Run 'nix fmt' on whole repo
This commit is contained in:
@@ -3,7 +3,7 @@
|
|||||||
enable = true;
|
enable = true;
|
||||||
virtualHosts = {
|
virtualHosts = {
|
||||||
"crueltysquad.com" = {
|
"crueltysquad.com" = {
|
||||||
serverAliases = [ "www.crueltysquad.com" ];
|
serverAliases = ["www.crueltysquad.com"];
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
redir https://store.steampowered.com/app/1388770/Cruelty_Squad/
|
redir https://store.steampowered.com/app/1388770/Cruelty_Squad/
|
||||||
'';
|
'';
|
||||||
|
|||||||
@@ -1,14 +1,11 @@
|
|||||||
{ pkgs, ... }:
|
{pkgs, ...}: let
|
||||||
|
|
||||||
let
|
|
||||||
PROJECT_ROOT = "/workspace/deployed-nixos-server-and-apps/nixos-apps/cutesealfanpage.love";
|
PROJECT_ROOT = "/workspace/deployed-nixos-server-and-apps/nixos-apps/cutesealfanpage.love";
|
||||||
in
|
in {
|
||||||
{
|
|
||||||
services.caddy = {
|
services.caddy = {
|
||||||
enable = true;
|
enable = true;
|
||||||
virtualHosts = {
|
virtualHosts = {
|
||||||
"cutesealfanpage.love" = {
|
"cutesealfanpage.love" = {
|
||||||
serverAliases = [ "www.cutesealfanpage.love" ];
|
serverAliases = ["www.cutesealfanpage.love"];
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
root * ${PROJECT_ROOT}/_site
|
root * ${PROJECT_ROOT}/_site
|
||||||
file_server
|
file_server
|
||||||
@@ -21,7 +18,7 @@ in
|
|||||||
cutesealfanpage-hakyll-site = {
|
cutesealfanpage-hakyll-site = {
|
||||||
enable = true;
|
enable = true;
|
||||||
description = "The hakyll executable that rebuilds the site when a new blog post is created.";
|
description = "The hakyll executable that rebuilds the site when a new blog post is created.";
|
||||||
path = with pkgs; [ nix git ];
|
path = with pkgs; [nix git];
|
||||||
script = ''
|
script = ''
|
||||||
cd ${PROJECT_ROOT}
|
cd ${PROJECT_ROOT}
|
||||||
nix run .#hakyll-site -- watch --no-server
|
nix run .#hakyll-site -- watch --no-server
|
||||||
@@ -32,7 +29,7 @@ in
|
|||||||
enable = true;
|
enable = true;
|
||||||
description = "The haskell script that creates the new post of the day.";
|
description = "The haskell script that creates the new post of the day.";
|
||||||
startAt = "08:12:42";
|
startAt = "08:12:42";
|
||||||
path = with pkgs; [ nix git ];
|
path = with pkgs; [nix git];
|
||||||
script = ''
|
script = ''
|
||||||
cd ${PROJECT_ROOT}
|
cd ${PROJECT_ROOT}
|
||||||
nix run .#generateSealPosts
|
nix run .#generateSealPosts
|
||||||
|
|||||||
@@ -1,17 +1,14 @@
|
|||||||
{ pkgs, ... }:
|
{pkgs, ...}: let
|
||||||
|
|
||||||
let
|
|
||||||
PROJECT_ROOT = "/workspace/deployed-nixos-server-and-apps/nixos-apps/ewanick.com";
|
PROJECT_ROOT = "/workspace/deployed-nixos-server-and-apps/nixos-apps/ewanick.com";
|
||||||
PORT = "5567";
|
PORT = "5567";
|
||||||
HOST = "localhost";
|
HOST = "localhost";
|
||||||
emanote-version = "1.2.0";
|
emanote-version = "1.2.0";
|
||||||
in
|
in {
|
||||||
{
|
|
||||||
services.caddy = {
|
services.caddy = {
|
||||||
enable = true;
|
enable = true;
|
||||||
virtualHosts = {
|
virtualHosts = {
|
||||||
"ewanick.com" = {
|
"ewanick.com" = {
|
||||||
serverAliases = [ "www.ewanick.com" ];
|
serverAliases = ["www.ewanick.com"];
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
reverse_proxy ${HOST}:${PORT}
|
reverse_proxy ${HOST}:${PORT}
|
||||||
'';
|
'';
|
||||||
|
|||||||
@@ -7,10 +7,10 @@
|
|||||||
- Haskell disciple
|
- Haskell disciple
|
||||||
- Polyglot programmer familiar with everything, from Ada to Zig.
|
- Polyglot programmer familiar with everything, from Ada to Zig.
|
||||||
|
|
||||||
Software developer for hire.
