treewide: format using nixfmt
Signed-off-by: Bloxx12 <charlie@charlieroot.dev> Change-Id: I6a6a69641c36f9763e104087a559c148d0449f00
This commit is contained in:
parent
f4464732e3
commit
e641dfa114
113 changed files with 1545 additions and 1019 deletions
|
@ -4,12 +4,14 @@
|
|||
lib,
|
||||
sources,
|
||||
...
|
||||
}: let
|
||||
}:
|
||||
let
|
||||
inherit (lib.modules) mkIf mkForce;
|
||||
inherit (builtins) map;
|
||||
|
||||
cfg = config.modules.system.impermanence;
|
||||
in {
|
||||
in
|
||||
{
|
||||
imports = [
|
||||
(sources.impermanence + "/nixos.nix")
|
||||
];
|
||||
|
@ -41,20 +43,36 @@ in {
|
|||
];
|
||||
|
||||
users.cr = {
|
||||
directories =
|
||||
[
|
||||
"cloud"
|
||||
"repos"
|
||||
]
|
||||
++ map (
|
||||
dir: ".config/${dir}"
|
||||
) ["nicotine" "Signal" "Nextcloud" "emacs" "doom"]
|
||||
++ map (
|
||||
dir: ".cache/${dir}"
|
||||
) ["tealdeer" "keepassxc" "nix" "starship" "nix-index" "mozilla" "zsh" "nvim"]
|
||||
++ map (
|
||||
dir: ".local/share/${dir}"
|
||||
) ["direnv" "Steam" "TelegramDesktop" "PrismLauncher" "nicotine" "zoxide" ".keepass"];
|
||||
directories = [
|
||||
"cloud"
|
||||
"repos"
|
||||
]
|
||||
++ map (dir: ".config/${dir}") [
|
||||
"nicotine"
|
||||
"Signal"
|
||||
"Nextcloud"
|
||||
"emacs"
|
||||
"doom"
|
||||
]
|
||||
++ map (dir: ".cache/${dir}") [
|
||||
"tealdeer"
|
||||
"keepassxc"
|
||||
"nix"
|
||||
"starship"
|
||||
"nix-index"
|
||||
"mozilla"
|
||||
"zsh"
|
||||
"nvim"
|
||||
]
|
||||
++ map (dir: ".local/share/${dir}") [
|
||||
"direnv"
|
||||
"Steam"
|
||||
"TelegramDesktop"
|
||||
"PrismLauncher"
|
||||
"nicotine"
|
||||
"zoxide"
|
||||
".keepass"
|
||||
];
|
||||
};
|
||||
};
|
||||
|
||||
|
|
|
@ -3,10 +3,12 @@
|
|||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}: let
|
||||
}:
|
||||
let
|
||||
StateDirectory = "dnscrypt-proxy";
|
||||
inherit (lib.modules) mkForce;
|
||||
in {
|
||||
in
|
||||
{
|
||||
networking = {
|
||||
networkmanager.dns = mkForce "none";
|
||||
nameservers = [
|
||||
|
|
|
@ -3,7 +3,8 @@
|
|||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}: {
|
||||
}:
|
||||
{
|
||||
networking = {
|
||||
# use nftables over iptables
|
||||
nftables.enable = true;
|
||||
|
|
|
@ -1,6 +1,8 @@
|
|||
{config, ...}: let
|
||||
{ config, ... }:
|
||||
let
|
||||
inherit (config.modules.other.system) username;
|
||||
in {
|
||||
in
|
||||
{
|
||||
networking = {
|
||||
enableIPv6 = true;
|
||||
|
||||
|
@ -40,7 +42,7 @@ in {
|
|||
openFirewall = true;
|
||||
};
|
||||
|
||||
users.users.${username}.extraGroups = ["networkmanager"];
|
||||
users.users.${username}.extraGroups = [ "networkmanager" ];
|
||||
|
||||
# faster boot
|
||||
systemd = {
|
||||
|
|
|
@ -1,11 +1,12 @@
|
|||
{pkgs, ...}: {
|
||||
{ pkgs, ... }:
|
||||
{
|
||||
security = {
|
||||
# Enable Soteria, a GTK-based Polkit authentication agent.
|
||||
soteria.enable = true;
|
||||
apparmor = {
|
||||
enable = true;
|
||||
killUnconfinedConfinables = true;
|
||||
packages = [pkgs.apparmor-profiles];
|
||||
packages = [ pkgs.apparmor-profiles ];
|
||||
};
|
||||
|
||||
pam.services = {
|
||||
|
|
|
@ -2,16 +2,18 @@
|
|||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}: let
|
||||
}:
|
||||
let
|
||||
inherit (lib.modules) mkForce mkDefault;
|
||||
in {
|
||||
in
|
||||
{
|
||||
security = {
|
||||
sudo-rs.enable = mkForce false;
|
||||
sudo = {
|
||||
enable = true;
|
||||
# We use the default sudo package, but with insults if we
|
||||
# fail to provide the correct password
|
||||
package = pkgs.sudo.override {withInsults = true;};
|
||||
package = pkgs.sudo.override { withInsults = true; };
|
||||
|
||||
# Wheel user should need the password to execute sudo commands
|
||||
wheelNeedsPassword = mkDefault true;
|
||||
|
|
|
@ -1,11 +1,13 @@
|
|||
{lib, ...}: let
|
||||
{ lib, ... }:
|
||||
let
|
||||
inherit (lib.modules) mkForce;
|
||||
in {
|
||||
in
|
||||
{
|
||||
config.systemd = {
|
||||
# faster startup
|
||||
targets.network-online.wantedBy = mkForce []; # Normally ["multi-user.target"]
|
||||
targets.network-online.wantedBy = mkForce [ ]; # Normally ["multi-user.target"]
|
||||
services = {
|
||||
NetworkManager-wait-online.wantedBy = mkForce []; # Normally ["network-online.target"]
|
||||
NetworkManager-wait-online.wantedBy = mkForce [ ]; # Normally ["network-online.target"]
|
||||
systemd-udev-settle.enable = false;
|
||||
};
|
||||
};
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue