From be65264a3f447e8844b450e499c5294f61f80111 Mon Sep 17 00:00:00 2001
From: zimbatm <zimbatm@zimbatm.com>
Date: Sun, 3 Jan 2021 00:07:49 +0100
Subject: [PATCH] format with nixpkgs-fmt

---
 build01/cache.nix                  |   5 +-
 build01/configuration.nix          |   3 +-
 build01/gitlab.nix                 |   1 -
 build01/hardware-configuration.nix |   4 +-
 build01/hydra.nix                  |  48 ++++---
 build01/marvin-mk2.nix             |   2 +-
 build01/matterbridge.nix           |   2 +-
 build01/nixpkgs-update.nix         |   5 +-
 deployment.nix                     | 223 ++++++++++++++---------------
 nix/default.nix                    |   4 +-
 nix/overlays.nix                   |  15 +-
 nix/sources.nix                    |  91 ++++++------
 users/adisbladis.nix               |   1 -
 users/flokli.nix                   |   1 -
 users/lewo.nix                     |   1 -
 users/lib.nix                      |   6 +-
 users/ryantm.nix                   |   1 -
 users/timokau.nix                  |   1 -
 users/worldofpeace.nix             |   1 -
 users/zimbatm.nix                  |   1 -
 20 files changed, 203 insertions(+), 213 deletions(-)

diff --git a/build01/cache.nix b/build01/cache.nix
index 892be9f..a82a177 100644
--- a/build01/cache.nix
+++ b/build01/cache.nix
@@ -1,7 +1,5 @@
 { config, pkgs, ... }:
-
 let
-
   postBuildHook = pkgs.writeScript "post-build-hook.sh" ''
     #!${pkgs.runtimeShell}
     export PATH=$PATH:${pkgs.nix}/bin
@@ -16,7 +14,8 @@ let
 
   sources = import ../nix/sources.nix;
 
-in {
+in
+{
 
   nixpkgs.overlays = [
     (self: super: {
diff --git a/build01/configuration.nix b/build01/configuration.nix
index 48d6ff6..0a78f0a 100644
--- a/build01/configuration.nix
+++ b/build01/configuration.nix
@@ -1,5 +1,4 @@
 { config, pkgs, lib, ... }:
-
 let
   userImports =
     let
@@ -7,7 +6,7 @@ let
       onlyUserFiles = x:
         lib.hasSuffix ".nix" x &&
         x != "lib.nix"
-        ;
+      ;
       userDirEntries = builtins.readDir ../users;
       userFiles = builtins.filter onlyUserFiles (lib.attrNames userDirEntries);
     in
diff --git a/build01/gitlab.nix b/build01/gitlab.nix
index 05f116f..03c4d13 100644
--- a/build01/gitlab.nix
+++ b/build01/gitlab.nix
@@ -1,5 +1,4 @@
 { pkgs, ... }:
-
 let
   gitlabModule = builtins.fetchTarball {
     url = "https://gitlab.com/arianvp/nixos-gitlab-runner/-/archive/9126927c701aa399bd1734e7e5230c3a0010c1b7/nixos-gitlab-runner-9126927c701aa399bd1734e7e5230c3a0010c1b7.tar.gz";
diff --git a/build01/hardware-configuration.nix b/build01/hardware-configuration.nix
index 6f4b488..43dbb56 100644
--- a/build01/hardware-configuration.nix
+++ b/build01/hardware-configuration.nix
@@ -8,7 +8,7 @@
 
   boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "sd_mod" ];
   boot.kernelModules = [ "kvm-amd" ];
-  boot.extraModulePackages = [];
+  boot.extraModulePackages = [ ];
 
   fileSystems."/" =
     {
@@ -34,7 +34,7 @@
       fsType = "ext4";
     };
 
-  swapDevices = [];
+  swapDevices = [ ];
 
   nix.maxJobs = lib.mkDefault 16;
 }
diff --git a/build01/hydra.nix b/build01/hydra.nix
index 6e59176..60c75bd 100644
--- a/build01/hydra.nix
+++ b/build01/hydra.nix
@@ -1,7 +1,6 @@
 { lib, pkgs, config, ... }:
 
 with lib;
-
 let
   cfg = config;
 
