diff --git a/flake.nix b/flake.nix index 9a7e1db..c7c5a1a 100644 --- a/flake.nix +++ b/flake.nix @@ -35,7 +35,8 @@ powerlevel10k.flake = false; }; - outputs = inputs: + outputs = + inputs: inputs.snowfall-lib.mkFlake { inherit inputs; src = ./.; @@ -51,7 +52,7 @@ home-manager.nixosModules.home-manager ]; - homes.modules = with inputs; [catppuccin.homeManagerModules.catppuccin]; + homes.modules = with inputs; [ catppuccin.homeManagerModules.catppuccin ]; deploy.nodes = { node = { @@ -60,7 +61,7 @@ user = "root"; sshUser = "alejandro"; path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos inputs.self.nixosConfigurations.node; - sshOpts = ["-A"]; + sshOpts = [ "-A" ]; }; }; @@ -70,56 +71,59 @@ user = "root"; sshUser = "alejandro"; path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos inputs.self.nixosConfigurations.git; - sshOpts = ["-A"]; + sshOpts = [ "-A" ]; }; }; - pi4 = let - system = "aarch64-linux"; - pkgs = import inputs.nixpkgs {inherit system;}; - deployPkgs = import inputs.nixpkgs { - inherit system; - overlays = [ - inputs.deploy-rs.overlay - (self: super: { - deploy-rs = { - inherit (pkgs) deploy-rs; - lib = inputs.deploy-rs.lib; - }; - }) - ]; + pi4 = + let + system = "aarch64-linux"; + pkgs = import inputs.nixpkgs { inherit system; }; + deployPkgs = import inputs.nixpkgs { + inherit system; + overlays = [ + inputs.deploy-rs.overlay + (self: super: { + deploy-rs = { + inherit (pkgs) deploy-rs; + lib = inputs.deploy-rs.lib; + }; + }) + ]; + }; + in + { + hostname = "pi4"; + profiles.system = { + user = "root"; + sshUser = "alejandro"; + path = deployPkgs.deploy-rs.lib.aarch64-linux.activate.nixos inputs.self.nixosConfigurations.pi4; + # Usually deploy from an x86_64 machine and don't want to bother + # trying to build an aarch64 derivation + remoteBuild = true; + }; }; - in { - hostname = "pi4"; - profiles.system = { - user = "root"; - sshUser = "alejandro"; - path = deployPkgs.deploy-rs.lib.aarch64-linux.activate.nixos inputs.self.nixosConfigurations.pi4; - # Usually deploy from an x86_64 machine and don't want to bother - # trying to build an aarch64 derivation - remoteBuild = true; - }; - }; }; # TODO: Re-enable this when I figure out how to prevent needing to build # dependencies for architectures other than the host machine # checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks inputs.self.deploy) inputs.deploy-rs.lib; - hydraJobs = let - systems_to_build = [ - "gospel" - "node" - "carbon" - ]; - in { - # Only have a builder for x86_64-linux atm - packages = inputs.self.packages.x86_64-linux; + hydraJobs = + let + systems_to_build = [ + "gospel" + "node" + "carbon" + ]; + in + { + # Only have a builder for x86_64-linux atm + packages = inputs.self.packages.x86_64-linux; - systems = inputs.nixpkgs.lib.attrsets.genAttrs systems_to_build ( - name: - inputs.self.nixosConfigurations."${name}".config.system.build.toplevel - ); - }; + systems = inputs.nixpkgs.lib.attrsets.genAttrs systems_to_build ( + name: inputs.self.nixosConfigurations."${name}".config.system.build.toplevel + ); + }; }; } diff --git a/homes/aarch64-linux/alejandro@pi4/default.nix b/homes/aarch64-linux/alejandro@pi4/default.nix index 075be51..e1ad605 100644 --- a/homes/aarch64-linux/alejandro@pi4/default.nix +++ b/homes/aarch64-linux/alejandro@pi4/default.nix @@ -1,4 +1,5 @@ -{...}: { +{ ... }: +{ aa = { apps = { bat.enable = true; diff --git a/homes/x86_64-linux/alejandro@git/default.nix b/homes/x86_64-linux/alejandro@git/default.nix index acfb642..4bb54e0 100644 --- a/homes/x86_64-linux/alejandro@git/default.nix +++ b/homes/x86_64-linux/alejandro@git/default.nix @@ -1,4 +1,5 @@ -{...}: { +{ ... }: +{ aa = { installDefaults = false; diff --git a/homes/x86_64-linux/alejandro@gospel/default.nix b/homes/x86_64-linux/alejandro@gospel/default.nix index 6509741..98aa884 100644 --- a/homes/x86_64-linux/alejandro@gospel/default.nix +++ b/homes/x86_64-linux/alejandro@gospel/default.nix @@ -1,4 +1,5 @@ -{...}: { +{ ... }: +{ aa.isHeadless = false; services.spotifyd = { enable = true; diff --git a/homes/x86_64-linux/alejandro@minimal/default.nix b/homes/x86_64-linux/alejandro@minimal/default.nix index ebe2dc2..58aebb6 100644 --- a/homes/x86_64-linux/alejandro@minimal/default.nix +++ b/homes/x86_64-linux/alejandro@minimal/default.nix @@ -1,3 +1,4 @@ -{...}: { +{ ... }: +{ aa.installDefaults = false; } diff --git a/homes/x86_64-linux/alejandro@node/default.nix b/homes/x86_64-linux/alejandro@node/default.nix index ea8f50d..52c14b8 100644 --- a/homes/x86_64-linux/alejandro@node/default.nix +++ b/homes/x86_64-linux/alejandro@node/default.nix @@ -1,2 +1,3 @@ -{...}: { +{ ... }: +{ } diff --git a/modules/home/apps/bat/default.nix b/modules/home/apps/bat/default.nix index 112a6a3..40ce9f6 100644 --- a/modules/home/apps/bat/default.nix +++ b/modules/home/apps/bat/default.nix @@ -3,11 +3,13 @@ lib, namespace, ... -}: let +}: +let inherit (lib) mkIf mkEnableOption; cfg = config.${namespace}.apps.bat; -in { +in +{ options.${namespace}.apps.bat = { enable = mkEnableOption "bat"; }; diff --git a/modules/home/apps/btop/default.nix b/modules/home/apps/btop/default.nix index 8cb630e..b504ab8 100644 --- a/modules/home/apps/btop/default.nix +++ b/modules/home/apps/btop/default.nix @@ -3,11 +3,13 @@ lib, namespace, ... -}: let +}: +let inherit (lib) mkIf mkEnableOption; cfg = config.${namespace}.apps.btop; -in { +in +{ options.${namespace}.apps.btop = { enable = mkEnableOption "btop"; }; diff --git a/modules/home/apps/tmux/default.nix b/modules/home/apps/tmux/default.nix index 3acf417..1f8185a 100644 --- a/modules/home/apps/tmux/default.nix +++ b/modules/home/apps/tmux/default.nix @@ -4,7 +4,8 @@ pkgs, namespace, ... -}: let +}: +let inherit (lib) mkEnableOption; inherit (pkgs) tmuxPlugins; @@ -20,13 +21,14 @@ } ]; }; -in { +in +{ options.${namespace}.apps.tmux = { enable = mkEnableOption "tmux"; }; config = lib.mkIf cfg.enable { - home.packages = [pkgs.tmux-sessionizer]; + home.packages = [ pkgs.tmux-sessionizer ]; catppuccin.tmux = { enable = true; @@ -102,6 +104,6 @@ in { ''; }; - xdg.configFile."tms/config.toml".source = (pkgs.formats.toml {}).generate "tms-config" tmsConfig; + xdg.configFile."tms/config.toml".source = (pkgs.formats.toml { }).generate "tms-config" tmsConfig; }; } diff --git a/modules/home/fonts/default.nix b/modules/home/fonts/default.nix index ed73e2a..97c073a 100644 --- a/modules/home/fonts/default.nix +++ b/modules/home/fonts/default.nix @@ -4,9 +4,11 @@ pkgs, namespace, ... -}: let +}: +let cfg = config.${namespace}.fonts; -in { +in +{ options.${namespace}.fonts = { enable = lib.mkEnableOption "font config"; }; @@ -24,10 +26,10 @@ in { fonts.fontconfig = { enable = true; defaultFonts = { - monospace = ["Hack Nerd Font"]; - emoji = ["Noto Color Emoji"]; - serif = ["Noto Serif"]; - sansSerif = ["Noto Sans"]; + monospace = [ "Hack Nerd Font" ]; + emoji = [ "Noto Color Emoji" ]; + serif = [ "Noto Serif" ]; + sansSerif = [ "Noto Sans" ]; }; }; }; diff --git a/modules/home/home/default.nix b/modules/home/home/default.nix index fd067af..9a41b80 100644 --- a/modules/home/home/default.nix +++ b/modules/home/home/default.nix @@ -1,10 +1,11 @@ { config, lib, - osConfig ? {}, + osConfig ? { }, namespace, ... -}: { +}: +{ options.${namespace} = { isHeadless = lib.mkOption { type = lib.types.bool; @@ -20,15 +21,13 @@ }; config = lib.mkMerge [ - ( - lib.mkIf (!config.${namespace}.isHeadless) { - ${namespace} = { - programs.firefox.enable = true; - programs.kitty.enable = true; - windowManagers.sway.enable = true; - }; - } - ) + (lib.mkIf (!config.${namespace}.isHeadless) { + ${namespace} = { + programs.firefox.enable = true; + programs.kitty.enable = true; + windowManagers.sway.enable = true; + }; + }) (lib.mkIf (config.${namespace}.installDefaults) { ${namespace} = { apps = { diff --git a/modules/home/programs/firefox/default.nix b/modules/home/programs/firefox/default.nix index 2049747..3e72af6 100644 --- a/modules/home/programs/firefox/default.nix +++ b/modules/home/programs/firefox/default.nix @@ -3,11 +3,13 @@ lib, namespace, ... -}: let +}: +let inherit (lib) mkEnableOption mkIf; cfg = config.${namespace}.programs.firefox; -in { +in +{ options.${namespace}.programs.firefox = { enable = mkEnableOption "firefox"; }; diff --git a/modules/home/programs/fuzzel/default.nix b/modules/home/programs/fuzzel/default.nix index fef0e85..97e0979 100644 --- a/modules/home/programs/fuzzel/default.nix +++ b/modules/home/programs/fuzzel/default.nix @@ -4,15 +4,17 @@ pkgs, namespace, ... -}: let +}: +let cfg = config.${namespace}.programs.fuzzel; -in { +in +{ options.${namespace}.programs.fuzzel = { enable = lib.mkEnableOption "fuzzel"; }; config = lib.mkIf cfg.enable { - home.packages = [pkgs.bemoji]; + home.packages = [ pkgs.bemoji ]; catppuccin.fuzzel.enable = true; programs.fuzzel.enable = true; diff --git a/modules/home/programs/fzf/default.nix b/modules/home/programs/fzf/default.nix index ab9a09a..f11a634 100644 --- a/modules/home/programs/fzf/default.nix +++ b/modules/home/programs/fzf/default.nix @@ -3,9 +3,11 @@ lib, namespace, ... -}: let +}: +let cfg = config.${namespace}.programs.fzf; -in { +in +{ options.${namespace}.programs.fzf = { enable = lib.mkEnableOption "fzf"; }; diff --git a/modules/home/programs/gpg/default.nix b/modules/home/programs/gpg/default.nix index f683ab2..b081fe6 100644 --- a/modules/home/programs/gpg/default.nix +++ b/modules/home/programs/gpg/default.nix @@ -5,11 +5,13 @@ namespace, system, ... -}: let +}: +let inherit (lib) mkIf mkEnableOption; cfg = config.${namespace}.programs.gpg; -in { +in +{ options.${namespace}.programs.gpg = { enable = mkEnableOption "gpg"; }; @@ -33,9 +35,7 @@ in { services.gpg-agent = mkIf (system == "x86_64-linux") { enable = true; pinentryPackage = - if config.${namespace}.windowManagers.sway.enable - then pkgs.pinentry-qt - else pkgs.pinentry-curses; + if config.${namespace}.windowManagers.sway.enable then pkgs.pinentry-qt else pkgs.pinentry-curses; enableZshIntegration = true; enableSshSupport = true; sshKeys = [ diff --git a/modules/home/programs/k9s/default.nix b/modules/home/programs/k9s/default.nix index c634b51..8472992 100644 --- a/modules/home/programs/k9s/default.nix +++ b/modules/home/programs/k9s/default.nix @@ -3,9 +3,11 @@ lib, namespace, ... -}: let +}: +let cfg = config.${namespace}.programs.k9s; -in { +in +{ options.${namespace}.programs.k9s = { enable = lib.mkEnableOption "k9s"; }; diff --git a/modules/home/programs/kitty/default.nix b/modules/home/programs/kitty/default.nix index 98b17d7..459c330 100644 --- a/modules/home/programs/kitty/default.nix +++ b/modules/home/programs/kitty/default.nix @@ -4,11 +4,13 @@ pkgs, namespace, ... -}: let +}: +let inherit (lib) mkEnableOption mkIf; cfg = config.${namespace}.programs.kitty; -in { +in +{ options.${namespace}.programs.kitty = { enable = mkEnableOption "kitty"; }; diff --git a/modules/home/programs/neovim/default.nix b/modules/home/programs/neovim/default.nix index a6bfa7d..859d389 100644 --- a/modules/home/programs/neovim/default.nix +++ b/modules/home/programs/neovim/default.nix @@ -4,9 +4,11 @@ pkgs, namespace, ... -}: let +}: +let cfg = config.${namespace}.programs.neovim; -in { +in +{ options.${namespace}.programs.neovim = { enable = lib.mkEnableOption "neovim"; lazygit.enable = lib.mkOption { @@ -21,19 +23,21 @@ in { }; }; - config = lib.mkIf cfg.enable (lib.mkMerge [ - {home.packages = [pkgs.neovim];} - (lib.mkIf cfg.lazygit.enable { - programs.zsh.shellAliases = { - nvim = "${pkgs.neovim}/bin/nvim --listen /tmp/nvim-server.pipe"; - }; + config = lib.mkIf cfg.enable ( + lib.mkMerge [ + { home.packages = [ pkgs.neovim ]; } + (lib.mkIf cfg.lazygit.enable { + programs.zsh.shellAliases = { + nvim = "${pkgs.neovim}/bin/nvim --listen /tmp/nvim-server.pipe"; + }; - programs.lazygit.settings.os = { - editCommand = "nvim"; - editCommandTemplate = '' - {{editor}} --server /tmp/nvim-server.pipe --remote-tab {{filename}} - ''; - }; - }) - ]); + programs.lazygit.settings.os = { + editCommand = "nvim"; + editCommandTemplate = '' + {{editor}} --server /tmp/nvim-server.pipe --remote-tab {{filename}} + ''; + }; + }) + ] + ); } diff --git a/modules/home/programs/rofi/default.nix b/modules/home/programs/rofi/default.nix index e7e02ff..9201af6 100644 --- a/modules/home/programs/rofi/default.nix +++ b/modules/home/programs/rofi/default.nix @@ -4,11 +4,13 @@ pkgs, namespace, ... -}: let +}: +let inherit (lib) mkEnableOption mkIf; cfg = config.${namespace}.programs.rofi; -in { +in +{ options.${namespace}.programs.rofi = { enable = mkEnableOption "rofi"; }; @@ -19,7 +21,7 @@ in { # TODO: How to ensure this font is installed? font = "Hack Nerd Font 10"; catppuccin.enable = true; - plugins = [pkgs.rofi-emoji]; + plugins = [ pkgs.rofi-emoji ]; extraConfig = { show-icons = true; modi = "window,run,ssh,emoji"; diff --git a/modules/home/programs/swaylock/default.nix b/modules/home/programs/swaylock/default.nix index 4df4934..384fff0 100644 --- a/modules/home/programs/swaylock/default.nix +++ b/modules/home/programs/swaylock/default.nix @@ -3,11 +3,13 @@ lib, namespace, ... -}: let +}: +let inherit (lib) mkEnableOption mkIf; cfg = config.${namespace}.programs.swaylock; -in { +in +{ options.${namespace}.programs.swaylock = { enable = mkEnableOption "swaylock"; }; diff --git a/modules/home/programs/waybar/default.nix b/modules/home/programs/waybar/default.nix index 25fc523..bb318f1 100644 --- a/modules/home/programs/waybar/default.nix +++ b/modules/home/programs/waybar/default.nix @@ -4,11 +4,18 @@ lib, namespace, ... -}: let - inherit (lib) mkIf mkEnableOption mkOption types; +}: +let + inherit (lib) + mkIf + mkEnableOption + mkOption + types + ; cfg = config.${namespace}.programs.waybar; -in { +in +{ options.aa.programs.waybar = { enable = mkEnableOption "waybar"; @@ -33,8 +40,8 @@ in { layer = "top"; position = "bottom"; height = 20; - modules-left = ["sway/workspaces"]; - modules-center = ["clock"]; + modules-left = [ "sway/workspaces" ]; + modules-center = [ "clock" ]; modules-right = [ "idle_inhibitor" "temperature" @@ -76,7 +83,11 @@ in { temperature = { critical-threshold = 80; format = "{icon}{temperatureC}°C"; - format-icons = [" " " " " "]; + format-icons = [ + " " + " " + " " + ]; thermal-zone = cfg.thermal-zone; }; @@ -99,7 +110,11 @@ in { phone = " "; portable = " "; car = " "; - default = [" " " " " "]; + default = [ + " " + " " + " " + ]; }; tooltip-format = "{desc}, {volume}%"; # TODO: Figure out how to get pactl binary? @@ -118,7 +133,13 @@ in { format-charging = " {capacity}%"; format-plugged = " "; format-alt = "{time} {icon}"; - format-icons = [" " " " " " " " " "]; + format-icons = [ + " " + " " + " " + " " + " " + ]; }; memory = { @@ -127,7 +148,10 @@ in { backlight = { format = "{icon} {percent}%"; - format-icons = ["`" ""]; + format-icons = [ + "`" + "" + ]; on-scroll-up = "light -A 1"; on-scroll-down = "light -U 1"; }; @@ -168,6 +192,6 @@ in { ]; }; - wayland.windowManager.sway.config.bars = []; + wayland.windowManager.sway.config.bars = [ ]; }; } diff --git a/modules/home/programs/yazi/default.nix b/modules/home/programs/yazi/default.nix index 9aadc2d..c44c998 100644 --- a/modules/home/programs/yazi/default.nix +++ b/modules/home/programs/yazi/default.nix @@ -3,9 +3,11 @@ lib, namespace, ... -}: let +}: +let cfg = config.${namespace}.programs.yazi; -in { +in +{ options.${namespace}.programs.yazi = { enable = lib.mkEnableOption "yazi"; }; diff --git a/modules/home/programs/zoxide/default.nix b/modules/home/programs/zoxide/default.nix index 4c072b1..0f904fc 100644 --- a/modules/home/programs/zoxide/default.nix +++ b/modules/home/programs/zoxide/default.nix @@ -4,19 +4,21 @@ lib, namespace, ... -}: let +}: +let cfg = config.${namespace}.programs.zoxide; -in { +in +{ options.${namespace}.programs.zoxide = { enable = lib.mkEnableOption "zoxide"; }; config = lib.mkIf cfg.enable { - home.packages = [pkgs.zoxide]; + home.packages = [ pkgs.zoxide ]; programs.zoxide = { enable = true; - options = ["--cmd cd"]; + options = [ "--cmd cd" ]; }; }; } diff --git a/modules/home/services/gammastep/default.nix b/modules/home/services/gammastep/default.nix index b7237f1..8f88614 100644 --- a/modules/home/services/gammastep/default.nix +++ b/modules/home/services/gammastep/default.nix @@ -3,11 +3,13 @@ lib, namespace, ... -}: let +}: +let inherit (lib) mkIf mkEnableOption; cfg = config.${namespace}.services.gammastep; -in { +in +{ options.${namespace}.services.gammastep = { enable = mkEnableOption "gammastep"; }; diff --git a/modules/home/services/playerctld/default.nix b/modules/home/services/playerctld/default.nix index 6a1db73..cc4fdbb 100644 --- a/modules/home/services/playerctld/default.nix +++ b/modules/home/services/playerctld/default.nix @@ -4,17 +4,19 @@ pkgs, namespace, ... -}: let +}: +let inherit (lib) mkEnableOption mkIf; cfg = config.${namespace}.services.playerctld; -in { +in +{ options.${namespace}.services.playerctld = { enable = mkEnableOption "playerctl"; }; config = mkIf cfg.enable { - home.packages = [pkgs.playerctl]; + home.packages = [ pkgs.playerctl ]; services.playerctld.enable = true; }; } diff --git a/modules/home/services/swayidle/default.nix b/modules/home/services/swayidle/default.nix index 3030f89..560cd9f 100644 --- a/modules/home/services/swayidle/default.nix +++ b/modules/home/services/swayidle/default.nix @@ -4,17 +4,19 @@ lib, namespace, ... -}: let +}: +let inherit (lib) mkIf mkEnableOption; cfg = config.${namespace}.services.swayidle; -in { +in +{ options.${namespace}.services.swayidle = { enable = mkEnableOption "swayidle"; }; config = mkIf cfg.enable { - home.packages = [pkgs.swayidle]; + home.packages = [ pkgs.swayidle ]; services.swayidle = { enable = true; diff --git a/modules/home/services/swaync/default.nix b/modules/home/services/swaync/default.nix index 3c5a318..49b84c2 100644 --- a/modules/home/services/swaync/default.nix +++ b/modules/home/services/swaync/default.nix @@ -4,22 +4,29 @@ pkgs, namespace, ... -}: let +}: +let inherit (lib) mkEnableOption mkIf; cfg = config.${namespace}.services.swaync; -in { +in +{ options.${namespace}.services.swaync = { enable = mkEnableOption "sway notification center"; }; config = mkIf cfg.enable { - home.packages = [pkgs.libnotify]; + home.packages = [ pkgs.libnotify ]; services.swaync = { enable = true; settings = { - widgets = ["title" "dnd" "notifications" "mpris"]; + widgets = [ + "title" + "dnd" + "notifications" + "mpris" + ]; }; }; diff --git a/modules/home/tools/direnv/default.nix b/modules/home/tools/direnv/default.nix index 2854ee0..fb70202 100644 --- a/modules/home/tools/direnv/default.nix +++ b/modules/home/tools/direnv/default.nix @@ -3,11 +3,13 @@ lib, namespace, ... -}: let +}: +let inherit (lib) mkEnableOption mkIf; cfg = config.${namespace}.tools.direnv; -in { +in +{ options.${namespace}.tools.direnv = { enable = mkEnableOption "direnv"; }; diff --git a/modules/home/tools/eza/default.nix b/modules/home/tools/eza/default.nix index 6f8dc98..6dcf295 100644 --- a/modules/home/tools/eza/default.nix +++ b/modules/home/tools/eza/default.nix @@ -3,11 +3,13 @@ lib, namespace, ... -}: let +}: +let inherit (lib) mkIf mkEnableOption; cfg = config.${namespace}.tools.eza; -in { +in +{ options.${namespace}.tools.eza = { enable = mkEnableOption "eza"; }; diff --git a/modules/home/tools/git/default.nix b/modules/home/tools/git/default.nix index db4ab54..393438b 100644 --- a/modules/home/tools/git/default.nix +++ b/modules/home/tools/git/default.nix @@ -4,11 +4,13 @@ lib, namespace, ... -}: let +}: +let inherit (lib) mkIf mkEnableOption mkDefault; cfg = config.${namespace}.tools.git; -in { +in +{ options.${namespace}.tools.git = { enable = mkEnableOption "git"; userName = lib.options.mkOption { diff --git a/modules/home/tools/zsh/default.nix b/modules/home/tools/zsh/default.nix index 9625dbf..8a3da11 100644 --- a/modules/home/tools/zsh/default.nix +++ b/modules/home/tools/zsh/default.nix @@ -5,11 +5,13 @@ pkgs, namespace, ... -}: let +}: +let inherit (lib) mkEnableOption mkIf; cfg = config.${namespace}.tools.zsh; -in { +in +{ options.${namespace}.tools.zsh = { enable = mkEnableOption "zsh"; }; diff --git a/modules/nixos/apps/steam/default.nix b/modules/nixos/apps/steam/default.nix index e6dd630..bbc9d5d 100644 --- a/modules/nixos/apps/steam/default.nix +++ b/modules/nixos/apps/steam/default.nix @@ -3,9 +3,11 @@ pkgs, lib, ... -}: let +}: +let cfg = config.aa.apps.steam; -in { +in +{ options.aa.apps.steam = { enable = lib.options.mkEnableOption "steam"; }; diff --git a/modules/nixos/apps/yubikey/default.nix b/modules/nixos/apps/yubikey/default.nix index 5480251..2f1d10e 100644 --- a/modules/nixos/apps/yubikey/default.nix +++ b/modules/nixos/apps/yubikey/default.nix @@ -3,11 +3,13 @@ pkgs, lib, ... -}: let +}: +let inherit (lib) mkEnableOption mkIf; cfg = config.aa.apps.yubikey; -in { +in +{ options.aa.apps.yubikey = { enable = mkEnableOption "yubikey"; }; diff --git a/modules/nixos/archetypes/workstation/default.nix b/modules/nixos/archetypes/workstation/default.nix index 1b4c8be..8fc02d7 100644 --- a/modules/nixos/archetypes/workstation/default.nix +++ b/modules/nixos/archetypes/workstation/default.nix @@ -2,11 +2,13 @@ config, lib, ... -}: let +}: +let inherit (lib) mkIf mkEnableOption; cfg = config.aa.archetypes.workstation; -in { +in +{ options.aa.archetypes.workstation = { enable = mkEnableOption "workstation archetype"; }; diff --git a/modules/nixos/hardware/audio/default.nix b/modules/nixos/hardware/audio/default.nix index 793659c..cdf043d 100644 --- a/modules/nixos/hardware/audio/default.nix +++ b/modules/nixos/hardware/audio/default.nix @@ -3,17 +3,19 @@ lib, pkgs, ... -}: let +}: +let inherit (lib) mkEnableOption mkIf; cfg = config.aa.hardware.audio; -in { +in +{ options.aa.hardware.audio = { enable = mkEnableOption "audio"; }; config = mkIf cfg.enable { - environment.systemPackages = with pkgs; [pamixer]; + environment.systemPackages = with pkgs; [ pamixer ]; security.rtkit.enable = true; services.pipewire = { enable = true; diff --git a/modules/nixos/hardware/bluetooth/default.nix b/modules/nixos/hardware/bluetooth/default.nix index 543cc2f..4c20fa3 100644 --- a/modules/nixos/hardware/bluetooth/default.nix +++ b/modules/nixos/hardware/bluetooth/default.nix @@ -2,11 +2,13 @@ config, lib, ... -}: let +}: +let inherit (lib) mkIf mkEnableOption; cfg = config.aa.hardware.bluetooth; -in { +in +{ options.aa.hardware.bluetooth = { enable = mkEnableOption "bluetooth"; }; diff --git a/modules/nixos/hardware/logitech/default.nix b/modules/nixos/hardware/logitech/default.nix index 1468ec7..ceb9961 100644 --- a/modules/nixos/hardware/logitech/default.nix +++ b/modules/nixos/hardware/logitech/default.nix @@ -4,12 +4,14 @@ pkgs, namespace, ... -}: let +}: +let inherit (lib) mkIf mkEnableOption; cfg = config.${namespace}.hardware.logitech; username = config.${namespace}.user.name; -in { +in +{ options.${namespace}.hardware.logitech = { enable = mkEnableOption "logitech devices"; }; @@ -22,13 +24,15 @@ in { systemd.user.services.solaar = { description = "Linux device manager for Logitech devices"; - documentation = ["https://pwr-solaar.github.io/Solaar/"]; - partOf = ["graphical-session.target"]; + documentation = [ "https://pwr-solaar.github.io/Solaar/" ]; + partOf = [ "graphical-session.target" ]; serviceConfig = { Type = "simple"; ExecStart = "${pkgs.solaar}/bin/solaar -w hide"; }; }; - systemd.user.services.solaar.wantedBy = mkIf config.home-manager.users.${username}.wayland.windowManager.sway.enable ["sway-session.target"]; + systemd.user.services.solaar.wantedBy = + mkIf config.home-manager.users.${username}.wayland.windowManager.sway.enable + [ "sway-session.target" ]; }; } diff --git a/modules/nixos/hardware/tlp/default.nix b/modules/nixos/hardware/tlp/default.nix index e0aa95d..05a0839 100644 --- a/modules/nixos/hardware/tlp/default.nix +++ b/modules/nixos/hardware/tlp/default.nix @@ -2,11 +2,13 @@ config, lib, ... -}: let +}: +let inherit (lib) mkEnableOption mkIf; cfg = config.aa.hardware.tlp; -in { +in +{ options.aa.hardware.tlp = { enable = mkEnableOption "tlp"; }; diff --git a/modules/nixos/home/default.nix b/modules/nixos/home/default.nix index a843679..7a3fbb6 100644 --- a/modules/nixos/home/default.nix +++ b/modules/nixos/home/default.nix @@ -5,10 +5,12 @@ inputs, namespace, ... -}: let +}: +let inherit (lib) mkAliasDefinitions mkOption; inherit (lib.types) attrs; -in { +in +{ imports = with inputs; [ home-manager.nixosModules.home-manager ]; @@ -16,22 +18,22 @@ in { options.${namespace}.home = { file = mkOption { type = attrs; - default = {}; + default = { }; description = "A set of files to be manged by home-manager's <option>home.file</option> option."; }; configFile = mkOption { type = attrs; - default = {}; + default = { }; description = "A set of files to be managed by home-manager's <option>xdg.configFile</option>."; }; dataFile = mkOption { type = attrs; - default = {}; + default = { }; description = "A set of files to be managed by home-manager's <option>xdg.dataFile</option>."; }; extraOptions = mkOption { type = attrs; - default = {}; + default = { }; description = "Options to pass directly to home-manager."; }; }; @@ -50,8 +52,7 @@ in { home-manager = { useUserPackages = true; - users.${config.aa.user.name} = - mkAliasDefinitions options.aa.home.extraOptions; + users.${config.aa.user.name} = mkAliasDefinitions options.aa.home.extraOptions; }; }; } diff --git a/modules/nixos/nix/default.nix b/modules/nixos/nix/default.nix index 7ce6e00..539b4e7 100644 --- a/modules/nixos/nix/default.nix +++ b/modules/nixos/nix/default.nix @@ -3,12 +3,19 @@ pkgs, lib, ... -}: let - inherit (lib) mkIf mkEnableOption mkOption types; +}: +let + inherit (lib) + mkIf + mkEnableOption + mkOption + types + ; cfg = config.aa.nix; selfHostedCacheHost = "https://cache.kilonull.com/"; -in { +in +{ options.aa.nix = { enable = mkEnableOption "manage nix configuration."; package = mkOption { @@ -26,37 +33,43 @@ in { nixfmt-rfc-style ]; - nix = let - users = ["root" config.aa.user.name]; - in { - package = cfg.package; + nix = + let + users = [ + "root" + config.aa.user.name + ]; + in + { + package = cfg.package; - settings = { - experimental-features = "nix-command flakes"; - trusted-users = users; - allowed-users = users; + settings = { + experimental-features = "nix-command flakes"; + trusted-users = users; + allowed-users = users; - builders-use-substitutes = cfg.useSelfhostedCache; - substituters = - if cfg.useSelfhostedCache - then [ - # TESTING - "https://minio.kilonull.com/nix-store" - selfHostedCacheHost - ] - else []; - trusted-public-keys = - mkIf cfg.useSelfhostedCache - ["gospelCache:9cbn8Wm54BbwpPS0TXw+15wrYZBpfOJt4Fzfbfcq/pc="]; + builders-use-substitutes = cfg.useSelfhostedCache; + substituters = + if cfg.useSelfhostedCache then + [ + # TESTING + "https://minio.kilonull.com/nix-store" + selfHostedCacheHost + ] + else + [ ]; + trusted-public-keys = mkIf cfg.useSelfhostedCache [ + "gospelCache:9cbn8Wm54BbwpPS0TXw+15wrYZBpfOJt4Fzfbfcq/pc=" + ]; + }; + + # TODO: Configure distributedBuilds and buildMachines? + + gc = { + automatic = lib.mkDefault true; + dates = lib.mkDefault "weekly"; + options = lib.mkDefault "--delete-older-than 30d"; + }; }; - - # TODO: Configure distributedBuilds and buildMachines? - - gc = { - automatic = lib.mkDefault true; - dates = lib.mkDefault "weekly"; - options = lib.mkDefault "--delete-older-than 30d"; - }; - }; }; } diff --git a/modules/nixos/programs/android-studio/default.nix b/modules/nixos/programs/android-studio/default.nix index 599ab9d..a8bc9cd 100644 --- a/modules/nixos/programs/android-studio/default.nix +++ b/modules/nixos/programs/android-studio/default.nix @@ -4,18 +4,20 @@ lib, namespace, ... -}: let +}: +let cfg = config.${namespace}.programs.android-studio; -in { +in +{ options.${namespace}.programs.android-studio = { enable = lib.mkEnableOption "Android Studio"; }; config = lib.mkIf cfg.enable { - ${namespace}.user.extraGroups = ["kvm"]; + ${namespace}.user.extraGroups = [ "kvm" ]; programs.adb.enable = true; - environment.systemPackages = [pkgs.android-studio]; + environment.systemPackages = [ pkgs.android-studio ]; }; } diff --git a/modules/nixos/security/acme/default.nix b/modules/nixos/security/acme/default.nix index 8af3e96..00f720a 100644 --- a/modules/nixos/security/acme/default.nix +++ b/modules/nixos/security/acme/default.nix @@ -3,11 +3,18 @@ lib, namespace, ... -}: let - inherit (lib) mkOption mkEnableOption mkIf types; +}: +let + inherit (lib) + mkOption + mkEnableOption + mkIf + types + ; cfg = config.aa.security.acme; -in { +in +{ options.aa.security.acme = { enable = mkEnableOption "Automatic Certificate Management Environment (ACME)"; useStaging = mkOption { @@ -53,7 +60,7 @@ in { # own DNS to make `lego` happy (will resolve names to a public IP). dnsResolver = "1.1.1.1:53"; credentialsFile = cfg.dnsCredentialsFile; - extraDomainNames = mkIf cfg.isWildcard [("*." + cfg.domainName)]; + extraDomainNames = mkIf cfg.isWildcard [ ("*." + cfg.domainName) ]; }; }; }; diff --git a/modules/nixos/services/adguardhome/default.nix b/modules/nixos/services/adguardhome/default.nix index 256ed72..00c369c 100644 --- a/modules/nixos/services/adguardhome/default.nix +++ b/modules/nixos/services/adguardhome/default.nix @@ -3,11 +3,18 @@ lib, namespace, ... -}: let - inherit (lib) mkIf mkEnableOption mkOption types; +}: +let + inherit (lib) + mkIf + mkEnableOption + mkOption + types + ; cfg = config.${namespace}.services.adguardhome; -in { +in +{ options.${namespace}.services.adguardhome = { enable = mkEnableOption "adguardhome"; acmeCertName = mkOption { diff --git a/modules/nixos/services/forgejo/default.nix b/modules/nixos/services/forgejo/default.nix index 2a4a8c7..95e5c4f 100644 --- a/modules/nixos/services/forgejo/default.nix +++ b/modules/nixos/services/forgejo/default.nix @@ -4,12 +4,19 @@ pkgs, namespace, ... -}: let - inherit (lib) mkIf mkEnableOption mkOption types; +}: +let + inherit (lib) + mkIf + mkEnableOption + mkOption + types + ; cfg = config.${namespace}.services.forgejo; forgejo_cfg = config.services.forgejo; -in { +in +{ options.${namespace}.services.forgejo = { enable = mkEnableOption "forgejo"; domain = mkOption { diff --git a/modules/nixos/services/grafana/default.nix b/modules/nixos/services/grafana/default.nix index a7ddad2..4216654 100644 --- a/modules/nixos/services/grafana/default.nix +++ b/modules/nixos/services/grafana/default.nix @@ -4,13 +4,20 @@ pkgs, namespace, ... -}: let - inherit (lib) mkIf mkEnableOption mkOption types; +}: +let + inherit (lib) + mkIf + mkEnableOption + mkOption + types + ; cfg = config.${namespace}.services.grafana; server_settings = config.services.grafana.settings.server; grafana_dashboards = pkgs.${namespace}.teslamate-grafana-dashboards; -in { +in +{ options.${namespace}.services.grafana = { enable = mkEnableOption "grafana"; acmeCertName = mkOption { @@ -120,7 +127,10 @@ in { }; networking.firewall = { - allowedTCPPorts = [80 443]; + allowedTCPPorts = [ + 80 + 443 + ]; }; }; } diff --git a/modules/nixos/services/hydra/default.nix b/modules/nixos/services/hydra/default.nix index ee288fc..9190b83 100644 --- a/modules/nixos/services/hydra/default.nix +++ b/modules/nixos/services/hydra/default.nix @@ -3,9 +3,11 @@ lib, namespace, ... -}: let +}: +let cfg = config.${namespace}.services.hydra; -in { +in +{ options.${namespace}.services.hydra = with lib; { enable = mkEnableOption "hydra"; hostname = mkOption { @@ -72,7 +74,7 @@ in { enable = true; hydraURL = "https://${cfg.hostname}"; notificationSender = "hydra@localhost"; - buildMachinesFiles = []; + buildMachinesFiles = [ ]; useSubstitutes = true; extraConfig = '' store_uri = s3://${cfg.s3Bucket}?compression=zstd¶llel-compression=true&write-nar-listing=1&ls-compression=br&log-compression=br&scheme=${cfg.s3Scheme}&endpoint=${cfg.s3Endpoint}&secret-key=${cfg.secretKeyPath} @@ -103,7 +105,10 @@ in { "hydra" "hydra-www" ]; - allowed-uris = ["github:" "git+https://git.alejandr0angul0.dev/"]; + allowed-uris = [ + "github:" + "git+https://git.alejandr0angul0.dev/" + ]; }; }; } diff --git a/modules/nixos/services/loki/default.nix b/modules/nixos/services/loki/default.nix index ccb9691..c16a3df 100644 --- a/modules/nixos/services/loki/default.nix +++ b/modules/nixos/services/loki/default.nix @@ -3,10 +3,12 @@ lib, namespace, ... -}: let +}: +let cfg = config.${namespace}.services.loki; loki = config.services.loki; -in { +in +{ options.${namespace}.services.loki = with lib; { enable = mkEnableOption "loki"; }; @@ -102,7 +104,7 @@ in { }; networking.firewall = { - allowedTCPPorts = [loki.configuration.server.http_listen_port]; + allowedTCPPorts = [ loki.configuration.server.http_listen_port ]; }; }; } diff --git a/modules/nixos/services/minio/default.nix b/modules/nixos/services/minio/default.nix index ae2455a..074396c 100644 --- a/modules/nixos/services/minio/default.nix +++ b/modules/nixos/services/minio/default.nix @@ -3,9 +3,11 @@ lib, namespace, ... -}: let +}: +let cfg = config.${namespace}.services.minio; -in { +in +{ options.${namespace}.services.minio = with lib; { enable = mkEnableOption "minio"; acmeCertName = mkOption { diff --git a/modules/nixos/services/mosquitto/default.nix b/modules/nixos/services/mosquitto/default.nix index 7db6646..eed3c7b 100644 --- a/modules/nixos/services/mosquitto/default.nix +++ b/modules/nixos/services/mosquitto/default.nix @@ -2,9 +2,11 @@ config, lib, ... -}: let +}: +let cfg = config.aa.services.mosquitto; -in { +in +{ options.aa.services.mosquitto = with lib; { enable = mkEnableOption "home assistant"; }; @@ -36,7 +38,7 @@ in { passwordFile = config.age.secrets.theengs_ble_mqtt.path; }; teslamate = { - acl = ["readwrite teslamate/#"]; + acl = [ "readwrite teslamate/#" ]; passwordFile = config.age.secrets.teslamate_mqtt.path; }; }; @@ -44,6 +46,6 @@ in { ]; }; - networking.firewall.allowedTCPPorts = [1883]; + networking.firewall.allowedTCPPorts = [ 1883 ]; }; } diff --git a/modules/nixos/services/nix-serve/default.nix b/modules/nixos/services/nix-serve/default.nix index 37eda6e..80f0dce 100644 --- a/modules/nixos/services/nix-serve/default.nix +++ b/modules/nixos/services/nix-serve/default.nix @@ -3,9 +3,11 @@ lib, pkgs, ... -}: let +}: +let cfg = config.aa.services.nix-serve; -in { +in +{ options.aa.services.nix-serve = with lib; { enable = mkEnableOption "nix-serve"; domain_name = mkOption { @@ -28,11 +30,11 @@ in { config = lib.mkIf cfg.enable { nix.settings = { - allowed-users = ["nix-serve"]; - trusted-users = ["nix-serve"]; + allowed-users = [ "nix-serve" ]; + trusted-users = [ "nix-serve" ]; }; - environment.systemPackages = [pkgs.nix-serve]; + environment.systemPackages = [ pkgs.nix-serve ]; services = { nix-serve = { @@ -45,7 +47,7 @@ in { enable = true; virtualHosts."${cfg.subdomain_name}.${cfg.domain_name}" = { - serverAliases = ["${cfg.subdomain_name}"]; + serverAliases = [ "${cfg.subdomain_name}" ]; locations."/".extraConfig = '' proxy_pass http://localhost:${toString config.services.nix-serve.port}; proxy_set_header Host $host; @@ -61,7 +63,10 @@ in { }; networking.firewall = { - allowedTCPPorts = [80 443]; + allowedTCPPorts = [ + 80 + 443 + ]; }; }; } diff --git a/modules/nixos/services/octoprint/default.nix b/modules/nixos/services/octoprint/default.nix index e9ecc22..35cde36 100644 --- a/modules/nixos/services/octoprint/default.nix +++ b/modules/nixos/services/octoprint/default.nix @@ -2,9 +2,11 @@ config, lib, ... -}: let +}: +let cfg = config.aa.services.octoprint; -in { +in +{ options.aa.services.octoprint = with lib; { enable = mkEnableOption "octoprint"; acmeCertName = mkOption { @@ -39,6 +41,9 @@ in { }; }; - networking.firewall.allowedTCPPorts = [80 443]; + networking.firewall.allowedTCPPorts = [ + 80 + 443 + ]; }; } diff --git a/modules/nixos/services/openssh/default.nix b/modules/nixos/services/openssh/default.nix index c1d2463..f5fe40a 100644 --- a/modules/nixos/services/openssh/default.nix +++ b/modules/nixos/services/openssh/default.nix @@ -3,17 +3,25 @@ lib, format, ... -}: let - inherit (lib) mkIf mkEnableOption mkOption mkDefault types; +}: +let + inherit (lib) + mkIf + mkEnableOption + mkOption + mkDefault + types + ; cfg = config.aa.services.openssh; default-key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEmPdQcM0KCQ3YunF1gwN+B+i1Q8KrIfiUvNtgFQjTy2"; -in { +in +{ options.aa.services.openssh = { enable = mkEnableOption "ssh"; authorizedKeys = mkOption { type = types.listOf types.str; - default = [default-key]; + default = [ default-key ]; description = "The public keys to authorize"; }; }; @@ -23,11 +31,7 @@ in { enable = true; settings = { PasswordAuthentication = false; - PermitRootLogin = mkDefault ( - if format == "install-iso" - then "yes" - else "no" - ); + PermitRootLogin = mkDefault (if format == "install-iso" then "yes" else "no"); }; }; diff --git a/modules/nixos/services/printing/default.nix b/modules/nixos/services/printing/default.nix index e716904..2937a37 100644 --- a/modules/nixos/services/printing/default.nix +++ b/modules/nixos/services/printing/default.nix @@ -2,9 +2,11 @@ config, lib, ... -}: let +}: +let cfg = config.aa.apps.steam; -in { +in +{ options.aa.services.printing = with lib; { enable = mkEnableOption "printing"; }; diff --git a/modules/nixos/services/prometheus/default.nix b/modules/nixos/services/prometheus/default.nix index 25eb0a5..e6a04fa 100644 --- a/modules/nixos/services/prometheus/default.nix +++ b/modules/nixos/services/prometheus/default.nix @@ -2,12 +2,14 @@ config, lib, ... -}: let +}: +let inherit (lib) mkIf; cfg = config.aa.services.prometheus; exporters = config.services.prometheus.exporters; -in { +in +{ options.aa.services.prometheus = with lib; { enable = mkEnableOption "prometheus"; enableServer = mkOption { @@ -28,7 +30,7 @@ in { exporters = { node = { enable = cfg.enableNodeExporter; - enabledCollectors = ["systemd"]; + enabledCollectors = [ "systemd" ]; port = 9002; openFirewall = true; }; @@ -52,7 +54,7 @@ in { }; networking.firewall = mkIf cfg.enableServer { - allowedTCPPorts = [config.services.prometheus.port]; + allowedTCPPorts = [ config.services.prometheus.port ]; }; }; } diff --git a/modules/nixos/services/promtail/default.nix b/modules/nixos/services/promtail/default.nix index b4ffddf..0c407d0 100644 --- a/modules/nixos/services/promtail/default.nix +++ b/modules/nixos/services/promtail/default.nix @@ -2,9 +2,11 @@ config, lib, ... -}: let +}: +let cfg = config.aa.services.promtail; -in { +in +{ options.aa.services.promtail = with lib; { enable = mkEnableOption "promtail"; }; @@ -38,7 +40,7 @@ in { }; relabel_configs = [ { - source_labels = ["__journal__systemd_unit"]; + source_labels = [ "__journal__systemd_unit" ]; target_label = "unit"; } ]; diff --git a/modules/nixos/services/tailscale/default.nix b/modules/nixos/services/tailscale/default.nix index 9510931..c85c5a6 100644 --- a/modules/nixos/services/tailscale/default.nix +++ b/modules/nixos/services/tailscale/default.nix @@ -3,11 +3,13 @@ pkgs, lib, ... -}: let +}: +let inherit (lib) mkIf; cfg = config.aa.services.tailscale; -in { +in +{ options.aa.services.tailscale = with lib; { enable = mkEnableOption "tailscale"; configureClientRouting = mkOption { @@ -35,18 +37,14 @@ in { tailscale tailscale-systray ]; - networking.firewall.allowedUDPPorts = [config.services.tailscale.port]; + networking.firewall.allowedUDPPorts = [ config.services.tailscale.port ]; services.tailscale = { enable = true; useRoutingFeatures = mkIf (cfg.configureClientRouting || cfg.configureServerRouting) ( - if (cfg.configureClientRouting && cfg.configureServerRouting) - then "both" + if (cfg.configureClientRouting && cfg.configureServerRouting) then + "both" else - ( - if cfg.configureClientRouting - then "client" - else "server" - ) + (if cfg.configureClientRouting then "client" else "server") ); }; }; diff --git a/modules/nixos/services/teslamate/default.nix b/modules/nixos/services/teslamate/default.nix index fe6ff13..4c35ff4 100644 --- a/modules/nixos/services/teslamate/default.nix +++ b/modules/nixos/services/teslamate/default.nix @@ -2,9 +2,11 @@ config, lib, ... -}: let +}: +let cfg = config.aa.services.teslamate; -in { +in +{ options.aa.services.teslamate = with lib; { enable = mkEnableOption "teslamate"; @@ -104,7 +106,7 @@ in { backend = "docker"; containers."teslamate" = { image = "teslamate/teslamate:1.32"; - environmentFiles = ["/var/lib/teslamate/env"]; + environmentFiles = [ "/var/lib/teslamate/env" ]; environment = { # TODO: Make this configurable PORT = "4000"; @@ -116,9 +118,12 @@ in { MQTT_USERNAME = "teslamate"; TZ = "America/Los_Angeles"; }; - extraOptions = ["--cap-drop=all" "--network=host"]; + extraOptions = [ + "--cap-drop=all" + "--network=host" + ]; # TODO: Make this configurable - ports = ["4000:4000"]; + ports = [ "4000:4000" ]; }; }; @@ -126,12 +131,12 @@ in { isSystemUser = true; group = cfg.group; }; - users.groups.${cfg.group} = {}; + users.groups.${cfg.group} = { }; services.postgresql = lib.optionalAttrs cfg.database.createDatabase { enable = lib.mkDefault true; - ensureDatabases = [cfg.database.name]; + ensureDatabases = [ cfg.database.name ]; ensureUsers = [ { name = cfg.database.user; @@ -157,6 +162,6 @@ in { }; }; - networking.firewall.allowedTCPPorts = [4000]; + networking.firewall.allowedTCPPorts = [ 4000 ]; }; } diff --git a/modules/nixos/suites/desktop/default.nix b/modules/nixos/suites/desktop/default.nix index 9710f78..7f30b46 100644 --- a/modules/nixos/suites/desktop/default.nix +++ b/modules/nixos/suites/desktop/default.nix @@ -3,11 +3,13 @@ lib, namespace, ... -}: let +}: +let inherit (lib) mkEnableOption mkIf; cfg = config.${namespace}.suites.desktop; -in { +in +{ options.${namespace}.suites.desktop = { enable = mkEnableOption "common desktop configuration"; }; @@ -19,7 +21,7 @@ in { # The following fixes an issue with using swaylcock as a home module # Workaround for https://github.com/NixOS/nixpkgs/issues/158025 # This comment specifically: https://github.com/NixOS/nixpkgs/issues/158025#issuecomment-1344766809 - security.pam.services.swaylock = {}; + security.pam.services.swaylock = { }; # Required for GUIs (like sway) to work correctly. hardware.graphics.enable = true; diff --git a/modules/nixos/suites/development/default.nix b/modules/nixos/suites/development/default.nix index 9ac938a..af13138 100644 --- a/modules/nixos/suites/development/default.nix +++ b/modules/nixos/suites/development/default.nix @@ -3,10 +3,12 @@ lib, pkgs, ... -}: let +}: +let inherit (lib) mkIf mkEnableOption; cfg = config.aa.suites.development; -in { +in +{ options.aa.suites.development = { enable = mkEnableOption "common configuration"; }; diff --git a/modules/nixos/suites/gaming/default.nix b/modules/nixos/suites/gaming/default.nix index c6b4124..6d2c8f2 100644 --- a/modules/nixos/suites/gaming/default.nix +++ b/modules/nixos/suites/gaming/default.nix @@ -5,9 +5,11 @@ pkgs, ... }: -with lib; let +with lib; +let cfg = config.aa.suites.gaming; -in { +in +{ options.aa.suites.gaming = with lib.types; { enable = mkEnableOption "gaming configuration"; }; diff --git a/modules/nixos/suites/utils/default.nix b/modules/nixos/suites/utils/default.nix index 4d62f3b..76a3d1f 100644 --- a/modules/nixos/suites/utils/default.nix +++ b/modules/nixos/suites/utils/default.nix @@ -4,11 +4,13 @@ pkgs, inputs, ... -}: let +}: +let inherit (lib) mkIf mkEnableOption; cfg = config.aa.suites.utils; -in { +in +{ options.aa.suites.utils = { enable = mkEnableOption "common configuration"; }; @@ -38,6 +40,6 @@ in { usbutils wget ]) - ++ [inputs.agenix.packages.x86_64-linux.default]; + ++ [ inputs.agenix.packages.x86_64-linux.default ]; }; } diff --git a/modules/nixos/system/fonts/default.nix b/modules/nixos/system/fonts/default.nix index 1a6b7e4..3ccb469 100644 --- a/modules/nixos/system/fonts/default.nix +++ b/modules/nixos/system/fonts/default.nix @@ -5,9 +5,11 @@ lib, ... }: -with lib; let +with lib; +let cfg = config.aa.system.fonts; -in { +in +{ options.aa.system.fonts = with types; { enable = mkEnableOption "manage fonts"; }; diff --git a/modules/nixos/system/monitoring/default.nix b/modules/nixos/system/monitoring/default.nix index 07f8161..5aa1af5 100644 --- a/modules/nixos/system/monitoring/default.nix +++ b/modules/nixos/system/monitoring/default.nix @@ -3,11 +3,13 @@ pkgs, lib, ... -}: let +}: +let inherit (lib) mkIf mkEnableOption; cfg = config.aa.system.monitoring; -in { +in +{ options.aa.system.monitoring = { enable = mkEnableOption "monitoring"; }; diff --git a/modules/nixos/system/zfs/default.nix b/modules/nixos/system/zfs/default.nix index ef466d6..f542b61 100644 --- a/modules/nixos/system/zfs/default.nix +++ b/modules/nixos/system/zfs/default.nix @@ -5,16 +5,18 @@ lib, ... }: -with lib; let +with lib; +let cfg = config.aa.system.zfs; -in { +in +{ options.aa.system.zfs = with types; { enable = mkEnableOption "zfs"; # TODO: Introduce a zfsOnRoot option }; config = mkIf cfg.enable { - environment.systemPackages = [pkgs.zfs-prune-snapshots]; + environment.systemPackages = [ pkgs.zfs-prune-snapshots ]; services.zfs = { autoScrub.enable = true; diff --git a/modules/nixos/user/default.nix b/modules/nixos/user/default.nix index dac33ca..67bea25 100644 --- a/modules/nixos/user/default.nix +++ b/modules/nixos/user/default.nix @@ -5,9 +5,11 @@ lib, ... }: -with lib; let +with lib; +let cfg = config.aa.user; -in { +in +{ options.aa.user = with types; { name = mkOption { type = str; @@ -26,12 +28,15 @@ in { }; extraGroups = mkOption { type = listOf str; - default = ["video" "networkmanager"]; + default = [ + "video" + "networkmanager" + ]; description = "Groups to for the user to be assigned."; }; extraOptions = mkOption { type = attrs; - default = {}; + default = { }; description = "Extra options passed to <option>users.users.<name></option>."; }; }; @@ -42,19 +47,17 @@ in { # Refer to modules/tools/zsh/default.nix programs.zsh.enable = true; - users.users.${cfg.name} = - { - isNormalUser = true; + users.users.${cfg.name} = { + isNormalUser = true; - inherit (cfg) name; + inherit (cfg) name; - home = "/home/${cfg.name}"; - group = "users"; + home = "/home/${cfg.name}"; + group = "users"; - shell = pkgs.zsh; + shell = pkgs.zsh; - extraGroups = ["wheel"] ++ cfg.extraGroups; - } - // cfg.extraOptions; + extraGroups = [ "wheel" ] ++ cfg.extraGroups; + } // cfg.extraOptions; }; } diff --git a/overlays/neovim/default.nix b/overlays/neovim/default.nix index def6d20..c150bbd 100644 --- a/overlays/neovim/default.nix +++ b/overlays/neovim/default.nix @@ -1,3 +1,4 @@ -{nixvim, ...}: (final: prev: { +{ nixvim, ... }: +(final: prev: { neovim = nixvim.packages.