From 3f165373226c30d751bdee2b14df42a36be0557d Mon Sep 17 00:00:00 2001
From: alejandro-angulo <iam@alejandr0angul0.dev>
Date: Mon, 31 Mar 2025 22:34:25 -0700
Subject: [PATCH] Reformatted with nixfmt

---
 flake.nix                                     |   90 +-
 homes/aarch64-linux/alejandro@pi4/default.nix |    3 +-
 homes/x86_64-linux/alejandro@git/default.nix  |    3 +-
 .../x86_64-linux/alejandro@gospel/default.nix |    3 +-
 .../alejandro@minimal/default.nix             |    3 +-
 homes/x86_64-linux/alejandro@node/default.nix |    3 +-
 modules/home/apps/bat/default.nix             |    6 +-
 modules/home/apps/btop/default.nix            |    6 +-
 modules/home/apps/tmux/default.nix            |   10 +-
 modules/home/fonts/default.nix                |   14 +-
 modules/home/home/default.nix                 |   21 +-
 modules/home/programs/firefox/default.nix     |    6 +-
 modules/home/programs/fuzzel/default.nix      |    8 +-
 modules/home/programs/fzf/default.nix         |    6 +-
 modules/home/programs/gpg/default.nix         |   10 +-
 modules/home/programs/k9s/default.nix         |    6 +-
 modules/home/programs/kitty/default.nix       |    6 +-
 modules/home/programs/neovim/default.nix      |   36 +-
 modules/home/programs/rofi/default.nix        |    8 +-
 modules/home/programs/swaylock/default.nix    |    6 +-
 modules/home/programs/waybar/default.nix      |   44 +-
 modules/home/programs/yazi/default.nix        |    6 +-
 modules/home/programs/zoxide/default.nix      |   10 +-
 modules/home/services/gammastep/default.nix   |    6 +-
 modules/home/services/playerctld/default.nix  |    8 +-
 modules/home/services/swayidle/default.nix    |    8 +-
 modules/home/services/swaync/default.nix      |   15 +-
 modules/home/tools/direnv/default.nix         |    6 +-
 modules/home/tools/eza/default.nix            |    6 +-
 modules/home/tools/git/default.nix            |    6 +-
 modules/home/tools/zsh/default.nix            |    6 +-
 modules/nixos/apps/steam/default.nix          |    6 +-
 modules/nixos/apps/yubikey/default.nix        |    6 +-
 .../nixos/archetypes/workstation/default.nix  |    6 +-
 modules/nixos/hardware/audio/default.nix      |    8 +-
 modules/nixos/hardware/bluetooth/default.nix  |    6 +-
 modules/nixos/hardware/logitech/default.nix   |   14 +-
 modules/nixos/hardware/tlp/default.nix        |    6 +-
 modules/nixos/home/default.nix                |   17 +-
 modules/nixos/nix/default.nix                 |   77 +-
 .../nixos/programs/android-studio/default.nix |   10 +-
 modules/nixos/security/acme/default.nix       |   15 +-
 .../nixos/services/adguardhome/default.nix    |   13 +-
 modules/nixos/services/forgejo/default.nix    |   13 +-
 modules/nixos/services/grafana/default.nix    |   18 +-
 modules/nixos/services/hydra/default.nix      |   13 +-
 modules/nixos/services/loki/default.nix       |    8 +-
 modules/nixos/services/minio/default.nix      |    6 +-
 modules/nixos/services/mosquitto/default.nix  |   10 +-
 modules/nixos/services/nix-serve/default.nix  |   19 +-
 modules/nixos/services/octoprint/default.nix  |   11 +-
 modules/nixos/services/openssh/default.nix    |   22 +-
 modules/nixos/services/printing/default.nix   |    6 +-
 modules/nixos/services/prometheus/default.nix |   10 +-
 modules/nixos/services/promtail/default.nix   |    8 +-
 modules/nixos/services/tailscale/default.nix  |   18 +-
 modules/nixos/services/teslamate/default.nix  |   21 +-
 modules/nixos/suites/desktop/default.nix      |    8 +-
 modules/nixos/suites/development/default.nix  |    6 +-
 modules/nixos/suites/gaming/default.nix       |    6 +-
 modules/nixos/suites/utils/default.nix        |    8 +-
 modules/nixos/system/fonts/default.nix        |    6 +-
 modules/nixos/system/monitoring/default.nix   |    6 +-
 modules/nixos/system/zfs/default.nix          |    8 +-
 modules/nixos/user/default.nix                |   31 +-
 overlays/neovim/default.nix                   |    3 +-
 packages/teslamate/default.nix                |   82 +-
 packages/teslamate/mix.nix                    | 1257 +++++++++--------
 secrets/age-yubikey-identity-508106ce.txt     |    7 +
 secrets/secrets.nix                           |   79 +-
 systems/aarch64-linux/pi4/default.nix         |   11 +-
 systems/x86_64-do/minimal/default.nix         |    3 +-
 .../carbon/hardware-configuration-zfs.nix     |   87 +-
 systems/x86_64-linux/carbon/zfs.nix           |    5 +-
 systems/x86_64-linux/git/default.nix          |   10 +-
 .../gospel/hardware-configuration.nix         |   38 +-
 systems/x86_64-linux/gospel/zfs.nix           |    5 +-
 .../node/hardware-configuration.nix           |   20 +-
 systems/x86_64-linux/node/zfs.nix             |    7 +-
 systems/x86_64-vm/virt/default.nix            |   11 +-
 80 files changed, 1454 insertions(+), 992 deletions(-)
 create mode 100644 secrets/age-yubikey-identity-508106ce.txt

diff --git a/flake.nix b/flake.nix
index 9a7e1db..c7c5a1a 100644
--- a/flake.nix
+++ b/flake.nix
@@ -35,7 +35,8 @@
     powerlevel10k.flake = false;
   };
 
-  outputs = inputs:
+  outputs =
+    inputs:
     inputs.snowfall-lib.mkFlake {
       inherit inputs;
       src = ./.;
@@ -51,7 +52,7 @@
         home-manager.nixosModules.home-manager
       ];
 
-      homes.modules = with inputs; [catppuccin.homeManagerModules.catppuccin];
+      homes.modules = with inputs; [ catppuccin.homeManagerModules.catppuccin ];
 
       deploy.nodes = {
         node = {
@@ -60,7 +61,7 @@
             user = "root";
             sshUser = "alejandro";
             path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos inputs.self.nixosConfigurations.node;
-            sshOpts = ["-A"];
+            sshOpts = [ "-A" ];
           };
         };
 
@@ -70,56 +71,59 @@
             user = "root";
             sshUser = "alejandro";
             path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos inputs.self.nixosConfigurations.git;
-            sshOpts = ["-A"];
+            sshOpts = [ "-A" ];
           };
         };
 
-        pi4 = let
-          system = "aarch64-linux";
-          pkgs = import inputs.nixpkgs {inherit system;};
-          deployPkgs = import inputs.nixpkgs {
-            inherit system;
-            overlays = [
-              inputs.deploy-rs.overlay
-              (self: super: {
-                deploy-rs = {
-                  inherit (pkgs) deploy-rs;
-                  lib = inputs.deploy-rs.lib;
-                };
-              })
-            ];
+        pi4 =
+          let
+            system = "aarch64-linux";
+            pkgs = import inputs.nixpkgs { inherit system; };
+            deployPkgs = import inputs.nixpkgs {
+              inherit system;
+              overlays = [
+                inputs.deploy-rs.overlay
+                (self: super: {
+                  deploy-rs = {
+                    inherit (pkgs) deploy-rs;
+                    lib = inputs.deploy-rs.lib;
+                  };
+                })
+              ];
+            };
+          in
+          {
+            hostname = "pi4";
+            profiles.system = {
+              user = "root";
+              sshUser = "alejandro";
+              path = deployPkgs.deploy-rs.lib.aarch64-linux.activate.nixos inputs.self.nixosConfigurations.pi4;
+              # Usually deploy from an x86_64 machine and don't want to bother
+              # trying to build an aarch64 derivation
+              remoteBuild = true;
+            };
           };
-        in {
-          hostname = "pi4";
-          profiles.system = {
-            user = "root";
-            sshUser = "alejandro";
-            path = deployPkgs.deploy-rs.lib.aarch64-linux.activate.nixos inputs.self.nixosConfigurations.pi4;
-            # Usually deploy from an x86_64 machine and don't want to bother
-            # trying to build an aarch64 derivation
-            remoteBuild = true;
-          };
-        };
       };
 
       # TODO: Re-enable this when I figure out how to prevent needing to build
       # dependencies for architectures other than the host machine
       # checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks inputs.self.deploy) inputs.deploy-rs.lib;
 
-      hydraJobs = let
-        systems_to_build = [
-          "gospel"
-          "node"
-          "carbon"
-        ];
-      in {
-        # Only have a builder for x86_64-linux atm
-        packages = inputs.self.packages.x86_64-linux;
+      hydraJobs =
+        let
+          systems_to_build = [
+            "gospel"
+            "node"
+            "carbon"
+          ];
+        in
+        {
+          # Only have a builder for x86_64-linux atm
+          packages = inputs.self.packages.x86_64-linux;
 
-        systems = inputs.nixpkgs.lib.attrsets.genAttrs systems_to_build (
-          name:
-            inputs.self.nixosConfigurations."${name}".config.system.build.toplevel
-        );
-      };
+          systems = inputs.nixpkgs.lib.attrsets.genAttrs systems_to_build (
+            name: inputs.self.nixosConfigurations."${name}".config.system.build.toplevel
+          );
+        };
     };
 }
diff --git a/homes/aarch64-linux/alejandro@pi4/default.nix b/homes/aarch64-linux/alejandro@pi4/default.nix
index 075be51..e1ad605 100644
--- a/homes/aarch64-linux/alejandro@pi4/default.nix
+++ b/homes/aarch64-linux/alejandro@pi4/default.nix
@@ -1,4 +1,5 @@
-{...}: {
+{ ... }:
+{
   aa = {
     apps = {
       bat.enable = true;
diff --git a/homes/x86_64-linux/alejandro@git/default.nix b/homes/x86_64-linux/alejandro@git/default.nix
index acfb642..4bb54e0 100644
--- a/homes/x86_64-linux/alejandro@git/default.nix
+++ b/homes/x86_64-linux/alejandro@git/default.nix
@@ -1,4 +1,5 @@
-{...}: {
+{ ... }:
+{
   aa = {
     installDefaults = false;
 
diff --git a/homes/x86_64-linux/alejandro@gospel/default.nix b/homes/x86_64-linux/alejandro@gospel/default.nix
index 6509741..98aa884 100644
--- a/homes/x86_64-linux/alejandro@gospel/default.nix
+++ b/homes/x86_64-linux/alejandro@gospel/default.nix
@@ -1,4 +1,5 @@
-{...}: {
+{ ... }:
+{
   aa.isHeadless = false;
   services.spotifyd = {
     enable = true;
diff --git a/homes/x86_64-linux/alejandro@minimal/default.nix b/homes/x86_64-linux/alejandro@minimal/default.nix
index ebe2dc2..58aebb6 100644
--- a/homes/x86_64-linux/alejandro@minimal/default.nix
+++ b/homes/x86_64-linux/alejandro@minimal/default.nix
@@ -1,3 +1,4 @@
-{...}: {
+{ ... }:
+{
   aa.installDefaults = false;
 }
diff --git a/homes/x86_64-linux/alejandro@node/default.nix b/homes/x86_64-linux/alejandro@node/default.nix
index ea8f50d..52c14b8 100644
--- a/homes/x86_64-linux/alejandro@node/default.nix
+++ b/homes/x86_64-linux/alejandro@node/default.nix
@@ -1,2 +1,3 @@
-{...}: {
+{ ... }:
+{
 }
diff --git a/modules/home/apps/bat/default.nix b/modules/home/apps/bat/default.nix
index 112a6a3..40ce9f6 100644
--- a/modules/home/apps/bat/default.nix
+++ b/modules/home/apps/bat/default.nix
@@ -3,11 +3,13 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf mkEnableOption;
 
   cfg = config.${namespace}.apps.bat;
-in {
+in
+{
   options.${namespace}.apps.bat = {
     enable = mkEnableOption "bat";
   };
diff --git a/modules/home/apps/btop/default.nix b/modules/home/apps/btop/default.nix
index 8cb630e..b504ab8 100644
--- a/modules/home/apps/btop/default.nix
+++ b/modules/home/apps/btop/default.nix
@@ -3,11 +3,13 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf mkEnableOption;
 
   cfg = config.${namespace}.apps.btop;
-in {
+in
+{
   options.${namespace}.apps.btop = {
     enable = mkEnableOption "btop";
   };
diff --git a/modules/home/apps/tmux/default.nix b/modules/home/apps/tmux/default.nix
index 3acf417..1f8185a 100644
--- a/modules/home/apps/tmux/default.nix
+++ b/modules/home/apps/tmux/default.nix
@@ -4,7 +4,8 @@
   pkgs,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkEnableOption;
   inherit (pkgs) tmuxPlugins;
 
@@ -20,13 +21,14 @@
       }
     ];
   };
-in {
+in
+{
   options.${namespace}.apps.tmux = {
     enable = mkEnableOption "tmux";
   };
 
   config = lib.mkIf cfg.enable {
-    home.packages = [pkgs.tmux-sessionizer];
+    home.packages = [ pkgs.tmux-sessionizer ];
 
     catppuccin.tmux = {
       enable = true;
@@ -102,6 +104,6 @@ in {
         '';
     };
 
-    xdg.configFile."tms/config.toml".source = (pkgs.formats.toml {}).generate "tms-config" tmsConfig;
+    xdg.configFile."tms/config.toml".source = (pkgs.formats.toml { }).generate "tms-config" tmsConfig;
   };
 }
diff --git a/modules/home/fonts/default.nix b/modules/home/fonts/default.nix
index ed73e2a..97c073a 100644
--- a/modules/home/fonts/default.nix
+++ b/modules/home/fonts/default.nix
@@ -4,9 +4,11 @@
   pkgs,
   namespace,
   ...
-}: let
+}:
+let
   cfg = config.${namespace}.fonts;
-in {
+in
+{
   options.${namespace}.fonts = {
     enable = lib.mkEnableOption "font config";
   };
@@ -24,10 +26,10 @@ in {
     fonts.fontconfig = {
       enable = true;
       defaultFonts = {
-        monospace = ["Hack Nerd Font"];
-        emoji = ["Noto Color Emoji"];
-        serif = ["Noto Serif"];
-        sansSerif = ["Noto Sans"];
+        monospace = [ "Hack Nerd Font" ];
+        emoji = [ "Noto Color Emoji" ];
+        serif = [ "Noto Serif" ];
+        sansSerif = [ "Noto Sans" ];
       };
     };
   };
diff --git a/modules/home/home/default.nix b/modules/home/home/default.nix
index fd067af..9a41b80 100644
--- a/modules/home/home/default.nix
+++ b/modules/home/home/default.nix
@@ -1,10 +1,11 @@
 {
   config,
   lib,
-  osConfig ? {},
+  osConfig ? { },
   namespace,
   ...
-}: {
+}:
+{
   options.${namespace} = {
     isHeadless = lib.mkOption {
       type = lib.types.bool;
@@ -20,15 +21,13 @@
   };
 
   config = lib.mkMerge [
-    (
-      lib.mkIf (!config.${namespace}.isHeadless) {
-        ${namespace} = {
-          programs.firefox.enable = true;
-          programs.kitty.enable = true;
-          windowManagers.sway.enable = true;
-        };
-      }
-    )
+    (lib.mkIf (!config.${namespace}.isHeadless) {
+      ${namespace} = {
+        programs.firefox.enable = true;
+        programs.kitty.enable = true;
+        windowManagers.sway.enable = true;
+      };
+    })
     (lib.mkIf (config.${namespace}.installDefaults) {
       ${namespace} = {
         apps = {
diff --git a/modules/home/programs/firefox/default.nix b/modules/home/programs/firefox/default.nix
index 2049747..3e72af6 100644
--- a/modules/home/programs/firefox/default.nix
+++ b/modules/home/programs/firefox/default.nix
@@ -3,11 +3,13 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkEnableOption mkIf;
 