@@ -17,10 +16,11 @@ let
     postFixup = ''
       wrapProgram "$out/bin/create-declarative-project" \
         --prefix PATH ":" ${pkgs.stdenv.lib.makeBinPath [ pkgs.curl ]}
-      '';
+    '';
   };
 
-in {
+in
+{
   options.services.hydra = {
     adminPasswordFile = mkOption {
       type = types.str;
@@ -29,7 +29,7 @@ in {
 
     declarativeProjects = mkOption {
       description = "Declarative projects";
-      default = {};
+      default = { };
       type = with types; attrsOf (submodule {
         options = {
           inputValue = mkOption {
@@ -82,7 +82,7 @@ in {
         forceSSL = true;
         enableACME = true;
         locations."/" = {
-          proxyPass = "http://localhost:${toString(hydraPort)}";
+          proxyPass = "http://localhost:${toString (hydraPort)}";
           extraConfig = ''
             proxy_set_header Host $host;
             proxy_set_header X-Real-IP $remote_addr;
@@ -119,12 +119,13 @@ in {
         allowed-uris = https://github.com/nix-community/ https://github.com/NixOS/
       '';
       buildMachines = [
-      {
-        hostName = "localhost";
-        systems = [ "x86_64-linux" "builtin" ];
-        maxJobs = 8;
-        supportedFeatures = [ "nixos-test" "big-parallel" "kvm" ];
-      }];
+        {
+          hostName = "localhost";
+          systems = [ "x86_64-linux" "builtin" ];
+          maxJobs = 8;
+          supportedFeatures = [ "nixos-test" "big-parallel" "kvm" ];
+        }
+      ];
     };
 
     # Create a admin user and configure a declarative project
@@ -134,7 +135,7 @@ in {
         TimeoutStartSec = "60";
       };
       wantedBy = [ "multi-user.target" ];
-      after = ["hydra-server.service" ];
+      after = [ "hydra-server.service" ];
       requires = [ "hydra-server.service" ];
       environment = {
         inherit (cfg.systemd.services.hydra-init.environment) HYDRA_DBI;
@@ -151,17 +152,18 @@ in {
 
         export URL=http://localhost:${toString hydraPort} 
       '' +
-      (concatStringsSep "\n" (mapAttrsToList (n: v: ''
-        export DECL_PROJECT_NAME="${n}"
-        export DECL_DISPLAY_NAME="${v.displayName}"
-        export DECL_VALUE="${v.inputValue}"
-        export DECL_TYPE="${v.inputType}"
-        export DECL_FILE="${v.specFile}"
-        export DECL_DESCRIPTION="${v.description}"
-        export DECL_HOMEPAGE="${v.homepage}"
-        ${createDeclarativeProjectScript}/bin/create-declarative-project
-      '') cfg.services.hydra.declarativeProjects));
+      (concatStringsSep "\n" (mapAttrsToList
+        (n: v: ''
+          export DECL_PROJECT_NAME="${n}"
+          export DECL_DISPLAY_NAME="${v.displayName}"
+          export DECL_VALUE="${v.inputValue}"
+          export DECL_TYPE="${v.inputType}"
+          export DECL_FILE="${v.specFile}"
+          export DECL_DESCRIPTION="${v.description}"
+          export DECL_HOMEPAGE="${v.homepage}"
+          ${createDeclarativeProjectScript}/bin/create-declarative-project
+        '')
+        cfg.services.hydra.declarativeProjects));
     };
   };
 }
-    
diff --git a/build01/marvin-mk2.nix b/build01/marvin-mk2.nix
index 8dcce44..5e08ace 100644
--- a/build01/marvin-mk2.nix
+++ b/build01/marvin-mk2.nix
@@ -3,7 +3,7 @@ let
   userLib = import ../users/lib.nix { inherit lib; };
   sources = import ../nix/sources.nix;
 