${prev.system}.default; }) diff --git a/packages/teslamate/default.nix b/packages/teslamate/default.nix index 5362421..d76365d 100644 --- a/packages/teslamate/default.nix +++ b/packages/teslamate/default.nix @@ -7,7 +7,8 @@ nodejs, breakpointHook, ... -}: let +}: +let pname = "teslamate"; version = "1.28.2"; @@ -23,29 +24,29 @@ overrides = ( final: prev: - (lib.mapAttrs - (_: value: - value.override { - appConfigPath = src + "/config"; - }) - prev) - // { - ex_cldr = prev.ex_cldr.overrideAttrs (old: rec { - # Copied from https://github.com/NixOS/nixpkgs/blob/d8fd23629b3910e8bdbd313e29532d3e33dd73d5/pkgs/servers/mobilizon/default.nix#L34-L47 - version = "2.37.5"; - # We have to use the GitHub sources, as it otherwise tries to download - # the locales at build time. - src = fetchFromGitHub { - owner = "elixir-cldr"; - repo = "cldr"; - rev = "v${version}"; - sha256 = "sha256-T5Qvuo+xPwpgBsqHNZYnTCA4loToeBn1LKTMsDcCdYs="; - }; - postInstall = '' - cp $src/priv/cldr/locales/* $out/lib/erlang/lib/ex_cldr-${old.version}/priv/cldr/locales/ - ''; - }); + (lib.mapAttrs ( + _: value: + value.override { + appConfigPath = src + "/config"; } + ) prev) + // { + ex_cldr = prev.ex_cldr.overrideAttrs (old: rec { + # Copied from https://github.com/NixOS/nixpkgs/blob/d8fd23629b3910e8bdbd313e29532d3e33dd73d5/pkgs/servers/mobilizon/default.nix#L34-L47 + version = "2.37.5"; + # We have to use the GitHub sources, as it otherwise tries to download + # the locales at build time. + src = fetchFromGitHub { + owner = "elixir-cldr"; + repo = "cldr"; + rev = "v${version}"; + sha256 = "sha256-T5Qvuo+xPwpgBsqHNZYnTCA4loToeBn1LKTMsDcCdYs="; + }; + postInstall = '' + cp $src/priv/cldr/locales/* $out/lib/erlang/lib/ex_cldr-${old.version}/priv/cldr/locales/ + ''; + }); + } ); }; @@ -54,7 +55,7 @@ inherit version; src = "${src}/assets"; npmDepsHash = "sha256-h92i/cRf4I0c4vUc6oBt5T4yvM0JNQMkoDy2YHcVWS4="; - patches = [./deploy_output.patch]; + patches = [ ./deploy_output.patch ]; dontNpmBuild = true; installPhase = '' runHook preinstall @@ -74,20 +75,25 @@ ''; }; in - beamPackages.mixRelease { - inherit pname version src mixNixDeps; +beamPackages.mixRelease { + inherit + pname + version + src + mixNixDeps + ; - nativeBuildInputs = [nodejs]; + nativeBuildInputs = [ nodejs ]; - preBuild = '' - mkdir -p priv/static/assets - # assets patched to write to scripts/deploy_output - cp -r ${assets}/scripts/deploy_output ./priv/static/assets - ''; + preBuild = '' + mkdir -p priv/static/assets + # assets patched to write to scripts/deploy_output + cp -r ${assets}/scripts/deploy_output ./priv/static/assets + ''; - postBuild = '' - # for external task you need a workaround for the no deps check flag - # https://github.com/phoenixframework/phoenix/issues/2690 - mix do deps.loadpaths --no-deps-check phx.digest, release --overwrite - ''; - } + postBuild = '' + # for external task you need a workaround for the no deps check flag + # https://github.com/phoenixframework/phoenix/issues/2690 + mix do deps.loadpaths --no-deps-check phx.digest, release --overwrite + ''; +} diff --git a/packages/teslamate/mix.nix b/packages/teslamate/mix.nix index 41ef738..63fb865 100644 --- a/packages/teslamate/mix.nix +++ b/packages/teslamate/mix.nix @@ -1,4 +1,8 @@ -{ lib, beamPackages, overrides ? (x: y: {}) }: +{ + lib, + beamPackages, + overrides ? (x: y: { }), +}: let buildRebar3 = lib.makeOverridable beamPackages.buildRebar3; @@ -7,825 +11,934 @@ let self = packages // (overrides self packages); - packages = with beamPackages; with self; { - bunt = buildMix rec { - name = "bunt"; - version = "0.2.1"; + packages = + with beamPackages; + with self; + { + bunt = buildMix rec { + name = "bunt"; + version = "0.2.1"; - src = fetchHex { - pkg = "bunt"; - version = "${version}"; - sha256 = "a330bfb4245239787b15005e66ae6845c9cd524a288f0d141c148b02603777a5"; + src = fetchHex { + pkg = "bunt"; + version = "${version}"; + sha256 = "a330bfb4245239787b15005e66ae6845c9cd524a288f0d141c148b02603777a5"; + }; + + beamDeps = [ ]; }; - beamDeps = []; - }; + castore = buildMix rec { + name = "castore"; + version = "1.0.4"; - castore = buildMix rec { - name = "castore"; - version = "1.0.4"; + src = fetchHex { + pkg = "castore"; + version = "${version}"; + sha256 = "9418c1b8144e11656f0be99943db4caf04612e3eaecefb5dae9a2a87565584f8"; + }; - src = fetchHex { - pkg = "castore"; - version = "${version}"; - sha256 = "9418c1b8144e11656f0be99943db4caf04612e3eaecefb5dae9a2a87565584f8"; + beamDeps = [ ]; }; - beamDeps = []; - }; + certifi = buildRebar3 rec { + name = "certifi"; + version = "2.12.0"; - certifi = buildRebar3 rec { - name = "certifi"; - version = "2.12.0"; + src = fetchHex { + pkg = "certifi"; + version = "${version}"; + sha256 = "ee68d85df22e554040cdb4be100f33873ac6051387baf6a8f6ce82272340ff1c"; + }; - src = fetchHex { - pkg = "certifi"; - version = "${version}"; - sha256 = "ee68d85df22e554040cdb4be100f33873ac6051387baf6a8f6ce82272340ff1c"; + beamDeps = [ ]; }; - beamDeps = []; - }; + cldr_utils = buildMix rec { + name = "cldr_utils"; + version = "2.24.2"; - cldr_utils = buildMix rec { - name = "cldr_utils"; - version = "2.24.2"; + src = fetchHex { + pkg = "cldr_utils"; + version = "${version}"; + sha256 = "3362b838836a9f0fa309de09a7127e36e67310e797d556db92f71b548832c7cf"; + }; - src = fetchHex { - pkg = "cldr_utils"; - version = "${version}"; - sha256 = "3362b838836a9f0fa309de09a7127e36e67310e797d556db92f71b548832c7cf"; + beamDeps = [ + castore + certifi + decimal + ]; }; - beamDeps = [ castore certifi decimal ]; - }; + cloak = buildMix rec { + name = "cloak"; + version = "1.1.2"; - cloak = buildMix rec { - name = "cloak"; - version = "1.1.2"; + src = fetchHex { + pkg = "cloak"; + version = "${version}"; + sha256 = "940d5ac4fcd51b252930fd112e319ea5ae6ab540b722f3ca60a85666759b9585"; + }; - src = fetchHex { - pkg = "cloak"; - version = "${version}"; - sha256 = "940d5ac4fcd51b252930fd112e319ea5ae6ab540b722f3ca60a85666759b9585"; + beamDeps = [ jason ]; }; - beamDeps = [ jason ]; - }; + cloak_ecto = buildMix rec { + name = "cloak_ecto"; + version = "1.2.0"; - cloak_ecto = buildMix rec { - name = "cloak_ecto"; - version = "1.2.0"; + src = fetchHex { + pkg = "cloak_ecto"; + version = "${version}"; + sha256 = "8bcc677185c813fe64b786618bd6689b1707b35cd95acaae0834557b15a0c62f"; + }; - src = fetchHex { - pkg = "cloak_ecto"; - version = "${version}"; - sha256 = "8bcc677185c813fe64b786618bd6689b1707b35cd95acaae0834557b15a0c62f"; + beamDeps = [ + cloak + ecto + ]; }; - beamDeps = [ cloak ecto ]; - }; + combine = buildMix rec { + name = "combine"; + version = "0.10.0"; - combine = buildMix rec { - name = "combine"; - version = "0.10.0"; + src = fetchHex { + pkg = "combine"; + version = "${version}"; + sha256 = "1b1dbc1790073076580d0d1d64e42eae2366583e7aecd455d1215b0d16f2451b"; + }; - src = fetchHex { - pkg = "combine"; - version = "${version}"; - sha256 = "1b1dbc1790073076580d0d1d64e42eae2366583e7aecd455d1215b0d16f2451b"; + beamDeps = [ ]; }; - beamDeps = []; - }; + cowboy = buildErlangMk rec { + name = "cowboy"; + version = "2.10.0"; - cowboy = buildErlangMk rec { - name = "cowboy"; - version = "2.10.0"; + src = fetchHex { + pkg = "cowboy"; + version = "${version}"; + sha256 = "3afdccb7183cc6f143cb14d3cf51fa00e53db9ec80cdcd525482f5e99bc41d6b"; + }; - src = fetchHex { - pkg = "cowboy"; - version = "${version}"; - sha256 = "3afdccb7183cc6f143cb14d3cf51fa00e53db9ec80cdcd525482f5e99bc41d6b"; + beamDeps = [ + cowlib + ranch + ]; }; - beamDeps = [ cowlib ranch ]; - }; + cowboy_telemetry = buildRebar3 rec { + name = "cowboy_telemetry"; + version = "0.4.0"; - cowboy_telemetry = buildRebar3 rec { - name = "cowboy_telemetry"; - version = "0.4.0"; + src = fetchHex { + pkg = "cowboy_telemetry"; + version = "${version}"; + sha256 = "7d98bac1ee4565d31b62d59f8823dfd8356a169e7fcbb83831b8a5397404c9de"; + }; - src = fetchHex { - pkg = "cowboy_telemetry"; - version = "${version}"; - sha256 = "7d98bac1ee4565d31b62d59f8823dfd8356a169e7fcbb83831b8a5397404c9de"; + beamDeps = [ + cowboy + telemetry + ]; }; - beamDeps = [ cowboy telemetry ]; - }; + cowlib = buildRebar3 rec { + name = "cowlib"; + version = "2.12.1"; - cowlib = buildRebar3 rec { - name = "cowlib"; - version = "2.12.1"; + src = fetchHex { + pkg = "cowlib"; + version = "${version}"; + sha256 = "163b73f6367a7341b33c794c4e88e7dbfe6498ac42dcd69ef44c5bc5507c8db0"; + }; - src = fetchHex { - pkg = "cowlib"; - version = "${version}"; - sha256 = "163b73f6367a7341b33c794c4e88e7dbfe6498ac42dcd69ef44c5bc5507c8db0"; + beamDeps = [ ]; }; - beamDeps = []; - }; + credo = buildMix rec { + name = "credo"; + version = "1.7.1"; - credo = buildMix rec { - name = "credo"; - version = "1.7.1"; + src = fetchHex { + pkg = "credo"; + version = "${version}"; + sha256 = "e9871c6095a4c0381c89b6aa98bc6260a8ba6addccf7f6a53da8849c748a58a2"; + }; - src = fetchHex { - pkg = "credo"; - version = "${version}"; - sha256 = "e9871c6095a4c0381c89b6aa98bc6260a8ba6addccf7f6a53da8849c748a58a2"; + beamDeps = [ + bunt + file_system + jason + ]; }; - beamDeps = [ bunt file_system jason ]; - }; + db_connection = buildMix rec { + name = "db_connection"; + version = "2.6.0"; - db_connection = buildMix rec { - name = "db_connection"; - version = "2.6.0"; + src = fetchHex { + pkg = "db_connection"; + version = "${version}"; + sha256 = "c2f992d15725e721ec7fbc1189d4ecdb8afef76648c746a8e1cad35e3b8a35f3"; + }; - src = fetchHex { - pkg = "db_connection"; - version = "${version}"; - sha256 = "c2f992d15725e721ec7fbc1189d4ecdb8afef76648c746a8e1cad35e3b8a35f3"; + beamDeps = [ telemetry ]; }; - beamDeps = [ telemetry ]; - }; + decimal = buildMix rec { + name = "decimal"; + version = "2.1.1"; - decimal = buildMix rec { - name = "decimal"; - version = "2.1.1"; + src = fetchHex { + pkg = "decimal"; + version = "${version}"; + sha256 = "53cfe5f497ed0e7771ae1a475575603d77425099ba5faef9394932b35020ffcc"; + }; - src = fetchHex { - pkg = "decimal"; - version = "${version}"; - sha256 = "53cfe5f497ed0e7771ae1a475575603d77425099ba5faef9394932b35020ffcc"; + beamDeps = [ ]; }; - beamDeps = []; - }; + dialyxir = buildMix rec { + name = "dialyxir"; + version = "1.4.2"; - dialyxir = buildMix rec { - name = "dialyxir"; - version = "1.4.2"; + src = fetchHex { + pkg = "dialyxir"; + version = "${version}"; + sha256 = "516603d8067b2fd585319e4b13d3674ad4f314a5902ba8130cd97dc902ce6bbd"; + }; - src = fetchHex { - pkg = "dialyxir"; - version = "${version}"; - sha256 = "516603d8067b2fd585319e4b13d3674ad4f314a5902ba8130cd97dc902ce6bbd"; + beamDeps = [ erlex ]; }; - beamDeps = [ erlex ]; - }; + ecto = buildMix rec { + name = "ecto"; + version = "3.10.3"; - ecto = buildMix rec { - name = "ecto"; - version = "3.10.3"; + src = fetchHex { + pkg = "ecto"; + version = "${version}"; + sha256 = "44bec74e2364d491d70f7e42cd0d690922659d329f6465e89feb8a34e8cd3433"; + }; - src = fetchHex { - pkg = "ecto"; - version = "${version}"; - sha256 = "44bec74e2364d491d70f7e42cd0d690922659d329f6465e89feb8a34e8cd3433"; + beamDeps = [ + decimal + jason + telemetry + ]; }; - beamDeps = [ decimal jason telemetry ]; - }; + ecto_sql = buildMix rec { + name = "ecto_sql"; + version = "3.10.2"; - ecto_sql = buildMix rec { - name = "ecto_sql"; - version = "3.10.2"; + src = fetchHex { + pkg = "ecto_sql"; + version = "${version}"; + sha256 = "68c018debca57cb9235e3889affdaec7a10616a4e3a80c99fa1d01fdafaa9007"; + }; - src = fetchHex { - pkg = "ecto_sql"; - version = "${version}"; - sha256 = "68c018debca57cb9235e3889affdaec7a10616a4e3a80c99fa1d01fdafaa9007"; + beamDeps = [ + db_connection + ecto + postgrex + telemetry + ]; }; - beamDeps = [ db_connection ecto postgrex telemetry ]; - }; + erlex = buildMix rec { + name = "erlex"; + version = "0.2.6"; - erlex = buildMix rec { - name = "erlex"; - version = "0.2.6"; + src = fetchHex { + pkg = "erlex"; + version = "${version}"; + sha256 = "2ed2e25711feb44d52b17d2780eabf998452f6efda104877a3881c2f8c0c0c75"; + }; - src = fetchHex { - pkg = "erlex"; - version = "${version}"; - sha256 = "2ed2e25711feb44d52b17d2780eabf998452f6efda104877a3881c2f8c0c0c75"; + beamDeps = [ ]; }; - beamDeps = []; - }; + ex_cldr = buildMix rec { + name = "ex_cldr"; + version = "2.37.5"; - ex_cldr = buildMix rec { - name = "ex_cldr"; - version = "2.37.5"; + src = fetchHex { + pkg = "ex_cldr"; + version = "${version}"; + sha256 = "74ad5ddff791112ce4156382e171a5f5d3766af9d5c4675e0571f081fe136479"; + }; - src = fetchHex { - pkg = "ex_cldr"; - version = "${version}"; - sha256 = "74ad5ddff791112ce4156382e171a5f5d3766af9d5c4675e0571f081fe136479"; + beamDeps = [ + cldr_utils + decimal + gettext + jason + ]; }; - beamDeps = [ cldr_utils decimal gettext jason ]; - }; + ex_cldr_plugs = buildMix rec { + name = "ex_cldr_plugs"; + version = "1.3.1"; - ex_cldr_plugs = buildMix rec { - name = "ex_cldr_plugs"; - version = "1.3.1"; + src = fetchHex { + pkg = "ex_cldr_plugs"; + version = "${version}"; + sha256 = "4f7b4a5fe061734cef7b62ff29118ed6ac72698cdd7bcfc97495db73611fe0fe"; + }; - src = fetchHex { - pkg = "ex_cldr_plugs"; - version = "${version}"; - sha256 = "4f7b4a5fe061734cef7b62ff29118ed6ac72698cdd7bcfc97495db73611fe0fe"; + beamDeps = [ + ex_cldr + gettext + jason + plug + ]; }; - beamDeps = [ ex_cldr gettext jason plug ]; - }; + excoveralls = buildMix rec { + name = "excoveralls"; + version = "0.18.0"; - excoveralls = buildMix rec { - name = "excoveralls"; - version = "0.18.0"; + src = fetchHex { + pkg = "excoveralls"; + version = "${version}"; + sha256 = "1109bb911f3cb583401760be49c02cbbd16aed66ea9509fc5479335d284da60b"; + }; - src = fetchHex { - pkg = "excoveralls"; - version = "${version}"; - sha256 = "1109bb911f3cb583401760be49c02cbbd16aed66ea9509fc5479335d284da60b"; + beamDeps = [ + castore + jason + ]; }; - beamDeps = [ castore jason ]; - }; + expo = buildMix rec { + name = "expo"; + version = "0.4.1"; - expo = buildMix rec { - name = "expo"; - version = "0.4.1"; + src = fetchHex { + pkg = "expo"; + version = "${version}"; + sha256 = "2ff7ba7a798c8c543c12550fa0e2cbc81b95d4974c65855d8d15ba7b37a1ce47"; + }; - src = fetchHex { - pkg = "expo"; - version = "${version}"; - sha256 = "2ff7ba7a798c8c543c12550fa0e2cbc81b95d4974c65855d8d15ba7b37a1ce47"; + beamDeps = [ ]; }; - beamDeps = []; - }; + file_system = buildMix rec { + name = "file_system"; + version = "0.2.10"; - file_system = buildMix rec { - name = "file_system"; - version = "0.2.10"; + src = fetchHex { + pkg = "file_system"; + version = "${version}"; + sha256 = "41195edbfb562a593726eda3b3e8b103a309b733ad25f3d642ba49696bf715dc"; + }; - src = fetchHex { - pkg = "file_system"; - version = "${version}"; - sha256 = "41195edbfb562a593726eda3b3e8b103a309b733ad25f3d642ba49696bf715dc"; + beamDeps = [ ]; }; - beamDeps = []; - }; + finch = buildMix rec { + name = "finch"; + version = "0.16.0"; - finch = buildMix rec { - name = "finch"; - version = "0.16.0"; + src = fetchHex { + pkg = "finch"; + version = "${version}"; + sha256 = "f660174c4d519e5fec629016054d60edd822cdfe2b7270836739ac2f97735ec5"; + }; - src = fetchHex { - pkg = "finch"; - version = "${version}"; - sha256 = "f660174c4d519e5fec629016054d60edd822cdfe2b7270836739ac2f97735ec5"; + beamDeps = [ + castore + mime + mint + nimble_options + nimble_pool + telemetry + ]; }; - beamDeps = [ castore mime mint nimble_options nimble_pool telemetry ]; - }; + floki = buildMix rec { + name = "floki"; + version = "0.35.2"; - floki = buildMix rec { - name = "floki"; - version = "0.35.2"; + src = fetchHex { + pkg = "floki"; + version = "${version}"; + sha256 = "6b05289a8e9eac475f644f09c2e4ba7e19201fd002b89c28c1293e7bd16773d9"; + }; - src = fetchHex { - pkg = "floki"; - version = "${version}"; - sha256 = "6b05289a8e9eac475f644f09c2e4ba7e19201fd002b89c28c1293e7bd16773d9"; + beamDeps = [ ]; }; - beamDeps = []; - }; + fuse = buildRebar3 rec { + name = "fuse"; + version = "2.5.0"; - fuse = buildRebar3 rec { - name = "fuse"; - version = "2.5.0"; + src = fetchHex { + pkg = "fuse"; + version = "${version}"; + sha256 = "7f52a1c84571731ad3c91d569e03131cc220ebaa7e2a11034405f0bac46a4fef"; + }; - src = fetchHex { - pkg = "fuse"; - version = "${version}"; - sha256 = "7f52a1c84571731ad3c91d569e03131cc220ebaa7e2a11034405f0bac46a4fef"; + beamDeps = [ ]; }; - beamDeps = []; - }; + gen_state_machine = buildMix rec { + name = "gen_state_machine"; + version = "3.0.0"; - gen_state_machine = buildMix rec { - name = "gen_state_machine"; - version = "3.0.0"; + src = fetchHex { + pkg = "gen_state_machine"; + version = "${version}"; + sha256 = "0a59652574bebceb7309f6b749d2a41b45fdeda8dbb4da0791e355dd19f0ed15"; + }; - src = fetchHex { - pkg = "gen_state_machine"; - version = "${version}"; - sha256 = "0a59652574bebceb7309f6b749d2a41b45fdeda8dbb4da0791e355dd19f0ed15"; + beamDeps = [ ]; }; - beamDeps = []; - }; + gettext = buildMix rec { + name = "gettext"; + version = "0.23.1"; - gettext = buildMix rec { - name = "gettext"; - version = "0.23.1"; + src = fetchHex { + pkg = "gettext"; + version = "${version}"; + sha256 = "19d744a36b809d810d610b57c27b934425859d158ebd56561bc41f7eeb8795db"; + }; - src = fetchHex { - pkg = "gettext"; - version = "${version}"; - sha256 = "19d744a36b809d810d610b57c27b934425859d158ebd56561bc41f7eeb8795db"; + beamDeps = [ expo ]; }; - beamDeps = [ expo ]; - }; + hackney = buildRebar3 rec { + name = "hackney"; + version = "1.20.1"; - hackney = buildRebar3 rec { - name = "hackney"; - version = "1.20.1"; + src = fetchHex { + pkg = "hackney"; + version = "${version}"; + sha256 = "fe9094e5f1a2a2c0a7d10918fee36bfec0ec2a979994cff8cfe8058cd9af38e3"; + }; - src = fetchHex { - pkg = "hackney"; - version = "${version}"; - sha256 = "fe9094e5f1a2a2c0a7d10918fee36bfec0ec2a979994cff8cfe8058cd9af38e3"; + beamDeps = [ + certifi + idna + metrics + mimerl + parse_trans + ssl_verify_fun + unicode_util_compat + ]; }; - beamDeps = [ certifi idna metrics mimerl parse_trans ssl_verify_fun unicode_util_compat ]; - }; + hpax = buildMix rec { + name = "hpax"; + version = "0.1.2"; - hpax = buildMix rec { - name = "hpax"; - version = "0.1.2"; + src = fetchHex { + pkg = "hpax"; + version = "${version}"; + sha256 = "2c87843d5a23f5f16748ebe77969880e29809580efdaccd615cd3bed628a8c13"; + }; - src = fetchHex { - pkg = "hpax"; - version = "${version}"; - sha256 = "2c87843d5a23f5f16748ebe77969880e29809580efdaccd615cd3bed628a8c13"; + beamDeps = [ ]; }; - beamDeps = []; - }; + idna = buildRebar3 rec { + name = "idna"; + version = "6.1.1"; - idna = buildRebar3 rec { - name = "idna"; - version = "6.1.1"; + src = fetchHex { + pkg = "idna"; + version = "${version}"; + sha256 = "92376eb7894412ed19ac475e4a86f7b413c1b9fbb5bd16dccd57934157944cea"; + }; - src = fetchHex { - pkg = "idna"; - version = "${version}"; - sha256 = "92376eb7894412ed19ac475e4a86f7b413c1b9fbb5bd16dccd57934157944cea"; + beamDeps = [ unicode_util_compat ]; }; - beamDeps = [ unicode_util_compat ]; - }; + jason = buildMix rec { + name = "jason"; + version = "1.4.1"; - jason = buildMix rec { - name = "jason"; - version = "1.4.1"; + src = fetchHex { + pkg = "jason"; + version = "${version}"; + sha256 = "fbb01ecdfd565b56261302f7e1fcc27c4fb8f32d56eab74db621fc154604a7a1"; + }; - src = fetchHex { - pkg = "jason"; - version = "${version}"; - sha256 = "fbb01ecdfd565b56261302f7e1fcc27c4fb8f32d56eab74db621fc154604a7a1"; + beamDeps = [ decimal ]; }; - beamDeps = [ decimal ]; - }; + meck = buildRebar3 rec { + name = "meck"; + version = "0.9.2"; - meck = buildRebar3 rec { - name = "meck"; - version = "0.9.2"; + src = fetchHex { + pkg = "meck"; + version = "${version}"; + sha256 = "81344f561357dc40a8344afa53767c32669153355b626ea9fcbc8da6b3045826"; + }; - src = fetchHex { - pkg = "meck"; - version = "${version}"; - sha256 = "81344f561357dc40a8344afa53767c32669153355b626ea9fcbc8da6b3045826"; + beamDeps = [ ]; }; - beamDeps = []; - }; + metrics = buildRebar3 rec { + name = "metrics"; + version = "1.0.1"; - metrics = buildRebar3 rec { - name = "metrics"; - version = "1.0.1"; + src = fetchHex { + pkg = "metrics"; + version = "${version}"; + sha256 = "69b09adddc4f74a40716ae54d140f93beb0fb8978d8636eaded0c31b6f099f16"; + }; - src = fetchHex { - pkg = "metrics"; - version = "${version}"; - sha256 = "69b09adddc4f74a40716ae54d140f93beb0fb8978d8636eaded0c31b6f099f16"; + beamDeps = [ ]; }; - beamDeps = []; - }; + mime = buildMix rec { + name = "mime"; + version = "2.0.5"; - mime = buildMix rec { - name = "mime"; - version = "2.0.5"; + src = fetchHex { + pkg = "mime"; + version = "${version}"; + sha256 = "da0d64a365c45bc9935cc5c8a7fc5e49a0e0f9932a761c55d6c52b142780a05c"; + }; - src = fetchHex { - pkg = "mime"; - version = "${version}"; - sha256 = "da0d64a365c45bc9935cc5c8a7fc5e49a0e0f9932a761c55d6c52b142780a05c"; + beamDeps = [ ]; }; - beamDeps = []; - }; + mimerl = buildRebar3 rec { + name = "mimerl"; + version = "1.2.0"; - mimerl = buildRebar3 rec { - name = "mimerl"; - version = "1.2.0"; + src = fetchHex { + pkg = "mimerl"; + version = "${version}"; + sha256 = "f278585650aa581986264638ebf698f8bb19df297f66ad91b18910dfc6e19323"; + }; - src = fetchHex { - pkg = "mimerl"; - version = "${version}"; - sha256 = "f278585650aa581986264638ebf698f8bb19df297f66ad91b18910dfc6e19323"; + beamDeps = [ ]; }; - beamDeps = []; - }; + mint = buildMix rec { + name = "mint"; + version = "1.5.1"; - mint = buildMix rec { - name = "mint"; - version = "1.5.1"; + src = fetchHex { + pkg = "mint"; + version = "${version}"; + sha256 = "4a63e1e76a7c3956abd2c72f370a0d0aecddc3976dea5c27eccbecfa5e7d5b1e"; + }; - src = fetchHex { - pkg = "mint"; - version = "${version}"; - sha256 = "4a63e1e76a7c3956abd2c72f370a0d0aecddc3976dea5c27eccbecfa5e7d5b1e"; + beamDeps = [ + castore + hpax + ]; }; - beamDeps = [ castore hpax ]; - }; + mock = buildMix rec { + name = "mock"; + version = "0.3.8"; - mock = buildMix rec { - name = "mock"; - version = "0.3.8"; + src = fetchHex { + pkg = "mock"; + version = "${version}"; + sha256 = "7fa82364c97617d79bb7d15571193fc0c4fe5afd0c932cef09426b3ee6fe2022"; + }; - src = fetchHex { - pkg = "mock"; - version = "${version}"; - sha256 = "7fa82364c97617d79bb7d15571193fc0c4fe5afd0c932cef09426b3ee6fe2022"; + beamDeps = [ meck ]; }; - beamDeps = [ meck ]; - }; + nimble_csv = buildMix rec { + name = "nimble_csv"; + version = "1.2.0"; - nimble_csv = buildMix rec { - name = "nimble_csv"; - version = "1.2.0"; + src = fetchHex { + pkg = "nimble_csv"; + version = "${version}"; + sha256 = "d0628117fcc2148178b034044c55359b26966c6eaa8e2ce15777be3bbc91b12a"; + }; - src = fetchHex { - pkg = "nimble_csv"; - version = "${version}"; - sha256 = "d0628117fcc2148178b034044c55359b26966c6eaa8e2ce15777be3bbc91b12a"; + beamDeps = [ ]; }; - beamDeps = []; - }; + nimble_options = buildMix rec { + name = "nimble_options"; + version = "1.0.2"; - nimble_options = buildMix rec { - name = "nimble_options"; - version = "1.0.2"; + src = fetchHex { + pkg = "nimble_options"; + version = "${version}"; + sha256 = "fd12a8db2021036ce12a309f26f564ec367373265b53e25403f0ee697380f1b8"; + }; - src = fetchHex { - pkg = "nimble_options"; - version = "${version}"; - sha256 = "fd12a8db2021036ce12a309f26f564ec367373265b53e25403f0ee697380f1b8"; + beamDeps = [ ]; }; - beamDeps = []; - }; + nimble_pool = buildMix rec { + name = "nimble_pool"; + version = "1.0.0"; - nimble_pool = buildMix rec { - name = "nimble_pool"; - version = "1.0.0"; + src = fetchHex { + pkg = "nimble_pool"; + version = "${version}"; + sha256 = "80be3b882d2d351882256087078e1b1952a28bf98d0a287be87e4a24a710b67a"; + }; - src = fetchHex { - pkg = "nimble_pool"; - version = "${version}"; - sha256 = "80be3b882d2d351882256087078e1b1952a28bf98d0a287be87e4a24a710b67a"; + beamDeps = [ ]; }; - beamDeps = []; - }; + parse_trans = buildRebar3 rec { + name = "parse_trans"; + version = "3.4.1"; - parse_trans = buildRebar3 rec { - name = "parse_trans"; - version = "3.4.1"; + src = fetchHex { + pkg = "parse_trans"; + version = "${version}"; + sha256 = "620a406ce75dada827b82e453c19cf06776be266f5a67cff34e1ef2cbb60e49a"; + }; - src = fetchHex { - pkg = "parse_trans"; - version = "${version}"; - sha256 = "620a406ce75dada827b82e453c19cf06776be266f5a67cff34e1ef2cbb60e49a"; + beamDeps = [ ]; }; - beamDeps = []; - }; + phoenix = buildMix rec { + name = "phoenix"; + version = "1.6.16"; - phoenix = buildMix rec { - name = "phoenix"; - version = "1.6.16"; + src = fetchHex { + pkg = "phoenix"; + version = "${version}"; + sha256 = "e15989ff34f670a96b95ef6d1d25bad0d9c50df5df40b671d8f4a669e050ac39"; + }; - src = fetchHex { - pkg = "phoenix"; - version = "${version}"; - sha256 = "e15989ff34f670a96b95ef6d1d25bad0d9c50df5df40b671d8f4a669e050ac39"; + beamDeps = [ + castore + jason + phoenix_pubsub + phoenix_view + plug + plug_cowboy + plug_crypto + telemetry + ]; }; - beamDeps = [ castore jason phoenix_pubsub phoenix_view plug plug_cowboy plug_crypto telemetry ]; - }; + phoenix_ecto = buildMix rec { + name = "phoenix_ecto"; + version = "4.4.3"; - phoenix_ecto = buildMix rec { - name = "phoenix_ecto"; - version = "4.4.3"; + src = fetchHex { + pkg = "phoenix_ecto"; + version = "${version}"; + sha256 = "d36c401206f3011fefd63d04e8ef626ec8791975d9d107f9a0817d426f61ac07"; + }; - src = fetchHex { - pkg = "phoenix_ecto"; - version = "${version}"; - sha256 = "d36c401206f3011fefd63d04e8ef626ec8791975d9d107f9a0817d426f61ac07"; + beamDeps = [ + ecto + phoenix_html + plug + ]; }; - beamDeps = [ ecto phoenix_html plug ]; - }; + phoenix_html = buildMix rec { + name = "phoenix_html"; + version = "3.3.3"; - phoenix_html = buildMix rec { - name = "phoenix_html"; - version = "3.3.3"; + src = fetchHex { + pkg = "phoenix_html"; + version = "${version}"; + sha256 = "923ebe6fec6e2e3b3e569dfbdc6560de932cd54b000ada0208b5f45024bdd76c"; + }; - src = fetchHex { - pkg = "phoenix_html"; - version = "${version}"; - sha256 = "923ebe6fec6e2e3b3e569dfbdc6560de932cd54b000ada0208b5f45024bdd76c"; + beamDeps = [ plug ]; }; - beamDeps = [ plug ]; - }; + phoenix_live_reload = buildMix rec { + name = "phoenix_live_reload"; + version = "1.4.1"; - phoenix_live_reload = buildMix rec { - name = "phoenix_live_reload"; - version = "1.4.1"; + src = fetchHex { + pkg = "phoenix_live_reload"; + version = "${version}"; + sha256 = "9bffb834e7ddf08467fe54ae58b5785507aaba6255568ae22b4d46e2bb3615ab"; + }; - src = fetchHex { - pkg = "phoenix_live_reload"; - version = "${version}"; - sha256 = "9bffb834e7ddf08467fe54ae58b5785507aaba6255568ae22b4d46e2bb3615ab"; + beamDeps = [ + file_system + phoenix + ]; }; - beamDeps = [ file_system phoenix ]; - }; + phoenix_live_view = buildMix rec { + name = "phoenix_live_view"; + version = "0.17.14"; - phoenix_live_view = buildMix rec { - name = "phoenix_live_view"; - version = "0.17.14"; + src = fetchHex { + pkg = "phoenix_live_view"; + version = "${version}"; + sha256 = "afeb6ba43ce329a6f7fc1c9acdfc6d3039995345f025febb7f409a92f6faebd3"; + }; - src = fetchHex { - pkg = "phoenix_live_view"; - version = "${version}"; - sha256 = "afeb6ba43ce329a6f7fc1c9acdfc6d3039995345f025febb7f409a92f6faebd3"; + beamDeps = [ + jason + phoenix + phoenix_html + telemetry + ]; }; - beamDeps = [ jason phoenix phoenix_html telemetry ]; - }; + phoenix_pubsub = buildMix rec { + name = "phoenix_pubsub"; + version = "2.1.3"; - phoenix_pubsub = buildMix rec { - name = "phoenix_pubsub"; - version = "2.1.3"; + src = fetchHex { + pkg = "phoenix_pubsub"; + version = "${version}"; + sha256 = "bba06bc1dcfd8cb086759f0edc94a8ba2bc8896d5331a1e2c2902bf8e36ee502"; + }; - src = fetchHex { - pkg = "phoenix_pubsub"; - version = "${version}"; - sha256 = "bba06bc1dcfd8cb086759f0edc94a8ba2bc8896d5331a1e2c2902bf8e36ee502"; + beamDeps = [ ]; }; - beamDeps = []; - }; + phoenix_template = buildMix rec { + name = "phoenix_template"; + version = "1.0.3"; - phoenix_template = buildMix rec { - name = "phoenix_template"; - version = "1.0.3"; + src = fetchHex { + pkg = "phoenix_template"; + version = "${version}"; + sha256 = "16f4b6588a4152f3cc057b9d0c0ba7e82ee23afa65543da535313ad8d25d8e2c"; + }; - src = fetchHex { - pkg = "phoenix_template"; - version = "${version}"; - sha256 = "16f4b6588a4152f3cc057b9d0c0ba7e82ee23afa65543da535313ad8d25d8e2c"; + beamDeps = [ phoenix_html ]; }; - beamDeps = [ phoenix_html ]; - }; + phoenix_view = buildMix rec { + name = "phoenix_view"; + version = "2.0.3"; - phoenix_view = buildMix rec { - name = "phoenix_view"; - version = "2.0.3"; + src = fetchHex { + pkg = "phoenix_view"; + version = "${version}"; + sha256 = "cd34049af41be2c627df99cd4eaa71fc52a328c0c3d8e7d4aa28f880c30e7f64"; + }; - src = fetchHex { - pkg = "phoenix_view"; - version = "${version}"; - sha256 = "cd34049af41be2c627df99cd4eaa71fc52a328c0c3d8e7d4aa28f880c30e7f64"; + beamDeps = [ + phoenix_html + phoenix_template + ]; }; - beamDeps = [ phoenix_html phoenix_template ]; - }; + plug = buildMix rec { + name = "plug"; + version = "1.15.1"; - plug = buildMix rec { - name = "plug"; - version = "1.15.1"; + src = fetchHex { + pkg = "plug"; + version = "${version}"; + sha256 = "459497bd94d041d98d948054ec6c0b76feacd28eec38b219ca04c0de13c79d30"; + }; - src = fetchHex { - pkg = "plug"; - version = "${version}"; - sha256 = "459497bd94d041d98d948054ec6c0b76feacd28eec38b219ca04c0de13c79d30"; + beamDeps = [ + mime + plug_crypto + telemetry + ]; }; - beamDeps = [ mime plug_crypto telemetry ]; - }; + plug_cowboy = buildMix rec { + name = "plug_cowboy"; + version = "2.6.1"; - plug_cowboy = buildMix rec { - name = "plug_cowboy"; - version = "2.6.1"; + src = fetchHex { + pkg = "plug_cowboy"; + version = "${version}"; + sha256 = "de36e1a21f451a18b790f37765db198075c25875c64834bcc82d90b309eb6613"; + }; - src = fetchHex { - pkg = "plug_cowboy"; - version = "${version}"; - sha256 = "de36e1a21f451a18b790f37765db198075c25875c64834bcc82d90b309eb6613"; + beamDeps = [ + cowboy + cowboy_telemetry + plug + ]; }; - beamDeps = [ cowboy cowboy_telemetry plug ]; - }; + plug_crypto = buildMix rec { + name = "plug_crypto"; + version = "1.2.5"; - plug_crypto = buildMix rec { - name = "plug_crypto"; - version = "1.2.5"; + src = fetchHex { + pkg = "plug_crypto"; + version = "${version}"; + sha256 = "26549a1d6345e2172eb1c233866756ae44a9609bd33ee6f99147ab3fd87fd842"; + }; - src = fetchHex { - pkg = "plug_crypto"; - version = "${version}"; - sha256 = "26549a1d6345e2172eb1c233866756ae44a9609bd33ee6f99147ab3fd87fd842"; + beamDeps = [ ]; }; - beamDeps = []; - }; + postgrex = buildMix rec { + name = "postgrex"; + version = "0.17.3"; - postgrex = buildMix rec { - name = "postgrex"; - version = "0.17.3"; + src = fetchHex { + pkg = "postgrex"; + version = "${version}"; + sha256 = "946cf46935a4fdca7a81448be76ba3503cff082df42c6ec1ff16a4bdfbfb098d"; + }; - src = fetchHex { - pkg = "postgrex"; - version = "${version}"; - sha256 = "946cf46935a4fdca7a81448be76ba3503cff082df42c6ec1ff16a4bdfbfb098d"; + beamDeps = [ + db_connection + decimal + jason + ]; }; - beamDeps = [ db_connection decimal jason ]; - }; + ranch = buildRebar3 rec { + name = "ranch"; + version = "1.8.0"; - ranch = buildRebar3 rec { - name = "ranch"; - version = "1.8.0"; + src = fetchHex { + pkg = "ranch"; + version = "${version}"; + sha256 = "49fbcfd3682fab1f5d109351b61257676da1a2fdbe295904176d5e521a2ddfe5"; + }; - src = fetchHex { - pkg = "ranch"; - version = "${version}"; - sha256 = "49fbcfd3682fab1f5d109351b61257676da1a2fdbe295904176d5e521a2ddfe5"; + beamDeps = [ ]; }; - beamDeps = []; - }; + srtm = buildMix rec { + name = "srtm"; + version = "0.8.0"; - srtm = buildMix rec { - name = "srtm"; - version = "0.8.0"; + src = fetchHex { + pkg = "srtm"; + version = "${version}"; + sha256 = "7ec2a2ced7c3c0c1bdcfca67ce4d466d77e66cf52589f546c91b96b4c79b6923"; + }; - src = fetchHex { - pkg = "srtm"; - version = "${version}"; - sha256 = "7ec2a2ced7c3c0c1bdcfca67ce4d466d77e66cf52589f546c91b96b4c79b6923"; + beamDeps = [ castore ]; }; - beamDeps = [ castore ]; - }; + ssl_verify_fun = buildRebar3 rec { + name = "ssl_verify_fun"; + version = "1.1.7"; - ssl_verify_fun = buildRebar3 rec { - name = "ssl_verify_fun"; - version = "1.1.7"; + src = fetchHex { + pkg = "ssl_verify_fun"; + version = "${version}"; + sha256 = "fe4c190e8f37401d30167c8c405eda19469f34577987c76dde613e838bbc67f8"; + }; - src = fetchHex { - pkg = "ssl_verify_fun"; - version = "${version}"; - sha256 = "fe4c190e8f37401d30167c8c405eda19469f34577987c76dde613e838bbc67f8"; + beamDeps = [ ]; }; - beamDeps = []; - }; + telemetry = buildRebar3 rec { + name = "telemetry"; + version = "1.2.1"; - telemetry = buildRebar3 rec { - name = "telemetry"; - version = "1.2.1"; + src = fetchHex { + pkg = "telemetry"; + version = "${version}"; + sha256 = "dad9ce9d8effc621708f99eac538ef1cbe05d6a874dd741de2e689c47feafed5"; + }; - src = fetchHex { - pkg = "telemetry"; - version = "${version}"; - sha256 = "dad9ce9d8effc621708f99eac538ef1cbe05d6a874dd741de2e689c47feafed5"; + beamDeps = [ ]; }; - beamDeps = []; - }; + tesla = buildMix rec { + name = "tesla"; + version = "1.8.0"; - tesla = buildMix rec { - name = "tesla"; - version = "1.8.0"; + src = fetchHex { + pkg = "tesla"; + version = "${version}"; + sha256 = "10501f360cd926a309501287470372af1a6e1cbed0f43949203a4c13300bc79f"; + }; - src = fetchHex { - pkg = "tesla"; - version = "${version}"; - sha256 = "10501f360cd926a309501287470372af1a6e1cbed0f43949203a4c13300bc79f"; + beamDeps = [ + castore + finch + fuse + hackney + jason + mime + mint + telemetry + ]; }; - beamDeps = [ castore finch fuse hackney jason mime mint telemetry ]; - }; + timex = buildMix rec { + name = "timex"; + version = "3.7.11"; - timex = buildMix rec { - name = "timex"; - version = "3.7.11"; + src = fetchHex { + pkg = "timex"; + version = "${version}"; + sha256 = "8b9024f7efbabaf9bd7aa04f65cf8dcd7c9818ca5737677c7b76acbc6a94d1aa"; + }; - src = fetchHex { - pkg = "timex"; - version = "${version}"; - sha256 = "8b9024f7efbabaf9bd7aa04f65cf8dcd7c9818ca5737677c7b76acbc6a94d1aa"; + beamDeps = [ + combine + gettext + tzdata + ]; }; - beamDeps = [ combine gettext tzdata ]; - }; + tortoise = buildMix rec { + name = "tortoise"; + version = "0.10.0"; - tortoise = buildMix rec { - name = "tortoise"; - version = "0.10.0"; + src = fetchHex { + pkg = "tortoise"; + version = "${version}"; + sha256 = "926d97b03cd0d2f6e0e1ebf06c1efa50101de96d0317dea5604c1c9e43e66735"; + }; - src = fetchHex { - pkg = "tortoise"; - version = "${version}"; - sha256 = "926d97b03cd0d2f6e0e1ebf06c1efa50101de96d0317dea5604c1c9e43e66735"; + beamDeps = [ gen_state_machine ]; }; - beamDeps = [ gen_state_machine ]; - }; + tzdata = buildMix rec { + name = "tzdata"; + version = "1.1.1"; - tzdata = buildMix rec { - name = "tzdata"; - version = "1.1.1"; + src = fetchHex { + pkg = "tzdata"; + version = "${version}"; + sha256 = "a69cec8352eafcd2e198dea28a34113b60fdc6cb57eb5ad65c10292a6ba89787"; + }; - src = fetchHex { - pkg = "tzdata"; - version = "${version}"; - sha256 = "a69cec8352eafcd2e198dea28a34113b60fdc6cb57eb5ad65c10292a6ba89787"; + beamDeps = [ hackney ]; }; - beamDeps = [ hackney ]; - }; + unicode_util_compat = buildRebar3 rec { + name = "unicode_util_compat"; + version = "0.7.0"; - unicode_util_compat = buildRebar3 rec { - name = "unicode_util_compat"; - version = "0.7.0"; + src = fetchHex { + pkg = "unicode_util_compat"; + version = "${version}"; + sha256 = "25eee6d67df61960cf6a794239566599b09e17e668d3700247bc498638152521"; + }; - src = fetchHex { - pkg = "unicode_util_compat"; - version = "${version}"; - sha256 = "25eee6d67df61960cf6a794239566599b09e17e668d3700247bc498638152521"; + beamDeps = [ ]; }; - beamDeps = []; - }; + websockex = buildMix rec { + name = "websockex"; + version = "0.4.3"; - websockex = buildMix rec { - name = "websockex"; - version = "0.4.3"; + src = fetchHex { + pkg = "websockex"; + version = "${version}"; + sha256 = "95f2e7072b85a3a4cc385602d42115b73ce0b74a9121d0d6dbbf557645ac53e4"; + }; - src = fetchHex { - pkg = "websockex"; - version = "${version}"; - sha256 = "95f2e7072b85a3a4cc385602d42115b73ce0b74a9121d0d6dbbf557645ac53e4"; + beamDeps = [ ]; }; - - beamDeps = []; }; - }; -in self - +in +self diff --git a/secrets/age-yubikey-identity-508106ce.txt b/secrets/age-yubikey-identity-508106ce.txt new file mode 100644 index 0000000..9670511 --- /dev/null +++ b/secrets/age-yubikey-identity-508106ce.txt @@ -0,0 +1,7 @@ +# Serial: 20472382, Slot: 1 +# Name: age_alejandro +# Created: Fri, 30 Jun 2023 03:32:36 +0000 +# PIN policy: Once (A PIN is required once per session, if set) +# Touch policy: Always (A physical touch is required for every decryption) +# Recipient: age1yubikey1qdwgvfqrcqmyw56ux7azuvqr6f8nanszu27nztvxmn4utmplgxctzt90g25 +AGE-PLUGIN-YUBIKEY-18E3RSQVZ2ZQSDNS67QTTC diff --git a/secrets/secrets.nix b/secrets/secrets.nix index e63a709..79fb416 100644 --- a/secrets/secrets.nix +++ b/secrets/secrets.nix @@ -9,18 +9,69 @@ let proxy = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAf6Z7SZEOH3H51T/GPIc/B0OpbaydM5l2PP3nMnwpFl"; git = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN8JLy/ipBfOet3/KT7rXOXHDjjmt+VqqQb3V+ILIuDN"; }; -in { - "cf_dns_kilonull.age".publicKeys = [users.me machines.node machines.gospel machines.pi4 machines.proxy]; - "gitea-runner-gospel.age".publicKeys = [users.me