add statix check

This commit is contained in:
Cyryl Płotnicki 2022-05-02 09:59:47 +01:00
parent 91ca724dea
commit 40dbc75827
16 changed files with 32 additions and 36 deletions

View file

@ -8,7 +8,8 @@ secrets:
tasks:
- check: |
cd dotfiles
nix-shell --pure --run 'nix-experimental flake info'
nix-shell --pure --run 'nix --extra-experimental-features "flakes nix-command" flake info'
nix-shell --pure --run 'statix check'
- github_push: |
set +xv

View file

@ -7,7 +7,7 @@
let
mkServer = pkgs: system: hostname:
pkgs.lib.nixosSystem {
system = system;
inherit system;
modules = [
(./. + "/nixos/boxes/${hostname}")
agenix.nixosModules.age
@ -23,7 +23,7 @@
};
mkWorkstation = pkgs: system: hostname:
pkgs.lib.nixosSystem {
system = system;
inherit system;
modules = [
(./. + "/nixos/boxes/${hostname}")
(import ./nixos/email-accounts.nix)
@ -56,6 +56,7 @@
with nixpkgs-nixos-unstable.legacyPackages."x86_64-linux"; [
cacert
git
nixFlakes
nixpkgs-fmt
openssh
openssl

View file

@ -1,7 +1,6 @@
{ config, pkgs, inputs, lib, ... }:
let
tailscale =
inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux".tailscale;
inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale;
in {
systemd.services.tailscale-autoconnect = {
description = "Automatic connection to Tailscale";

View file

@ -1,7 +1,6 @@
{ config, pkgs, inputs, lib, ... }:
let
tailscale =
inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux".tailscale;
inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale;
in {
systemd.services.tailscale-autoconnect = {
description = "Automatic connection to Tailscale";

View file

@ -1,7 +1,6 @@
{ config, pkgs, inputs, lib, ... }:
let
tailscale =
inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux".tailscale;
inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale;
in {
systemd.services.tailscale-autoconnect = {
description = "Automatic connection to Tailscale";

View file

@ -1,7 +1,6 @@
{ config, pkgs, inputs, lib, ... }:
let
tailscale =
inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux".tailscale;
inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale;
in {
systemd.services.tailscale-autoconnect = {
description = "Automatic connection to Tailscale";

View file

@ -1,7 +1,6 @@
{ config, pkgs, inputs, lib, ... }:
let
tailscale =
inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux".tailscale;
inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale;
in {
systemd.services.tailscale-autoconnect = {
description = "Automatic connection to Tailscale";

View file

@ -1,7 +1,6 @@
{ config, pkgs, inputs, lib, ... }:
let
tailscale =
inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux".tailscale;
inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale;
in {
systemd.services.tailscale-autoconnect = {
description = "Automatic connection to Tailscale";

View file

@ -96,7 +96,7 @@
};
powerManagement = {
enable = (lib.mkForce true);
enable = lib.mkForce true;
resumeCommands = ''
${pkgs.autorandr}/bin/autorandr -c
'';

View file

@ -1,7 +1,7 @@
{ config, pkgs, inputs, ... }:
let unstable = inputs.nixpkgs-nixos-unstable.legacyPackages.${pkgs.system};
in {
home-manager.users.cyryl = { ... }: {
home-manager.users.cyryl = {
accounts.email.accounts.cyplo = {
primary = true;
address = "cyplo@cyplo.dev";

View file

@ -1,7 +1,7 @@
{ pkgs }:
let
myEmacs = pkgs.emacs-nox;
emacsWithPackages = (pkgs.emacsPackagesGen myEmacs).emacsWithPackages;
inherit ((pkgs.emacsPackagesGen myEmacs)) emacsWithPackages;
in emacsWithPackages (epkgs:
(with epkgs.melpaStablePackages; [ magit solarized-theme evil ])
++ (with epkgs.melpaPackages; [ xterm-color nix-mode ])

View file

@ -24,7 +24,7 @@
'';
programs.emacs = {
enable = true;
package = (import ./emacs.nix { inherit pkgs; });
package = import ./emacs.nix { inherit pkgs; };
};
}

View file

@ -12,7 +12,7 @@ in {
nixpkgs.config = {
allowUnfree = true;
packageOverrides = pkgs: {
unstable = import unstableTarball { config = config.nixpkgs.config; };
unstable = import unstableTarball { inherit (config.nixpkgs) config; };
};
};

View file

@ -1,6 +1,6 @@
{ config, pkgs, ... }: {
services.autorandr.enable = true;
home-manager.users.cyryl = { ... }: {
home-manager.users.cyryl = _: {
programs.autorandr = {
enable = true;
hooks.postswitch = {

View file

@ -1,7 +1,6 @@
{ config, pkgs, inputs, ... }:
let
tailscale =
inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux".tailscale;
inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale;
in {
environment.systemPackages = [ tailscale ];

View file

@ -1,13 +1,14 @@
let nixpkgs = import <nixpkgs> { };
in with nixpkgs;
stdenv.mkDerivation {
name = "legacy_shell";
buildInputs = [
(pkgs.writeShellScriptBin "nix-experimental" ''
exec ${pkgs.nixUnstable}/bin/nix --experimental-features "nix-command flakes" "$@"
'')
cacert
git
];
shellHook = "";
}
(import
(
let
lock = builtins.fromJSON (builtins.readFile ./flake.lock);
in
fetchTarball {
url = "https://github.com/edolstra/flake-compat/archive/${lock.nodes.flake-compat.locked.rev}.tar.gz";
sha256 = lock.nodes.flake-compat.locked.narHash;
}
)
{
src = ./.;
}).shellNix