chore: nf-fmt-nix

This commit is contained in:
arcnmx 2024-05-13 15:13:58 -07:00
parent 7486517713
commit 9903866044
160 changed files with 4570 additions and 3019 deletions

View file

@ -1,4 +1,8 @@
{ inputs, lib, ... }: let
{
inputs,
lib,
...
}: let
inherit (lib.modules) mkForce;
in {
arch = "x86_64";
@ -6,10 +10,16 @@ in {
modules = mkForce [
./nixos.nix
];
builder = mkForce ({ modules, system, specialArgs, ... }: inputs.nixpkgs.lib.nixosSystem {
inherit modules system;
specialArgs = {
extern'test'inputs = specialArgs.inputs;
};
});
builder = mkForce ({
modules,
system,
specialArgs,
...
}:
inputs.nixpkgs.lib.nixosSystem {
inherit modules system;
specialArgs = {
extern'test'inputs = specialArgs.inputs;
};
});
}

View file

@ -1,7 +1,4 @@
{
extern'test'inputs,
...
}: let
{extern'test'inputs, ...}: let
inherit (extern'test'inputs.self) nixosModules homeModules;
in {
imports = [
@ -53,7 +50,7 @@ in {
sharedModules = [
homeModules.default
];
users.me = { config, ... }: {
users.me = {config, ...}: {
config = {
home.stateVersion = "23.11";
gensokyo-zone = {

View file

@ -1,4 +1,4 @@
{ lib, ... }: {
{lib, ...}: {
imports = [
./proxmox.nix
];

View file

@ -1,4 +1,9 @@
{meta, config, access, ...}: {
{
meta,
config,
access,
...
}: {
imports = let
inherit (meta) nixos;
in [
@ -24,13 +29,28 @@
inherit (vouch'system.exports.services) vouch-proxy;
in {
"${keycloak.id}.${config.networking.domain}" = let
portName = if keycloak.ports.https.enable then "https" else "http";
portName =
if keycloak.ports.https.enable
then "https"
else "http";
in {
service = access.proxyUrlFor { system = keycloak'system; service = keycloak; inherit portName; };
originRequest.${if keycloak.ports.${portName}.protocol == "https" then "noTLSVerify" else null} = true;
service = access.proxyUrlFor {
system = keycloak'system;
service = keycloak;
inherit portName;
};
originRequest.${
if keycloak.ports.${portName}.protocol == "https"
then "noTLSVerify"
else null
} =
true;
};
"${vouch-proxy.id}.${config.networking.domain}" = {
service = access.proxyUrlFor { system = vouch'system; service = vouch-proxy; };
service = access.proxyUrlFor {
system = vouch'system;
service = vouch-proxy;
};
};
};
};

View file

@ -1,21 +1,21 @@
{lib, ...}: let
inherit (lib.strings) concatStringsSep;
dot = concatStringsSep ".";
cutie = dot [ "cutie" "moe" ];
netname = { config, ... }: {
domain = dot [ config.name cutie ];
cutie = dot ["cutie" "moe"];
netname = {config, ...}: {
domain = dot [config.name cutie];
};
in {
type = "Linux";
access.domain = dot [ "gensokyo" cutie ];
access.domain = dot ["gensokyo" cutie];
network.networks = {
local = {
imports = [ netname ];
imports = [netname];
address4 = "10.1.1.62";
address6 = "fd0a::daf8:83ff:fe36:81b6";
};
tail = {
imports = [ netname ];
imports = [netname];
address4 = "100.86.77.54";
address6 = "fd7a:115c:a1e0:ab12:4843:cd96:6256:4d36";
};

View file

@ -1,24 +1,25 @@
{lib, ...}: let
inherit (lib.strings) concatStringsSep;
dot = concatStringsSep ".";
cutie = dot [ "cutie" "moe" ];
netname = { config, ... }: {
domain = dot [ config.name cutie ];
cutie = dot ["cutie" "moe"];
netname = {config, ...}: {
domain = dot [config.name cutie];
};
in {
type = "Linux";
access.domain = dot [ "gensokyo" cutie ];
access.domain = dot ["gensokyo" cutie];
network.networks = {
local = {
imports = [ netname ];
imports = [netname];
macAddress = let
#eth = "18:c0:4d:08:87:bd";
eth25 = "18:c0:4d:08:87:bc";
in eth25;
in
eth25;
address4 = "10.1.1.32";
};
tail = {
imports = [ netname ];
imports = [netname];
address4 = "100.104.155.122";
address6 = "fd7a:115c:a1e0:ab12:4843:cd96:6268:9b7a";
};

View file

@ -21,7 +21,7 @@ in {
(nginx.virtualHosts.barcodebuddy.proxied.cloudflared.getIngress {})
{
${home-assistant.domain} = assert home-assistant.enable; {
service = access.proxyUrlFor { serviceName = "home-assistant"; };
service = access.proxyUrlFor {serviceName = "home-assistant";};
};
}
];

View file

@ -1,4 +1,8 @@
{meta, config, ...}: let
{
meta,
config,
...
}: let
inherit (config.services) nginx;
in {
imports = let