machines.gospel]; - "hass_mqtt.age".publicKeys = [users.me machines.pi4 machines.node machines.gospel]; - "hydra-aws-creds.age".publicKeys = [users.me machines.gospel]; - "nextcloud_admin.age".publicKeys = [users.me machines.node machines.gospel]; - "nextcloud_restic_env.age".publicKeys = [users.me machines.node]; - "nextcloud_restic_password.age".publicKeys = [users.me machines.node]; - "nextcloud_restic_repo.age".publicKeys = [users.me machines.node]; - "tailscale_git_server.age".publicKeys = [users.me machines.git]; # This key expires, might have to update - "teslamate_db.age".publicKeys = [users.me machines.node machines.gospel]; - "teslamate_encryption.age".publicKeys = [users.me machines.node machines.gospel]; - "teslamate_mqtt.age".publicKeys = [users.me machines.pi4 machines.node machines.gospel]; - "theengs_ble_mqtt.age".publicKeys = [users.me machines.pi4 machines.gospel]; +in +{ + "cf_dns_kilonull.age".publicKeys = [ + users.me + machines.node + machines.gospel + machines.pi4 + machines.proxy + ]; + "gitea-runner-gospel.age".publicKeys = [ + users.me + machines.gospel + ]; + "hass_mqtt.age".publicKeys = [ + users.me + machines.pi4 + machines.node + machines.gospel + ]; + "hydra-aws-creds.age".publicKeys = [ + users.me + machines.gospel + ]; + "nextcloud_admin.age".publicKeys = [ + users.me + machines.node + machines.gospel + ]; + "nextcloud_restic_env.age".publicKeys = [ + users.me + machines.node + ]; + "nextcloud_restic_password.age".publicKeys = [ + users.me + machines.node + ]; + "nextcloud_restic_repo.age".publicKeys = [ + users.me + machines.node + ]; + "tailscale_git_server.age".publicKeys = [ + users.me + machines.git + ]; # This key expires, might have to update + "teslamate_db.age".publicKeys = [ + users.me + machines.node + machines.gospel + ]; + "teslamate_encryption.age".publicKeys = [ + users.me + machines.node + machines.gospel + ]; + "teslamate_mqtt.age".publicKeys = [ + users.me + machines.pi4 + machines.node + machines.gospel + ]; + "theengs_ble_mqtt.age".publicKeys = [ + users.me + machines.pi4 + machines.gospel + ]; } diff --git a/systems/aarch64-linux/pi4/default.nix b/systems/aarch64-linux/pi4/default.nix index 9010bff..795f62b 100644 --- a/systems/aarch64-linux/pi4/default.nix +++ b/systems/aarch64-linux/pi4/default.nix @@ -4,7 +4,8 @@ inputs, modulesPath, ... -}: { +}: +{ imports = [ (modulesPath + "/installer/scan/not-detected.nix") (modulesPath + "/installer/sd-card/sd-image-aarch64.nix") @@ -15,8 +16,7 @@ # See here: https://github.com/NixOS/nixpkgs/issues/109280#issuecomment-973636212 nixpkgs.overlays = [ (final: super: { - makeModulesClosure = x: - super.makeModulesClosure (x // {allowMissing = true;}); + makeModulesClosure = x: super.makeModulesClosure (x // { allowMissing = true; }); }) ]; @@ -57,7 +57,10 @@ hostName = "pi4"; useDHCP = false; defaultGateway = "192.168.113.1"; - nameservers = ["192.168.113.13" "1.1.1.1"]; + nameservers = [ + "192.168.113.13" + "1.1.1.1" + ]; interfaces.end0.ipv4.addresses = [ { address = "192.168.113.42"; diff --git a/systems/x86_64-do/minimal/default.nix b/systems/x86_64-do/minimal/default.nix index 132bba8..e2321db 100644 --- a/systems/x86_64-do/minimal/default.nix +++ b/systems/x86_64-do/minimal/default.nix @@ -1,4 +1,5 @@ -{...}: { +{ ... }: +{ aa = { nix.enable = true; diff --git a/systems/x86_64-linux/carbon/hardware-configuration-zfs.nix b/systems/x86_64-linux/carbon/hardware-configuration-zfs.nix index 835b98f..220b65a 100644 --- a/systems/x86_64-linux/carbon/hardware-configuration-zfs.nix +++ b/systems/x86_64-linux/carbon/hardware-configuration-zfs.nix @@ -7,104 +7,151 @@ pkgs, modulesPath, ... -}: { +}: +{ imports = [ (modulesPath + "/installer/scan/not-detected.nix") ]; - boot.initrd.availableKernelModules = ["xhci_pci" "nvme" "usb_storage" "sd_mod"]; - boot.initrd.kernelModules = []; - boot.kernelModules = ["kvm-intel"]; - boot.extraModulePackages = []; + boot.initrd.availableKernelModules = [ + "xhci_pci" + "nvme" + "usb_storage" + "sd_mod" + ]; + boot.initrd.kernelModules = [ ]; + boot.kernelModules = [ "kvm-intel" ]; + boot.extraModulePackages = [ ]; fileSystems."/" = { device = "rpool_/nixos/ROOT/default"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; fileSystems."/boot" = { device = "bpool_/nixos/BOOT/default"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; fileSystems."/home" = { device = "rpool_/nixos/DATA/default/home"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; fileSystems."/root" = { device = "rpool_/nixos/DATA/default/root"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; fileSystems."/srv" = { device = "rpool_/nixos/DATA/default/srv"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; fileSystems."/usr/local" = { device = "rpool_/nixos/DATA/default/usr/local"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; fileSystems."/var/log" = { device = "rpool_/nixos/DATA/default/var/log"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; fileSystems."/var/spool" = { device = "rpool_/nixos/DATA/default/var/spool"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; fileSystems."/nix" = { device = "rpool_/nixos/DATA/local/nix"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; fileSystems."/state" = { device = "rpool_/nixos/DATA/default/state"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; fileSystems."/etc/nixos" = { device = "/state/etc/nixos"; fsType = "none"; - options = ["bind"]; + options = [ "bind" ]; }; fileSystems."/etc/cryptkey.d" = { device = "/state/etc/cryptkey.d"; fsType = "none"; - options = ["bind"]; + options = [ "bind" ]; }; fileSystems."/boot/efis/nvme-SAMSUNG_MZVLW256HEHP-000L7_S35ENX1K539085-part1" = { device = "/dev/disk/by-uuid/F429-235F"; fsType = "vfat"; - options = ["x-systemd.idle-timeout=1min" "x-systemd.automount" "noauto"]; + options = [ + "x-systemd.idle-timeout=1min" + "x-systemd.automount" + "noauto" + ]; }; fileSystems."/boot/efis/nvme-WDC_PC_SN520_SDAPTUW-512G_182747800010-part1" = { device = "/dev/disk/by-uuid/F429-AB41"; fsType = "vfat"; - options = ["x-systemd.idle-timeout=1min" "x-systemd.automount" "noauto"]; + options = [ + "x-systemd.idle-timeout=1min" + "x-systemd.automount" + "noauto" + ]; }; fileSystems."/var/lib/docker" = { device = "rpool_/nixos/DATA/default/var/lib/docker"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; powerManagement.cpuFreqGovernor = lib.mkDefault "powersave"; diff --git a/systems/x86_64-linux/carbon/zfs.nix b/systems/x86_64-linux/carbon/zfs.nix index 23445ca..f7fd568 100644 --- a/systems/x86_64-linux/carbon/zfs.nix +++ b/systems/x86_64-linux/carbon/zfs.nix @@ -1,5 +1,6 @@ -{pkgs, ...}: { - boot.supportedFilesystems = ["zfs"]; +{ pkgs, ... }: +{ + boot.supportedFilesystems = [ "zfs" ]; networking.hostId = "b2d25606"; boot.zfs.devNodes = "/dev/disk/by-id"; swapDevices = [ diff --git a/systems/x86_64-linux/git/default.nix b/systems/x86_64-linux/git/default.nix index f16169b..b024f6b 100644 --- a/systems/x86_64-linux/git/default.nix +++ b/systems/x86_64-linux/git/default.nix @@ -2,11 +2,13 @@ inputs, config, ... -}: let +}: +let domain = "git.alejandr0angul0.dev"; secrets = config.age.secrets; -in { - imports = ["${inputs.nixpkgs}/nixos/modules/virtualisation/digital-ocean-config.nix"]; +in +{ + imports = [ "${inputs.nixpkgs}/nixos/modules/virtualisation/digital-ocean-config.nix" ]; age.secrets.authKeyFile.file = ../../../secrets/tailscale_git_server.age; @@ -38,7 +40,7 @@ in { services.tailscale = { authKeyFile = secrets.authKeyFile.path; - extraUpFlags = ["--ssh"]; + extraUpFlags = [ "--ssh" ]; }; security.acme = { diff --git a/systems/x86_64-linux/gospel/hardware-configuration.nix b/systems/x86_64-linux/gospel/hardware-configuration.nix index e90661f..79c23b5 100644 --- a/systems/x86_64-linux/gospel/hardware-configuration.nix +++ b/systems/x86_64-linux/gospel/hardware-configuration.nix @@ -6,37 +6,57 @@ lib, modulesPath, ... -}: { +}: +{ imports = [ (modulesPath + "/installer/scan/not-detected.nix") ]; - boot.initrd.availableKernelModules = ["xhci_pci" "ahci" "nvme" "usbhid" "usb_storage" "sd_mod"]; - boot.initrd.kernelModules = []; - boot.kernelModules = ["kvm-intel"]; + boot.initrd.availableKernelModules = [ + "xhci_pci" + "ahci" + "nvme" + "usbhid" + "usb_storage" + "sd_mod" + ]; + boot.initrd.kernelModules = [ ]; + boot.kernelModules = [ "kvm-intel" ]; fileSystems."/" = { device = "rpool/nixos/root"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; fileSystems."/home" = { device = "rpool/nixos/home"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; fileSystems."/var/lib" = { device = "rpool/nixos/var/lib"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; fileSystems."/var/log" = { device = "rpool/nixos/var/log"; fsType = "zfs"; - options = ["zfsutil" "X-mount.mkdir"]; + options = [ + "zfsutil" + "X-mount.mkdir" + ]; }; fileSystems."/boot" = { @@ -44,7 +64,7 @@ fsType = "vfat"; }; - swapDevices = []; + swapDevices = [ ]; # Enables DHCP on each ethernet and wireless interface. In case of scripted networking # (the default) this is the recommended approach. When using systemd-networkd it's diff --git a/systems/x86_64-linux/gospel/zfs.nix b/systems/x86_64-linux/gospel/zfs.nix index 334971a..4384762 100644 --- a/systems/x86_64-linux/gospel/zfs.nix +++ b/systems/x86_64-linux/gospel/zfs.nix @@ -1,5 +1,6 @@ -{...}: { - boot.supportedFilesystems = ["zfs"]; +{ ... }: +{ + boot.supportedFilesystems = [ "zfs" ]; networking.hostId = "f8616592"; boot.loader.efi.canTouchEfiVariables = false; boot.loader.systemd-boot.enable = true; diff --git a/systems/x86_64-linux/node/hardware-configuration.nix b/systems/x86_64-linux/node/hardware-configuration.nix index c2f516a..8d50958 100644 --- a/systems/x86_64-linux/node/hardware-configuration.nix +++ b/systems/x86_64-linux/node/hardware-configuration.nix @@ -7,15 +7,23 @@ pkgs, modulesPath, ... -}: { +}: +{ imports = [ (modulesPath + "/installer/scan/not-detected.nix") ]; - boot.initrd.availableKernelModules = ["xhci_pci" "ahci" "nvme" "usb_storage" "usbhid" "sd_mod"]; - boot.initrd.kernelModules = []; - boot.kernelModules = ["kvm-amd"]; - boot.extraModulePackages = []; + boot.initrd.availableKernelModules = [ + "xhci_pci" + "ahci" + "nvme" + "usb_storage" + "usbhid" + "sd_mod" + ]; + boot.initrd.kernelModules = [ ]; + boot.kernelModules = [ "kvm-amd" ]; + boot.extraModulePackages = [ ]; fileSystems."/" = { device = "/dev/disk/by-label/NIXROOT"; @@ -27,7 +35,7 @@ fsType = "vfat"; }; - swapDevices = []; + swapDevices = [ ]; # Enables DHCP on each ethernet and wireless interface. In case of scripted networking # (the default) this is the recommended approach. When using systemd-networkd it's diff --git a/systems/x86_64-linux/node/zfs.nix b/systems/x86_64-linux/node/zfs.nix index 9ec41f2..ac8962e 100644 --- a/systems/x86_64-linux/node/zfs.nix +++ b/systems/x86_64-linux/node/zfs.nix @@ -2,8 +2,9 @@ config, pkgs, ... -}: { - boot.supportedFilesystems = ["zfs"]; - boot.zfs.extraPools = ["tank"]; +}: +{ + boot.supportedFilesystems = [ "zfs" ]; + boot.zfs.extraPools = [ "tank" ]; networking.hostId = "db616c9e"; } diff --git a/systems/x86_64-vm/virt/default.nix b/systems/x86_64-vm/virt/default.nix index 12863ab..c9d200e 100644 --- a/systems/x86_64-vm/virt/default.nix +++ b/systems/x86_64-vm/virt/default.nix @@ -3,8 +3,9 @@ lib, ... }: -with lib; { - virtualisation.qemu.options = ["-vga qxl"]; +with lib; +{ + virtualisation.qemu.options = [ "-vga qxl" ]; # For sway to work with home manager security.polkit.enable = true; @@ -23,7 +24,7 @@ with lib; { users.users.virt = { isNormalUser = true; - extraGroups = ["wheel"]; + extraGroups = [ "wheel" ]; hashedPassword = "$6$nOlwKVf1u0Wt//zU$43xhafbe2CAWTjOemAUm1J1Dpw7to0ZTbGhFk7CkVTRB3E80a1lhhQ175VnkcJ/X1HI6lsyV8fNMc3GF7JTAP0"; }; @@ -31,6 +32,8 @@ with lib; { systemPackages = with pkgs; [ wayland-utils ]; - variables = {"WLR_RENDERER_ALLOW_SOFTWARE" = "1";}; + variables = { + "WLR_RENDERER_ALLOW_SOFTWARE" = "1"; + }; }; }