   cfg = config.${namespace}.programs.firefox;
-in {
+in
+{
   options.${namespace}.programs.firefox = {
     enable = mkEnableOption "firefox";
   };
diff --git a/modules/home/programs/fuzzel/default.nix b/modules/home/programs/fuzzel/default.nix
index fef0e85..97e0979 100644
--- a/modules/home/programs/fuzzel/default.nix
+++ b/modules/home/programs/fuzzel/default.nix
@@ -4,15 +4,17 @@
   pkgs,
   namespace,
   ...
-}: let
+}:
+let
   cfg = config.${namespace}.programs.fuzzel;
-in {
+in
+{
   options.${namespace}.programs.fuzzel = {
     enable = lib.mkEnableOption "fuzzel";
   };
 
   config = lib.mkIf cfg.enable {
-    home.packages = [pkgs.bemoji];
+    home.packages = [ pkgs.bemoji ];
 
     catppuccin.fuzzel.enable = true;
     programs.fuzzel.enable = true;
diff --git a/modules/home/programs/fzf/default.nix b/modules/home/programs/fzf/default.nix
index ab9a09a..f11a634 100644
--- a/modules/home/programs/fzf/default.nix
+++ b/modules/home/programs/fzf/default.nix
@@ -3,9 +3,11 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   cfg = config.${namespace}.programs.fzf;
-in {
+in
+{
   options.${namespace}.programs.fzf = {
     enable = lib.mkEnableOption "fzf";
   };
diff --git a/modules/home/programs/gpg/default.nix b/modules/home/programs/gpg/default.nix
index f683ab2..b081fe6 100644
--- a/modules/home/programs/gpg/default.nix
+++ b/modules/home/programs/gpg/default.nix
@@ -5,11 +5,13 @@
   namespace,
   system,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf mkEnableOption;
 
   cfg = config.${namespace}.programs.gpg;
-in {
+in
+{
   options.${namespace}.programs.gpg = {
     enable = mkEnableOption "gpg";
   };
@@ -33,9 +35,7 @@ in {
     services.gpg-agent = mkIf (system == "x86_64-linux") {
       enable = true;
       pinentryPackage =
-        if config.${namespace}.windowManagers.sway.enable
-        then pkgs.pinentry-qt
-        else pkgs.pinentry-curses;
+        if config.${namespace}.windowManagers.sway.enable then pkgs.pinentry-qt else pkgs.pinentry-curses;
       enableZshIntegration = true;
       enableSshSupport = true;
       sshKeys = [
diff --git a/modules/home/programs/k9s/default.nix b/modules/home/programs/k9s/default.nix
index c634b51..8472992 100644
--- a/modules/home/programs/k9s/default.nix
+++ b/modules/home/programs/k9s/default.nix
@@ -3,9 +3,11 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   cfg = config.${namespace}.programs.k9s;
-in {
+in
+{
   options.${namespace}.programs.k9s = {
     enable = lib.mkEnableOption "k9s";
   };
diff --git a/modules/home/programs/kitty/default.nix b/modules/home/programs/kitty/default.nix
index 98b17d7..459c330 100644
--- a/modules/home/programs/kitty/default.nix
+++ b/modules/home/programs/kitty/default.nix
@@ -4,11 +4,13 @@
   pkgs,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkEnableOption mkIf;
 
   cfg = config.${namespace}.programs.kitty;
-in {
+in
+{
   options.${namespace}.programs.kitty = {
     enable = mkEnableOption "kitty";
   };
diff --git a/modules/home/programs/neovim/default.nix b/modules/home/programs/neovim/default.nix
index a6bfa7d..859d389 100644
--- a/modules/home/programs/neovim/default.nix
+++ b/modules/home/programs/neovim/default.nix
@@ -4,9 +4,11 @@
   pkgs,
   namespace,
   ...
-}: let
+}:
+let
   cfg = config.${namespace}.programs.neovim;
-in {
+in
+{
   options.${namespace}.programs.neovim = {
     enable = lib.mkEnableOption "neovim";
     lazygit.enable = lib.mkOption {
@@ -21,19 +23,21 @@ in {
     };
   };
 
-  config = lib.mkIf cfg.enable (lib.mkMerge [
-    {home.packages = [pkgs.neovim];}
-    (lib.mkIf cfg.lazygit.enable {
-      programs.zsh.shellAliases = {
-        nvim = "${pkgs.neovim}/bin/nvim --listen /tmp/nvim-server.pipe";
-      };
+  config = lib.mkIf cfg.enable (
+    lib.mkMerge [
+      { home.packages = [ pkgs.neovim ]; }
+      (lib.mkIf cfg.lazygit.enable {
+        programs.zsh.shellAliases = {
+          nvim = "${pkgs.neovim}/bin/nvim --listen /tmp/nvim-server.pipe";
+        };
 
-      programs.lazygit.settings.os = {
-        editCommand = "nvim";
-        editCommandTemplate = ''
-          {{editor}} --server /tmp/nvim-server.pipe --remote-tab {{filename}}
-        '';
-      };
-    })
-  ]);
+        programs.lazygit.settings.os = {
+          editCommand = "nvim";
+          editCommandTemplate = ''
+            {{editor}} --server /tmp/nvim-server.pipe --remote-tab {{filename}}
+          '';
+        };
+      })
+    ]
+  );
 }
diff --git a/modules/home/programs/rofi/default.nix b/modules/home/programs/rofi/default.nix
index e7e02ff..9201af6 100644
--- a/modules/home/programs/rofi/default.nix
+++ b/modules/home/programs/rofi/default.nix
@@ -4,11 +4,13 @@
   pkgs,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkEnableOption mkIf;
 
   cfg = config.${namespace}.programs.rofi;
-in {
+in
+{
   options.${namespace}.programs.rofi = {
     enable = mkEnableOption "rofi";
   };
@@ -19,7 +21,7 @@ in {
       # TODO: How to ensure this font is installed?
       font = "Hack Nerd Font 10";
       catppuccin.enable = true;
-      plugins = [pkgs.rofi-emoji];
+      plugins = [ pkgs.rofi-emoji ];
       extraConfig = {
         show-icons = true;
         modi = "window,run,ssh,emoji";
diff --git a/modules/home/programs/swaylock/default.nix b/modules/home/programs/swaylock/default.nix
index 4df4934..384fff0 100644
--- a/modules/home/programs/swaylock/default.nix
+++ b/modules/home/programs/swaylock/default.nix
@@ -3,11 +3,13 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkEnableOption mkIf;
 
   cfg = config.${namespace}.programs.swaylock;
-in {
+in
+{
   options.${namespace}.programs.swaylock = {
     enable = mkEnableOption "swaylock";
   };
diff --git a/modules/home/programs/waybar/default.nix b/modules/home/programs/waybar/default.nix
index 25fc523..bb318f1 100644
--- a/modules/home/programs/waybar/default.nix
+++ b/modules/home/programs/waybar/default.nix
@@ -4,11 +4,18 @@
   lib,
   namespace,
   ...
-}: let
-  inherit (lib) mkIf mkEnableOption mkOption types;
+}:
+let
+  inherit (lib)
+    mkIf
+    mkEnableOption
+    mkOption
+    types
+    ;
 
   cfg = config.${namespace}.programs.waybar;
-in {
+in
+{
   options.aa.programs.waybar = {
     enable = mkEnableOption "waybar";
 
@@ -33,8 +40,8 @@ in {
           layer = "top";
           position = "bottom";
           height = 20;
-          modules-left = ["sway/workspaces"];
-          modules-center = ["clock"];
+          modules-left = [ "sway/workspaces" ];
+          modules-center = [ "clock" ];
           modules-right = [
             "idle_inhibitor"
             "temperature"
@@ -76,7 +83,11 @@ in {
           temperature = {
             critical-threshold = 80;
             format = "{icon}{temperatureC}°C";
-            format-icons = [" " " " " "];
+            format-icons = [
+              " "
+              " "
+              " "
+            ];
             thermal-zone = cfg.thermal-zone;
           };
 
@@ -99,7 +110,11 @@ in {
               phone = " ";
               portable = " ";
               car = " ";
-              default = [" " " " " "];
+              default = [
+                " "
+                " "
+                " "
+              ];
             };
             tooltip-format = "{desc}, {volume}%";
             # TODO: Figure out how to get pactl binary?
@@ -118,7 +133,13 @@ in {
             format-charging = "󰂄 {capacity}%";
             format-plugged = " ";
             format-alt = "{time} {icon}";
-            format-icons = [" " " " " " " " " "];
+            format-icons = [
+              " "
+              " "
+              " "
+              " "
+              " "
+            ];
           };
 
           memory = {
@@ -127,7 +148,10 @@ in {
 
           backlight = {
             format = "{icon} {percent}%";
-            format-icons = ["󰃞`" "󰃚"];
+            format-icons = [
+              "󰃞`"
+              "󰃚"
+            ];
             on-scroll-up = "light -A 1";
             on-scroll-down = "light -U 1";
           };
@@ -168,6 +192,6 @@ in {
       ];
     };
 
-    wayland.windowManager.sway.config.bars = [];
+    wayland.windowManager.sway.config.bars = [ ];
   };
 }
diff --git a/modules/home/programs/yazi/default.nix b/modules/home/programs/yazi/default.nix
index 9aadc2d..c44c998 100644
--- a/modules/home/programs/yazi/default.nix
+++ b/modules/home/programs/yazi/default.nix
@@ -3,9 +3,11 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   cfg = config.${namespace}.programs.yazi;
-in {
+in
+{
   options.${namespace}.programs.yazi = {
     enable = lib.mkEnableOption "yazi";
   };
diff --git a/modules/home/programs/zoxide/default.nix b/modules/home/programs/zoxide/default.nix
index 4c072b1..0f904fc 100644
--- a/modules/home/programs/zoxide/default.nix
+++ b/modules/home/programs/zoxide/default.nix
@@ -4,19 +4,21 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   cfg = config.${namespace}.programs.zoxide;
-in {
+in
+{
   options.${namespace}.programs.zoxide = {
     enable = lib.mkEnableOption "zoxide";
   };
 
   config = lib.mkIf cfg.enable {
-    home.packages = [pkgs.zoxide];
+    home.packages = [ pkgs.zoxide ];
 
     programs.zoxide = {
       enable = true;
-      options = ["--cmd cd"];
+      options = [ "--cmd cd" ];
     };
   };
 }
diff --git a/modules/home/services/gammastep/default.nix b/modules/home/services/gammastep/default.nix
index b7237f1..8f88614 100644
--- a/modules/home/services/gammastep/default.nix
+++ b/modules/home/services/gammastep/default.nix
@@ -3,11 +3,13 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf mkEnableOption;
 
   cfg = config.${namespace}.services.gammastep;
-in {
+in
+{
   options.${namespace}.services.gammastep = {
     enable = mkEnableOption "gammastep";
   };
diff --git a/modules/home/services/playerctld/default.nix b/modules/home/services/playerctld/default.nix
index 6a1db73..cc4fdbb 100644
--- a/modules/home/services/playerctld/default.nix
+++ b/modules/home/services/playerctld/default.nix
@@ -4,17 +4,19 @@
   pkgs,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkEnableOption mkIf;
 
   cfg = config.${namespace}.services.playerctld;
-in {
+in
+{
   options.${namespace}.services.playerctld = {
     enable = mkEnableOption "playerctl";
   };
 
   config = mkIf cfg.enable {
-    home.packages = [pkgs.playerctl];
+    home.packages = [ pkgs.playerctl ];
     services.playerctld.enable = true;
   };
 }
diff --git a/modules/home/services/swayidle/default.nix b/modules/home/services/swayidle/default.nix
index 3030f89..560cd9f 100644
--- a/modules/home/services/swayidle/default.nix
+++ b/modules/home/services/swayidle/default.nix
@@ -4,17 +4,19 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf mkEnableOption;
 
   cfg = config.${namespace}.services.swayidle;
-in {
+in
+{
   options.${namespace}.services.swayidle = {
     enable = mkEnableOption "swayidle";
   };
 
   config = mkIf cfg.enable {
-    home.packages = [pkgs.swayidle];
+    home.packages = [ pkgs.swayidle ];
 
     services.swayidle = {
       enable = true;
diff --git a/modules/home/services/swaync/default.nix b/modules/home/services/swaync/default.nix
index 3c5a318..49b84c2 100644
--- a/modules/home/services/swaync/default.nix
+++ b/modules/home/services/swaync/default.nix
@@ -4,22 +4,29 @@
   pkgs,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkEnableOption mkIf;
 
   cfg = config.${namespace}.services.swaync;
-in {
+in
+{
   options.${namespace}.services.swaync = {
     enable = mkEnableOption "sway notification center";
   };
 
   config = mkIf cfg.enable {
-    home.packages = [pkgs.libnotify];
+    home.packages = [ pkgs.libnotify ];
 
     services.swaync = {
       enable = true;
       settings = {
-        widgets = ["title" "dnd" "notifications" "mpris"];
+        widgets = [
+          "title"
+          "dnd"
+          "notifications"
+          "mpris"
+        ];
       };
     };
 
diff --git a/modules/home/tools/direnv/default.nix b/modules/home/tools/direnv/default.nix
index 2854ee0..fb70202 100644
--- a/modules/home/tools/direnv/default.nix
+++ b/modules/home/tools/direnv/default.nix
@@ -3,11 +3,13 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkEnableOption mkIf;
 
   cfg = config.${namespace}.tools.direnv;
-in {
+in
+{
   options.${namespace}.tools.direnv = {
     enable = mkEnableOption "direnv";
   };
diff --git a/modules/home/tools/eza/default.nix b/modules/home/tools/eza/default.nix
index 6f8dc98..6dcf295 100644
--- a/modules/home/tools/eza/default.nix
+++ b/modules/home/tools/eza/default.nix
@@ -3,11 +3,13 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf mkEnableOption;
 
   cfg = config.${namespace}.tools.eza;
-in {
+in
+{
   options.${namespace}.tools.eza = {
     enable = mkEnableOption "eza";
   };
diff --git a/modules/home/tools/git/default.nix b/modules/home/tools/git/default.nix
index db4ab54..393438b 100644
--- a/modules/home/tools/git/default.nix
+++ b/modules/home/tools/git/default.nix
@@ -4,11 +4,13 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf mkEnableOption mkDefault;
 
   cfg = config.${namespace}.tools.git;
-in {
+in
+{
   options.${namespace}.tools.git = {
     enable = mkEnableOption "git";
     userName = lib.options.mkOption {
diff --git a/modules/home/tools/zsh/default.nix b/modules/home/tools/zsh/default.nix
index 9625dbf..8a3da11 100644
--- a/modules/home/tools/zsh/default.nix
+++ b/modules/home/tools/zsh/default.nix
@@ -5,11 +5,13 @@
   pkgs,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkEnableOption mkIf;
 
   cfg = config.${namespace}.tools.zsh;
-in {
+in
+{
   options.${namespace}.tools.zsh = {
     enable = mkEnableOption "zsh";
   };
diff --git a/modules/nixos/apps/steam/default.nix b/modules/nixos/apps/steam/default.nix
index e6dd630..bbc9d5d 100644
--- a/modules/nixos/apps/steam/default.nix
+++ b/modules/nixos/apps/steam/default.nix
@@ -3,9 +3,11 @@
   pkgs,
   lib,
   ...
-}: let
+}:
+let
   cfg = config.aa.apps.steam;
-in {
+in
+{
   options.aa.apps.steam = {
     enable = lib.options.mkEnableOption "steam";
   };
diff --git a/modules/nixos/apps/yubikey/default.nix b/modules/nixos/apps/yubikey/default.nix
index 5480251..2f1d10e 100644
--- a/modules/nixos/apps/yubikey/default.nix
+++ b/modules/nixos/apps/yubikey/default.nix
@@ -3,11 +3,13 @@
   pkgs,
   lib,
   ...
-}: let
+}:
+let
   inherit (lib) mkEnableOption mkIf;
 
   cfg = config.aa.apps.yubikey;
-in {
+in
+{
   options.aa.apps.yubikey = {
     enable = mkEnableOption "yubikey";
   };
diff --git a/modules/nixos/archetypes/workstation/default.nix b/modules/nixos/archetypes/workstation/default.nix
index 1b4c8be..8fc02d7 100644
--- a/modules/nixos/archetypes/workstation/default.nix
+++ b/modules/nixos/archetypes/workstation/default.nix
@@ -2,11 +2,13 @@
   config,
   lib,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf mkEnableOption;
 
   cfg = config.aa.archetypes.workstation;
-in {
+in
+{
   options.aa.archetypes.workstation = {
     enable = mkEnableOption "workstation archetype";
   };
diff --git a/modules/nixos/hardware/audio/default.nix b/modules/nixos/hardware/audio/default.nix
index 793659c..cdf043d 100644
--- a/modules/nixos/hardware/audio/default.nix
+++ b/modules/nixos/hardware/audio/default.nix
@@ -3,17 +3,19 @@
   lib,
   pkgs,
   ...
-}: let
+}:
+let
   inherit (lib) mkEnableOption mkIf;
 
   cfg = config.aa.hardware.audio;
-in {
+in
+{
   options.aa.hardware.audio = {
     enable = mkEnableOption "audio";
   };
 
   config = mkIf cfg.enable {
-    environment.systemPackages = with pkgs; [pamixer];
+    environment.systemPackages = with pkgs; [ pamixer ];
     security.rtkit.enable = true;
     services.pipewire = {
       enable = true;
diff --git a/modules/nixos/hardware/bluetooth/default.nix b/modules/nixos/hardware/bluetooth/default.nix
index 543cc2f..4c20fa3 100644
--- a/modules/nixos/hardware/bluetooth/default.nix
+++ b/modules/nixos/hardware/bluetooth/default.nix
@@ -2,11 +2,13 @@
   config,
   lib,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf mkEnableOption;
 
   cfg = config.aa.hardware.bluetooth;
-in {
+in
+{
   options.aa.hardware.bluetooth = {
     enable = mkEnableOption "bluetooth";
   };
diff --git a/modules/nixos/hardware/logitech/default.nix b/modules/nixos/hardware/logitech/default.nix
index 1468ec7..ceb9961 100644
--- a/modules/nixos/hardware/logitech/default.nix
+++ b/modules/nixos/hardware/logitech/default.nix
@@ -4,12 +4,14 @@
   pkgs,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf mkEnableOption;
 
   cfg = config.${namespace}.hardware.logitech;
   username = config.${namespace}.user.name;
-in {
+in
+{
   options.${namespace}.hardware.logitech = {
     enable = mkEnableOption "logitech devices";
   };
@@ -22,13 +24,15 @@ in {
 
     systemd.user.services.solaar = {
       description = "Linux device manager for Logitech devices";
-      documentation = ["https://pwr-solaar.github.io/Solaar/"];
-      partOf = ["graphical-session.target"];
+      documentation = [ "https://pwr-solaar.github.io/Solaar/" ];
+      partOf = [ "graphical-session.target" ];
       serviceConfig = {
         Type = "simple";
         ExecStart = "${pkgs.solaar}/bin/solaar -w hide";
       };
     };
-    systemd.user.services.solaar.wantedBy = mkIf config.home-manager.users.${username}.wayland.windowManager.sway.enable ["sway-session.target"];
+    systemd.user.services.solaar.wantedBy =
+      mkIf config.home-manager.users.${username}.wayland.windowManager.sway.enable
+        [ "sway-session.target" ];
   };
 }
diff --git a/modules/nixos/hardware/tlp/default.nix b/modules/nixos/hardware/tlp/default.nix
index e0aa95d..05a0839 100644
--- a/modules/nixos/hardware/tlp/default.nix
+++ b/modules/nixos/hardware/tlp/default.nix
@@ -2,11 +2,13 @@
   config,
   lib,
   ...
-}: let
+}:
+let
   inherit (lib) mkEnableOption mkIf;
 
   cfg = config.aa.hardware.tlp;
-in {
+in
+{
   options.aa.hardware.tlp = {
     enable = mkEnableOption "tlp";
   };
diff --git a/modules/nixos/home/default.nix b/modules/nixos/home/default.nix
index a843679..7a3fbb6 100644
--- a/modules/nixos/home/default.nix
+++ b/modules/nixos/home/default.nix
@@ -5,10 +5,12 @@
   inputs,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkAliasDefinitions mkOption;
   inherit (lib.types) attrs;
-in {
+in
+{
   imports = with inputs; [
     home-manager.nixosModules.home-manager
   ];
@@ -16,22 +18,22 @@ in {
   options.${namespace}.home = {
     file = mkOption {
       type = attrs;
-      default = {};
+      default = { };
       description = "A set of files to be manged by home-manager's <option>home.file</option> option.";
     };
     configFile = mkOption {
       type = attrs;
-      default = {};
+      default = { };
       description = "A set of files to be managed by home-manager's <option>xdg.configFile</option>.";
     };
     dataFile = mkOption {
       type = attrs;
-      default = {};
+      default = { };
       description = "A set of files to be managed by home-manager's <option>xdg.dataFile</option>.";
     };
     extraOptions = mkOption {
       type = attrs;
-      default = {};
+      default = { };
       description = "Options to pass directly to home-manager.";
     };
   };
@@ -50,8 +52,7 @@ in {
     home-manager = {
       useUserPackages = true;
 
-      users.${config.aa.user.name} =
-        mkAliasDefinitions options.aa.home.extraOptions;
+      users.${config.aa.user.name} = mkAliasDefinitions options.aa.home.extraOptions;
     };
   };
 }
diff --git a/modules/nixos/nix/default.nix b/modules/nixos/nix/default.nix
index 7ce6e00..539b4e7 100644
--- a/modules/nixos/nix/default.nix
+++ b/modules/nixos/nix/default.nix
@@ -3,12 +3,19 @@
   pkgs,
   lib,
   ...
-}: let
-  inherit (lib) mkIf mkEnableOption mkOption types;
+}:
+let
+  inherit (lib)
+    mkIf
+    mkEnableOption
+    mkOption
+    types
+    ;
 
   cfg = config.aa.nix;
   selfHostedCacheHost = "https://cache.kilonull.com/";
-in {
+in
+{
   options.aa.nix = {
     enable = mkEnableOption "manage nix configuration.";
     package = mkOption {
@@ -26,37 +33,43 @@ in {
       nixfmt-rfc-style
     ];
 
-    nix = let
-      users = ["root" config.aa.user.name];
-    in {
-      package = cfg.package;
+    nix =
+      let
+        users = [
+          "root"
+          config.aa.user.name
+        ];
+      in
+      {
+        package = cfg.package;
 
-      settings = {
-        experimental-features = "nix-command flakes";
-        trusted-users = users;
-        allowed-users = users;
+        settings = {
+          experimental-features = "nix-command flakes";
+          trusted-users = users;
+          allowed-users = users;
 
-        builders-use-substitutes = cfg.useSelfhostedCache;
-        substituters =
-          if cfg.useSelfhostedCache
-          then [
-            # TESTING
-            "https://minio.kilonull.com/nix-store"
-            selfHostedCacheHost
-          ]
-          else [];
-        trusted-public-keys =
-          mkIf cfg.useSelfhostedCache
-          ["gospelCache:9cbn8Wm54BbwpPS0TXw+15wrYZBpfOJt4Fzfbfcq/pc="];
+          builders-use-substitutes = cfg.useSelfhostedCache;
+          substituters =
+            if cfg.useSelfhostedCache then
+              [
+                # TESTING
+                "https://minio.kilonull.com/nix-store"
+                selfHostedCacheHost
+              ]
+            else
+              [ ];
+          trusted-public-keys = mkIf cfg.useSelfhostedCache [
+            "gospelCache:9cbn8Wm54BbwpPS0TXw+15wrYZBpfOJt4Fzfbfcq/pc="
+          ];
+        };
+
+        # TODO: Configure distributedBuilds and buildMachines?
+
+        gc = {
+          automatic = lib.mkDefault true;
+          dates = lib.mkDefault "weekly";
+          options = lib.mkDefault "--delete-older-than 30d";
+        };
       };
-
-      # TODO: Configure distributedBuilds and buildMachines?
-
-      gc = {
-        automatic = lib.mkDefault true;
-        dates = lib.mkDefault "weekly";
-        options = lib.mkDefault "--delete-older-than 30d";
-      };
-    };
   };
 }
diff --git a/modules/nixos/programs/android-studio/default.nix b/modules/nixos/programs/android-studio/default.nix
index 599ab9d..a8bc9cd 100644
--- a/modules/nixos/programs/android-studio/default.nix
+++ b/modules/nixos/programs/android-studio/default.nix
@@ -4,18 +4,20 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   cfg = config.${namespace}.programs.android-studio;
-in {
+in
+{
   options.${namespace}.programs.android-studio = {
     enable = lib.mkEnableOption "Android Studio";
   };
 
   config = lib.mkIf cfg.enable {
-    ${namespace}.user.extraGroups = ["kvm"];
+    ${namespace}.user.extraGroups = [ "kvm" ];
 
     programs.adb.enable = true;
 
-    environment.systemPackages = [pkgs.android-studio];
+    environment.systemPackages = [ pkgs.android-studio ];
   };
 }
diff --git a/modules/nixos/security/acme/default.nix b/modules/nixos/security/acme/default.nix
index 8af3e96..00f720a 100644
--- a/modules/nixos/security/acme/default.nix
+++ b/modules/nixos/security/acme/default.nix
@@ -3,11 +3,18 @@
   lib,
   namespace,
   ...
-}: let
-  inherit (lib) mkOption mkEnableOption mkIf types;
+}:
+let
+  inherit (lib)
+    mkOption
+    mkEnableOption
+    mkIf
+    types
+    ;
 
   cfg = config.aa.security.acme;
-in {
+in
+{
   options.aa.security.acme = {
     enable = mkEnableOption "Automatic Certificate Management Environment (ACME)";
     useStaging = mkOption {
@@ -53,7 +60,7 @@ in {
         # own DNS to make `lego` happy (will resolve names to a public IP).
         dnsResolver = "1.1.1.1:53";
         credentialsFile = cfg.dnsCredentialsFile;
-        extraDomainNames = mkIf cfg.isWildcard [("*." + cfg.domainName)];
+        extraDomainNames = mkIf cfg.isWildcard [ ("*." + cfg.domainName) ];
       };
     };
   };
diff --git a/modules/nixos/services/adguardhome/default.nix b/modules/nixos/services/adguardhome/default.nix
index 256ed72..00c369c 100644
--- a/modules/nixos/services/adguardhome/default.nix
+++ b/modules/nixos/services/adguardhome/default.nix
@@ -3,11 +3,18 @@
   lib,
   namespace,
   ...
-}: let
-  inherit (lib) mkIf mkEnableOption mkOption types;
+}:
+let
+  inherit (lib)
+    mkIf
+    mkEnableOption
+    mkOption
+    types
+    ;
 
   cfg = config.${namespace}.services.adguardhome;
-in {
+in
+{
   options.${namespace}.services.adguardhome = {
     enable = mkEnableOption "adguardhome";
     acmeCertName = mkOption {
diff --git a/modules/nixos/services/forgejo/default.nix b/modules/nixos/services/forgejo/default.nix
index 2a4a8c7..95e5c4f 100644
--- a/modules/nixos/services/forgejo/default.nix
+++ b/modules/nixos/services/forgejo/default.nix
@@ -4,12 +4,19 @@
   pkgs,
   namespace,
   ...
-}: let
-  inherit (lib) mkIf mkEnableOption mkOption types;
+}:
+let
+  inherit (lib)
+    mkIf
+    mkEnableOption
+    mkOption
+    types
+    ;
 
   cfg = config.${namespace}.services.forgejo;
   forgejo_cfg = config.services.forgejo;
-in {
+in
+{
   options.${namespace}.services.forgejo = {
     enable = mkEnableOption "forgejo";
     domain = mkOption {
diff --git a/modules/nixos/services/grafana/default.nix b/modules/nixos/services/grafana/default.nix
index a7ddad2..4216654 100644
--- a/modules/nixos/services/grafana/default.nix
+++ b/modules/nixos/services/grafana/default.nix
@@ -4,13 +4,20 @@
   pkgs,
   namespace,
   ...
-}: let
-  inherit (lib) mkIf mkEnableOption mkOption types;
+}:
+let
+  inherit (lib)
+    mkIf
+    mkEnableOption
+    mkOption
+    types
+    ;
 
   cfg = config.${namespace}.services.grafana;
   server_settings = config.services.grafana.settings.server;
   grafana_dashboards = pkgs.${namespace}.teslamate-grafana-dashboards;
-in {
+in
+{
   options.${namespace}.services.grafana = {
     enable = mkEnableOption "grafana";
     acmeCertName = mkOption {
@@ -120,7 +127,10 @@ in {
     };
 
     networking.firewall = {
-      allowedTCPPorts = [80 443];
+      allowedTCPPorts = [
+        80
+        443
+      ];
     };
   };
 }
diff --git a/modules/nixos/services/hydra/default.nix b/modules/nixos/services/hydra/default.nix
index ee288fc..9190b83 100644
--- a/modules/nixos/services/hydra/default.nix
+++ b/modules/nixos/services/hydra/default.nix
@@ -3,9 +3,11 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   cfg = config.${namespace}.services.hydra;
-in {
+in
+{
   options.${namespace}.services.hydra = with lib; {
     enable = mkEnableOption "hydra";
     hostname = mkOption {
@@ -72,7 +74,7 @@ in {
       enable = true;
       hydraURL = "https://${cfg.hostname}";
       notificationSender = "hydra@localhost";
-      buildMachinesFiles = [];
+      buildMachinesFiles = [ ];
       useSubstitutes = true;
       extraConfig = ''
         store_uri = s3://${cfg.s3Bucket}?compression=zstd&parallel-compression=true&write-nar-listing=1&ls-compression=br&log-compression=br&scheme=${cfg.s3Scheme}&endpoint=${cfg.s3Endpoint}&secret-key=${cfg.secretKeyPath}
@@ -103,7 +105,10 @@ in {
         "hydra"
         "hydra-www"
       ];
-      allowed-uris = ["github:" "git+https://git.alejandr0angul0.dev/"];
+      allowed-uris = [
+        "github:"
+        "git+https://git.alejandr0angul0.dev/"
+      ];
     };
   };
 }
diff --git a/modules/nixos/services/loki/default.nix b/modules/nixos/services/loki/default.nix
index ccb9691..c16a3df 100644
--- a/modules/nixos/services/loki/default.nix
+++ b/modules/nixos/services/loki/default.nix
@@ -3,10 +3,12 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   cfg = config.${namespace}.services.loki;
   loki = config.services.loki;
-in {
+in
+{
   options.${namespace}.services.loki = with lib; {
     enable = mkEnableOption "loki";
   };
@@ -102,7 +104,7 @@ in {
     };
 
     networking.firewall = {
-      allowedTCPPorts = [loki.configuration.server.http_listen_port];
+      allowedTCPPorts = [ loki.configuration.server.http_listen_port ];
     };
   };
 }
diff --git a/modules/nixos/services/minio/default.nix b/modules/nixos/services/minio/default.nix
index ae2455a..074396c 100644
--- a/modules/nixos/services/minio/default.nix
+++ b/modules/nixos/services/minio/default.nix
@@ -3,9 +3,11 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   cfg = config.${namespace}.services.minio;
-in {
+in
+{
   options.${namespace}.services.minio = with lib; {
     enable = mkEnableOption "minio";
     acmeCertName = mkOption {
diff --git a/modules/nixos/services/mosquitto/default.nix b/modules/nixos/services/mosquitto/default.nix
index 7db6646..eed3c7b 100644
--- a/modules/nixos/services/mosquitto/default.nix
+++ b/modules/nixos/services/mosquitto/default.nix
@@ -2,9 +2,11 @@
   config,
   lib,
   ...
-}: let
+}:
+let
   cfg = config.aa.services.mosquitto;
-in {
+in
+{
   options.aa.services.mosquitto = with lib; {
     enable = mkEnableOption "home assistant";
   };
@@ -36,7 +38,7 @@ in {
               passwordFile = config.age.secrets.theengs_ble_mqtt.path;
             };
             teslamate = {
-              acl = ["readwrite teslamate/#"];
+              acl = [ "readwrite teslamate/#" ];
               passwordFile = config.age.secrets.teslamate_mqtt.path;
             };
           };
@@ -44,6 +46,6 @@ in {
       ];
     };
 
-    networking.firewall.allowedTCPPorts = [1883];
+    networking.firewall.allowedTCPPorts = [ 1883 ];
   };
 }
diff --git a/modules/nixos/services/nix-serve/default.nix b/modules/nixos/services/nix-serve/default.nix
index 37eda6e..80f0dce 100644
--- a/modules/nixos/services/nix-serve/default.nix
+++ b/modules/nixos/services/nix-serve/default.nix
@@ -3,9 +3,11 @@
   lib,
   pkgs,
   ...
-}: let
+}:
+let
   cfg = config.aa.services.nix-serve;
-in {
+in
+{
   options.aa.services.nix-serve = with lib; {
     enable = mkEnableOption "nix-serve";
     domain_name = mkOption {
@@ -28,11 +30,11 @@ in {
 
   config = lib.mkIf cfg.enable {
     nix.settings = {
-      allowed-users = ["nix-serve"];
-      trusted-users = ["nix-serve"];
+      allowed-users = [ "nix-serve" ];
+      trusted-users = [ "nix-serve" ];
     };
 
