diff options
Diffstat (limited to 'modules/nixos/base')
| -rw-r--r-- | modules/nixos/base/default.nix | 3 | ||||
| -rw-r--r-- | modules/nixos/base/documentation.nix | 11 | ||||
| -rw-r--r-- | modules/nixos/base/networking.nix | 14 | ||||
| -rw-r--r-- | modules/nixos/base/nix.nix | 15 | ||||
| -rw-r--r-- | modules/nixos/base/programs.nix | 10 | ||||
| -rw-r--r-- | modules/nixos/base/security.nix | 14 | ||||
| -rw-r--r-- | modules/nixos/base/users.nix | 22 |
7 files changed, 49 insertions, 40 deletions
diff --git a/modules/nixos/base/default.nix b/modules/nixos/base/default.nix index 421f733..d80d573 100644 --- a/modules/nixos/base/default.nix +++ b/modules/nixos/base/default.nix @@ -3,7 +3,8 @@ lib, pkgs, ... -}: { +}: +{ imports = [ ../../shared ./documentation.nix diff --git a/modules/nixos/base/documentation.nix b/modules/nixos/base/documentation.nix index 5792c80..986c6ee 100644 --- a/modules/nixos/base/documentation.nix +++ b/modules/nixos/base/documentation.nix @@ -3,13 +3,18 @@ lib, pkgs, ... -}: let +}: +let cfg = config.base.documentation; enable = config.base.enable && cfg.enable; -in { +in +{ config = lib.mkIf enable { documentation.nixos.enable = false; - environment.systemPackages = with pkgs; [man-pages man-pages-posix]; + environment.systemPackages = with pkgs; [ + man-pages + man-pages-posix + ]; }; } diff --git a/modules/nixos/base/networking.nix b/modules/nixos/base/networking.nix index 895127c..49feca5 100644 --- a/modules/nixos/base/networking.nix +++ b/modules/nixos/base/networking.nix @@ -1,13 +1,13 @@ -{ - config, - lib, - ... -}: let +{ config, lib, ... }: +let cfg = config.base.networking; enable = config.base.enable && cfg.enable; -in { +in +{ options.base.networking = { - enable = lib.mkEnableOption "base network settings" // {default = true;}; + enable = lib.mkEnableOption "base network settings" // { + default = true; + }; }; config = lib.mkIf enable { diff --git a/modules/nixos/base/nix.nix b/modules/nixos/base/nix.nix index 8429346..6c49312 100644 --- a/modules/nixos/base/nix.nix +++ b/modules/nixos/base/nix.nix @@ -1,16 +1,17 @@ -{ - config, - lib, - ... -}: let +{ config, lib, ... }: +let cfg = config.base.nixSettings; enable = config.base.enable && cfg.enable; -in { +in +{ config = lib.mkIf enable { nix = { channel.enable = lib.mkDefault false; gc.dates = lib.mkDefault "weekly"; - settings.trusted-users = ["root" "@wheel"]; + settings.trusted-users = [ + "root" + "@wheel" + ]; }; }; } diff --git a/modules/nixos/base/programs.nix b/modules/nixos/base/programs.nix index 7d1a15b..def710c 100644 --- a/modules/nixos/base/programs.nix +++ b/modules/nixos/base/programs.nix @@ -1,11 +1,9 @@ -{ - config, - lib, - ... -}: let +{ config, lib, ... }: +let cfg = config.base.defaultPrograms; enable = config.base.enable && cfg.enable; -in { +in +{ config = lib.mkIf enable { programs = { git.enable = true; diff --git a/modules/nixos/base/security.nix b/modules/nixos/base/security.nix index 4401f81..c3d606f 100644 --- a/modules/nixos/base/security.nix +++ b/modules/nixos/base/security.nix @@ -1,13 +1,13 @@ -{ - config, - lib, - ... -}: let +{ config, lib, ... }: +let cfg = config.base.security; enable = config.base.enable && cfg.enable; -in { +in +{ options.base.security = { - enable = lib.mkEnableOption "base security settings" // {default = true;}; + enable = lib.mkEnableOption "base security settings" // { + default = true; + }; }; config = lib.mkIf enable { diff --git a/modules/nixos/base/users.nix b/modules/nixos/base/users.nix index 507a82a..b026f73 100644 --- a/modules/nixos/base/users.nix +++ b/modules/nixos/base/users.nix @@ -4,19 +4,23 @@ pkgs, secretsDir, ... -}: let +}: +let cfg = config.base.users; -in { +in +{ options.base.users = { - enable = lib.mkEnableOption "base user configurations" // {default = true;}; + enable = lib.mkEnableOption "base user configurations" // { + default = true; + }; defaultRoot = { - enable = lib.mkEnableOption "default root user configuration" // {default = false;}; - manageSecrets = - lib.mkEnableOption "automatic secrets management" - // { - default = config.traits.secrets.enable; - }; + enable = lib.mkEnableOption "default root user configuration" // { + default = false; + }; + manageSecrets = lib.mkEnableOption "automatic secrets management" // { + default = config.traits.secrets.enable; + }; }; }; |
