systemd-boot) enable;
# INFO: Leaving this enabled is a security vulneratibility, # INFO: Leaving this enabled is a security vulneratibility,
# since we can just start /bin/sh from there and get root access. # since we can just start /bin/sh from there and get root access.
# Since I have FDE, this isn't _as_ critical, but it would still be # Since I have FDE, this isn't _as_ critical, but it would still be
@ -64,7 +64,7 @@ in {
configurationLimit = 5; configurationLimit = 5;
}; };
grub = { grub = {
enable = cfg.grub.enable; inherit (cfg.grub) enable;
efiSupport = true; efiSupport = true;
device = "nodev"; device = "nodev";
configurationLimit = 5; configurationLimit = 5;

View file

@ -3,8 +3,7 @@
lib, lib,
pkgs, pkgs,
... ...
}: let }: {
in {
networking = { networking = {
# use nftables over iptables # use nftables over iptables
nftables.enable = true; nftables.enable = true;

View file

@ -3,6 +3,5 @@
lib, lib,
pkgs, pkgs,
... ...
}: let }: {
in {
} }

View file

@ -9,15 +9,15 @@ pkgs.writeTextDir "${vendorConf}/blox_config.fish"
# source ${pkgs.fishPlugins.sponge}/share/zsh-defer/zsh-defer.plugin.zsh # source ${pkgs.fishPlugins.sponge}/share/zsh-defer/zsh-defer.plugin.zsh
${pkgs.atuin}/bin/atuin init fish | source ${pkgs.atuin}/bin/atuin init fish | source
bind up _atuin_bind_up bind up _atuin_bind_up
${pkgs.zoxide}/bin/zoxide init fish | source ${pkgs.zoxide}/bin/zoxide init fish | source
# abbr --erase cd &>/dev/null # abbr --erase cd &>/dev/null
# alias cd=__zoxide_z # alias cd=__zoxide_z
# abbr --erase ci &>/dev/null # abbr --erase ci &>/dev/null
# alias ci=__zoxide_zi # alias ci=__zoxide_zi
${pkgs.starship}/bin/starship init fish | source ${pkgs.starship}/bin/starship init fish | source
${pkgs.direnv}/bin/direnv hook fish | source ${pkgs.direnv}/bin/direnv hook fish | source
${pkgs.pay-respects}/bin/pay-respects fish --alias f --nocnf | source ${pkgs.pay-respects}/bin/pay-respects fish --alias f --nocnf | source