refactor(statix): resolve 'statix check' issues

This commit is contained in:
2026-01-26 10:28:35 +01:00
parent 68eecd01c7
commit b827b518cd
24 changed files with 206 additions and 172 deletions

View File

@@ -1,13 +1,15 @@
{ ... }:
_:
{
services.pulseaudio.enable = false;
security.rtkit.enable = true;
services.pipewire = {
enable = true;
alsa.enable = true;
alsa.support32Bit = true;
pulse.enable = true;
services = {
pulseaudio.enable = false;
pipewire = {
enable = true;
alsa.enable = true;
alsa.support32Bit = true;
pulse.enable = true;
};
pulseaudio.extraConfig = "load-module module-switch-on-connect";
};
services.pulseaudio.extraConfig = "load-module module-switch-on-connect";
}

View File

@@ -1,4 +1,4 @@
{ ... }:
_:
{
boot.loader.systemd-boot.enable = true;

View File

@@ -1,4 +1,9 @@
{ inputs, outputs, dotsPath, ... }:
{
inputs,
outputs,
dotsPath,
...
}:
{
imports = [
@@ -23,15 +28,16 @@
};
};
nix.optimise = {
automatic = true;
dates = [ "05:00" ];
};
nix.gc = {
automatic = true;
dates = "weekly";
options = "--delete-older-than 30d";
nix = {
optimise = {
automatic = true;
dates = [ "05:00" ];
};
gc = {
automatic = true;
dates = "weekly";
options = "--delete-older-than 30d";
};
};
system.autoUpgrade = {

View File

@@ -1,14 +1,16 @@
{
programs.niri.enable = true;
services.dbus.enable = true;
services.logind.settings.Login = {
HandleLidSwitch = "suspend";
IdleAction = "suspend";
IdleActionSec = 1800;
};
services = {
dbus.enable = true;
logind.settings.Login = {
HandleLidSwitch = "suspend";
IdleAction = "suspend";
IdleActionSec = 1800;
};
services.displayManager.ly = {
enable = true;
displayManager.ly = {
enable = true;
};
};
}

View File

@@ -11,7 +11,7 @@
disk = {
root = {
type = "disk";
device = config.device;
inherit (config) device;
content = {
type = "gpt";
partitions = {

View File

@@ -1,4 +1,4 @@
{ ... }:
_:
{
time.timeZone = "Europe/Brussels";

View File

@@ -5,7 +5,7 @@
{
networking = {
hostName = hostName;
inherit hostName;
wireless.iwd.enable = true;
networkmanager.wifi.backend = "iwd";
nftables.enable = true;

View File

@@ -34,56 +34,58 @@ in
"opencode_api_key".owner = config.users.users.${cfg.username}.name;
};
templates."taskrc.d/sync" = {
owner = config.users.users.${cfg.username}.name;
content = ''
sync.server.url=${config.sops.placeholder."taskwarrior_sync_server_url"}
sync.server.client_id=${config.sops.placeholder."taskwarrior_sync_server_client_id"}
sync.encryption_secret=${config.sops.placeholder."taskwarrior_sync_encryption_secret"}
'';
};
templates = {
"taskrc.d/sync" = {
owner = config.users.users.${cfg.username}.name;
content = ''
sync.server.url=${config.sops.placeholder."taskwarrior_sync_server_url"}
sync.server.client_id=${config.sops.placeholder."taskwarrior_sync_server_client_id"}
sync.encryption_secret=${config.sops.placeholder."taskwarrior_sync_encryption_secret"}
'';
};
templates.".gitconfig.email" = {
owner = config.users.users.${cfg.username}.name;
path = "/home/${cfg.username}/.gitconfig.email";
content = ''
[user]
email = ${config.sops.placeholder."email_personal"}
'';
};
".gitconfig.email" = {
owner = config.users.users.${cfg.username}.name;
path = "/home/${cfg.username}/.gitconfig.email";
content = ''
[user]
email = ${config.sops.placeholder."email_personal"}
'';
};
templates.".gitconfig.work.email" = {
owner = config.users.users.${cfg.username}.name;
path = "/home/${cfg.username}/.gitconfig.work.email";
content = ''
[user]
email = ${config.sops.placeholder."email_work"}
'';
};
".gitconfig.work.email" = {
owner = config.users.users.${cfg.username}.name;
path = "/home/${cfg.username}/.gitconfig.work.email";
content = ''
[user]
email = ${config.sops.placeholder."email_work"}
'';
};
templates."hcloud/cli.toml" = {
owner = config.users.users.${cfg.username}.name;
path = "/home/${cfg.username}/.config/hcloud/cli.toml";
content = ''
active_context = "server"
"hcloud/cli.toml" = {
owner = config.users.users.${cfg.username}.name;
path = "/home/${cfg.username}/.config/hcloud/cli.toml";
content = ''
active_context = "server"
[[contexts]]
name = "server"
token = "${config.sops.placeholder."hcloud"}"
'';
};
[[contexts]]
name = "server"
token = "${config.sops.placeholder."hcloud"}"
'';
};
templates."opencode/auth.json" = {
owner = config.users.users.${cfg.username}.name;
path = "/home/${cfg.username}/.local/share/opencode/auth.json";
content = ''
{
"zai-coding-plan": {
"type": "api",
"key": "${config.sops.placeholder."opencode_api_key"}"
"opencode/auth.json" = {
owner = config.users.users.${cfg.username}.name;
path = "/home/${cfg.username}/.local/share/opencode/auth.json";
content = ''
{
"zai-coding-plan": {
"type": "api",
"key": "${config.sops.placeholder."opencode_api_key"}"
}
}
}
'';
'';
};
};
};
};

View File

@@ -1,6 +1,6 @@
{ lib, config, ... }:
let
username = config.ssh.username;
inherit (config.ssh) username;
in
{
# auto extract SSH keys

View File

@@ -1,4 +1,4 @@
{ ... }:
_:
{
services.xserver.windowManager.xmonad = {