summaryrefslogtreecommitdiff
path: root/modules/examples/lnl.nix
diff options
context:
space:
mode:
authorDaiderd Jordan <daiderd@gmail.com>2020-06-09 23:40:10 +0200
committerDaiderd Jordan <daiderd@gmail.com>2020-06-11 19:17:06 +0200
commit78434e602d7c111c25b6676f879eae3a543d2be0 (patch)
tree2fe7e34c91e65fcf9b5bfb3e9effe8a388f471a3 /modules/examples/lnl.nix
parent1b71f9f21c2e058292ef0d71d65d8655252f02c1 (diff)
replace NIX_PATH references with regular paths
Diffstat (limited to 'modules/examples/lnl.nix')
-rw-r--r--modules/examples/lnl.nix24
1 files changed, 12 insertions, 12 deletions
diff --git a/modules/examples/lnl.nix b/modules/examples/lnl.nix
index 4b3977f..c0b9816 100644
--- a/modules/examples/lnl.nix
+++ b/modules/examples/lnl.nix
@@ -66,18 +66,18 @@
services.chunkwm.enable = true;
services.skhd.enable = true;
- security.sandbox.profiles.fetch-nixpkgs-updates.closure = [ pkgs.cacert pkgs.git ];
- security.sandbox.profiles.fetch-nixpkgs-updates.writablePaths = [ (toString <nixpkgs-trunk>) ];
- security.sandbox.profiles.fetch-nixpkgs-updates.allowNetworking = true;
-
- launchd.user.agents.fetch-nixpkgs-updates = {
- command = "/usr/bin/sandbox-exec -f ${config.security.sandbox.profiles.fetch-nixpkgs-updates.profile} ${pkgs.git}/bin/git -C ${toString <nixpkgs-trunk>} fetch origin master";
- environment.HOME = "";
- environment.NIX_SSL_CERT_FILE = "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt";
- serviceConfig.KeepAlive = false;
- serviceConfig.ProcessType = "Background";
- serviceConfig.StartInterval = 360;
- };
+ # security.sandbox.profiles.fetch-nixpkgs-updates.closure = [ pkgs.cacert pkgs.git ];
+ # security.sandbox.profiles.fetch-nixpkgs-updates.allowNetworking = true;
+ # security.sandbox.profiles.fetch-nixpkgs-updates.writablePaths = [ (toString ~/Code/nixos/nixpkgs) ];
+
+ # launchd.user.agents.fetch-nixpkgs-updates = {
+ # command = "/usr/bin/sandbox-exec -f ${config.security.sandbox.profiles.fetch-nixpkgs-updates.profile} ${pkgs.git}/bin/git -C ${toString ~/Code/nixos/nixpkgs} fetch origin master";
+ # environment.HOME = "";
+ # environment.NIX_SSL_CERT_FILE = "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt";
+ # serviceConfig.KeepAlive = false;
+ # serviceConfig.ProcessType = "Background";
+ # serviceConfig.StartInterval = 360;
+ # };
launchd.user.agents.letty = {
serviceConfig.Program = "${pkgs.lnl.letty}/bin/letty-blink";