diff options
| author | seth <[email protected]> | 2024-06-30 09:56:30 -0400 |
|---|---|---|
| committer | seth <[email protected]> | 2024-06-30 10:23:04 -0400 |
| commit | 088facf700946cb8f2d96c6089185bdc2a67180a (patch) | |
| tree | c5b4e4cffbb3ee4ad2498c2251892bd457e9d3c7 /systems/glados | |
| parent | 5d3045a0769af3a94fba7b5cf646e8498aaef595 (diff) | |
alejandra -> nixfmt-rfc-style
Diffstat (limited to 'systems/glados')
| -rw-r--r-- | systems/glados/boot.nix | 9 | ||||
| -rw-r--r-- | systems/glados/default.nix | 5 | ||||
| -rw-r--r-- | systems/glados/hardware-configuration.nix | 50 |
3 files changed, 44 insertions, 20 deletions
diff --git a/systems/glados/boot.nix b/systems/glados/boot.nix index 7f6793e..0aa6f9e 100644 --- a/systems/glados/boot.nix +++ b/systems/glados/boot.nix @@ -3,8 +3,9 @@ pkgs, inputs, ... -}: { - imports = [inputs.lanzaboote.nixosModules.lanzaboote]; +}: +{ + imports = [ inputs.lanzaboote.nixosModules.lanzaboote ]; environment.systemPackages = with pkgs; [ sbctl @@ -15,7 +16,7 @@ initrd.systemd.enable = true; kernelPackages = pkgs.linuxPackages_latest; - kernelParams = ["amd_pstate=active"]; + kernelParams = [ "amd_pstate=active" ]; loader.systemd-boot.enable = lib.mkForce false; @@ -24,6 +25,6 @@ pkiBundle = "/etc/secureboot"; }; - supportedFilesystems = ["ntfs"]; + supportedFilesystems = [ "ntfs" ]; }; } diff --git a/systems/glados/default.nix b/systems/glados/default.nix index 491285d..7a096db 100644 --- a/systems/glados/default.nix +++ b/systems/glados/default.nix @@ -1,4 +1,5 @@ -{pkgs, ...}: { +{ pkgs, ... }: +{ imports = [ ./boot.nix ./hardware-configuration.nix @@ -11,7 +12,7 @@ plasma.enable = true; }; - environment.systemPackages = [pkgs.obs-studio]; + environment.systemPackages = [ pkgs.obs-studio ]; networking.hostName = "glados"; diff --git a/systems/glados/hardware-configuration.nix b/systems/glados/hardware-configuration.nix index a7ff9e9..bd5f220 100644 --- a/systems/glados/hardware-configuration.nix +++ b/systems/glados/hardware-configuration.nix @@ -6,23 +6,28 @@ lib, modulesPath, ... -}: { - imports = [ - (modulesPath + "/installer/scan/not-detected.nix") - ]; +}: +{ + imports = [ (modulesPath + "/installer/scan/not-detected.nix") ]; boot = { - extraModulePackages = []; - kernelModules = ["kvm-amd"]; + extraModulePackages = [ ]; + kernelModules = [ "kvm-amd" ]; initrd = { - availableKernelModules = ["xhci_pci" "ahci" "usb_storage" "usbhid" "sd_mod"]; - kernelModules = []; + availableKernelModules = [ + "xhci_pci" + "ahci" + "usb_storage" + "usbhid" + "sd_mod" + ]; + kernelModules = [ ]; luks.devices."cryptroot" = { device = "/dev/disk/by-uuid/bbbc1f37-53f5-4776-a70e-f2779179de50"; allowDiscards = true; - crypttabExtraOpts = ["tpm2-device=auto"]; + crypttabExtraOpts = [ "tpm2-device=auto" ]; }; }; }; @@ -31,25 +36,42 @@ "/" = { device = "/dev/mapper/cryptroot"; fsType = "btrfs"; - options = ["subvol=root" "compress=zstd" "noatime"]; + options = [ + "subvol=root" + "compress=zstd" + "noatime" + ]; }; "/var/log" = { device = "/dev/mapper/cryptroot"; fsType = "btrfs"; - options = ["subvol=var_log" "compress=zstd" "noatime"]; + options = [ + "subvol=var_log" + "compress=zstd" + "noatime" + ]; }; "/nix" = { device = "/dev/mapper/cryptroot"; fsType = "btrfs"; - options = ["subvol=nix" "compress=zstd" "noatime" "nodatacow"]; + options = [ + "subvol=nix" + "compress=zstd" + "noatime" + "nodatacow" + ]; }; "/home" = { device = "/dev/mapper/cryptroot"; fsType = "btrfs"; - options = ["subvol=home" "compress=zstd" "noatime"]; + options = [ + "subvol=home" + "compress=zstd" + "noatime" + ]; }; "/boot" = { @@ -58,7 +80,7 @@ }; }; - swapDevices = []; + swapDevices = [ ]; # Enables DHCP on each ethernet and wireless interface. In case of scripted networking # (the default) this is the recommended approach. When using systemd-networkd it's |
