Skip to content

Commit

Permalink
wip
Browse files Browse the repository at this point in the history
  • Loading branch information
elythh committed Aug 30, 2024
1 parent 0ac737f commit bfc25d8
Show file tree
Hide file tree
Showing 9 changed files with 9 additions and 95 deletions.
2 changes: 1 addition & 1 deletion homes/x86_64-linux/gwen@grovetender/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -73,7 +73,7 @@ in
xdg = enabled;
};

theme.enable = true;
theme = enabled;

suites = {
art = enabled;
Expand Down
2 changes: 1 addition & 1 deletion modules/home/programs/graphical/bars/waybar/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ let
custom-modules
default-modules
group-modules
(lib.mkIf config.${namespace}.programs.graphical.wms.hyprland.enable hyprland-modules)
hyprland-modules
];

generateOutputSettings =
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -145,7 +145,9 @@ let
'';
in
{
options.${namespace}.programs.graphical.screenlockers.hyprlock.enable = mkBoolOpt false "Enable Hyprlock";
options.${namespace}.programs.graphical.screenlockers.hyprlock = {
enable = mkBoolOpt false "Enable Hyprlock";
};

config = mkIf cfg.enable {
programs.hyprlock = with config.lib.stylix.colors; {
Expand Down
25 changes: 0 additions & 25 deletions modules/home/programs/graphical/wms/hyprland/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -191,30 +191,5 @@ in
wlroots = enabled;
};
};

wayland.windowManager.hyprland = {
package = inputs.hyprland.packages.${pkgs.system}.hyprland;
plugins = [
#inputs.hyprspace.packages.${pkgs.system}.Hyprspace
#inputs.hyprsplit.packages.${pkgs.system}.hyprsplit
#inputs.split-monitor-workspaces.packages.${pkgs.system}.split-monitor-workspaces
];
xwayland.enable = true;
enable = true;
systemd = {
enable = true;
extraCommands = lib.mkBefore [
"systemctl --user stop graphical-session.target"
"systemctl --user start hyprland-session.target"
];
};
};

systemd.user.targets.tray = {
Unit = {
Description = "Home Manager System Tray";
Requires = [ "graphical-session-pre.target" ];
};
};
};
}
54 changes: 1 addition & 53 deletions modules/home/programs/terminal/tools/git/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -11,9 +11,8 @@ let
mkEnableOption
mkIf
mkForce
getExe'
;
inherit (lib.${namespace}) mkOpt mkBoolOpt enabled;
inherit (lib.${namespace}) mkOpt mkBoolOpt;
inherit (config.${namespace}) user;

cfg = config.${namespace}.programs.terminal.tools.git;
Expand Down Expand Up @@ -69,57 +68,6 @@ in
};
};

extraConfig = {
credential = {
helper =
if cfg.wslAgentBridge then
cfg.wslGitCredentialManagerPath
else if pkgs.stdenv.isLinux then
''${getExe' config.programs.git.package "git-credential-libsecret"}''
else
''${getExe' config.programs.git.package "git-credential-osxkeychain"}'';

useHttpPath = true;
};

fetch = {
prune = true;
};

gpg.format = "ssh";
"gpg \"ssh\"".program = mkIf cfg._1password (
''''
+ ''${lib.optionalString pkgs.stdenv.isLinux (getExe' pkgs._1password-gui "op-ssh-sign")}''
+ ''${lib.optionalString pkgs.stdenv.isDarwin "${pkgs._1password-gui}/Applications/1Password.app/Contents/MacOS/op-ssh-sign"}''
);

init = {
defaultBranch = "main";
};

lfs = enabled;

pull = {
rebase = true;
};

push = {
autoSetupRemote = true;
default = "current";
};

rebase = {
autoStash = true;
};

safe = {
directory = [
"~/${namespace}/"
"/etc/nixos"
];
};
};

signing = {
key = cfg.signingKey;
inherit (cfg) signByDefault;
Expand Down
5 changes: 0 additions & 5 deletions modules/home/programs/terminal/tools/ssh/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@
lib,
inputs,
host,
pkgs,
namespace,
...
}:
Expand Down Expand Up @@ -85,10 +84,6 @@ in
shellAliases = foldl (
aliases: system: aliases // { "ssh-${system}" = "ssh ${system} -t tmux a"; }
) { } (builtins.attrNames other-hosts);

file = mkIf pkgs.stdenv.isDarwin {
".ssh/authorized_keys".text = builtins.concatStringsSep "\n" cfg.authorizedKeys;
};
};
};
}
2 changes: 1 addition & 1 deletion modules/home/theme/stylix/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,8 @@
let
inherit (lib)
mkIf
mkEnableOption
types
mkEnableOption
;
inherit (lib.${namespace}) mkOpt;

Expand Down
4 changes: 2 additions & 2 deletions modules/home/user/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ let
getExe
getExe'
;
inherit (lib.${namespace}) mkOpt enabled;
inherit (lib.${namespace}) mkOpt mkBoolOpt enabled;
inherit (inputs) snowfall-flake;

cfg = config.${namespace}.user;
Expand All @@ -31,7 +31,7 @@ let
in
{
options.${namespace}.user = {
enable = mkOpt types.bool false "Whether to configure the user account.";
enable = mkBoolOpt false "Whether to configure the user account.";
email = mkOpt types.str "[email protected]" "The email of the user.";
fullName = mkOpt types.str "Gwenc'hlan Le Kerneau" "The full name of the user.";
home = mkOpt (types.nullOr types.str) home-directory "The user's home directory.";
Expand Down
6 changes: 0 additions & 6 deletions modules/nixos/security/polkit/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -23,12 +23,6 @@ in
enable = true;
debug = lib.mkDefault true;

extraConfig = lib.mkIf config.security.polkit.debug ''
/* Log authorization checks. */
polkit.addRule(function(action, subject) {
polkit.log("user " + subject.user + " is attempting action " + action.id + " from PID " + subject.pid);
});
'';
};

systemd = {
Expand Down

0 comments on commit bfc25d8

Please sign in to comment.