diff --git a/hosts/server/configuration.nix b/hosts/server/configuration.nix index 7a2cf95..0a89e86 100644 --- a/hosts/server/configuration.nix +++ b/hosts/server/configuration.nix @@ -77,46 +77,49 @@ in }; }; - environment.systemPackages = with pkgs; [ - age - bat - cairo - dconf - fastfetch - git - home-manager - lego - libjpeg - libpng - libuuid - linux-manual - man - man-pages - man-pages-posix - networkmanager - openssl - pkg-config - postgresql - protonup-ng - python3 - python3Packages.pip - qFlipper - ripgrep - swaylock - swaylock-fancy - tmux - unzip - vim - wget - wl-clipboard - xclip - xdg-desktop-portal-hyprland - xsel - yarn - zsh - ] ++ [ - inputs.agenix.packages.${pkgs.system}.agenix - ]; + environment.systemPackages = + with pkgs; + [ + age + bat + cairo + dconf + fastfetch + git + home-manager + lego + libjpeg + libpng + libuuid + linux-manual + man + man-pages + man-pages-posix + networkmanager + openssl + pkg-config + postgresql + protonup-ng + python3 + python3Packages.pip + qFlipper + ripgrep + swaylock + swaylock-fancy + tmux + unzip + vim + wget + wl-clipboard + xclip + xdg-desktop-portal-hyprland + xsel + yarn + zsh + ] + ++ [ + inputs.agenix.packages.${pkgs.system}.agenix + ]; # Bootloader. boot.loader = { @@ -139,7 +142,7 @@ in openssh = { enable = true; ports = [ - 42131 + 42131 ]; }; udev.extraRules = '' diff --git a/hosts/server/hardware-configuration.nix b/hosts/server/hardware-configuration.nix index 848d0c8..68b3b48 100644 --- a/hosts/server/hardware-configuration.nix +++ b/hosts/server/hardware-configuration.nix @@ -1,31 +1,42 @@ # Do not modify this file! It was generated by ‘nixos-generate-config’ # and may be overwritten by future invocations. Please make changes # to /etc/nixos/configuration.nix instead. -{ config, lib, pkgs, modulesPath, ... }: +{ + config, + lib, + pkgs, + modulesPath, + ... +}: { - imports = - [ (modulesPath + "/installer/scan/not-detected.nix") - ]; + imports = [ + (modulesPath + "/installer/scan/not-detected.nix") + ]; - boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "sd_mod" ]; + boot.initrd.availableKernelModules = [ + "xhci_pci" + "ahci" + "usbhid" + "sd_mod" + ]; boot.initrd.kernelModules = [ ]; boot.kernelModules = [ "kvm-intel" ]; boot.extraModulePackages = [ ]; fileSystems = { "/" = { - device = "/dev/disk/by-uuid/67b9f544-f7d6-4203-a1ee-3d527f0c4ace"; - fsType = "ext4"; - }; + device = "/dev/disk/by-uuid/67b9f544-f7d6-4203-a1ee-3d527f0c4ace"; + fsType = "ext4"; + }; "/boot" = { - device = "/dev/disk/by-uuid/C2ED-90A4"; - fsType = "vfat"; - options = [ - "fmask=0077" - "dmask=0077" - ]; - }; + device = "/dev/disk/by-uuid/C2ED-90A4"; + fsType = "vfat"; + options = [ + "fmask=0077" + "dmask=0077" + ]; + }; "/mnt/data" = { device = "/dev/disk/by-uuid/efa8669d-d141-4858-9e66-d3efa9a88816"; fsType = "ext4"; diff --git a/hosts/server/secrets.nix b/hosts/server/secrets.nix index 152c432..1b2b9eb 100644 --- a/hosts/server/secrets.nix +++ b/hosts/server/secrets.nix @@ -9,69 +9,69 @@ file = ../../secrets/wireguard-secret.age; owner = "root"; group = "root"; - mode = "0400"; + mode = "0400"; }; age.secrets."mailjet-user" = { file = ../../secrets/mailjet-user.age; owner = "root"; group = "root"; - mode = "0400"; + mode = "0400"; }; age.secrets."mailjet-pass" = { file = ../../secrets/mailjet-pass.age; owner = "root"; group = "root"; - mode = "0400"; + mode = "0400"; }; age.secrets."nextcloud-admin-pass" = { file = ../../secrets/nextcloud-admin-pass.age; owner = "nextcloud"; group = "nextcloud"; - mode = "0400"; + mode = "0400"; }; age.secrets."nextcloud-oidc-secret" = { file = ../../secrets/nextcloud-oidc-secret.age; owner = "kanidm"; group = "kanidm"; - mode = "0400"; + mode = "0400"; }; age.secrets."grafana-oidc-secret" = { file = ../../secrets/grafana-oidc-secret.age; owner = "kanidm"; group = "grafana"; - mode = "0440"; + mode = "0440"; }; age.secrets."forgejo-oidc-secret" = { file = ../../secrets/forgejo-oidc-secret.age; owner = "kanidm"; group = "forgejo"; - mode = "0440"; + mode = "0440"; }; age.secrets."nextcloud-database" = { file = ../../secrets/nextcloud-database.age; owner = "nextcloud"; group = "nextcloud"; - mode = "0400"; + mode = "0400"; }; age.secrets."kanidm-admin" = { file = ../../secrets/kandim-admin.age; owner = "kanidm"; group = "kanidm"; - mode = "0400"; + mode = "0400"; }; age.secrets."kanidm-idmAdmin" = { file = ../../secrets/kandim-idmAdmin.age; owner = "kanidm"; group = "kanidm"; - mode = "0400"; + mode = "0400"; }; }