-    environment.systemPackages = [pkgs.nix-serve];
+    environment.systemPackages = [ pkgs.nix-serve ];
 
     services = {
       nix-serve = {
@@ -45,7 +47,7 @@ in {
         enable = true;
         virtualHosts."${cfg.subdomain_name}.${cfg.domain_name}" =
           {
-            serverAliases = ["${cfg.subdomain_name}"];
+            serverAliases = [ "${cfg.subdomain_name}" ];
             locations."/".extraConfig = ''
               proxy_pass http://localhost:${toString config.services.nix-serve.port};
               proxy_set_header Host $host;
@@ -61,7 +63,10 @@ in {
     };
 
     networking.firewall = {
-      allowedTCPPorts = [80 443];
+      allowedTCPPorts = [
+        80
+        443
+      ];
     };
   };
 }
diff --git a/modules/nixos/services/octoprint/default.nix b/modules/nixos/services/octoprint/default.nix
index e9ecc22..35cde36 100644
--- a/modules/nixos/services/octoprint/default.nix
+++ b/modules/nixos/services/octoprint/default.nix
@@ -2,9 +2,11 @@
   config,
   lib,
   ...
-}: let
+}:
+let
   cfg = config.aa.services.octoprint;
-in {
+in
+{
   options.aa.services.octoprint = with lib; {
     enable = mkEnableOption "octoprint";
     acmeCertName = mkOption {
@@ -39,6 +41,9 @@ in {
         };
     };
 
-    networking.firewall.allowedTCPPorts = [80 443];
+    networking.firewall.allowedTCPPorts = [
+      80
+      443
+    ];
   };
 }
diff --git a/modules/nixos/services/openssh/default.nix b/modules/nixos/services/openssh/default.nix
index c1d2463..f5fe40a 100644
--- a/modules/nixos/services/openssh/default.nix
+++ b/modules/nixos/services/openssh/default.nix
@@ -3,17 +3,25 @@
   lib,
   format,
   ...
-}: let
-  inherit (lib) mkIf mkEnableOption mkOption mkDefault types;
+}:
+let
+  inherit (lib)
+    mkIf
+    mkEnableOption
+    mkOption
+    mkDefault
+    types
+    ;
 
   cfg = config.aa.services.openssh;
   default-key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEmPdQcM0KCQ3YunF1gwN+B+i1Q8KrIfiUvNtgFQjTy2";
-in {
+in
+{
   options.aa.services.openssh = {
     enable = mkEnableOption "ssh";
     authorizedKeys = mkOption {
       type = types.listOf types.str;
-      default = [default-key];
+      default = [ default-key ];
       description = "The public keys to authorize";
     };
   };
@@ -23,11 +31,7 @@ in {
       enable = true;
       settings = {
         PasswordAuthentication = false;
-        PermitRootLogin = mkDefault (
-          if format == "install-iso"
-          then "yes"
-          else "no"
-        );
+        PermitRootLogin = mkDefault (if format == "install-iso" then "yes" else "no");
       };
     };
 
diff --git a/modules/nixos/services/printing/default.nix b/modules/nixos/services/printing/default.nix
index e716904..2937a37 100644
--- a/modules/nixos/services/printing/default.nix
+++ b/modules/nixos/services/printing/default.nix
@@ -2,9 +2,11 @@
   config,
   lib,
   ...
-}: let
+}:
+let
   cfg = config.aa.apps.steam;
-in {
+in
+{
   options.aa.services.printing = with lib; {
     enable = mkEnableOption "printing";
   };
diff --git a/modules/nixos/services/prometheus/default.nix b/modules/nixos/services/prometheus/default.nix
index 25eb0a5..e6a04fa 100644
--- a/modules/nixos/services/prometheus/default.nix
+++ b/modules/nixos/services/prometheus/default.nix
@@ -2,12 +2,14 @@
   config,
   lib,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf;
 
   cfg = config.aa.services.prometheus;
   exporters = config.services.prometheus.exporters;
-in {
+in
+{
   options.aa.services.prometheus = with lib; {
     enable = mkEnableOption "prometheus";
     enableServer = mkOption {
@@ -28,7 +30,7 @@ in {
       exporters = {
         node = {
           enable = cfg.enableNodeExporter;
-          enabledCollectors = ["systemd"];
+          enabledCollectors = [ "systemd" ];
           port = 9002;
           openFirewall = true;
         };
@@ -52,7 +54,7 @@ in {
     };
 
     networking.firewall = mkIf cfg.enableServer {
-      allowedTCPPorts = [config.services.prometheus.port];
+      allowedTCPPorts = [ config.services.prometheus.port ];
     };
   };
 }
diff --git a/modules/nixos/services/promtail/default.nix b/modules/nixos/services/promtail/default.nix
index b4ffddf..0c407d0 100644
--- a/modules/nixos/services/promtail/default.nix
+++ b/modules/nixos/services/promtail/default.nix
@@ -2,9 +2,11 @@
   config,
   lib,
   ...
-}: let
+}:
+let
   cfg = config.aa.services.promtail;
-in {
+in
+{
   options.aa.services.promtail = with lib; {
     enable = mkEnableOption "promtail";
   };
@@ -38,7 +40,7 @@ in {
             };
             relabel_configs = [
               {
-                source_labels = ["__journal__systemd_unit"];
+                source_labels = [ "__journal__systemd_unit" ];
                 target_label = "unit";
               }
             ];
diff --git a/modules/nixos/services/tailscale/default.nix b/modules/nixos/services/tailscale/default.nix
index 9510931..c85c5a6 100644
--- a/modules/nixos/services/tailscale/default.nix
+++ b/modules/nixos/services/tailscale/default.nix
@@ -3,11 +3,13 @@
   pkgs,
   lib,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf;
 
   cfg = config.aa.services.tailscale;
-in {
+in
+{
   options.aa.services.tailscale = with lib; {
     enable = mkEnableOption "tailscale";
     configureClientRouting = mkOption {
@@ -35,18 +37,14 @@ in {
       tailscale
       tailscale-systray
     ];
-    networking.firewall.allowedUDPPorts = [config.services.tailscale.port];
+    networking.firewall.allowedUDPPorts = [ config.services.tailscale.port ];
     services.tailscale = {
       enable = true;
       useRoutingFeatures = mkIf (cfg.configureClientRouting || cfg.configureServerRouting) (
-        if (cfg.configureClientRouting && cfg.configureServerRouting)
-        then "both"
+        if (cfg.configureClientRouting && cfg.configureServerRouting) then
+          "both"
         else
-          (
-            if cfg.configureClientRouting
-            then "client"
-            else "server"
-          )
+          (if cfg.configureClientRouting then "client" else "server")
       );
     };
   };
diff --git a/modules/nixos/services/teslamate/default.nix b/modules/nixos/services/teslamate/default.nix
index fe6ff13..4c35ff4 100644
--- a/modules/nixos/services/teslamate/default.nix
+++ b/modules/nixos/services/teslamate/default.nix
@@ -2,9 +2,11 @@
   config,
   lib,
   ...
-}: let
+}:
+let
   cfg = config.aa.services.teslamate;
-in {
+in
+{
   options.aa.services.teslamate = with lib; {
     enable = mkEnableOption "teslamate";
 
@@ -104,7 +106,7 @@ in {
       backend = "docker";
       containers."teslamate" = {
         image = "teslamate/teslamate:1.32";
-        environmentFiles = ["/var/lib/teslamate/env"];
+        environmentFiles = [ "/var/lib/teslamate/env" ];
         environment = {
           # TODO: Make this configurable
           PORT = "4000";
@@ -116,9 +118,12 @@ in {
           MQTT_USERNAME = "teslamate";
           TZ = "America/Los_Angeles";
         };
-        extraOptions = ["--cap-drop=all" "--network=host"];
+        extraOptions = [
+          "--cap-drop=all"
+          "--network=host"
+        ];
         # TODO: Make this configurable
-        ports = ["4000:4000"];
+        ports = [ "4000:4000" ];
       };
     };
 
@@ -126,12 +131,12 @@ in {
       isSystemUser = true;
       group = cfg.group;
     };
-    users.groups.${cfg.group} = {};
+    users.groups.${cfg.group} = { };
 
     services.postgresql = lib.optionalAttrs cfg.database.createDatabase {
       enable = lib.mkDefault true;
 
-      ensureDatabases = [cfg.database.name];
+      ensureDatabases = [ cfg.database.name ];
       ensureUsers = [
         {
           name = cfg.database.user;
@@ -157,6 +162,6 @@ in {
         };
     };
 
-    networking.firewall.allowedTCPPorts = [4000];
+    networking.firewall.allowedTCPPorts = [ 4000 ];
   };
 }
diff --git a/modules/nixos/suites/desktop/default.nix b/modules/nixos/suites/desktop/default.nix
index 9710f78..7f30b46 100644
--- a/modules/nixos/suites/desktop/default.nix
+++ b/modules/nixos/suites/desktop/default.nix
@@ -3,11 +3,13 @@
   lib,
   namespace,
   ...
-}: let
+}:
+let
   inherit (lib) mkEnableOption mkIf;
 
   cfg = config.${namespace}.suites.desktop;
-in {
+in
+{
   options.${namespace}.suites.desktop = {
     enable = mkEnableOption "common desktop configuration";
   };
@@ -19,7 +21,7 @@ in {
     # The following fixes an issue with using swaylcock as a home module
     # Workaround for https://github.com/NixOS/nixpkgs/issues/158025
     # This comment specifically: https://github.com/NixOS/nixpkgs/issues/158025#issuecomment-1344766809
-    security.pam.services.swaylock = {};
+    security.pam.services.swaylock = { };
 
     # Required for GUIs (like sway) to work correctly.
     hardware.graphics.enable = true;
diff --git a/modules/nixos/suites/development/default.nix b/modules/nixos/suites/development/default.nix
index 9ac938a..af13138 100644
--- a/modules/nixos/suites/development/default.nix
+++ b/modules/nixos/suites/development/default.nix
@@ -3,10 +3,12 @@
   lib,
   pkgs,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf mkEnableOption;
   cfg = config.aa.suites.development;
-in {
+in
+{
   options.aa.suites.development = {
     enable = mkEnableOption "common configuration";
   };
diff --git a/modules/nixos/suites/gaming/default.nix b/modules/nixos/suites/gaming/default.nix
index c6b4124..6d2c8f2 100644
--- a/modules/nixos/suites/gaming/default.nix
+++ b/modules/nixos/suites/gaming/default.nix
@@ -5,9 +5,11 @@
   pkgs,
   ...
 }:
-with lib; let
+with lib;
+let
   cfg = config.aa.suites.gaming;
-in {
+in
+{
   options.aa.suites.gaming = with lib.types; {
     enable = mkEnableOption "gaming configuration";
   };
diff --git a/modules/nixos/suites/utils/default.nix b/modules/nixos/suites/utils/default.nix
index 4d62f3b..76a3d1f 100644
--- a/modules/nixos/suites/utils/default.nix
+++ b/modules/nixos/suites/utils/default.nix
@@ -4,11 +4,13 @@
   pkgs,
   inputs,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf mkEnableOption;
 
   cfg = config.aa.suites.utils;
-in {
+in
+{
   options.aa.suites.utils = {
     enable = mkEnableOption "common configuration";
   };
@@ -38,6 +40,6 @@ in {
         usbutils
         wget
       ])
-      ++ [inputs.agenix.packages.x86_64-linux.default];
+      ++ [ inputs.agenix.packages.x86_64-linux.default ];
   };
 }
diff --git a/modules/nixos/system/fonts/default.nix b/modules/nixos/system/fonts/default.nix
index 1a6b7e4..3ccb469 100644
--- a/modules/nixos/system/fonts/default.nix
+++ b/modules/nixos/system/fonts/default.nix
@@ -5,9 +5,11 @@
   lib,
   ...
 }:
-with lib; let
+with lib;
+let
   cfg = config.aa.system.fonts;
-in {
+in
+{
   options.aa.system.fonts = with types; {
     enable = mkEnableOption "manage fonts";
   };
diff --git a/modules/nixos/system/monitoring/default.nix b/modules/nixos/system/monitoring/default.nix
index 07f8161..5aa1af5 100644
--- a/modules/nixos/system/monitoring/default.nix
+++ b/modules/nixos/system/monitoring/default.nix
@@ -3,11 +3,13 @@
   pkgs,
   lib,
   ...
-}: let
+}:
+let
   inherit (lib) mkIf mkEnableOption;
 
   cfg = config.aa.system.monitoring;
-in {
+in
+{
   options.aa.system.monitoring = {
     enable = mkEnableOption "monitoring";
   };
diff --git a/modules/nixos/system/zfs/default.nix b/modules/nixos/system/zfs/default.nix
index ef466d6..f542b61 100644
--- a/modules/nixos/system/zfs/default.nix
+++ b/modules/nixos/system/zfs/default.nix
@@ -5,16 +5,18 @@
   lib,
   ...
 }:
-with lib; let
+with lib;
+let
   cfg = config.aa.system.zfs;
-in {
+in
+{
   options.aa.system.zfs = with types; {
     enable = mkEnableOption "zfs";
     # TODO: Introduce a zfsOnRoot option
   };
 
   config = mkIf cfg.enable {
-    environment.systemPackages = [pkgs.zfs-prune-snapshots];
+    environment.systemPackages = [ pkgs.zfs-prune-snapshots ];
 
     services.zfs = {
       autoScrub.enable = true;
diff --git a/modules/nixos/user/default.nix b/modules/nixos/user/default.nix
index dac33ca..67bea25 100644
--- a/modules/nixos/user/default.nix
+++ b/modules/nixos/user/default.nix
@@ -5,9 +5,11 @@
   lib,
   ...
 }:
-with lib; let
+with lib;
+let
   cfg = config.aa.user;
-in {
+in
+{
   options.aa.user = with types; {
     name = mkOption {
       type = str;
@@ -26,12 +28,15 @@ in {
     };
     extraGroups = mkOption {
       type = listOf str;
-      default = ["video" "networkmanager"];
+      default = [
+        "video"
+        "networkmanager"
+      ];
       description = "Groups to for the user to be assigned.";
     };
     extraOptions = mkOption {
       type = attrs;
-      default = {};
+      default = { };
       description = "Extra options passed to <option>users.users.<name></option>.";
     };
   };
@@ -42,19 +47,17 @@ in {
     # Refer to modules/tools/zsh/default.nix
     programs.zsh.enable = true;
 
-    users.users.${cfg.name} =
-      {
-        isNormalUser = true;
+    users.users.${cfg.name} = {
+      isNormalUser = true;
 
-        inherit (cfg) name;
+      inherit (cfg) name;
 
-        home = "/home/${cfg.name}";
-        group = "users";
+      home = "/home/${cfg.name}";
+      group = "users";
 
-        shell = pkgs.zsh;
+      shell = pkgs.zsh;
 
-        extraGroups = ["wheel"] ++ cfg.extraGroups;
-      }
-      // cfg.extraOptions;
+      extraGroups = [ "wheel" ] ++ cfg.extraGroups;
+    } // cfg.extraOptions;
   };
 }
diff --git a/overlays/neovim/default.nix b/overlays/neovim/default.nix
index def6d20..c150bbd 100644
--- a/overlays/neovim/default.nix
+++ b/overlays/neovim/default.nix
@@ -1,3 +1,4 @@
-{nixvim, ...}: (final: prev: {
+{ nixvim, ... }:
+(final: prev: {
   neovim = nixvim.packages.${prev.system}.default;
 })
diff --git a/packages/teslamate/default.nix b/packages/teslamate/default.nix
index 5362421..d76365d 100644
--- a/packages/teslamate/default.nix
+++ b/packages/teslamate/default.nix
@@ -7,7 +7,8 @@
   nodejs,
   breakpointHook,
   ...
-}: let
+}:
+let
   pname = "teslamate";
   version = "1.28.2";
 
