treewide: format using nixfmt

Signed-off-by: Bloxx12 <charlie@charlieroot.dev>
Change-Id: I6a6a69641c36f9763e104087a559c148d0449f00
This commit is contained in:
Bloxx12 2025-07-20 01:23:48 +02:00
commit e641dfa114
Signed by: faukah
SSH key fingerprint: SHA256:jpYIt4Vkz1NBTQcks/N9OPTfTFxE6KF2W/rV7hrfrIw
113 changed files with 1545 additions and 1019 deletions

View file

@ -4,12 +4,14 @@
lib,
sources,
...
}: let
}:
let
inherit (lib.modules) mkIf mkForce;
inherit (builtins) map;
cfg = config.modules.system.impermanence;
in {
in
{
imports = [
(sources.impermanence + "/nixos.nix")
];
@ -41,20 +43,36 @@ in {
];
users.cr = {
directories =
[
"cloud"
"repos"
]
++ map (
dir: ".config/${dir}"
) ["nicotine" "Signal" "Nextcloud" "emacs" "doom"]
++ map (
dir: ".cache/${dir}"
) ["tealdeer" "keepassxc" "nix" "starship" "nix-index" "mozilla" "zsh" "nvim"]
++ map (
dir: ".local/share/${dir}"
) ["direnv" "Steam" "TelegramDesktop" "PrismLauncher" "nicotine" "zoxide" ".keepass"];
directories = [
"cloud"
"repos"
]
++ map (dir: ".config/${dir}") [
"nicotine"
"Signal"
"Nextcloud"
"emacs"
"doom"
]
++ map (dir: ".cache/${dir}") [
"tealdeer"
"keepassxc"
"nix"
"starship"
"nix-index"
"mozilla"
"zsh"
"nvim"
]
++ map (dir: ".local/share/${dir}") [
"direnv"
"Steam"
"TelegramDesktop"
"PrismLauncher"
"nicotine"
"zoxide"
".keepass"
];
};
};

View file

@ -3,10 +3,12 @@
lib,
pkgs,
...
}: let
}:
let
StateDirectory = "dnscrypt-proxy";
inherit (lib.modules) mkForce;
in {
in
{
networking = {
networkmanager.dns = mkForce "none";
nameservers = [

View file

@ -3,7 +3,8 @@
lib,
pkgs,
...
}: {
}:
{
networking = {
# use nftables over iptables
nftables.enable = true;

View file

@ -1,6 +1,8 @@
{config, ...}: let
{ config, ... }:
let
inherit (config.modules.other.system) username;
in {
in
{
networking = {
enableIPv6 = true;
@ -40,7 +42,7 @@ in {
openFirewall = true;
};
users.users.${username}.extraGroups = ["networkmanager"];
users.users.${username}.extraGroups = [ "networkmanager" ];
# faster boot
systemd = {

View file

@ -1,11 +1,12 @@
{pkgs, ...}: {
{ pkgs, ... }:
{
security = {
# Enable Soteria, a GTK-based Polkit authentication agent.
soteria.enable = true;
apparmor = {
enable = true;
killUnconfinedConfinables = true;
packages = [pkgs.apparmor-profiles];
packages = [ pkgs.apparmor-profiles ];
};
pam.services = {

View file

@ -2,16 +2,18 @@
lib,
pkgs,
...
}: let
}:
let
inherit (lib.modules) mkForce mkDefault;
in {
in
{
security = {
sudo-rs.enable = mkForce false;
sudo = {
enable = true;
# We use the default sudo package, but with insults if we
# fail to provide the correct password
package = pkgs.sudo.override {withInsults = true;};
package = pkgs.sudo.override { withInsults = true; };
# Wheel user should need the password to execute sudo commands
wheelNeedsPassword = mkDefault true;

View file

@ -1,11 +1,13 @@
{lib, ...}: let
{ lib, ... }:
let
inherit (lib.modules) mkForce;
in {
in
{
config.systemd = {
# faster startup
targets.network-online.wantedBy = mkForce []; # Normally ["multi-user.target"]
targets.network-online.wantedBy = mkForce [ ]; # Normally ["multi-user.target"]
services = {
NetworkManager-wait-online.wantedBy = mkForce []; # Normally ["network-online.target"]
NetworkManager-wait-online.wantedBy = mkForce [ ]; # Normally ["network-online.target"]
systemd-udev-settle.enable = false;
};
};