-  marvinNixpkgs = (import (sources.marvin-mk2.outPath + "/definitions.nix") {}).pkgs;
+  marvinNixpkgs = (import (sources.marvin-mk2.outPath + "/definitions.nix") { }).pkgs;
 
   marvin-mk2 = marvinNixpkgs.python3.pkgs.buildPythonApplication rec {
     pname = "marvin-mk2";
diff --git a/build01/matterbridge.nix b/build01/matterbridge.nix
index 4ae7151..1c9ebd7 100644
--- a/build01/matterbridge.nix
+++ b/build01/matterbridge.nix
@@ -2,5 +2,5 @@
   services.matterbridge.enable = true;
   services.matterbridge.configPath = "/run/keys/matterbridge.toml";
   # Allow to access /run/keys
-  users.users.matterbridge.extraGroups = ["keys"];
+  users.users.matterbridge.extraGroups = [ "keys" ];
 }
diff --git a/build01/nixpkgs-update.nix b/build01/nixpkgs-update.nix
index 18396fd..2df54f3 100644
--- a/build01/nixpkgs-update.nix
+++ b/build01/nixpkgs-update.nix
@@ -1,5 +1,4 @@
 { pkgs, lib, config, ... }:
-
 let
   userLib = import ../users/lib.nix { inherit lib; };
 
@@ -20,7 +19,7 @@ let
 
 in
 {
-  users.groups.r-ryantm = {};
+  users.groups.r-ryantm = { };
   users.users.r-ryantm = {
     useDefaultShell = true;
     isNormalUser = true; # The hub cli seems to really want stuff to be set up like a normal user
@@ -42,7 +41,7 @@ in
     # Used by nixpkgs-update-pypi-releases
     environment.NIX_PATH = "nixpkgs=/var/cache/nixpkgs-update/nixpkgs";
 
-    serviceConfig =  {
+    serviceConfig = {
       Type = "simple";
       User = "r-ryantm";
       Group = "r-ryantm";
diff --git a/deployment.nix b/deployment.nix
index d6b11a7..365a34c 100644
--- a/deployment.nix
+++ b/deployment.nix
@@ -1,5 +1,4 @@
 with builtins;
-
 let
   secrets = import ./secrets.nix;
 
@@ -23,119 +22,119 @@ in
 
   build01 =
     { resources, ... }:
-      {
-        imports = [
-          ./build01/configuration.nix
-        ];
+    {
+      imports = [
+        ./build01/configuration.nix
+      ];
 
-        deployment.targetHost = "94.130.143.84";
-
-        deployment.keys.buildkite-token = {
-          text = removeSuffix "\n" secrets.buildkite-token;
-          user = "buildkite-agent-ci";
-          permissions = "0600";
-        };
-
-        deployment.keys.buildkite-agent-key = {
-          text = secrets.buildkite-agent-key;
-          user = "buildkite-agent-ci";
-          permissions = "0600";
-        };
-
-        deployment.keys."buildkite-agent-key.pub" = {
-          text = secrets."buildkite-agent-key.pub";
-          user = "buildkite-agent-ci";
-          permissions = "0600";
-        };
-
-        deployment.keys.gitlab-runner-registration = {
-          text = secrets.gitlab-runner-registration;
-          user = "gitlab-runner";
-          permissions = "0600";
-        };
-
-        deployment.keys."id_rsa" = {
-          text = secrets.github-r-ryantm-key;
-          destDir = "/home/r-ryantm/.ssh";
-          user = "r-ryantm";
-          group = "r-ryantm";
-          permissions = "0600";
-        };
-
-        deployment.keys."github_token.txt" = {
-          text = secrets.github-r-ryantm-token;
-          destDir = "/var/lib/nixpkgs-update";
-          user = "r-ryantm";
-          group = "r-ryantm";
-          permissions = "0600";
-        };
-
-        deployment.keys."github_token_with_username.txt" = {
-          text = "r-ryantm:${secrets.github-r-ryantm-token}";
-          destDir = "/var/lib/nixpkgs-update";
-          user = "r-ryantm";
-          group = "r-ryantm";
-          permissions = "0600";
-        };
-
-        deployment.keys."marvin-mk2-key.pem" = {
-          text = secrets."marvin-mk2-key.pem";
-          destDir = "/var/lib/marvin-mk2";
-          user = "marvin-mk2";
-          group = "marvin-mk2";
-          permissions = "0600";
-        };
-
-        deployment.keys."marvin_mk2_id.txt" = {
-          text = secrets."marvin_mk2_id.txt";
-          destDir = "/var/lib/marvin-mk2";
-          user = "marvin-mk2";
-          group = "marvin-mk2";
-          permissions = "0600";
-        };
-
-        deployment.keys."marvin-mk2-webhook-secret.txt" = {
-          text = secrets."marvin-mk2-webhook-secret.txt";
-          destDir = "/var/lib/marvin-mk2";
-          user = "marvin-mk2";
-          group = "marvin-mk2";
-          permissions = "0600";
-        };
-
-        deployment.keys."matterbridge.toml" = {
-          text = secrets."matterbridge.toml";
-          user = "matterbridge";
-          group = "matterbridge";
-          permissions = "0400";
-        };
-
-        deployment.keys."cachix.dhall" = {
-          text = secrets."cachix.dhall";
-          destDir = "/var/lib/nixpkgs-update/cachix";
-          user = "r-ryantm";
-          group = "r-ryantm";
-          permissions = "0600";
-        };
-
-        deployment.keys."nix-community-cachix.dhall" = {
-          text = secrets."nix-community-cachix.dhall";
-          destDir = "/var/lib/post-build-hook";
-          user = "root";
-          permissions = "0400";
-        };
-
-        deployment.keys.github-nixpkgs-swh-key = {
-          text = secrets.github-nixpkgs-swh-key;
-          user = "buildkite-agent-ci";
-          permissions = "0400";
-        };
-
-        deployment.keys.hydra-admin-password = {
-          text = secrets.hydra-admin-password;
-          user = "hydra";
-          permissions = "0400";
-        };
+      deployment.targetHost = "94.130.143.84";
 