@@ -23,29 +24,29 @@
 
     overrides = (
       final: prev:
-        (lib.mapAttrs
-          (_: value:
-            value.override {
-              appConfigPath = src + "/config";
-            })
-          prev)
-        // {
-          ex_cldr = prev.ex_cldr.overrideAttrs (old: rec {
-            # Copied from https://github.com/NixOS/nixpkgs/blob/d8fd23629b3910e8bdbd313e29532d3e33dd73d5/pkgs/servers/mobilizon/default.nix#L34-L47
-            version = "2.37.5";
-            # We have to use the GitHub sources, as it otherwise tries to download
-            # the locales at build time.
-            src = fetchFromGitHub {
-              owner = "elixir-cldr";
-              repo = "cldr";
-              rev = "v${version}";
-              sha256 = "sha256-T5Qvuo+xPwpgBsqHNZYnTCA4loToeBn1LKTMsDcCdYs=";
-            };
-            postInstall = ''
-              cp $src/priv/cldr/locales/* $out/lib/erlang/lib/ex_cldr-${old.version}/priv/cldr/locales/
-            '';
-          });
+      (lib.mapAttrs (
+        _: value:
+        value.override {
+          appConfigPath = src + "/config";
         }
+      ) prev)
+      // {
+        ex_cldr = prev.ex_cldr.overrideAttrs (old: rec {
+          # Copied from https://github.com/NixOS/nixpkgs/blob/d8fd23629b3910e8bdbd313e29532d3e33dd73d5/pkgs/servers/mobilizon/default.nix#L34-L47
+          version = "2.37.5";
+          # We have to use the GitHub sources, as it otherwise tries to download
+          # the locales at build time.
+          src = fetchFromGitHub {
+            owner = "elixir-cldr";
+            repo = "cldr";
+            rev = "v${version}";
+            sha256 = "sha256-T5Qvuo+xPwpgBsqHNZYnTCA4loToeBn1LKTMsDcCdYs=";
+          };
+          postInstall = ''
+            cp $src/priv/cldr/locales/* $out/lib/erlang/lib/ex_cldr-${old.version}/priv/cldr/locales/
+          '';
+        });
+      }
     );
   };
 
@@ -54,7 +55,7 @@
     inherit version;
     src = "${src}/assets";
     npmDepsHash = "sha256-h92i/cRf4I0c4vUc6oBt5T4yvM0JNQMkoDy2YHcVWS4=";
-    patches = [./deploy_output.patch];
+    patches = [ ./deploy_output.patch ];
     dontNpmBuild = true;
     installPhase = ''
       runHook preinstall
@@ -74,20 +75,25 @@
     '';
   };
 in
-  beamPackages.mixRelease {
-    inherit pname version src mixNixDeps;
+beamPackages.mixRelease {
+  inherit
+    pname
+    version
+    src
+    mixNixDeps
+    ;
 
-    nativeBuildInputs = [nodejs];
+  nativeBuildInputs = [ nodejs ];
 
-    preBuild = ''
-      mkdir -p priv/static/assets
-      # assets patched to write to scripts/deploy_output
-      cp -r ${assets}/scripts/deploy_output ./priv/static/assets
-    '';
+  preBuild = ''
+    mkdir -p priv/static/assets
+    # assets patched to write to scripts/deploy_output
+    cp -r ${assets}/scripts/deploy_output ./priv/static/assets
+  '';
 
-    postBuild = ''
-      # for external task you need a workaround for the no deps check flag
-      # https://github.com/phoenixframework/phoenix/issues/2690
-      mix do deps.loadpaths --no-deps-check phx.digest, release --overwrite
-    '';
-  }
+  postBuild = ''
+    # for external task you need a workaround for the no deps check flag
+    # https://github.com/phoenixframework/phoenix/issues/2690
+    mix do deps.loadpaths --no-deps-check phx.digest, release --overwrite
+  '';
+}
diff --git a/packages/teslamate/mix.nix b/packages/teslamate/mix.nix
index 41ef738..63fb865 100644
--- a/packages/teslamate/mix.nix
+++ b/packages/teslamate/mix.nix
@@ -1,4 +1,8 @@
-{ lib, beamPackages, overrides ? (x: y: {}) }:
+{
+  lib,
+  beamPackages,
+  overrides ? (x: y: { }),
+}:
 
 let
   buildRebar3 = lib.makeOverridable beamPackages.buildRebar3;
@@ -7,825 +11,934 @@ let
 
   self = packages // (overrides self packages);
 
-  packages = with beamPackages; with self; {
-    bunt = buildMix rec {
-      name = "bunt";
-      version = "0.2.1";
+  packages =
+    with beamPackages;
+    with self;
+    {
+      bunt = buildMix rec {
+        name = "bunt";
+        version = "0.2.1";
 
-      src = fetchHex {
-        pkg = "bunt";
-        version = "${version}";
-        sha256 = "a330bfb4245239787b15005e66ae6845c9cd524a288f0d141c148b02603777a5";
+        src = fetchHex {
+          pkg = "bunt";
+          version = "${version}";
+          sha256 = "a330bfb4245239787b15005e66ae6845c9cd524a288f0d141c148b02603777a5";
+        };
+
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      castore = buildMix rec {
+        name = "castore";
+        version = "1.0.4";
 
-    castore = buildMix rec {
-      name = "castore";
-      version = "1.0.4";
+        src = fetchHex {
+          pkg = "castore";
+          version = "${version}";
+          sha256 = "9418c1b8144e11656f0be99943db4caf04612e3eaecefb5dae9a2a87565584f8";
+        };
 
-      src = fetchHex {
-        pkg = "castore";
-        version = "${version}";
-        sha256 = "9418c1b8144e11656f0be99943db4caf04612e3eaecefb5dae9a2a87565584f8";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      certifi = buildRebar3 rec {
+        name = "certifi";
+        version = "2.12.0";
 
-    certifi = buildRebar3 rec {
-      name = "certifi";
-      version = "2.12.0";
+        src = fetchHex {
+          pkg = "certifi";
+          version = "${version}";
+          sha256 = "ee68d85df22e554040cdb4be100f33873ac6051387baf6a8f6ce82272340ff1c";
+        };
 
-      src = fetchHex {
-        pkg = "certifi";
-        version = "${version}";
-        sha256 = "ee68d85df22e554040cdb4be100f33873ac6051387baf6a8f6ce82272340ff1c";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      cldr_utils = buildMix rec {
+        name = "cldr_utils";
+        version = "2.24.2";
 
-    cldr_utils = buildMix rec {
-      name = "cldr_utils";
-      version = "2.24.2";
+        src = fetchHex {
+          pkg = "cldr_utils";
+          version = "${version}";
+          sha256 = "3362b838836a9f0fa309de09a7127e36e67310e797d556db92f71b548832c7cf";
+        };
 
-      src = fetchHex {
-        pkg = "cldr_utils";
-        version = "${version}";
-        sha256 = "3362b838836a9f0fa309de09a7127e36e67310e797d556db92f71b548832c7cf";
+        beamDeps = [
+          castore
+          certifi
+          decimal
+        ];
       };
 
-      beamDeps = [ castore certifi decimal ];
-    };
+      cloak = buildMix rec {
+        name = "cloak";
+        version = "1.1.2";
 
-    cloak = buildMix rec {
-      name = "cloak";
-      version = "1.1.2";
+        src = fetchHex {
+          pkg = "cloak";
+          version = "${version}";
+          sha256 = "940d5ac4fcd51b252930fd112e319ea5ae6ab540b722f3ca60a85666759b9585";
+        };
 
-      src = fetchHex {
-        pkg = "cloak";
-        version = "${version}";
-        sha256 = "940d5ac4fcd51b252930fd112e319ea5ae6ab540b722f3ca60a85666759b9585";
+        beamDeps = [ jason ];
       };
 
-      beamDeps = [ jason ];
-    };
+      cloak_ecto = buildMix rec {
+        name = "cloak_ecto";
+        version = "1.2.0";
 
-    cloak_ecto = buildMix rec {
-      name = "cloak_ecto";
-      version = "1.2.0";
+        src = fetchHex {
+          pkg = "cloak_ecto";
+          version = "${version}";
+          sha256 = "8bcc677185c813fe64b786618bd6689b1707b35cd95acaae0834557b15a0c62f";
+        };
 
-      src = fetchHex {
-        pkg = "cloak_ecto";
-        version = "${version}";
-        sha256 = "8bcc677185c813fe64b786618bd6689b1707b35cd95acaae0834557b15a0c62f";
+        beamDeps = [
+          cloak
+          ecto
+        ];
       };
 
-      beamDeps = [ cloak ecto ];
-    };
+      combine = buildMix rec {
+        name = "combine";
+        version = "0.10.0";
 
-    combine = buildMix rec {
-      name = "combine";
-      version = "0.10.0";
+        src = fetchHex {
+          pkg = "combine";
+          version = "${version}";
+          sha256 = "1b1dbc1790073076580d0d1d64e42eae2366583e7aecd455d1215b0d16f2451b";
+        };
 
-      src = fetchHex {
-        pkg = "combine";
-        version = "${version}";
-        sha256 = "1b1dbc1790073076580d0d1d64e42eae2366583e7aecd455d1215b0d16f2451b";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      cowboy = buildErlangMk rec {
+        name = "cowboy";
+        version = "2.10.0";
 
-    cowboy = buildErlangMk rec {
-      name = "cowboy";
-      version = "2.10.0";
+        src = fetchHex {
+          pkg = "cowboy";
+          version = "${version}";
+          sha256 = "3afdccb7183cc6f143cb14d3cf51fa00e53db9ec80cdcd525482f5e99bc41d6b";
+        };
 
-      src = fetchHex {
-        pkg = "cowboy";
-        version = "${version}";
-        sha256 = "3afdccb7183cc6f143cb14d3cf51fa00e53db9ec80cdcd525482f5e99bc41d6b";
+        beamDeps = [
+          cowlib
+          ranch
+        ];
       };
 
-      beamDeps = [ cowlib ranch ];
-    };
+      cowboy_telemetry = buildRebar3 rec {
+        name = "cowboy_telemetry";
+        version = "0.4.0";
 
-    cowboy_telemetry = buildRebar3 rec {
-      name = "cowboy_telemetry";
-      version = "0.4.0";
+        src = fetchHex {
+          pkg = "cowboy_telemetry";
+          version = "${version}";
+          sha256 = "7d98bac1ee4565d31b62d59f8823dfd8356a169e7fcbb83831b8a5397404c9de";
+        };
 
-      src = fetchHex {
-        pkg = "cowboy_telemetry";
-        version = "${version}";
-        sha256 = "7d98bac1ee4565d31b62d59f8823dfd8356a169e7fcbb83831b8a5397404c9de";
+        beamDeps = [
+          cowboy
+          telemetry
+        ];
       };
 
-      beamDeps = [ cowboy telemetry ];
-    };
+      cowlib = buildRebar3 rec {
+        name = "cowlib";
+        version = "2.12.1";
 
-    cowlib = buildRebar3 rec {
-      name = "cowlib";
-      version = "2.12.1";
+        src = fetchHex {
+          pkg = "cowlib";
+          version = "${version}";
+          sha256 = "163b73f6367a7341b33c794c4e88e7dbfe6498ac42dcd69ef44c5bc5507c8db0";
+        };
 
-      src = fetchHex {
-        pkg = "cowlib";
-        version = "${version}";
-        sha256 = "163b73f6367a7341b33c794c4e88e7dbfe6498ac42dcd69ef44c5bc5507c8db0";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      credo = buildMix rec {
+        name = "credo";
+        version = "1.7.1";
 
-    credo = buildMix rec {
-      name = "credo";
-      version = "1.7.1";
+        src = fetchHex {
+          pkg = "credo";
+          version = "${version}";
+          sha256 = "e9871c6095a4c0381c89b6aa98bc6260a8ba6addccf7f6a53da8849c748a58a2";
+        };
 
-      src = fetchHex {
-        pkg = "credo";
-        version = "${version}";
-        sha256 = "e9871c6095a4c0381c89b6aa98bc6260a8ba6addccf7f6a53da8849c748a58a2";
+        beamDeps = [
+          bunt
+          file_system
+          jason
+        ];
       };
 
-      beamDeps = [ bunt file_system jason ];
-    };
+      db_connection = buildMix rec {
+        name = "db_connection";
+        version = "2.6.0";
 
-    db_connection = buildMix rec {
-      name = "db_connection";
-      version = "2.6.0";
+        src = fetchHex {
+          pkg = "db_connection";
+          version = "${version}";
+          sha256 = "c2f992d15725e721ec7fbc1189d4ecdb8afef76648c746a8e1cad35e3b8a35f3";
+        };
 
-      src = fetchHex {
-        pkg = "db_connection";
-        version = "${version}";
-        sha256 = "c2f992d15725e721ec7fbc1189d4ecdb8afef76648c746a8e1cad35e3b8a35f3";
+        beamDeps = [ telemetry ];
       };
 
-      beamDeps = [ telemetry ];
-    };
+      decimal = buildMix rec {
+        name = "decimal";
+        version = "2.1.1";
 
-    decimal = buildMix rec {
-      name = "decimal";
-      version = "2.1.1";
+        src = fetchHex {
+          pkg = "decimal";
+          version = "${version}";
+          sha256 = "53cfe5f497ed0e7771ae1a475575603d77425099ba5faef9394932b35020ffcc";
+        };
 
-      src = fetchHex {
-        pkg = "decimal";
-        version = "${version}";
-        sha256 = "53cfe5f497ed0e7771ae1a475575603d77425099ba5faef9394932b35020ffcc";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      dialyxir = buildMix rec {
+        name = "dialyxir";
+        version = "1.4.2";
 
-    dialyxir = buildMix rec {
-      name = "dialyxir";
-      version = "1.4.2";
+        src = fetchHex {
+          pkg = "dialyxir";
+          version = "${version}";
+          sha256 = "516603d8067b2fd585319e4b13d3674ad4f314a5902ba8130cd97dc902ce6bbd";
+        };
 
-      src = fetchHex {
-        pkg = "dialyxir";
-        version = "${version}";
-        sha256 = "516603d8067b2fd585319e4b13d3674ad4f314a5902ba8130cd97dc902ce6bbd";
+        beamDeps = [ erlex ];
       };
 
-      beamDeps = [ erlex ];
-    };
+      ecto = buildMix rec {
+        name = "ecto";
+        version = "3.10.3";
 
-    ecto = buildMix rec {
-      name = "ecto";
-      version = "3.10.3";
+        src = fetchHex {
+          pkg = "ecto";
+          version = "${version}";
+          sha256 = "44bec74e2364d491d70f7e42cd0d690922659d329f6465e89feb8a34e8cd3433";
+        };
 
-      src = fetchHex {
-        pkg = "ecto";
-        version = "${version}";
-        sha256 = "44bec74e2364d491d70f7e42cd0d690922659d329f6465e89feb8a34e8cd3433";
+        beamDeps = [
+          decimal
+          jason
+          telemetry
+        ];
       };
 
-      beamDeps = [ decimal jason telemetry ];
-    };
+      ecto_sql = buildMix rec {
+        name = "ecto_sql";
+        version = "3.10.2";
 
-    ecto_sql = buildMix rec {
-      name = "ecto_sql";
-      version = "3.10.2";
+        src = fetchHex {
+          pkg = "ecto_sql";
+          version = "${version}";
+          sha256 = "68c018debca57cb9235e3889affdaec7a10616a4e3a80c99fa1d01fdafaa9007";
+        };
 
-      src = fetchHex {
-        pkg = "ecto_sql";
-        version = "${version}";
-        sha256 = "68c018debca57cb9235e3889affdaec7a10616a4e3a80c99fa1d01fdafaa9007";
+        beamDeps = [
+          db_connection
+          ecto
+          postgrex
+          telemetry
+        ];
       };
 
-      beamDeps = [ db_connection ecto postgrex telemetry ];
-    };
+      erlex = buildMix rec {
+        name = "erlex";
+        version = "0.2.6";
 
-    erlex = buildMix rec {
-      name = "erlex";
-      version = "0.2.6";
+        src = fetchHex {
+          pkg = "erlex";
+          version = "${version}";
+          sha256 = "2ed2e25711feb44d52b17d2780eabf998452f6efda104877a3881c2f8c0c0c75";
+        };
 
-      src = fetchHex {
-        pkg = "erlex";
-        version = "${version}";
-        sha256 = "2ed2e25711feb44d52b17d2780eabf998452f6efda104877a3881c2f8c0c0c75";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      ex_cldr = buildMix rec {
+        name = "ex_cldr";
+        version = "2.37.5";
 
-    ex_cldr = buildMix rec {
-      name = "ex_cldr";
-      version = "2.37.5";
+        src = fetchHex {
+          pkg = "ex_cldr";
+          version = "${version}";
+          sha256 = "74ad5ddff791112ce4156382e171a5f5d3766af9d5c4675e0571f081fe136479";
+        };
 
-      src = fetchHex {
-        pkg = "ex_cldr";
-        version = "${version}";
-        sha256 = "74ad5ddff791112ce4156382e171a5f5d3766af9d5c4675e0571f081fe136479";
+        beamDeps = [
+          cldr_utils
+          decimal
+          gettext
+          jason
+        ];
       };
 
