tangled
alpha
login
or
join now
wiro.world
/
dotfiles
2
fork
atom
yep, more dotfiles
2
fork
atom
overview
issues
1
pulls
1
pipelines
nix: add angrr deamon
wiro.world
3 months ago
bc427963
c485272f
verified
This commit was signed with the committer's
known signature
.
wiro.world
SSH Key Fingerprint:
SHA256:SmMcWpNAnL+VAgItSawvXgdPVn7f1rsyAuB/5VNclKY=
+30
-18
6 changed files
expand all
collapse all
unified
split
Justfile
flake.lock
flake.nix
home-manager
fragments
shell.nix
nixos
fragments
nix.nix
profiles
server.nix
+1
-1
Justfile
···
25
25
nixos-rebuild switch \
26
26
--flake .#{{host}} \
27
27
--target-host {{host}} \
28
28
-
--use-remote-sudo {{args}}
28
28
+
--sudo {{args}}
+5
-5
flake.lock
···
491
491
"rust-overlay": "rust-overlay_2"
492
492
},
493
493
"locked": {
494
494
-
"lastModified": 1763654528,
495
495
-
"narHash": "sha256-FngaJrwCZT+SSiw4BrkepYoW6SwZtzVg/1nX9k6nUdc=",
494
494
+
"lastModified": 1764455123,
495
495
+
"narHash": "sha256-ePlZ3OHBLTRlRa9zs2IeHNA8CuiMLyu5ZUzxoGI5Hp0=",
496
496
"owner": "pixilie",
497
497
"repo": "hypixel-bank-tracker",
498
498
-
"rev": "047d3bcabae9c7aa87214f92292a8ee3550927cc",
498
498
+
"rev": "8e4e91b1a8fa264895fa40dda93c3363be33a958",
499
499
"type": "github"
500
500
},
501
501
"original": {
···
927
927
"rev": "7358ec6edfa4d17b8b8f543d99e83a4705901148",
928
928
"revCount": 1687,
929
929
"type": "git",
930
930
-
"url": "https://tangled.org/@tangled.org/core"
930
930
+
"url": "https://tangled.org/tangled.org/core"
931
931
},
932
932
"original": {
933
933
"type": "git",
934
934
-
"url": "https://tangled.org/@tangled.org/core"
934
934
+
"url": "https://tangled.org/tangled.org/core"
935
935
}
936
936
},
937
937
"tinted-foot": {
+1
-1
flake.nix
···
41
41
hypixel-bank-tracker.url = "github:pixilie/hypixel-bank-tracker";
42
42
hypixel-bank-tracker.inputs.nixpkgs.follows = "nixpkgs";
43
43
44
44
-
tangled.url = "git+https://tangled.org/@tangled.org/core";
44
44
+
tangled.url = "git+https://tangled.org/tangled.org/core";
45
45
tangled.inputs.nixpkgs.follows = "unixpkgs";
46
46
47
47
wakatime-ls.url = "github:mrnossiom/wakatime-ls";
+12
-9
home-manager/fragments/shell.nix
···
29
29
git_status.disabled = true;
30
30
31
31
nix_shell = {
32
32
-
format = "via [$symbol$state]($style) "; # Remove nix shell name
32
32
+
format = "via [$symbol]($style) "; # Remove nix shell name
33
33
symbol = " ";
34
34
};
35
35
};
···
38
38
programs.direnv = {
39
39
enable = true;
40
40
silent = true;
41
41
+
41
42
nix-direnv.enable = true;
42
42
-
};
43
43
44
44
-
programs.nushell = {
45
45
-
enable = true;
46
46
-
47
47
-
extraConfig = ''
48
48
-
$env.config = {
49
49
-
show_banner: false,
50
50
-
}
44
44
+
stdlib = ''
45
45
+
use angrr
51
46
'';
52
47
};
48
48
+
# TODO: depend on osConfig
49
49
+
xdg.configFile."direnv/lib/angrr.sh".text = ''
50
50
+
use_angrr() {
51
51
+
layout_dir="$(direnv_layout_dir)"
52
52
+
log_status "angrr: touch GC roots $layout_dir"
53
53
+
RUST_LOG="''${ANGRR_DIRENV_LOG:-angrr=error}" ${lib.getExe upkgs.angrr} touch "$layout_dir" --silent
54
54
+
}
55
55
+
'';
53
56
54
57
programs.zoxide = {
55
58
enable = true;
+7
nixos/fragments/nix.nix
···
65
65
extra-trusted-public-keys = [ "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" ];
66
66
};
67
67
};
68
68
+
69
69
+
# other disk space saver
70
70
+
services.angrr = {
71
71
+
enable = true;
72
72
+
period = "2weeks";
73
73
+
enableNixGcIntegration = true;
74
74
+
};
68
75
};
69
76
}
+4
-2
nixos/profiles/server.nix
···
460
460
};
461
461
462
462
age.secrets.lldap-env.file = ../../secrets/lldap-env.age;
463
463
-
age.secrets.lldap-user-pass = { file = ../../secrets/lldap-user-pass.age; };
463
463
+
users.users.lldap = { isSystemUser = true; group = "lldap"; };
464
464
+
users.groups.lldap = { };
465
465
+
age.secrets.lldap-user-pass = { file = ../../secrets/lldap-user-pass.age; owner = "lldap"; };
464
466
services.lldap = {
465
467
enable = true;
466
468
settings = {
···
468
470
http_port = lldap-port;
469
471
470
472
ldap_user_pass_file = config.age.secrets.lldap-user-pass.path;
471
471
-
force_ldap_user_pass_reset = "always";
473
473
+
force_ldap_user_pass_reset = false;
472
474
473
475
ldap_base_dn = "dc=wiro,dc=world";
474
476
};