+      deployment.keys.buildkite-token = {
+        text = removeSuffix "\n" secrets.buildkite-token;
+        user = "buildkite-agent-ci";
+        permissions = "0600";
       };
 
+      deployment.keys.buildkite-agent-key = {
+        text = secrets.buildkite-agent-key;
+        user = "buildkite-agent-ci";
+        permissions = "0600";
+      };
+
+      deployment.keys."buildkite-agent-key.pub" = {
+        text = secrets."buildkite-agent-key.pub";
+        user = "buildkite-agent-ci";
+        permissions = "0600";
+      };
+
+      deployment.keys.gitlab-runner-registration = {
+        text = secrets.gitlab-runner-registration;
+        user = "gitlab-runner";
+        permissions = "0600";
+      };
+
+      deployment.keys."id_rsa" = {
+        text = secrets.github-r-ryantm-key;
+        destDir = "/home/r-ryantm/.ssh";
+        user = "r-ryantm";
+        group = "r-ryantm";
+        permissions = "0600";
+      };
+
+      deployment.keys."github_token.txt" = {
+        text = secrets.github-r-ryantm-token;
+        destDir = "/var/lib/nixpkgs-update";
+        user = "r-ryantm";
+        group = "r-ryantm";
+        permissions = "0600";
+      };
+
+      deployment.keys."github_token_with_username.txt" = {
+        text = "r-ryantm:${secrets.github-r-ryantm-token}";
+        destDir = "/var/lib/nixpkgs-update";
+        user = "r-ryantm";
+        group = "r-ryantm";
+        permissions = "0600";
+      };
+
+      deployment.keys."marvin-mk2-key.pem" = {
+        text = secrets."marvin-mk2-key.pem";
+        destDir = "/var/lib/marvin-mk2";
+        user = "marvin-mk2";
+        group = "marvin-mk2";
+        permissions = "0600";
+      };
+
+      deployment.keys."marvin_mk2_id.txt" = {
+        text = secrets."marvin_mk2_id.txt";
+        destDir = "/var/lib/marvin-mk2";
+        user = "marvin-mk2";
+        group = "marvin-mk2";
+        permissions = "0600";
+      };
+
+      deployment.keys."marvin-mk2-webhook-secret.txt" = {
+        text = secrets."marvin-mk2-webhook-secret.txt";
+        destDir = "/var/lib/marvin-mk2";
+        user = "marvin-mk2";
+        group = "marvin-mk2";
+        permissions = "0600";
+      };
+
+      deployment.keys."matterbridge.toml" = {
+        text = secrets."matterbridge.toml";
+        user = "matterbridge";
+        group = "matterbridge";
+        permissions = "0400";
+      };
+
+      deployment.keys."cachix.dhall" = {
+        text = secrets."cachix.dhall";
+        destDir = "/var/lib/nixpkgs-update/cachix";
+        user = "r-ryantm";
+        group = "r-ryantm";
+        permissions = "0600";
+      };
+
+      deployment.keys."nix-community-cachix.dhall" = {
+        text = secrets."nix-community-cachix.dhall";
+        destDir = "/var/lib/post-build-hook";
+        user = "root";
+        permissions = "0400";
+      };
+
+      deployment.keys.github-nixpkgs-swh-key = {
+        text = secrets.github-nixpkgs-swh-key;
+        user = "buildkite-agent-ci";
+        permissions = "0400";
+      };
+
+      deployment.keys.hydra-admin-password = {
+        text = secrets.hydra-admin-password;
+        user = "hydra";
+        permissions = "0400";
+      };
+
+    };
+
 }
diff --git a/nix/default.nix b/nix/default.nix
index c0cccf1..313e4fe 100644
--- a/nix/default.nix
+++ b/nix/default.nix
@@ -4,8 +4,8 @@ let
 