-      beamDeps = [ cldr_utils decimal gettext jason ];
-    };
+      ex_cldr_plugs = buildMix rec {
+        name = "ex_cldr_plugs";
+        version = "1.3.1";
 
-    ex_cldr_plugs = buildMix rec {
-      name = "ex_cldr_plugs";
-      version = "1.3.1";
+        src = fetchHex {
+          pkg = "ex_cldr_plugs";
+          version = "${version}";
+          sha256 = "4f7b4a5fe061734cef7b62ff29118ed6ac72698cdd7bcfc97495db73611fe0fe";
+        };
 
-      src = fetchHex {
-        pkg = "ex_cldr_plugs";
-        version = "${version}";
-        sha256 = "4f7b4a5fe061734cef7b62ff29118ed6ac72698cdd7bcfc97495db73611fe0fe";
+        beamDeps = [
+          ex_cldr
+          gettext
+          jason
+          plug
+        ];
       };
 
-      beamDeps = [ ex_cldr gettext jason plug ];
-    };
+      excoveralls = buildMix rec {
+        name = "excoveralls";
+        version = "0.18.0";
 
-    excoveralls = buildMix rec {
-      name = "excoveralls";
-      version = "0.18.0";
+        src = fetchHex {
+          pkg = "excoveralls";
+          version = "${version}";
+          sha256 = "1109bb911f3cb583401760be49c02cbbd16aed66ea9509fc5479335d284da60b";
+        };
 
-      src = fetchHex {
-        pkg = "excoveralls";
-        version = "${version}";
-        sha256 = "1109bb911f3cb583401760be49c02cbbd16aed66ea9509fc5479335d284da60b";
+        beamDeps = [
+          castore
+          jason
+        ];
       };
 
-      beamDeps = [ castore jason ];
-    };
+      expo = buildMix rec {
+        name = "expo";
+        version = "0.4.1";
 
-    expo = buildMix rec {
-      name = "expo";
-      version = "0.4.1";
+        src = fetchHex {
+          pkg = "expo";
+          version = "${version}";
+          sha256 = "2ff7ba7a798c8c543c12550fa0e2cbc81b95d4974c65855d8d15ba7b37a1ce47";
+        };
 
-      src = fetchHex {
-        pkg = "expo";
-        version = "${version}";
-        sha256 = "2ff7ba7a798c8c543c12550fa0e2cbc81b95d4974c65855d8d15ba7b37a1ce47";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      file_system = buildMix rec {
+        name = "file_system";
+        version = "0.2.10";
 
-    file_system = buildMix rec {
-      name = "file_system";
-      version = "0.2.10";
+        src = fetchHex {
+          pkg = "file_system";
+          version = "${version}";
+          sha256 = "41195edbfb562a593726eda3b3e8b103a309b733ad25f3d642ba49696bf715dc";
+        };
 
-      src = fetchHex {
-        pkg = "file_system";
-        version = "${version}";
-        sha256 = "41195edbfb562a593726eda3b3e8b103a309b733ad25f3d642ba49696bf715dc";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      finch = buildMix rec {
+        name = "finch";
+        version = "0.16.0";
 
-    finch = buildMix rec {
-      name = "finch";
-      version = "0.16.0";
+        src = fetchHex {
+          pkg = "finch";
+          version = "${version}";
+          sha256 = "f660174c4d519e5fec629016054d60edd822cdfe2b7270836739ac2f97735ec5";
+        };
 
-      src = fetchHex {
-        pkg = "finch";
-        version = "${version}";
-        sha256 = "f660174c4d519e5fec629016054d60edd822cdfe2b7270836739ac2f97735ec5";
+        beamDeps = [
+          castore
+          mime
+          mint
+          nimble_options
+          nimble_pool
+          telemetry
+        ];
       };
 
-      beamDeps = [ castore mime mint nimble_options nimble_pool telemetry ];
-    };
+      floki = buildMix rec {
+        name = "floki";
+        version = "0.35.2";
 
-    floki = buildMix rec {
-      name = "floki";
-      version = "0.35.2";
+        src = fetchHex {
+          pkg = "floki";
+          version = "${version}";
+          sha256 = "6b05289a8e9eac475f644f09c2e4ba7e19201fd002b89c28c1293e7bd16773d9";
+        };
 
-      src = fetchHex {
-        pkg = "floki";
-        version = "${version}";
-        sha256 = "6b05289a8e9eac475f644f09c2e4ba7e19201fd002b89c28c1293e7bd16773d9";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      fuse = buildRebar3 rec {
+        name = "fuse";
+        version = "2.5.0";
 
-    fuse = buildRebar3 rec {
-      name = "fuse";
-      version = "2.5.0";
+        src = fetchHex {
+          pkg = "fuse";
+          version = "${version}";
+          sha256 = "7f52a1c84571731ad3c91d569e03131cc220ebaa7e2a11034405f0bac46a4fef";
+        };
 
-      src = fetchHex {
-        pkg = "fuse";
-        version = "${version}";
-        sha256 = "7f52a1c84571731ad3c91d569e03131cc220ebaa7e2a11034405f0bac46a4fef";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      gen_state_machine = buildMix rec {
+        name = "gen_state_machine";
+        version = "3.0.0";
 
-    gen_state_machine = buildMix rec {
-      name = "gen_state_machine";
-      version = "3.0.0";
+        src = fetchHex {
+          pkg = "gen_state_machine";
+          version = "${version}";
+          sha256 = "0a59652574bebceb7309f6b749d2a41b45fdeda8dbb4da0791e355dd19f0ed15";
+        };
 
-      src = fetchHex {
-        pkg = "gen_state_machine";
-        version = "${version}";
-        sha256 = "0a59652574bebceb7309f6b749d2a41b45fdeda8dbb4da0791e355dd19f0ed15";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      gettext = buildMix rec {
+        name = "gettext";
+        version = "0.23.1";
 
-    gettext = buildMix rec {
-      name = "gettext";
-      version = "0.23.1";
+        src = fetchHex {
+          pkg = "gettext";
+          version = "${version}";
+          sha256 = "19d744a36b809d810d610b57c27b934425859d158ebd56561bc41f7eeb8795db";
+        };
 
-      src = fetchHex {
-        pkg = "gettext";
-        version = "${version}";
-        sha256 = "19d744a36b809d810d610b57c27b934425859d158ebd56561bc41f7eeb8795db";
+        beamDeps = [ expo ];
       };
 
-      beamDeps = [ expo ];
-    };
+      hackney = buildRebar3 rec {
+        name = "hackney";
+        version = "1.20.1";
 
-    hackney = buildRebar3 rec {
-      name = "hackney";
-      version = "1.20.1";
+        src = fetchHex {
+          pkg = "hackney";
+          version = "${version}";
+          sha256 = "fe9094e5f1a2a2c0a7d10918fee36bfec0ec2a979994cff8cfe8058cd9af38e3";
+        };
 
-      src = fetchHex {
-        pkg = "hackney";
-        version = "${version}";
-        sha256 = "fe9094e5f1a2a2c0a7d10918fee36bfec0ec2a979994cff8cfe8058cd9af38e3";
+        beamDeps = [
+          certifi
+          idna
+          metrics
+          mimerl
+          parse_trans
+          ssl_verify_fun
+          unicode_util_compat
+        ];
       };
 
-      beamDeps = [ certifi idna metrics mimerl parse_trans ssl_verify_fun unicode_util_compat ];
-    };
+      hpax = buildMix rec {
+        name = "hpax";
+        version = "0.1.2";
 
-    hpax = buildMix rec {
-      name = "hpax";
-      version = "0.1.2";
+        src = fetchHex {
+          pkg = "hpax";
+          version = "${version}";
+          sha256 = "2c87843d5a23f5f16748ebe77969880e29809580efdaccd615cd3bed628a8c13";
+        };
 
-      src = fetchHex {
-        pkg = "hpax";
-        version = "${version}";
-        sha256 = "2c87843d5a23f5f16748ebe77969880e29809580efdaccd615cd3bed628a8c13";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      idna = buildRebar3 rec {
+        name = "idna";
+        version = "6.1.1";
 
-    idna = buildRebar3 rec {
-      name = "idna";
-      version = "6.1.1";
+        src = fetchHex {
+          pkg = "idna";
+          version = "${version}";
+          sha256 = "92376eb7894412ed19ac475e4a86f7b413c1b9fbb5bd16dccd57934157944cea";
+        };
 
-      src = fetchHex {
-        pkg = "idna";
-        version = "${version}";
-        sha256 = "92376eb7894412ed19ac475e4a86f7b413c1b9fbb5bd16dccd57934157944cea";
+        beamDeps = [ unicode_util_compat ];
       };
 
-      beamDeps = [ unicode_util_compat ];
-    };
+      jason = buildMix rec {
+        name = "jason";
+        version = "1.4.1";
 
-    jason = buildMix rec {
-      name = "jason";
-      version = "1.4.1";
+        src = fetchHex {
+          pkg = "jason";
+          version = "${version}";
+          sha256 = "fbb01ecdfd565b56261302f7e1fcc27c4fb8f32d56eab74db621fc154604a7a1";
+        };
 
-      src = fetchHex {
-        pkg = "jason";
-        version = "${version}";
-        sha256 = "fbb01ecdfd565b56261302f7e1fcc27c4fb8f32d56eab74db621fc154604a7a1";
+        beamDeps = [ decimal ];
       };
 
-      beamDeps = [ decimal ];
-    };
+      meck = buildRebar3 rec {
+        name = "meck";
+        version = "0.9.2";
 
-    meck = buildRebar3 rec {
-      name = "meck";
-      version = "0.9.2";
+        src = fetchHex {
+          pkg = "meck";
+          version = "${version}";
+          sha256 = "81344f561357dc40a8344afa53767c32669153355b626ea9fcbc8da6b3045826";
+        };
 
-      src = fetchHex {
-        pkg = "meck";
-        version = "${version}";
-        sha256 = "81344f561357dc40a8344afa53767c32669153355b626ea9fcbc8da6b3045826";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      metrics = buildRebar3 rec {
+        name = "metrics";
+        version = "1.0.1";
 
-    metrics = buildRebar3 rec {
-      name = "metrics";
-      version = "1.0.1";
+        src = fetchHex {
+          pkg = "metrics";
+          version = "${version}";
+          sha256 = "69b09adddc4f74a40716ae54d140f93beb0fb8978d8636eaded0c31b6f099f16";
+        };
 
-      src = fetchHex {
-        pkg = "metrics";
-        version = "${version}";
-        sha256 = "69b09adddc4f74a40716ae54d140f93beb0fb8978d8636eaded0c31b6f099f16";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      mime = buildMix rec {
+        name = "mime";
+        version = "2.0.5";
 
-    mime = buildMix rec {
-      name = "mime";
-      version = "2.0.5";
+        src = fetchHex {
+          pkg = "mime";
+          version = "${version}";
+          sha256 = "da0d64a365c45bc9935cc5c8a7fc5e49a0e0f9932a761c55d6c52b142780a05c";
+        };
 
-      src = fetchHex {
-        pkg = "mime";
-        version = "${version}";
-        sha256 = "da0d64a365c45bc9935cc5c8a7fc5e49a0e0f9932a761c55d6c52b142780a05c";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      mimerl = buildRebar3 rec {
+        name = "mimerl";
+        version = "1.2.0";
 
-    mimerl = buildRebar3 rec {
-      name = "mimerl";
-      version = "1.2.0";
+        src = fetchHex {
+          pkg = "mimerl";
+          version = "${version}";
+          sha256 = "f278585650aa581986264638ebf698f8bb19df297f66ad91b18910dfc6e19323";
+        };
 
-      src = fetchHex {
-        pkg = "mimerl";
-        version = "${version}";
-        sha256 = "f278585650aa581986264638ebf698f8bb19df297f66ad91b18910dfc6e19323";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      mint = buildMix rec {
+        name = "mint";
+        version = "1.5.1";
 
-    mint = buildMix rec {
-      name = "mint";
-      version = "1.5.1";
+        src = fetchHex {
+          pkg = "mint";
+          version = "${version}";
+          sha256 = "4a63e1e76a7c3956abd2c72f370a0d0aecddc3976dea5c27eccbecfa5e7d5b1e";
+        };
 
-      src = fetchHex {
-        pkg = "mint";
-        version = "${version}";
-        sha256 = "4a63e1e76a7c3956abd2c72f370a0d0aecddc3976dea5c27eccbecfa5e7d5b1e";
+        beamDeps = [
+          castore
+          hpax
+        ];
       };
 
-      beamDeps = [ castore hpax ];
-    };
+      mock = buildMix rec {
+        name = "mock";
+        version = "0.3.8";
 
-    mock = buildMix rec {
-      name = "mock";
-      version = "0.3.8";
+        src = fetchHex {
+          pkg = "mock";
+          version = "${version}";
+          sha256 = "7fa82364c97617d79bb7d15571193fc0c4fe5afd0c932cef09426b3ee6fe2022";
+        };
 
-      src = fetchHex {
-        pkg = "mock";
-        version = "${version}";
-        sha256 = "7fa82364c97617d79bb7d15571193fc0c4fe5afd0c932cef09426b3ee6fe2022";
+        beamDeps = [ meck ];
       };
 
-      beamDeps = [ meck ];
-    };
+      nimble_csv = buildMix rec {
+        name = "nimble_csv";
+        version = "1.2.0";
 
-    nimble_csv = buildMix rec {
-      name = "nimble_csv";
-      version = "1.2.0";
+        src = fetchHex {
+          pkg = "nimble_csv";
+          version = "${version}";
+          sha256 = "d0628117fcc2148178b034044c55359b26966c6eaa8e2ce15777be3bbc91b12a";
+        };
 
-      src = fetchHex {
-        pkg = "nimble_csv";
-        version = "${version}";
-        sha256 = "d0628117fcc2148178b034044c55359b26966c6eaa8e2ce15777be3bbc91b12a";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      nimble_options = buildMix rec {
+        name = "nimble_options";
+        version = "1.0.2";
 
-    nimble_options = buildMix rec {
-      name = "nimble_options";
-      version = "1.0.2";
+        src = fetchHex {
+          pkg = "nimble_options";
+          version = "${version}";
+          sha256 = "fd12a8db2021036ce12a309f26f564ec367373265b53e25403f0ee697380f1b8";
+        };
 
-      src = fetchHex {
-        pkg = "nimble_options";
-        version = "${version}";
-        sha256 = "fd12a8db2021036ce12a309f26f564ec367373265b53e25403f0ee697380f1b8";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      nimble_pool = buildMix rec {
+        name = "nimble_pool";
+        version = "1.0.0";
 
-    nimble_pool = buildMix rec {
-      name = "nimble_pool";
-      version = "1.0.0";
+        src = fetchHex {
+          pkg = "nimble_pool";
+          version = "${version}";
+          sha256 = "80be3b882d2d351882256087078e1b1952a28bf98d0a287be87e4a24a710b67a";
+        };
 
-      src = fetchHex {
-        pkg = "nimble_pool";
-        version = "${version}";
-        sha256 = "80be3b882d2d351882256087078e1b1952a28bf98d0a287be87e4a24a710b67a";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      parse_trans = buildRebar3 rec {
+        name = "parse_trans";
+        version = "3.4.1";
 
-    parse_trans = buildRebar3 rec {
-      name = "parse_trans";
-      version = "3.4.1";
+        src = fetchHex {
+          pkg = "parse_trans";
+          version = "${version}";
+          sha256 = "620a406ce75dada827b82e453c19cf06776be266f5a67cff34e1ef2cbb60e49a";
+        };
 
-      src = fetchHex {
-        pkg = "parse_trans";
-        version = "${version}";
-        sha256 = "620a406ce75dada827b82e453c19cf06776be266f5a67cff34e1ef2cbb60e49a";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      phoenix = buildMix rec {
+        name = "phoenix";
+        version = "1.6.16";
 
-    phoenix = buildMix rec {
-      name = "phoenix";
-      version = "1.6.16";
+        src = fetchHex {
+          pkg = "phoenix";
+          version = "${version}";
+          sha256 = "e15989ff34f670a96b95ef6d1d25bad0d9c50df5df40b671d8f4a669e050ac39";
+        };
 
-      src = fetchHex {
-        pkg = "phoenix";
-        version = "${version}";
-        sha256 = "e15989ff34f670a96b95ef6d1d25bad0d9c50df5df40b671d8f4a669e050ac39";
+        beamDeps = [
+          castore
+          jason
+          phoenix_pubsub
+          phoenix_view
+          plug
+          plug_cowboy
+          plug_crypto
+          telemetry
+        ];
       };
 
