format nixfiles

This commit is contained in:
ChaotiCryptidz 2021-12-28 22:06:26 +00:00
parent 5db013afa0
commit e1ddf66b7d
11 changed files with 33 additions and 36 deletions

View file

@ -1,9 +1,5 @@
{ config, pkgs, ... }: { { config, pkgs, ... }: {
home.packages = with pkgs; [ home.packages = with pkgs; [ exa ripgrep vault ];
exa
ripgrep
vault
];
programs.zsh = { programs.zsh = {
enable = true; enable = true;
@ -15,7 +11,7 @@
plugins = [ ]; plugins = [ ];
}; };
shellAliases = { shellAliases = {
nixdirfmt = "nixpkgs-fmt $(fd -e nix)"; nixdirfmt = "nixfmt $(fd -e nix)";
exa = "exa --time-style long-iso"; exa = "exa --time-style long-iso";
ls = "exa -G"; ls = "exa -G";
la = "exa -Ga"; la = "exa -Ga";

View file

@ -1,3 +1 @@
{ pkgs, ... }: { { pkgs, ... }: { home.packages = with pkgs; [ gitAndTools.gitFull ]; }
home.packages = with pkgs; [ gitAndTools.gitFull ];
}

View file

@ -1,7 +1,10 @@
{ self, home-manager, nixpkgs, tree, ... }@inputs: { self, home-manager, nixpkgs, tree, ... }@inputs:
let let
defaultModules = defaultModules = [
[ home-manager.nixosModules.home-manager tree.impure.modules.nixos tree.impure.profiles.base ]; home-manager.nixosModules.home-manager
tree.impure.modules.nixos
tree.impure.profiles.base
];
defaultSpecialArgs = { defaultSpecialArgs = {
tree = tree.impure; tree = tree.impure;
pureTree = tree.pure; pureTree = tree.pure;

View file

@ -15,16 +15,15 @@
(modulesPath + "/profiles/qemu-guest.nix") (modulesPath + "/profiles/qemu-guest.nix")
]; ];
home-manager.users.root = { imports = with tree; [ home.base ]; }; home-manager.users.root = { imports = with tree; [ home.base ]; };
home-manager.users.chaoticryptidz = { home-manager.users.chaoticryptidz = {
imports = with tree; [ imports = with tree; [
home.base home.base
home.dev.archives home.dev.archives
home.dev.editors home.dev.editors
home.dev.git home.dev.git
home.dev.info home.dev.info
home.dev.network home.dev.network
home.dev.vcs home.dev.vcs
]; ];
}; };
@ -37,13 +36,16 @@
networking.firewall.allowedTCPPorts = [ 22 ]; networking.firewall.allowedTCPPorts = [ 22 ];
users.users.root.openssh.authorizedKeys.keys = [ users.users.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL4L1eBZzYXZNGBucTn/eOFp48el9JPiYt9iXQDpBSg/ chaoticryptidz@owo.monster" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL4L1eBZzYXZNGBucTn/eOFp48el9JPiYt9iXQDpBSg/ chaoticryptidz@owo.monster"
]; ];
boot.loader.grub.enable = true; boot.loader.grub.enable = true;
boot.loader.grub.device = "/dev/sda"; boot.loader.grub.device = "/dev/sda";
boot.initrd.kernelModules = [ "nvme" ]; boot.initrd.kernelModules = [ "nvme" ];
fileSystems."/" = { device = "/dev/sda1"; fsType = "ext4"; }; fileSystems."/" = {
device = "/dev/sda1";
fsType = "ext4";
};
system.stateVersion = "21.11"; system.stateVersion = "21.11";
} }

View file

@ -1,9 +1,11 @@
{ ... }: { { ... }: {
services.jitsi-meet.enable = true; services.jitsi-meet = {
services.jitsi-meet.hostName = "jitsi.owo.monster"; enable = true;
services.jitsi-meet.nginx.enable = true; hostName = "jitsi.owo.monster";
nginx.enable = true;
};
services.nginx.virtualHosts."jitsi.owo.monster" = { services.nginx.virtualHosts."jitsi.owo.monster" = {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
}; };
} }

View file

@ -1,4 +1,4 @@
{...}: { { ... }: {
security.acme = { security.acme = {
email = "chaoticryptidz@owo.monster"; email = "chaoticryptidz@owo.monster";
acceptTerms = true; acceptTerms = true;
@ -13,4 +13,4 @@
clientMaxBodySize = "512m"; clientMaxBodySize = "512m";
}; };
networking.firewall.allowedTCPPorts = [ 80 443 ]; networking.firewall.allowedTCPPorts = [ 80 443 ];
} }

View file

@ -1 +1 @@
{...}: {} { ... }: { }

View file

@ -1 +1 @@
{ ... }: { } { ... }: { }

View file

@ -14,15 +14,13 @@ let
"modules/nixos" = { "modules/nixos" = {
functor = { functor = {
enable = true; enable = true;
external = [ external = [ ];
];
}; };
}; };
"modules/home" = { "modules/home" = {
functor = { functor = {
enable = true; enable = true;
external = [ external = [ ];
];
}; };
}; };
}; };

View file

@ -1,5 +1,5 @@
{...}: { { ... }: {
services.openssh.enable = true; services.openssh.enable = true;
services.openssh.permitRootLogin = "prohibit-password"; services.openssh.permitRootLogin = "prohibit-password";
programs.mosh.enable = true; programs.mosh.enable = true;
} }

View file

@ -1,3 +1 @@
{...}: { { ... }: { services.tailscale.enable = true; }
services.tailscale.enable = true;
}