   pkgs = import sources.nixpkgs {
     inherit system;
-    config = {};
+    config = { };
     overlays = import ./overlays.nix;
   };
 in
-  pkgs
+pkgs
diff --git a/nix/overlays.nix b/nix/overlays.nix
index ecda23c..4a073cf 100644
--- a/nix/overlays.nix
+++ b/nix/overlays.nix
@@ -7,7 +7,7 @@ let
       ;
 
     terraform-provider-vpsadmin =
-      pkgs.callPackage ./terraform-provider-vpsadmin.nix {};
+      pkgs.callPackage ./terraform-provider-vpsadmin.nix { };
 
     terraform = pkgs.terraform.withPlugins (
       p: [
@@ -20,10 +20,9 @@ let
   };
 
 in
-  [
-    (self: super: { sources = import ./sources.nix; })
-    (self: super: {
-      nix-community-infra = nix-community-infra super;
-    })
-  ]
-
+[
+  (self: super: { sources = import ./sources.nix; })
+  (self: super: {
+    nix-community-infra = nix-community-infra super;
+  })
+]
diff --git a/nix/sources.nix b/nix/sources.nix
index b796fff..8b543df 100644
--- a/nix/sources.nix
+++ b/nix/sources.nix
@@ -1,7 +1,5 @@
 # This file has been generated by Niv.
-
 let
-
   #
   # The fetchers. fetch_<type> fetches specs of type <type>.
   #
@@ -10,29 +8,29 @@ let
     let
       name' = sanitizeName name + "-src";
     in
-      if spec.builtin or true then
-        builtins_fetchurl { inherit (spec) url sha256; name = name'; }
-      else
-        pkgs.fetchurl { inherit (spec) url sha256; name = name'; };
+    if spec.builtin or true then
+      builtins_fetchurl { inherit (spec) url sha256; name = name'; }
+    else
+      pkgs.fetchurl { inherit (spec) url sha256; name = name'; };
 
   fetch_tarball = pkgs: name: spec:
     let
       name' = sanitizeName name + "-src";
     in
-      if spec.builtin or true then
-        builtins_fetchTarball { name = name'; inherit (spec) url sha256; }
-      else
-        pkgs.fetchzip { name = name'; inherit (spec) url sha256; };
+    if spec.builtin or true then
+      builtins_fetchTarball { name = name'; inherit (spec) url sha256; }
+    else
+      pkgs.fetchzip { name = name'; inherit (spec) url sha256; };
 
   fetch_git = name: spec:
     let
       ref =
         if spec ? ref then spec.ref else
-          if spec ? branch then "refs/heads/${spec.branch}" else
-            if spec ? tag then "refs/tags/${spec.tag}" else
-              abort "In git source '${name}': Please specify `ref`, `tag` or `branch`!";
+        if spec ? branch then "refs/heads/${spec.branch}" else
+        if spec ? tag then "refs/tags/${spec.tag}" else
+        abort "In git source '${name}': Please specify `ref`, `tag` or `branch`!";
     in
-      builtins.fetchGit { url = spec.repo; inherit (spec) rev; inherit ref; };
+    builtins.fetchGit { url = spec.repo; inherit (spec) rev;inherit ref; };
 
   fetch_local = spec: spec.path;
 
