merge-nixconfigs #14

Merged
jahanson merged 4 commits from merge-nixconfigs into main 2024-05-31 00:26:21 -05:00
13 changed files with 12 additions and 42 deletions
Showing only changes of commit 435f1b3aa1 - Show all commits

View file

@ -1,6 +1,6 @@
## Modules ## Modules
A set of 'custom' modules with the aim to enable easy on/off/settings to build up a system modulary to my 'specs'. A set of 'custom' modules with the aim to enable easy on/off/settings to build up a system modularly to my 'specs'.
The main goal is to build up a `mySystem` options key which is easy to read and toggle functionality on and off. The main goal is to build up a `mySystem` options key which is easy to read and toggle functionality on and off.

View file

@ -1,7 +1,4 @@
{ lib { lib, config, ... }:
, config
, ...
}:
let let
cfg = config.mySystem.system.impermanence; cfg = config.mySystem.system.impermanence;
in in

View file

@ -1,8 +1,4 @@
{ lib { lib, config, ... }:
, config
, self
, ...
}:
with lib; with lib;
let let
cfg = config.mySystem.nix; cfg = config.mySystem.nix;
@ -27,7 +23,6 @@ in
}; };
}; };
}; };
config.nix = { config.nix = {
optimise.automatic = cfg.autoOptimiseStore; optimise.automatic = cfg.autoOptimiseStore;
# automatically garbage collect nix store # automatically garbage collect nix store

View file

@ -1,8 +1,4 @@
{ lib { lib, config, ... }:
, config
, self
, ...
}:
with lib; with lib;
let let
cfg = config.mySystem.services.openssh; cfg = config.mySystem.services.openssh;
@ -23,7 +19,6 @@ in
default = "no"; default = "no";
}; };
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
services.openssh = { services.openssh = {
enable = true; enable = true;

View file

@ -8,7 +8,7 @@ let
cfg = config.mySystem.system.systemd.pushover-alerts; cfg = config.mySystem.system.systemd.pushover-alerts;
in in
{ {
options.mySystem.system.systemd.pushover-alerts.enable = mkEnableOption "Pushover alers for systemd failures" // { default = true; }; options.mySystem.system.systemd.pushover-alerts.enable = mkEnableOption "Pushover alerts for systemd failures" // { default = true; };
options.systemd.services = mkOption { options.systemd.services = mkOption {
type = with types; attrsOf ( type = with types; attrsOf (
submodule { submodule {

View file

@ -1,7 +1,4 @@
{ lib { lib, config, ... }:
, config
, ...
}:
with lib; with lib;
let let
cfg = config.mySystem.security; cfg = config.mySystem.security;

View file

@ -1,8 +1,4 @@
{ lib { lib, config, ... }:
, config
, self
, ...
}:
with lib; with lib;
let let
cfg = config.mySystem.system; cfg = config.mySystem.system;

View file

@ -1,7 +1,4 @@
{ lib { lib, config, ... }:
, config
, ...
}:
let let
cfg = config.mySystem.time; cfg = config.mySystem.time;
in in

View file

@ -1,8 +1,4 @@
{ lib { lib, config, pkgs, ... }:
, config
, pkgs
, ...
}:
let let
cfg = config.mySystem.system.zfs; cfg = config.mySystem.system.zfs;
in in
@ -40,6 +36,5 @@ with lib;
ZED_PUSHOVER_TOKEN = "$(${pkgs.busybox}/bin/cat ${config.sops.secrets.pushover-api-key.path})"; ZED_PUSHOVER_TOKEN = "$(${pkgs.busybox}/bin/cat ${config.sops.secrets.pushover-api-key.path})";
ZED_PUSHOVER_USER = "$(${pkgs.busybox}/bin/cat ${config.sops.secrets.pushover-user-key.path})"; ZED_PUSHOVER_USER = "$(${pkgs.busybox}/bin/cat ${config.sops.secrets.pushover-user-key.path})";
}; };
}; };
} }

View file

@ -1,4 +1,4 @@
{ config, lib, pkgs, imports, modulesPath, ... }: { config, lib, pkgs, modulesPath, ... }:
with lib; with lib;
{ {

View file

@ -5,5 +5,4 @@
./system.nix ./system.nix
./users.nix ./users.nix
]; ];
} }

View file

@ -1,4 +1,4 @@
{ config, ... }: { ... }:
{ {
sops.age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ]; sops.age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
# Secret for machine-specific pushover # Secret for machine-specific pushover

View file

@ -1,5 +1,4 @@
{ config, lib, pkgs, ... }: { lib, pkgs, ... }:
with lib;
{ {
system = { system = {
# Enable printing changes on nix build etc with nvd # Enable printing changes on nix build etc with nvd