yep, more dotfiles

nix: add angrr deamon

wiro.world bc427963 c485272f

verified
+30 -18
+1 -1
Justfile
··· 25 25 nixos-rebuild switch \ 26 26 --flake .#{{host}} \ 27 27 --target-host {{host}} \ 28 - --use-remote-sudo {{args}} 28 + --sudo {{args}}
+5 -5
flake.lock
··· 491 491 "rust-overlay": "rust-overlay_2" 492 492 }, 493 493 "locked": { 494 - "lastModified": 1763654528, 495 - "narHash": "sha256-FngaJrwCZT+SSiw4BrkepYoW6SwZtzVg/1nX9k6nUdc=", 494 + "lastModified": 1764455123, 495 + "narHash": "sha256-ePlZ3OHBLTRlRa9zs2IeHNA8CuiMLyu5ZUzxoGI5Hp0=", 496 496 "owner": "pixilie", 497 497 "repo": "hypixel-bank-tracker", 498 - "rev": "047d3bcabae9c7aa87214f92292a8ee3550927cc", 498 + "rev": "8e4e91b1a8fa264895fa40dda93c3363be33a958", 499 499 "type": "github" 500 500 }, 501 501 "original": { ··· 927 927 "rev": "7358ec6edfa4d17b8b8f543d99e83a4705901148", 928 928 "revCount": 1687, 929 929 "type": "git", 930 - "url": "https://tangled.org/@tangled.org/core" 930 + "url": "https://tangled.org/tangled.org/core" 931 931 }, 932 932 "original": { 933 933 "type": "git", 934 - "url": "https://tangled.org/@tangled.org/core" 934 + "url": "https://tangled.org/tangled.org/core" 935 935 } 936 936 }, 937 937 "tinted-foot": {
+1 -1
flake.nix
··· 41 41 hypixel-bank-tracker.url = "github:pixilie/hypixel-bank-tracker"; 42 42 hypixel-bank-tracker.inputs.nixpkgs.follows = "nixpkgs"; 43 43 44 - tangled.url = "git+https://tangled.org/@tangled.org/core"; 44 + tangled.url = "git+https://tangled.org/tangled.org/core"; 45 45 tangled.inputs.nixpkgs.follows = "unixpkgs"; 46 46 47 47 wakatime-ls.url = "github:mrnossiom/wakatime-ls";
+12 -9
home-manager/fragments/shell.nix
··· 29 29 git_status.disabled = true; 30 30 31 31 nix_shell = { 32 - format = "via [$symbol$state]($style) "; # Remove nix shell name 32 + format = "via [$symbol]($style) "; # Remove nix shell name 33 33 symbol = " "; 34 34 }; 35 35 }; ··· 38 38 programs.direnv = { 39 39 enable = true; 40 40 silent = true; 41 + 41 42 nix-direnv.enable = true; 42 - }; 43 43 44 - programs.nushell = { 45 - enable = true; 46 - 47 - extraConfig = '' 48 - $env.config = { 49 - show_banner: false, 50 - } 44 + stdlib = '' 45 + use angrr 51 46 ''; 52 47 }; 48 + # TODO: depend on osConfig 49 + xdg.configFile."direnv/lib/angrr.sh".text = '' 50 + use_angrr() { 51 + layout_dir="$(direnv_layout_dir)" 52 + log_status "angrr: touch GC roots $layout_dir" 53 + RUST_LOG="''${ANGRR_DIRENV_LOG:-angrr=error}" ${lib.getExe upkgs.angrr} touch "$layout_dir" --silent 54 + } 55 + ''; 53 56 54 57 programs.zoxide = { 55 58 enable = true;
+7
nixos/fragments/nix.nix
··· 65 65 extra-trusted-public-keys = [ "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" ]; 66 66 }; 67 67 }; 68 + 69 + # other disk space saver 70 + services.angrr = { 71 + enable = true; 72 + period = "2weeks"; 73 + enableNixGcIntegration = true; 74 + }; 68 75 }; 69 76 }
+4 -2
nixos/profiles/server.nix
··· 460 460 }; 461 461 462 462 age.secrets.lldap-env.file = ../../secrets/lldap-env.age; 463 - age.secrets.lldap-user-pass = { file = ../../secrets/lldap-user-pass.age; }; 463 + users.users.lldap = { isSystemUser = true; group = "lldap"; }; 464 + users.groups.lldap = { }; 465 + age.secrets.lldap-user-pass = { file = ../../secrets/lldap-user-pass.age; owner = "lldap"; }; 464 466 services.lldap = { 465 467 enable = true; 466 468 settings = { ··· 468 470 http_port = lldap-port; 469 471 470 472 ldap_user_pass_file = config.age.secrets.lldap-user-pass.path; 471 - force_ldap_user_pass_reset = "always"; 473 + force_ldap_user_pass_reset = false; 472 474 473 475 ldap_base_dn = "dc=wiro,dc=world"; 474 476 };