@@ -66,16 +64,16 @@ let
       hasNixpkgsPath = builtins.any (x: x.prefix == "nixpkgs") builtins.nixPath;
       hasThisAsNixpkgsPath = <nixpkgs> == ./.;
     in
-      if builtins.hasAttr "nixpkgs" sources
-      then sourcesNixpkgs
-      else if hasNixpkgsPath && ! hasThisAsNixpkgsPath then
-        import <nixpkgs> {}
-      else
-        abort
-          ''
-            Please specify either <nixpkgs> (through -I or NIX_PATH=nixpkgs=...) or
-            add a package called "nixpkgs" to your sources.json.
-          '';
+    if builtins.hasAttr "nixpkgs" sources
+    then sourcesNixpkgs
+    else if hasNixpkgsPath && ! hasThisAsNixpkgsPath then
+      import <nixpkgs> { }
+    else
+      abort
+        ''
+          Please specify either <nixpkgs> (through -I or NIX_PATH=nixpkgs=...) or
+          add a package called "nixpkgs" to your sources.json.
+        '';
 
   # The actual fetching function.
   fetch = pkgs: name: spec:
@@ -98,7 +96,7 @@ let
       saneName = stringAsChars (c: if isNull (builtins.match "[a-zA-Z0-9]" c) then "_" else c) name;
       ersatz = builtins.getEnv "NIV_OVERRIDE_${saneName}";
     in
-      if ersatz == "" then drv else ersatz;
+    if ersatz == "" then drv else ersatz;
 
   # Ports of functions for older nix versions
 
@@ -109,7 +107,7 @@ let
   );
 
   # https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/lists.nix#L295
-  range = first: last: if first > last then [] else builtins.genList (n: first + n) (last - first + 1);
+  range = first: last: if first > last then [ ] else builtins.genList (n: first + n) (last - first + 1);
 
   # https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/strings.nix#L257
   stringToCharacters = s: map (p: builtins.substring p 1 s) (range 0 (builtins.stringLength s - 1));
@@ -120,43 +118,46 @@ let
   concatStrings = builtins.concatStringsSep "";
 
   # https://github.com/NixOS/nixpkgs/blob/8a9f58a375c401b96da862d969f66429def1d118/lib/attrsets.nix#L331
-  optionalAttrs = cond: as: if cond then as else {};
+  optionalAttrs = cond: as: if cond then as else { };
 
   # fetchTarball version that is compatible between all the versions of Nix
   builtins_fetchTarball = { url, name ? null, sha256 }@attrs:
     let
       inherit (builtins) lessThan nixVersion fetchTarball;
     in
-      if lessThan nixVersion "1.12" then
-        fetchTarball ({ inherit url; } // (optionalAttrs (!isNull name) { inherit name; }))
-      else
-        fetchTarball attrs;
+    if lessThan nixVersion "1.12" then
+      fetchTarball ({ inherit url; } // (optionalAttrs (!isNull name) { inherit name; }))
+    else
+      fetchTarball attrs;
 
   # fetchurl version that is compatible between all the versions of Nix
   builtins_fetchurl = { url, name ? null, sha256 }@attrs:
     let
       inherit (builtins) lessThan nixVersion fetchurl;
     in
-      if lessThan nixVersion "1.12" then
-        fetchurl ({ inherit url; } // (optionalAttrs (!isNull name) { inherit name; }))
-      else
-        fetchurl attrs;
+    if lessThan nixVersion "1.12" then
+      fetchurl ({ inherit url; } // (optionalAttrs (!isNull name) { inherit name; }))
+    else
+      fetchurl attrs;
 
