formated most nix funciton inputs

This commit is contained in:
William 2024-10-01 11:13:57 -03:00
parent 702d0f195b
commit 89c8784d49
48 changed files with 88 additions and 340 deletions

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ ... }:
{
boot = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ ... }:
{
console = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ ... }:
{
time.timeZone = "America/Bahia";

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ ... }:
{
networking = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ ... }:
{
nix = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ pkgs, ... }:
{
nixpkgs.config.allowUnfree = true;

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ ... }:
{
security = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ ... }:
{
services = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ pkgs, ... }:
{
users.users = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ pkgs, ... }:
{
virtualisation.podman = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ pkgs, ... }:
{
boot = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ ... }:
{
hardware = {

View file

@ -1,6 +1,4 @@
{
...
}:
{ ... }:
{
home-manager = {

View file

@ -1,9 +1,4 @@
{
config,
lib,
pkgs,
...
}:
{ ... }:
{
environment.persistence.main = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ inputs, ... }:
{
environment.etc."channels/nixpkgs".source = inputs.nixpkgs.outPath;

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ pkgs, ... }:
let
kdepkgs = with pkgs.kdePackages; [
ark

View file

@ -2,7 +2,6 @@
inputs,
config,
pkgs,
lib,
...
}:

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ ... }:
{
environment.sessionVariables = rec {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ ... }:
{
virtualisation = {

View file

@ -1,9 +1,4 @@
{
config,
lib,
pkgs,
...
}:
{ ... }:
{
boot.initrd.systemd.services.recreate-root = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ pkgs, ... }:
let
qubesnsh = pkgs.writeTextFile {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ ... }:
{
imports = [

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ config, lib, ... }:
{
services = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ config, ... }:
{
virtualisation.oci-containers.containers."cinny" = {

View file

@ -12,7 +12,6 @@
./nginx.nix
./paperless.nix
./searx.nix
./security.nix
./services.nix
./pairdrop.nix
./users.nix

View file

@ -1,9 +1,5 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{
config,
pkgs,
lib,
modulesPath,
...
@ -12,16 +8,20 @@
{
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
boot.initrd.availableKernelModules = [
"xhci_pci"
"ahci"
"usbhid"
"usb_storage"
"sd_mod"
];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ];
boot = {
initrd = {
availableKernelModules = [
"xhci_pci"
"ahci"
"usbhid"
"usb_storage"
"sd_mod"
];
kernelModules = [ ];
};
kernelModules = [ "kvm-intel" ];
extraModulePackages = [ ];
};
fileSystems."/" = {
device = "/dev/disk/by-uuid/31289617-1d84-4432-a833-680b52e88525";
@ -35,13 +35,9 @@
swapDevices = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.enp1s0.useDHCP = lib.mkDefault true;
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ config, ... }:
{
services = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ config, ... }:
{
virtualisation.oci-containers.containers."librespeed" = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ pkgs, ... }:
{
services.minecraft-servers = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ config, pkgs, ... }:
{
services = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ config, ... }:
{
services.nginx = {
@ -14,11 +8,30 @@
recommendedOptimisation = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
virtualHosts."baduhai.dev" = {
useACMEHost = "baduhai.dev";
forceSSL = true;
kTLS = true;
root = inputs.homepage;
};
security.acme = {
acceptTerms = true;
defaults = {
email = "baduhai@proton.me";
dnsResolver = "1.1.1.1:53";
dnsProvider = "cloudflare";
credentialsFile = config.age.secrets.cloudflare.path;
};
certs."baduhai.dev" = {
extraDomainNames = [ "*.baduhai.dev" ];
};
};
boot.kernel.sysctl = {
"net.ipv4.ip_forward" = 1;
"net.ipv6.conf.all.forwarding" = 1;
};
age.secrets.cloudflare = {
file = ../../../secrets/cloudflare.age;
owner = "nginx";
group = "hosted";
};
}

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ config, ... }:
{
virtualisation.oci-containers.containers."pairdrop" = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ config, lib, ... }:
{
services = {

View file

@ -1,5 +1,4 @@
{
inputs,
config,
pkgs,
lib,

View file

@ -1,33 +0,0 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{
security.acme = {
acceptTerms = true;
defaults = {
email = "baduhai@proton.me";
dnsResolver = "1.1.1.1:53";
dnsProvider = "cloudflare";
credentialsFile = config.age.secrets.cloudflare.path;
};
certs."baduhai.dev" = {
extraDomainNames = [ "*.baduhai.dev" ];
};
};
boot.kernel.sysctl = {
"net.ipv4.ip_forward" = 1;
"net.ipv6.conf.all.forwarding" = 1;
};
age.secrets.cloudflare = {
file = ../../../secrets/cloudflare.age;
owner = "nginx";
group = "hosted";
};
}

View file

@ -1,14 +1,9 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ ... }:
{
services.postgresql.enable = true;
# TODO: remove when bug fux
# Workaround for upstream bug in NetworkManager-wait-online.service
systemd.services.NetworkManager-wait-online.enable = false;
}

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ ... }:
{
users = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ lib, ... }:
let
mkStringOption =

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ config, ... }:
{
services = {

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ pkgs, ... }:
{
boot.kernelPackages = pkgs.linuxPackages_hardened;

View file

@ -1,6 +1,4 @@
{
...
}:
{ ... }:
{
home-manager = {
@ -10,4 +8,3 @@
users.user = import ../../../users/servers/user.nix;
};
}

View file

@ -1,10 +1,4 @@
{
inputs,
config,
pkgs,
lib,
...
}:
{ inputs, ... }:
{
environment.etc."channels/nixpkgs".source = inputs.nixpkgs-stable.outPath;

View file

@ -4,6 +4,7 @@
pkgs,
...
}:
with lib;
let
cfg = config.services.qbittorrent;

View file

@ -1,11 +1,8 @@
{
stdenv,
pkgs,
lib,
}:
{ pkgs, lib }:
pkgs.stdenv.mkDerivation rec {
pkgs.stdenv.mkDerivation {
name = "cros-ectool";
nativeBuildInputs = with pkgs; [
cmake
ninja
@ -13,6 +10,7 @@ pkgs.stdenv.mkDerivation rec {
libusb
libftdi1
];
src = pkgs.fetchFromGitLab {
domain = "gitlab.howett.net";
owner = "DHowett";
@ -20,10 +18,12 @@ pkgs.stdenv.mkDerivation rec {
rev = "39d64fb0e79e874cfe9877af69158fc2520b1a80";
hash = "sha256-SHRnyqicFlviBDu3aH+uKVUstVxpIhZV6JSuZOgOwXU=";
};
installPhase = ''
mkdir -p $out/bin
cp src/ectool $out/bin/ectool
'';
meta = with lib; {
description = "ectool for ChromeOS devices";
homepage = "https://gitlab.howett.net/DHowett/ectool";

View file

@ -1,9 +1,4 @@
{
config,
pkgs,
lib,
...
}:
{ pkgs, ... }:
{
home = {

View file

@ -1,9 +1,4 @@
{
config,
pkgs,
lib,
...
}:
{ pkgs, ... }:
{
programs = {

View file

@ -1,9 +1,4 @@
{
config,
pkgs,
lib,
...
}:
{ pkgs, ... }:
{
fonts.fontconfig.enable = true;

View file

@ -1,9 +1,4 @@
{
config,
pkgs,
lib,
...
}:
{ config, ... }:
{
programs.wezterm = {