fixing taskwarrior problem

This commit is contained in:
Ingolf Wagner 2022-07-23 13:22:23 +02:00
parent 907171a441
commit cd5c83946b
No known key found for this signature in database
GPG key ID: 76BF5F1928B9618B
3 changed files with 38 additions and 36 deletions

View file

@ -1,41 +1,38 @@
{ config, lib, pkgs, ... }: { config, lib, pkgs, ... }:
{ {
sops.secrets.pushoverApiToken = { #sops.secrets.pushoverApiToken = {
owner = "taskwarrior-pushover"; # owner = "taskwarrior-pushover";
key = "pushoverApiToken"; # key = "pushoverApiToken";
}; #};
sops.secrets.pushoverUserKey = { #sops.secrets.pushoverUserKey = {
owner = "taskwarrior-pushover"; # owner = "taskwarrior-pushover";
key = "pushoverUserKey"; # key = "pushoverUserKey";
}; #};
#sops.secrets.pushoverTaskwarriorCa = {
sops.secrets.pushoverTaskwarriorCa = { # owner = "taskwarrior-pushover";
owner = "taskwarrior-pushover"; # key = "taskwarriorCa";
key = "taskwarriorCa"; #};
}; #sops.secrets.pushoverTaskwarriorCertificate = {
sops.secrets.pushoverTaskwarriorCertificate = { # owner = "taskwarrior-pushover";
owner = "taskwarrior-pushover"; # key = "taskwarriorCertificate";
key = "taskwarriorCertificate"; #};
}; #sops.secrets.pushoverTaskwarriorKey = {
sops.secrets.pushoverTaskwarriorKey = { # owner = "taskwarrior-pushover";
owner = "taskwarrior-pushover"; # key = "taskwarriorKey";
key = "taskwarriorKey"; #};
}; #services.taskwarrior-pushover = {
# enable = false;
# recurrence = "off";
services.taskwarrior-pushover = { # onCalendar = "06:30:00";
enable = true; # server = "taskd.ingolf-wagner.de:53589";
recurrence = "on"; # pushoverApiTokenFile = config.sops.secrets.pushoverApiToken.path;
onCalendar = "06:30:00"; # pushoverUserKeyFile = config.sops.secrets.pushoverUserKey.path;
server = "taskd.ingolf-wagner.de:53589"; # caFile = config.sops.secrets.pushoverTaskwarriorCa.path;
pushoverApiTokenFile = config.sops.secrets.pushoverApiToken.path; # certificateFile = config.sops.secrets.pushoverTaskwarriorCertificate.path;
pushoverUserKeyFile = config.sops.secrets.pushoverUserKey.path; # keyFile = config.sops.secrets.pushoverTaskwarriorKey.path;
caFile = config.sops.secrets.pushoverTaskwarriorCa.path; # credentials = "1337/palo/ed0fdbe8-2dc3-408b-84cb-d07d363bccd2";
certificateFile = config.sops.secrets.pushoverTaskwarriorCertificate.path; #};
keyFile = config.sops.secrets.pushoverTaskwarriorKey.path;
credentials = "1337/palo/ed0fdbe8-2dc3-408b-84cb-d07d363bccd2";
};
sops.secrets.autotagTaskwarriorCa = { sops.secrets.autotagTaskwarriorCa = {
owner = "taskwarrior-autotag"; owner = "taskwarrior-autotag";
@ -53,6 +50,7 @@
services.taskwarrior-autotag = { services.taskwarrior-autotag = {
enable = true; enable = true;
recurrence = "on";
onCalendar = "hourly"; onCalendar = "hourly";
server = "taskd.ingolf-wagner.de:53589"; server = "taskd.ingolf-wagner.de:53589";
caFile = config.sops.secrets.autotagTaskwarriorCa.path; caFile = config.sops.secrets.autotagTaskwarriorCa.path;

View file

@ -94,5 +94,8 @@
vaapiIntel = pkgs.vaapiIntel.override { enableHybridCodec = true; }; vaapiIntel = pkgs.vaapiIntel.override { enableHybridCodec = true; };
}; };
# include all modules from flakes
# documentation.nixos.includeAllModules = true;
} }

View file

@ -69,6 +69,7 @@ in
rc:/var/lib/${name}/.taskrc \ rc:/var/lib/${name}/.taskrc \
rc.data.location=/var/lib/${name}/${cfg.dataDir} \ rc.data.location=/var/lib/${name}/${cfg.dataDir} \
rc.recurrence=${cfg.recurrence} \ rc.recurrence=${cfg.recurrence} \
rc.recurrence.confirmation=no \
rc.taskd.ca=${cfg.caFile} \ rc.taskd.ca=${cfg.caFile} \
rc.taskd.certificate=${cfg.certificateFile} \ rc.taskd.certificate=${cfg.certificateFile} \
rc.taskd.credentials="${cfg.credentials}" \ rc.taskd.credentials="${cfg.credentials}" \
@ -77,7 +78,7 @@ in
"$@" "$@"
''; '';
set_tag_query = "status:pending '${cfg.query}'"; set_tag_query = "status:pending '${cfg.query}'";
unset_tag_query = "'! ${cfg.query}'"; unset_tag_query = "'! ${cfg.query} and +${cfg.tag_name}'";
yes = "${pkgs.coreutils}/bin/yes"; yes = "${pkgs.coreutils}/bin/yes";
in in
'' ''