-      beamDeps = [ castore jason phoenix_pubsub phoenix_view plug plug_cowboy plug_crypto telemetry ];
-    };
+      phoenix_ecto = buildMix rec {
+        name = "phoenix_ecto";
+        version = "4.4.3";
 
-    phoenix_ecto = buildMix rec {
-      name = "phoenix_ecto";
-      version = "4.4.3";
+        src = fetchHex {
+          pkg = "phoenix_ecto";
+          version = "${version}";
+          sha256 = "d36c401206f3011fefd63d04e8ef626ec8791975d9d107f9a0817d426f61ac07";
+        };
 
-      src = fetchHex {
-        pkg = "phoenix_ecto";
-        version = "${version}";
-        sha256 = "d36c401206f3011fefd63d04e8ef626ec8791975d9d107f9a0817d426f61ac07";
+        beamDeps = [
+          ecto
+          phoenix_html
+          plug
+        ];
       };
 
-      beamDeps = [ ecto phoenix_html plug ];
-    };
+      phoenix_html = buildMix rec {
+        name = "phoenix_html";
+        version = "3.3.3";
 
-    phoenix_html = buildMix rec {
-      name = "phoenix_html";
-      version = "3.3.3";
+        src = fetchHex {
+          pkg = "phoenix_html";
+          version = "${version}";
+          sha256 = "923ebe6fec6e2e3b3e569dfbdc6560de932cd54b000ada0208b5f45024bdd76c";
+        };
 
-      src = fetchHex {
-        pkg = "phoenix_html";
-        version = "${version}";
-        sha256 = "923ebe6fec6e2e3b3e569dfbdc6560de932cd54b000ada0208b5f45024bdd76c";
+        beamDeps = [ plug ];
       };
 
-      beamDeps = [ plug ];
-    };
+      phoenix_live_reload = buildMix rec {
+        name = "phoenix_live_reload";
+        version = "1.4.1";
 
-    phoenix_live_reload = buildMix rec {
-      name = "phoenix_live_reload";
-      version = "1.4.1";
+        src = fetchHex {
+          pkg = "phoenix_live_reload";
+          version = "${version}";
+          sha256 = "9bffb834e7ddf08467fe54ae58b5785507aaba6255568ae22b4d46e2bb3615ab";
+        };
 
-      src = fetchHex {
-        pkg = "phoenix_live_reload";
-        version = "${version}";
-        sha256 = "9bffb834e7ddf08467fe54ae58b5785507aaba6255568ae22b4d46e2bb3615ab";
+        beamDeps = [
+          file_system
+          phoenix
+        ];
       };
 
-      beamDeps = [ file_system phoenix ];
-    };
+      phoenix_live_view = buildMix rec {
+        name = "phoenix_live_view";
+        version = "0.17.14";
 
-    phoenix_live_view = buildMix rec {
-      name = "phoenix_live_view";
-      version = "0.17.14";
+        src = fetchHex {
+          pkg = "phoenix_live_view";
+          version = "${version}";
+          sha256 = "afeb6ba43ce329a6f7fc1c9acdfc6d3039995345f025febb7f409a92f6faebd3";
+        };
 
-      src = fetchHex {
-        pkg = "phoenix_live_view";
-        version = "${version}";
-        sha256 = "afeb6ba43ce329a6f7fc1c9acdfc6d3039995345f025febb7f409a92f6faebd3";
+        beamDeps = [
+          jason
+          phoenix
+          phoenix_html
+          telemetry
+        ];
       };
 
-      beamDeps = [ jason phoenix phoenix_html telemetry ];
-    };
+      phoenix_pubsub = buildMix rec {
+        name = "phoenix_pubsub";
+        version = "2.1.3";
 
-    phoenix_pubsub = buildMix rec {
-      name = "phoenix_pubsub";
-      version = "2.1.3";
+        src = fetchHex {
+          pkg = "phoenix_pubsub";
+          version = "${version}";
+          sha256 = "bba06bc1dcfd8cb086759f0edc94a8ba2bc8896d5331a1e2c2902bf8e36ee502";
+        };
 
-      src = fetchHex {
-        pkg = "phoenix_pubsub";
-        version = "${version}";
-        sha256 = "bba06bc1dcfd8cb086759f0edc94a8ba2bc8896d5331a1e2c2902bf8e36ee502";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      phoenix_template = buildMix rec {
+        name = "phoenix_template";
+        version = "1.0.3";
 
-    phoenix_template = buildMix rec {
-      name = "phoenix_template";
-      version = "1.0.3";
+        src = fetchHex {
+          pkg = "phoenix_template";
+          version = "${version}";
+          sha256 = "16f4b6588a4152f3cc057b9d0c0ba7e82ee23afa65543da535313ad8d25d8e2c";
+        };
 
-      src = fetchHex {
-        pkg = "phoenix_template";
-        version = "${version}";
-        sha256 = "16f4b6588a4152f3cc057b9d0c0ba7e82ee23afa65543da535313ad8d25d8e2c";
+        beamDeps = [ phoenix_html ];
       };
 
-      beamDeps = [ phoenix_html ];
-    };
+      phoenix_view = buildMix rec {
+        name = "phoenix_view";
+        version = "2.0.3";
 
-    phoenix_view = buildMix rec {
-      name = "phoenix_view";
-      version = "2.0.3";
+        src = fetchHex {
+          pkg = "phoenix_view";
+          version = "${version}";
+          sha256 = "cd34049af41be2c627df99cd4eaa71fc52a328c0c3d8e7d4aa28f880c30e7f64";
+        };
 
-      src = fetchHex {
-        pkg = "phoenix_view";
-        version = "${version}";
-        sha256 = "cd34049af41be2c627df99cd4eaa71fc52a328c0c3d8e7d4aa28f880c30e7f64";
+        beamDeps = [
+          phoenix_html
+          phoenix_template
+        ];
       };
 
-      beamDeps = [ phoenix_html phoenix_template ];
-    };
+      plug = buildMix rec {
+        name = "plug";
+        version = "1.15.1";
 
-    plug = buildMix rec {
-      name = "plug";
-      version = "1.15.1";
+        src = fetchHex {
+          pkg = "plug";
+          version = "${version}";
+          sha256 = "459497bd94d041d98d948054ec6c0b76feacd28eec38b219ca04c0de13c79d30";
+        };
 
-      src = fetchHex {
-        pkg = "plug";
-        version = "${version}";
-        sha256 = "459497bd94d041d98d948054ec6c0b76feacd28eec38b219ca04c0de13c79d30";
+        beamDeps = [
+          mime
+          plug_crypto
+          telemetry
+        ];
       };
 
-      beamDeps = [ mime plug_crypto telemetry ];
-    };
+      plug_cowboy = buildMix rec {
+        name = "plug_cowboy";
+        version = "2.6.1";
 
-    plug_cowboy = buildMix rec {
-      name = "plug_cowboy";
-      version = "2.6.1";
+        src = fetchHex {
+          pkg = "plug_cowboy";
+          version = "${version}";
+          sha256 = "de36e1a21f451a18b790f37765db198075c25875c64834bcc82d90b309eb6613";
+        };
 
-      src = fetchHex {
-        pkg = "plug_cowboy";
-        version = "${version}";
-        sha256 = "de36e1a21f451a18b790f37765db198075c25875c64834bcc82d90b309eb6613";
+        beamDeps = [
+          cowboy
+          cowboy_telemetry
+          plug
+        ];
       };
 
-      beamDeps = [ cowboy cowboy_telemetry plug ];
-    };
+      plug_crypto = buildMix rec {
+        name = "plug_crypto";
+        version = "1.2.5";
 
-    plug_crypto = buildMix rec {
-      name = "plug_crypto";
-      version = "1.2.5";
+        src = fetchHex {
+          pkg = "plug_crypto";
+          version = "${version}";
+          sha256 = "26549a1d6345e2172eb1c233866756ae44a9609bd33ee6f99147ab3fd87fd842";
+        };
 
-      src = fetchHex {
-        pkg = "plug_crypto";
-        version = "${version}";
-        sha256 = "26549a1d6345e2172eb1c233866756ae44a9609bd33ee6f99147ab3fd87fd842";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      postgrex = buildMix rec {
+        name = "postgrex";
+        version = "0.17.3";
 
-    postgrex = buildMix rec {
-      name = "postgrex";
-      version = "0.17.3";
+        src = fetchHex {
+          pkg = "postgrex";
+          version = "${version}";
+          sha256 = "946cf46935a4fdca7a81448be76ba3503cff082df42c6ec1ff16a4bdfbfb098d";
+        };
 
-      src = fetchHex {
-        pkg = "postgrex";
-        version = "${version}";
-        sha256 = "946cf46935a4fdca7a81448be76ba3503cff082df42c6ec1ff16a4bdfbfb098d";
+        beamDeps = [
+          db_connection
+          decimal
+          jason
+        ];
       };
 
-      beamDeps = [ db_connection decimal jason ];
-    };
+      ranch = buildRebar3 rec {
+        name = "ranch";
+        version = "1.8.0";
 
-    ranch = buildRebar3 rec {
-      name = "ranch";
-      version = "1.8.0";
+        src = fetchHex {
+          pkg = "ranch";
+          version = "${version}";
+          sha256 = "49fbcfd3682fab1f5d109351b61257676da1a2fdbe295904176d5e521a2ddfe5";
+        };
 
-      src = fetchHex {
-        pkg = "ranch";
-        version = "${version}";
-        sha256 = "49fbcfd3682fab1f5d109351b61257676da1a2fdbe295904176d5e521a2ddfe5";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      srtm = buildMix rec {
+        name = "srtm";
+        version = "0.8.0";
 
-    srtm = buildMix rec {
-      name = "srtm";
-      version = "0.8.0";
+        src = fetchHex {
+          pkg = "srtm";
+          version = "${version}";
+          sha256 = "7ec2a2ced7c3c0c1bdcfca67ce4d466d77e66cf52589f546c91b96b4c79b6923";
+        };
 
-      src = fetchHex {
-        pkg = "srtm";
-        version = "${version}";
-        sha256 = "7ec2a2ced7c3c0c1bdcfca67ce4d466d77e66cf52589f546c91b96b4c79b6923";
+        beamDeps = [ castore ];
       };
 
-      beamDeps = [ castore ];
-    };
+      ssl_verify_fun = buildRebar3 rec {
+        name = "ssl_verify_fun";
+        version = "1.1.7";
 
-    ssl_verify_fun = buildRebar3 rec {
-      name = "ssl_verify_fun";
-      version = "1.1.7";
+        src = fetchHex {
+          pkg = "ssl_verify_fun";
+          version = "${version}";
+          sha256 = "fe4c190e8f37401d30167c8c405eda19469f34577987c76dde613e838bbc67f8";
+        };
 
-      src = fetchHex {
-        pkg = "ssl_verify_fun";
-        version = "${version}";
-        sha256 = "fe4c190e8f37401d30167c8c405eda19469f34577987c76dde613e838bbc67f8";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      telemetry = buildRebar3 rec {
+        name = "telemetry";
+        version = "1.2.1";
 
-    telemetry = buildRebar3 rec {
-      name = "telemetry";
-      version = "1.2.1";
+        src = fetchHex {
+          pkg = "telemetry";
+          version = "${version}";
+          sha256 = "dad9ce9d8effc621708f99eac538ef1cbe05d6a874dd741de2e689c47feafed5";
+        };
 
-      src = fetchHex {
-        pkg = "telemetry";
-        version = "${version}";
-        sha256 = "dad9ce9d8effc621708f99eac538ef1cbe05d6a874dd741de2e689c47feafed5";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      tesla = buildMix rec {
+        name = "tesla";
+        version = "1.8.0";
 
-    tesla = buildMix rec {
-      name = "tesla";
-      version = "1.8.0";
+        src = fetchHex {
+          pkg = "tesla";
+          version = "${version}";
+          sha256 = "10501f360cd926a309501287470372af1a6e1cbed0f43949203a4c13300bc79f";
+        };
 
-      src = fetchHex {
-        pkg = "tesla";
-        version = "${version}";
-        sha256 = "10501f360cd926a309501287470372af1a6e1cbed0f43949203a4c13300bc79f";
+        beamDeps = [
+          castore
+          finch
+          fuse
+          hackney
+          jason
+          mime
+          mint
+          telemetry
+        ];
       };
 
-      beamDeps = [ castore finch fuse hackney jason mime mint telemetry ];
-    };
+      timex = buildMix rec {
+        name = "timex";
+        version = "3.7.11";
 
-    timex = buildMix rec {
-      name = "timex";
-      version = "3.7.11";
+        src = fetchHex {
+          pkg = "timex";
+          version = "${version}";
+          sha256 = "8b9024f7efbabaf9bd7aa04f65cf8dcd7c9818ca5737677c7b76acbc6a94d1aa";
+        };
 
-      src = fetchHex {
-        pkg = "timex";
-        version = "${version}";
-        sha256 = "8b9024f7efbabaf9bd7aa04f65cf8dcd7c9818ca5737677c7b76acbc6a94d1aa";
+        beamDeps = [
+          combine
+          gettext
+          tzdata
+        ];
       };
 
-      beamDeps = [ combine gettext tzdata ];
-    };
+      tortoise = buildMix rec {
+        name = "tortoise";
+        version = "0.10.0";
 
-    tortoise = buildMix rec {
-      name = "tortoise";
-      version = "0.10.0";
+        src = fetchHex {
+          pkg = "tortoise";
+          version = "${version}";
+          sha256 = "926d97b03cd0d2f6e0e1ebf06c1efa50101de96d0317dea5604c1c9e43e66735";
+        };
 
-      src = fetchHex {
-        pkg = "tortoise";
-        version = "${version}";
-        sha256 = "926d97b03cd0d2f6e0e1ebf06c1efa50101de96d0317dea5604c1c9e43e66735";
+        beamDeps = [ gen_state_machine ];
       };
 
-      beamDeps = [ gen_state_machine ];
-    };
+      tzdata = buildMix rec {
+        name = "tzdata";
+        version = "1.1.1";
 
-    tzdata = buildMix rec {
-      name = "tzdata";
-      version = "1.1.1";
+        src = fetchHex {
+          pkg = "tzdata";
+          version = "${version}";
+          sha256 = "a69cec8352eafcd2e198dea28a34113b60fdc6cb57eb5ad65c10292a6ba89787";
+        };
 
-      src = fetchHex {
-        pkg = "tzdata";
-        version = "${version}";
-        sha256 = "a69cec8352eafcd2e198dea28a34113b60fdc6cb57eb5ad65c10292a6ba89787";
+        beamDeps = [ hackney ];
       };
 
-      beamDeps = [ hackney ];
-    };
+      unicode_util_compat = buildRebar3 rec {
+        name = "unicode_util_compat";
+        version = "0.7.0";
 
-    unicode_util_compat = buildRebar3 rec {
-      name = "unicode_util_compat";
-      version = "0.7.0";
+        src = fetchHex {
+          pkg = "unicode_util_compat";
+          version = "${version}";
+          sha256 = "25eee6d67df61960cf6a794239566599b09e17e668d3700247bc498638152521";
+        };
 
-      src = fetchHex {
-        pkg = "unicode_util_compat";
-        version = "${version}";
-        sha256 = "25eee6d67df61960cf6a794239566599b09e17e668d3700247bc498638152521";
+        beamDeps = [ ];
       };
 
-      beamDeps = [];
-    };
+      websockex = buildMix rec {
+        name = "websockex";
+        version = "0.4.3";
 
-    websockex = buildMix rec {
-      name = "websockex";
-      version = "0.4.3";
+        src = fetchHex {
+          pkg = "websockex";
+          version = "${version}";
+          sha256 = "95f2e7072b85a3a4cc385602d42115b73ce0b74a9121d0d6dbbf557645ac53e4";
+        };
 
