summaryrefslogtreecommitdiff
path: root/systems/glados
diff options
context:
space:
mode:
authorseth <[email protected]>2024-06-30 09:56:30 -0400
committerseth <[email protected]>2024-06-30 10:23:04 -0400
commit088facf700946cb8f2d96c6089185bdc2a67180a (patch)
treec5b4e4cffbb3ee4ad2498c2251892bd457e9d3c7 /systems/glados
parent5d3045a0769af3a94fba7b5cf646e8498aaef595 (diff)
alejandra -> nixfmt-rfc-style
Diffstat (limited to 'systems/glados')
-rw-r--r--systems/glados/boot.nix9
-rw-r--r--systems/glados/default.nix5
-rw-r--r--systems/glados/hardware-configuration.nix50
3 files changed, 44 insertions, 20 deletions
diff --git a/systems/glados/boot.nix b/systems/glados/boot.nix
index 7f6793e..0aa6f9e 100644
--- a/systems/glados/boot.nix
+++ b/systems/glados/boot.nix
@@ -3,8 +3,9 @@
pkgs,
inputs,
...
-}: {
- imports = [inputs.lanzaboote.nixosModules.lanzaboote];
+}:
+{
+ imports = [ inputs.lanzaboote.nixosModules.lanzaboote ];
environment.systemPackages = with pkgs; [
sbctl
@@ -15,7 +16,7 @@
initrd.systemd.enable = true;
kernelPackages = pkgs.linuxPackages_latest;
- kernelParams = ["amd_pstate=active"];
+ kernelParams = [ "amd_pstate=active" ];
loader.systemd-boot.enable = lib.mkForce false;
@@ -24,6 +25,6 @@
pkiBundle = "/etc/secureboot";
};
- supportedFilesystems = ["ntfs"];
+ supportedFilesystems = [ "ntfs" ];
};
}
diff --git a/systems/glados/default.nix b/systems/glados/default.nix
index 491285d..7a096db 100644
--- a/systems/glados/default.nix
+++ b/systems/glados/default.nix
@@ -1,4 +1,5 @@
-{pkgs, ...}: {
+{ pkgs, ... }:
+{
imports = [
./boot.nix
./hardware-configuration.nix
@@ -11,7 +12,7 @@
plasma.enable = true;
};
- environment.systemPackages = [pkgs.obs-studio];
+ environment.systemPackages = [ pkgs.obs-studio ];
networking.hostName = "glados";
diff --git a/systems/glados/hardware-configuration.nix b/systems/glados/hardware-configuration.nix
index a7ff9e9..bd5f220 100644
--- a/systems/glados/hardware-configuration.nix
+++ b/systems/glados/hardware-configuration.nix
@@ -6,23 +6,28 @@
lib,
modulesPath,
...
-}: {
- imports = [
- (modulesPath + "/installer/scan/not-detected.nix")
- ];
+}:
+{
+ imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
boot = {
- extraModulePackages = [];
- kernelModules = ["kvm-amd"];
+ extraModulePackages = [ ];
+ kernelModules = [ "kvm-amd" ];
initrd = {
- availableKernelModules = ["xhci_pci" "ahci" "usb_storage" "usbhid" "sd_mod"];
- kernelModules = [];
+ availableKernelModules = [
+ "xhci_pci"
+ "ahci"
+ "usb_storage"
+ "usbhid"
+ "sd_mod"
+ ];
+ kernelModules = [ ];
luks.devices."cryptroot" = {
device = "/dev/disk/by-uuid/bbbc1f37-53f5-4776-a70e-f2779179de50";
allowDiscards = true;
- crypttabExtraOpts = ["tpm2-device=auto"];
+ crypttabExtraOpts = [ "tpm2-device=auto" ];
};
};
};
@@ -31,25 +36,42 @@
"/" = {
device = "/dev/mapper/cryptroot";
fsType = "btrfs";
- options = ["subvol=root" "compress=zstd" "noatime"];
+ options = [
+ "subvol=root"
+ "compress=zstd"
+ "noatime"
+ ];
};
"/var/log" = {
device = "/dev/mapper/cryptroot";
fsType = "btrfs";
- options = ["subvol=var_log" "compress=zstd" "noatime"];
+ options = [
+ "subvol=var_log"
+ "compress=zstd"
+ "noatime"
+ ];
};
"/nix" = {
device = "/dev/mapper/cryptroot";
fsType = "btrfs";
- options = ["subvol=nix" "compress=zstd" "noatime" "nodatacow"];
+ options = [
+ "subvol=nix"
+ "compress=zstd"
+ "noatime"
+ "nodatacow"
+ ];
};
"/home" = {
device = "/dev/mapper/cryptroot";
fsType = "btrfs";
- options = ["subvol=home" "compress=zstd" "noatime"];
+ options = [
+ "subvol=home"
+ "compress=zstd"
+ "noatime"
+ ];
};
"/boot" = {
@@ -58,7 +80,7 @@
};
};
- swapDevices = [];
+ swapDevices = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's