   # Create the final "sources" from the config
   mkSources = config:
-    mapAttrs (
-      name: spec:
-        if builtins.hasAttr "outPath" spec
-        then abort
-          "The values in sources.json should not have an 'outPath' attribute"
-        else
-          spec // { outPath = replace name (fetch config.pkgs name spec); }
-    ) config.sources;
+    mapAttrs
+      (
+        name: spec:
+          if builtins.hasAttr "outPath" spec
+          then
+            abort
+              "The values in sources.json should not have an 'outPath' attribute"
+          else
+            spec // { outPath = replace name (fetch config.pkgs name spec); }
+      )
+      config.sources;
 
   # The "config" used by the fetchers
   mkConfig =
     { sourcesFile ? if builtins.pathExists ./sources.json then ./sources.json else null
-    , sources ? if isNull sourcesFile then {} else builtins.fromJSON (builtins.readFile sourcesFile)
+    , sources ? if isNull sourcesFile then { } else builtins.fromJSON (builtins.readFile sourcesFile)
     , system ? builtins.currentSystem
     , pkgs ? mkPkgs sources system
     }: rec {
@@ -168,4 +169,4 @@ let
     };
 
 in
-mkSources (mkConfig {}) // { __functor = _: settings: mkSources (mkConfig settings); }
+mkSources (mkConfig { }) // { __functor = _: settings: mkSources (mkConfig settings); }
diff --git a/users/adisbladis.nix b/users/adisbladis.nix
index dd7d8e8..f675bd0 100644
--- a/users/adisbladis.nix
+++ b/users/adisbladis.nix
@@ -1,5 +1,4 @@
 { config, pkgs, lib, ... }:
-
 let
   userLib = import ./lib.nix { inherit lib; };
   keys = [
diff --git a/users/flokli.nix b/users/flokli.nix
index 7686a66..651c47b 100644
--- a/users/flokli.nix
+++ b/users/flokli.nix
@@ -1,5 +1,4 @@
 { config, pkgs, lib, ... }:
-
 let
   userLib = import ./lib.nix { inherit lib; };
   keys = [
diff --git a/users/lewo.nix b/users/lewo.nix
index 0f31d0c..8ccd9a2 100644
--- a/users/lewo.nix
+++ b/users/lewo.nix
@@ -1,5 +1,4 @@
 { config, pkgs, lib, ... }:
-
 let
   userLib = import ./lib.nix { inherit lib; };
   keys = [
diff --git a/users/lib.nix b/users/lib.nix
index 6e3eec8..20cfba3 100644
--- a/users/lib.nix
+++ b/users/lib.nix
@@ -11,7 +11,7 @@ in
       n = builtins.map (c: lib.mod (ord c) 10) chars;
       s = builtins.concatStringsSep "" (builtins.map (i: builtins.toString i) n);
     in
-      assert builtins.stringLength id >= 4;
-      assert builtins.length chars == 4;
-      1000 + lib.toInt s;
+    assert builtins.stringLength id >= 4;
+    assert builtins.length chars == 4;
+    1000 + lib.toInt s;
 }
diff --git a/users/ryantm.nix b/users/ryantm.nix
index cbee41c..0f2d268 100644
--- a/users/ryantm.nix
+++ b/users/ryantm.nix
@@ -1,5 +1,4 @@
 { config, pkgs, lib, ... }:
-
 let
   userLib = import ./lib.nix { inherit lib; };
   keys = [
diff --git a/users/timokau.nix b/users/timokau.nix
index d13902d..b00be14 100644
--- a/users/timokau.nix
+++ b/users/timokau.nix
@@ -1,5 +1,4 @@
 { config, pkgs, lib, ... }:
-
 let
   userLib = import ./lib.nix { inherit lib; };
   keys = [
diff --git a/users/worldofpeace.nix b/users/worldofpeace.nix
index 0c9baac..7cae8a7 100644
--- a/users/worldofpeace.nix
+++ b/users/worldofpeace.nix
@@ -1,5 +1,4 @@
 { config, pkgs, lib, ... }:
-
 let
   userLib = import ./lib.nix { inherit lib; };
   keys = [
diff --git a/users/zimbatm.nix b/users/zimbatm.nix
index 8a8f6f8..6cee0b5 100644
--- a/users/zimbatm.nix
+++ b/users/zimbatm.nix
@@ -1,5 +1,4 @@
 { config, pkgs, lib, ... }:
-
 let
   userLib = import ./lib.nix { inherit lib; };
   keys = [