-      src = fetchHex {
-        pkg = "websockex";
-        version = "${version}";
-        sha256 = "95f2e7072b85a3a4cc385602d42115b73ce0b74a9121d0d6dbbf557645ac53e4";
+        beamDeps = [ ];
       };
-
-      beamDeps = [];
     };
-  };
-in self
-
+in
+self
diff --git a/secrets/age-yubikey-identity-508106ce.txt b/secrets/age-yubikey-identity-508106ce.txt
new file mode 100644
index 0000000..9670511
--- /dev/null
+++ b/secrets/age-yubikey-identity-508106ce.txt
@@ -0,0 +1,7 @@
+#       Serial: 20472382, Slot: 1
+#         Name: age_alejandro
+#      Created: Fri, 30 Jun 2023 03:32:36 +0000
+#   PIN policy: Once   (A PIN is required once per session, if set)
+# Touch policy: Always (A physical touch is required for every decryption)
+#    Recipient: age1yubikey1qdwgvfqrcqmyw56ux7azuvqr6f8nanszu27nztvxmn4utmplgxctzt90g25
+AGE-PLUGIN-YUBIKEY-18E3RSQVZ2ZQSDNS67QTTC
diff --git a/secrets/secrets.nix b/secrets/secrets.nix
index e63a709..79fb416 100644
--- a/secrets/secrets.nix
+++ b/secrets/secrets.nix
@@ -9,18 +9,69 @@ let
     proxy = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAf6Z7SZEOH3H51T/GPIc/B0OpbaydM5l2PP3nMnwpFl";
     git = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN8JLy/ipBfOet3/KT7rXOXHDjjmt+VqqQb3V+ILIuDN";
   };
-in {
-  "cf_dns_kilonull.age".publicKeys = [users.me machines.node machines.gospel machines.pi4 machines.proxy];
-  "gitea-runner-gospel.age".publicKeys = [users.me machines.gospel];
-  "hass_mqtt.age".publicKeys = [users.me machines.pi4 machines.node machines.gospel];
-  "hydra-aws-creds.age".publicKeys = [users.me machines.gospel];
-  "nextcloud_admin.age".publicKeys = [users.me machines.node machines.gospel];
-  "nextcloud_restic_env.age".publicKeys = [users.me machines.node];
-  "nextcloud_restic_password.age".publicKeys = [users.me machines.node];
-  "nextcloud_restic_repo.age".publicKeys = [users.me machines.node];
-  "tailscale_git_server.age".publicKeys = [users.me machines.git]; # This key expires, might have to update
-  "teslamate_db.age".publicKeys = [users.me machines.node machines.gospel];
-  "teslamate_encryption.age".publicKeys = [users.me machines.node machines.gospel];
-  "teslamate_mqtt.age".publicKeys = [users.me machines.pi4 machines.node machines.gospel];
-  "theengs_ble_mqtt.age".publicKeys = [users.me machines.pi4 machines.gospel];
+in
+{
+  "cf_dns_kilonull.age".publicKeys = [
+    users.me
+    machines.node
+    machines.gospel
+    machines.pi4
+    machines.proxy
+  ];
+  "gitea-runner-gospel.age".publicKeys = [
+    users.me
+    machines.gospel
+  ];
+  "hass_mqtt.age".publicKeys = [
+    users.me
+    machines.pi4
+    machines.node
+    machines.gospel
+  ];
+  "hydra-aws-creds.age".publicKeys = [
+    users.me
+    machines.gospel
+  ];
+  "nextcloud_admin.age".publicKeys = [
+    users.me
+    machines.node
+    machines.gospel
+  ];
+  "nextcloud_restic_env.age".publicKeys = [
+    users.me
+    machines.node
+  ];
+  "nextcloud_restic_password.age".publicKeys = [
+    users.me
+    machines.node
+  ];
+  "nextcloud_restic_repo.age".publicKeys = [
+    users.me
+    machines.node
+  ];
+  "tailscale_git_server.age".publicKeys = [
+    users.me
+    machines.git
+  ]; # This key expires, might have to update
+  "teslamate_db.age".publicKeys = [
+    users.me
+    machines.node
+    machines.gospel
+  ];
+  "teslamate_encryption.age".publicKeys = [
+    users.me
+    machines.node
+    machines.gospel
+  ];
+  "teslamate_mqtt.age".publicKeys = [
+    users.me
+    machines.pi4
+    machines.node
+    machines.gospel
+  ];
+  "theengs_ble_mqtt.age".publicKeys = [
+    users.me
+    machines.pi4
+    machines.gospel
+  ];
 }
diff --git a/systems/aarch64-linux/pi4/default.nix b/systems/aarch64-linux/pi4/default.nix
index 9010bff..795f62b 100644
--- a/systems/aarch64-linux/pi4/default.nix
+++ b/systems/aarch64-linux/pi4/default.nix
@@ -4,7 +4,8 @@
   inputs,
   modulesPath,
   ...
-}: {
+}:
+{
   imports = [
     (modulesPath + "/installer/scan/not-detected.nix")
     (modulesPath + "/installer/sd-card/sd-image-aarch64.nix")
@@ -15,8 +16,7 @@
   # See here: https://github.com/NixOS/nixpkgs/issues/109280#issuecomment-973636212
   nixpkgs.overlays = [
     (final: super: {
-      makeModulesClosure = x:
-        super.makeModulesClosure (x // {allowMissing = true;});
+      makeModulesClosure = x: super.makeModulesClosure (x // { allowMissing = true; });
     })
   ];
 
@@ -57,7 +57,10 @@
     hostName = "pi4";
     useDHCP = false;
     defaultGateway = "192.168.113.1";
-    nameservers = ["192.168.113.13" "1.1.1.1"];
+    nameservers = [
+      "192.168.113.13"
+      "1.1.1.1"
+    ];
     interfaces.end0.ipv4.addresses = [
       {
         address = "192.168.113.42";
diff --git a/systems/x86_64-do/minimal/default.nix b/systems/x86_64-do/minimal/default.nix
index 132bba8..e2321db 100644
--- a/systems/x86_64-do/minimal/default.nix
+++ b/systems/x86_64-do/minimal/default.nix
@@ -1,4 +1,5 @@
-{...}: {
+{ ... }:
+{
   aa = {
     nix.enable = true;
 
diff --git a/systems/x86_64-linux/carbon/hardware-configuration-zfs.nix b/systems/x86_64-linux/carbon/hardware-configuration-zfs.nix
index 835b98f..220b65a 100644
--- a/systems/x86_64-linux/carbon/hardware-configuration-zfs.nix
+++ b/systems/x86_64-linux/carbon/hardware-configuration-zfs.nix
@@ -7,104 +7,151 @@
   pkgs,
   modulesPath,
   ...
-}: {
+}:
+{
   imports = [
     (modulesPath + "/installer/scan/not-detected.nix")
   ];
 
-  boot.initrd.availableKernelModules = ["xhci_pci" "nvme" "usb_storage" "sd_mod"];
-  boot.initrd.kernelModules = [];
-  boot.kernelModules = ["kvm-intel"];
-  boot.extraModulePackages = [];
+  boot.initrd.availableKernelModules = [
+    "xhci_pci"
+    "nvme"
+    "usb_storage"
+    "sd_mod"
+  ];
+  boot.initrd.kernelModules = [ ];
+  boot.kernelModules = [ "kvm-intel" ];
+  boot.extraModulePackages = [ ];
 
   fileSystems."/" = {
     device = "rpool_/nixos/ROOT/default";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   fileSystems."/boot" = {
     device = "bpool_/nixos/BOOT/default";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   fileSystems."/home" = {
     device = "rpool_/nixos/DATA/default/home";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   fileSystems."/root" = {
     device = "rpool_/nixos/DATA/default/root";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   fileSystems."/srv" = {
     device = "rpool_/nixos/DATA/default/srv";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   fileSystems."/usr/local" = {
     device = "rpool_/nixos/DATA/default/usr/local";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   fileSystems."/var/log" = {
     device = "rpool_/nixos/DATA/default/var/log";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   fileSystems."/var/spool" = {
     device = "rpool_/nixos/DATA/default/var/spool";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   fileSystems."/nix" = {
     device = "rpool_/nixos/DATA/local/nix";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   fileSystems."/state" = {
     device = "rpool_/nixos/DATA/default/state";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   fileSystems."/etc/nixos" = {
     device = "/state/etc/nixos";
     fsType = "none";
-    options = ["bind"];
+    options = [ "bind" ];
   };
 
   fileSystems."/etc/cryptkey.d" = {
     device = "/state/etc/cryptkey.d";
     fsType = "none";
-    options = ["bind"];
+    options = [ "bind" ];
   };
 
   fileSystems."/boot/efis/nvme-SAMSUNG_MZVLW256HEHP-000L7_S35ENX1K539085-part1" = {
     device = "/dev/disk/by-uuid/F429-235F";
     fsType = "vfat";
-    options = ["x-systemd.idle-timeout=1min" "x-systemd.automount" "noauto"];
+    options = [
+      "x-systemd.idle-timeout=1min"
+      "x-systemd.automount"
+      "noauto"
+    ];
   };
 
   fileSystems."/boot/efis/nvme-WDC_PC_SN520_SDAPTUW-512G_182747800010-part1" = {
     device = "/dev/disk/by-uuid/F429-AB41";
     fsType = "vfat";
-    options = ["x-systemd.idle-timeout=1min" "x-systemd.automount" "noauto"];
+    options = [
+      "x-systemd.idle-timeout=1min"
+      "x-systemd.automount"
+      "noauto"
+    ];
   };
 
   fileSystems."/var/lib/docker" = {
     device = "rpool_/nixos/DATA/default/var/lib/docker";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
diff --git a/systems/x86_64-linux/carbon/zfs.nix b/systems/x86_64-linux/carbon/zfs.nix
index 23445ca..f7fd568 100644
--- a/systems/x86_64-linux/carbon/zfs.nix
+++ b/systems/x86_64-linux/carbon/zfs.nix
@@ -1,5 +1,6 @@
-{pkgs, ...}: {
-  boot.supportedFilesystems = ["zfs"];
+{ pkgs, ... }:
+{
+  boot.supportedFilesystems = [ "zfs" ];
   networking.hostId = "b2d25606";
   boot.zfs.devNodes = "/dev/disk/by-id";
   swapDevices = [
diff --git a/systems/x86_64-linux/git/default.nix b/systems/x86_64-linux/git/default.nix
index f16169b..b024f6b 100644
--- a/systems/x86_64-linux/git/default.nix
+++ b/systems/x86_64-linux/git/default.nix
@@ -2,11 +2,13 @@
   inputs,
   config,
   ...
-}: let
+}:
+let
   domain = "git.alejandr0angul0.dev";
   secrets = config.age.secrets;
-in {
-  imports = ["${inputs.nixpkgs}/nixos/modules/virtualisation/digital-ocean-config.nix"];
+in
+{
+  imports = [ "${inputs.nixpkgs}/nixos/modules/virtualisation/digital-ocean-config.nix" ];
 
   age.secrets.authKeyFile.file = ../../../secrets/tailscale_git_server.age;
 
@@ -38,7 +40,7 @@ in {
 
   services.tailscale = {
     authKeyFile = secrets.authKeyFile.path;
-    extraUpFlags = ["--ssh"];
+    extraUpFlags = [ "--ssh" ];
   };
 
   security.acme = {
diff --git a/systems/x86_64-linux/gospel/hardware-configuration.nix b/systems/x86_64-linux/gospel/hardware-configuration.nix
index e90661f..79c23b5 100644
--- a/systems/x86_64-linux/gospel/hardware-configuration.nix
+++ b/systems/x86_64-linux/gospel/hardware-configuration.nix
@@ -6,37 +6,57 @@
   lib,
   modulesPath,
   ...
-}: {
+}:
+{
   imports = [
     (modulesPath + "/installer/scan/not-detected.nix")
   ];
 
-  boot.initrd.availableKernelModules = ["xhci_pci" "ahci" "nvme" "usbhid" "usb_storage" "sd_mod"];
-  boot.initrd.kernelModules = [];
-  boot.kernelModules = ["kvm-intel"];
+  boot.initrd.availableKernelModules = [
+    "xhci_pci"
+    "ahci"
+    "nvme"
+    "usbhid"
+    "usb_storage"
+    "sd_mod"
+  ];
+  boot.initrd.kernelModules = [ ];
+  boot.kernelModules = [ "kvm-intel" ];
 
   fileSystems."/" = {
     device = "rpool/nixos/root";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   fileSystems."/home" = {
     device = "rpool/nixos/home";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   fileSystems."/var/lib" = {
     device = "rpool/nixos/var/lib";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   fileSystems."/var/log" = {
     device = "rpool/nixos/var/log";
     fsType = "zfs";
-    options = ["zfsutil" "X-mount.mkdir"];
+    options = [
+      "zfsutil"
+      "X-mount.mkdir"
+    ];
   };
 
   fileSystems."/boot" = {
@@ -44,7 +64,7 @@
     fsType = "vfat";
   };
 
-  swapDevices = [];
+  swapDevices = [ ];
 
   # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
   # (the default) this is the recommended approach. When using systemd-networkd it's
diff --git a/systems/x86_64-linux/gospel/zfs.nix b/systems/x86_64-linux/gospel/zfs.nix
index 334971a..4384762 100644
--- a/systems/x86_64-linux/gospel/zfs.nix
+++ b/systems/x86_64-linux/gospel/zfs.nix
@@ -1,5 +1,6 @@
-{...}: {
-  boot.supportedFilesystems = ["zfs"];
+{ ... }:
+{
+  boot.supportedFilesystems = [ "zfs" ];
   networking.hostId = "f8616592";
   boot.loader.efi.canTouchEfiVariables = false;
   boot.loader.systemd-boot.enable = true;
diff --git a/systems/x86_64-linux/node/hardware-configuration.nix b/systems/x86_64-linux/node/hardware-configuration.nix
index c2f516a..8d50958 100644
--- a/systems/x86_64-linux/node/hardware-configuration.nix
+++ b/systems/x86_64-linux/node/hardware-configuration.nix
@@ -7,15 +7,23 @@
   pkgs,
   modulesPath,
   ...
-}: {
+}:
+{
   imports = [
     (modulesPath + "/installer/scan/not-detected.nix")
   ];
 
-  boot.initrd.availableKernelModules = ["xhci_pci" "ahci" "nvme" "usb_storage" "usbhid" "sd_mod"];
-  boot.initrd.kernelModules = [];
-  boot.kernelModules = ["kvm-amd"];
-  boot.extraModulePackages = [];
+  boot.initrd.availableKernelModules = [
+    "xhci_pci"
+    "ahci"
+    "nvme"
+    "usb_storage"
+    "usbhid"
+    "sd_mod"
+  ];
+  boot.initrd.kernelModules = [ ];
+  boot.kernelModules = [ "kvm-amd" ];
+  boot.extraModulePackages = [ ];
 
   fileSystems."/" = {
     device = "/dev/disk/by-label/NIXROOT";
@@ -27,7 +35,7 @@
     fsType = "vfat";
   };
 
-  swapDevices = [];
+  swapDevices = [ ];
 
   # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
   # (the default) this is the recommended approach. When using systemd-networkd it's
diff --git a/systems/x86_64-linux/node/zfs.nix b/systems/x86_64-linux/node/zfs.nix
index 9ec41f2..ac8962e 100644
--- a/systems/x86_64-linux/node/zfs.nix
+++ b/systems/x86_64-linux/node/zfs.nix
@@ -2,8 +2,9 @@
   config,
   pkgs,
   ...
-}: {
-  boot.supportedFilesystems = ["zfs"];
-  boot.zfs.extraPools = ["tank"];
+}:
+{
+  boot.supportedFilesystems = [ "zfs" ];
+  boot.zfs.extraPools = [ "tank" ];
   networking.hostId = "db616c9e";
 }
diff --git a/systems/x86_64-vm/virt/default.nix b/systems/x86_64-vm/virt/default.nix
index 12863ab..c9d200e 100644
--- a/systems/x86_64-vm/virt/default.nix
+++ b/systems/x86_64-vm/virt/default.nix
@@ -3,8 +3,9 @@
   lib,
   ...
 }:
-with lib; {
-  virtualisation.qemu.options = ["-vga qxl"];
+with lib;
+{
+  virtualisation.qemu.options = [ "-vga qxl" ];
 
   # For sway to work with home manager
   security.polkit.enable = true;
@@ -23,7 +24,7 @@ with lib; {
 
   users.users.virt = {
     isNormalUser = true;
-    extraGroups = ["wheel"];
+    extraGroups = [ "wheel" ];
     hashedPassword = "$6$nOlwKVf1u0Wt//zU$43xhafbe2CAWTjOemAUm1J1Dpw7to0ZTbGhFk7CkVTRB3E80a1lhhQ175VnkcJ/X1HI6lsyV8fNMc3GF7JTAP0";
   };
 
@@ -31,6 +32,8 @@ with lib; {
     systemPackages = with pkgs; [
       wayland-utils
     ];
-    variables = {"WLR_RENDERER_ALLOW_SOFTWARE" = "1";};
+    variables = {
+      "WLR_RENDERER_ALLOW_SOFTWARE" = "1";
+    };
   };
 }