add statix check
This commit is contained in:
parent
91ca724dea
commit
40dbc75827
16 changed files with 32 additions and 36 deletions
|
@ -8,7 +8,8 @@ secrets:
|
|||
tasks:
|
||||
- check: |
|
||||
cd dotfiles
|
||||
nix-shell --pure --run 'nix-experimental flake info'
|
||||
nix-shell --pure --run 'nix --extra-experimental-features "flakes nix-command" flake info'
|
||||
nix-shell --pure --run 'statix check'
|
||||
|
||||
- github_push: |
|
||||
set +xv
|
||||
|
|
|
@ -7,7 +7,7 @@
|
|||
let
|
||||
mkServer = pkgs: system: hostname:
|
||||
pkgs.lib.nixosSystem {
|
||||
system = system;
|
||||
inherit system;
|
||||
modules = [
|
||||
(./. + "/nixos/boxes/${hostname}")
|
||||
agenix.nixosModules.age
|
||||
|
@ -23,7 +23,7 @@
|
|||
};
|
||||
mkWorkstation = pkgs: system: hostname:
|
||||
pkgs.lib.nixosSystem {
|
||||
system = system;
|
||||
inherit system;
|
||||
modules = [
|
||||
(./. + "/nixos/boxes/${hostname}")
|
||||
(import ./nixos/email-accounts.nix)
|
||||
|
@ -56,6 +56,7 @@
|
|||
with nixpkgs-nixos-unstable.legacyPackages."x86_64-linux"; [
|
||||
cacert
|
||||
git
|
||||
nixFlakes
|
||||
nixpkgs-fmt
|
||||
openssh
|
||||
openssl
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
{ config, pkgs, inputs, lib, ... }:
|
||||
let
|
||||
tailscale =
|
||||
inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux".tailscale;
|
||||
inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale;
|
||||
in {
|
||||
systemd.services.tailscale-autoconnect = {
|
||||
description = "Automatic connection to Tailscale";
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
{ config, pkgs, inputs, lib, ... }:
|
||||
let
|
||||
tailscale =
|
||||
inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux".tailscale;
|
||||
inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale;
|
||||
in {
|
||||
systemd.services.tailscale-autoconnect = {
|
||||
description = "Automatic connection to Tailscale";
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
{ config, pkgs, inputs, lib, ... }:
|
||||
let
|
||||
tailscale =
|
||||
inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux".tailscale;
|
||||
inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale;
|
||||
in {
|
||||
systemd.services.tailscale-autoconnect = {
|
||||
description = "Automatic connection to Tailscale";
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
{ config, pkgs, inputs, lib, ... }:
|
||||
let
|
||||
tailscale =
|
||||
inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux".tailscale;
|
||||
inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale;
|
||||
in {
|
||||
systemd.services.tailscale-autoconnect = {
|
||||
description = "Automatic connection to Tailscale";
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
{ config, pkgs, inputs, lib, ... }:
|
||||
let
|
||||
tailscale =
|
||||
inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux".tailscale;
|
||||
inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale;
|
||||
in {
|
||||
systemd.services.tailscale-autoconnect = {
|
||||
description = "Automatic connection to Tailscale";
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
{ config, pkgs, inputs, lib, ... }:
|
||||
let
|
||||
tailscale =
|
||||
inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux".tailscale;
|
||||
inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale;
|
||||
in {
|
||||
systemd.services.tailscale-autoconnect = {
|
||||
description = "Automatic connection to Tailscale";
|
||||
|
|
|
@ -96,7 +96,7 @@
|
|||
};
|
||||
|
||||
powerManagement = {
|
||||
enable = (lib.mkForce true);
|
||||
enable = lib.mkForce true;
|
||||
resumeCommands = ''
|
||||
${pkgs.autorandr}/bin/autorandr -c
|
||||
'';
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{ config, pkgs, inputs, ... }:
|
||||
let unstable = inputs.nixpkgs-nixos-unstable.legacyPackages.${pkgs.system};
|
||||
in {
|
||||
home-manager.users.cyryl = { ... }: {
|
||||
home-manager.users.cyryl = {
|
||||
accounts.email.accounts.cyplo = {
|
||||
primary = true;
|
||||
address = "cyplo@cyplo.dev";
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{ pkgs }:
|
||||
let
|
||||
myEmacs = pkgs.emacs-nox;
|
||||
emacsWithPackages = (pkgs.emacsPackagesGen myEmacs).emacsWithPackages;
|
||||
inherit ((pkgs.emacsPackagesGen myEmacs)) emacsWithPackages;
|
||||
in emacsWithPackages (epkgs:
|
||||
(with epkgs.melpaStablePackages; [ magit solarized-theme evil ])
|
||||
++ (with epkgs.melpaPackages; [ xterm-color nix-mode ])
|
||||
|
|
|
@ -24,7 +24,7 @@
|
|||
'';
|
||||
programs.emacs = {
|
||||
enable = true;
|
||||
package = (import ./emacs.nix { inherit pkgs; });
|
||||
package = import ./emacs.nix { inherit pkgs; };
|
||||
};
|
||||
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@ in {
|
|||
nixpkgs.config = {
|
||||
allowUnfree = true;
|
||||
packageOverrides = pkgs: {
|
||||
unstable = import unstableTarball { config = config.nixpkgs.config; };
|
||||
unstable = import unstableTarball { inherit (config.nixpkgs) config; };
|
||||
};
|
||||
};
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, pkgs, ... }: {
|
||||
services.autorandr.enable = true;
|
||||
home-manager.users.cyryl = { ... }: {
|
||||
home-manager.users.cyryl = _: {
|
||||
programs.autorandr = {
|
||||
enable = true;
|
||||
hooks.postswitch = {
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
{ config, pkgs, inputs, ... }:
|
||||
let
|
||||
tailscale =
|
||||
inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux".tailscale;
|
||||
inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale;
|
||||
|
||||
in {
|
||||
environment.systemPackages = [ tailscale ];
|
||||
|
|
27
shell.nix
27
shell.nix
|
@ -1,13 +1,14 @@
|
|||
let nixpkgs = import <nixpkgs> { };
|
||||
in with nixpkgs;
|
||||
stdenv.mkDerivation {
|
||||
name = "legacy_shell";
|
||||
buildInputs = [
|
||||
(pkgs.writeShellScriptBin "nix-experimental" ''
|
||||
exec ${pkgs.nixUnstable}/bin/nix --experimental-features "nix-command flakes" "$@"
|
||||
'')
|
||||
cacert
|
||||
git
|
||||
];
|
||||
shellHook = "";
|
||||
}
|
||||
(import
|
||||
(
|
||||
let
|
||||
lock = builtins.fromJSON (builtins.readFile ./flake.lock);
|
||||
in
|
||||
fetchTarball {
|
||||
url = "https://github.com/edolstra/flake-compat/archive/${lock.nodes.flake-compat.locked.rev}.tar.gz";
|
||||
sha256 = lock.nodes.flake-compat.locked.narHash;
|
||||
}
|
||||
)
|
||||
{
|
||||
src = ./.;
|
||||
}).shellNix
|
||||
|
||||
|
|
Loading…
Reference in a new issue