From cc1d3db5f2a6f05ca68818dc2303dd85fc3db06d Mon Sep 17 00:00:00 2001 From: Azat Bahawi Date: Sun, 19 Feb 2023 23:34:25 +0300 Subject: 2023-02-19 --- modules/nixos/common/secrets.nix | 2 +- modules/nixos/firefox/userChrome.css | 2 +- modules/nixos/mpd.nix | 3 +-- modules/nixos/profiles/headful.nix | 2 +- modules/nixos/unbound.nix | 2 +- 5 files changed, 5 insertions(+), 6 deletions(-) (limited to 'modules/nixos') diff --git a/modules/nixos/common/secrets.nix b/modules/nixos/common/secrets.nix index c229882..2ee5753 100644 --- a/modules/nixos/common/secrets.nix +++ b/modules/nixos/common/secrets.nix @@ -21,7 +21,7 @@ with lib; { map (attr: attr.path) (filter (attr: attr.type == my.ssh.type) config.services.openssh.hostKeys); - # This can be used to auto-add all secrets, thus eleminating the need to + # This can be used to auto-add all secrets, thus eliminating the need to # specify path to each envrypted file. The drawback is that this will # expose *all* secrets to all machines and try to decrypt them all even on # machines where the secret will not be used. diff --git a/modules/nixos/firefox/userChrome.css b/modules/nixos/firefox/userChrome.css index 58e450e..14f486c 100644 --- a/modules/nixos/firefox/userChrome.css +++ b/modules/nixos/firefox/userChrome.css @@ -136,7 +136,7 @@ /* #urlbar { */ /* background: var(--background) !important; */ - /* color: var(--forground) !important; */ + /* color: var(--foreground) !important; */ /* font-family: var(--sans-serif-font-family) !important; */ /* font-size: var(--sans-serif-font-size) !important; */ /* border-color: transparent !important; */ diff --git a/modules/nixos/mpd.nix b/modules/nixos/mpd.nix index 4b49213..7540c14 100644 --- a/modules/nixos/mpd.nix +++ b/modules/nixos/mpd.nix @@ -7,8 +7,7 @@ with lib; let cfg = config.nixfiles.modules.mpd; in { - options.nixfiles.modules.mpd.enable = - mkEnableOption "Wether to enable MPD and its clients."; + options.nixfiles.modules.mpd.enable = mkEnableOption "MPD and its clients."; config = mkIf cfg.enable { hm = { diff --git a/modules/nixos/profiles/headful.nix b/modules/nixos/profiles/headful.nix index 71addbf..d0ca777 100644 --- a/modules/nixos/profiles/headful.nix +++ b/modules/nixos/profiles/headful.nix @@ -39,7 +39,7 @@ in { # Hyperthreading altogether which will essentially put one's computer into # the stone age by not being able to to effectively utilise multi-core its # multicore capabilities. Secondly, by enabling mitigations, we introduce - # a plethora of performace overheads[1], which, albeit small, but still + # a plethora of performance overheads[1], which, albeit small, but still # contribute to the overall speed of things. This is however still poses a # security risk, which I am willing to take. # diff --git a/modules/nixos/unbound.nix b/modules/nixos/unbound.nix index 8c40291..103e375 100644 --- a/modules/nixos/unbound.nix +++ b/modules/nixos/unbound.nix @@ -175,7 +175,7 @@ in { >${adblock-conf} if [[ -f "${localControlSocketPath}" ]]; then - unbound-control reload + unbound-control reload fi ''; }; -- cgit 1.4.1