|
Software developer for hire.\
|
||||||
Contact me for contract work at `<firstName>@<lastName>.com`
|
Contact me for contract work at `<firstName>@<lastName>.com`\
|
||||||
See what I'm currently tinkering with at:
|
See what I'm currently tinkering with at:\
|
||||||
<https://git.ewanick.com/bill>
|
<https://git.ewanick.com/bill>
|
||||||
|
|
||||||
:::{.photoframe-center}
|
:::{.photoframe-center}
|
||||||
![[profile.jpg]]
|
!\[[profile.jpg]\]
|
||||||
|
|||||||
@@ -1,23 +1,20 @@
|
|||||||
{ pkgs, ... }:
|
{pkgs, ...}: let
|
||||||
|
|
||||||
let
|
|
||||||
PROJECT_ROOT = "/workspace/deployed-nixos-server-and-apps/nixos-apps/fancyTypist.dev";
|
PROJECT_ROOT = "/workspace/deployed-nixos-server-and-apps/nixos-apps/fancyTypist.dev";
|
||||||
HOST = "localhost";
|
HOST = "localhost";
|
||||||
PORT = 12513;
|
PORT = 12513;
|
||||||
in
|
in {
|
||||||
{
|
|
||||||
services.caddy = {
|
services.caddy = {
|
||||||
enable = true;
|
enable = true;
|
||||||
virtualHosts = {
|
virtualHosts = {
|
||||||
"fancytypist.com" = {
|
"fancytypist.com" = {
|
||||||
serverAliases = [ "www.fancytypist.com" ];
|
serverAliases = ["www.fancytypist.com"];
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
respond "Hello, world! fancytypist.com"
|
respond "Hello, world! fancytypist.com"
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
"fancytypist.ca" = {
|
"fancytypist.ca" = {
|
||||||
serverAliases = [ "www.fancytypist.ca" ];
|
serverAliases = ["www.fancytypist.ca"];
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
respond "Hello, world! fancytypist.ca"
|
respond "Hello, world! fancytypist.ca"
|
||||||
'';
|
'';
|
||||||
@@ -36,7 +33,7 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
"osds.fancytypist.dev" = {
|
"osds.fancytypist.dev" = {
|
||||||
serverAliases = [ "osds.fancytypist.dev" ];
|
serverAliases = ["osds.fancytypist.dev"];
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
reverse_proxy ${HOST}:${toString PORT}
|
reverse_proxy ${HOST}:${toString PORT}
|
||||||
'';
|
'';
|
||||||
|
|||||||
@@ -1,9 +1,7 @@
|
|||||||
{ pkgs, ... }:
|
{pkgs, ...}: let
|
||||||
let
|
|
||||||
baseUrl = "git.ewanick.com";
|
baseUrl = "git.ewanick.com";
|
||||||
PROJECT_ROOT = "/workspace/deployed-nixos-server-and-apps/nixos-apps/git.ewanick.com";
|
PROJECT_ROOT = "/workspace/deployed-nixos-server-and-apps/nixos-apps/git.ewanick.com";
|
||||||
in
|
in {
|
||||||
{
|
|
||||||
services.gitea = {
|
services.gitea = {
|
||||||
enable = true;
|
enable = true;
|
||||||
appName = "Bill's Gitea server, hosted on Linode using NixOS";
|
appName = "Bill's Gitea server, hosted on Linode using NixOS";
|
||||||
@@ -58,17 +56,16 @@ in
|
|||||||
|
|
||||||
virtualisation.docker.enable = true;
|
virtualisation.docker.enable = true;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
# README
|
# README
|
||||||
|
|
||||||
## View users and use the command line
|
## View users and use the command line
|
||||||
|
|
||||||
Do something like this, preferably as the gitea user
|
Do something like this, preferably as the gitea user
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ sudo su gitea
|
$ sudo su gitea
|
||||||
$ /nix/store/5xwh7m7252m9ljvr3lyilcza1q699r2c-gitea-1.17.4/bin/gitea -c /var/lib/gitea/custom/conf/app.ini admin user list
|
$ /nix/store/5xwh7m7252m9ljvr3lyilcza1q699r2c-gitea-1.17.4/bin/gitea -c /var/lib/gitea/custom/conf/app.ini admin user list
|
||||||
```
|
```
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
|||||||
@@ -2,14 +2,13 @@ let
|
|||||||
baseUrl = "hydra.fancyTypist.com";
|
baseUrl = "hydra.fancyTypist.com";
|
||||||
HOST = "localhost";
|
HOST = "localhost";
|
||||||
PORT = 8246;
|
PORT = 8246;
|
||||||
in
|
in {
|
||||||
{
|
|
||||||
services.hydra = {
|
services.hydra = {
|
||||||
enable = false;
|
enable = false;
|
||||||
port = PORT;
|
port = PORT;
|
||||||
hydraURL = "https://${HOST}:${toString PORT}";
|
hydraURL = "https://${HOST}:${toString PORT}";
|
||||||
notificationSender = "hydra@fancyTypist.com";
|
notificationSender = "hydra@fancyTypist.com";
|
||||||
buildMachinesFiles = [ ];
|
buildMachinesFiles = [];
|
||||||
useSubstitutes = true;
|
useSubstitutes = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
@@ -1,20 +1,18 @@
|
|||||||
# Currently disabled, having issues starting
|
# Currently disabled, having issues starting
|
||||||
{ pkgs, ... }:
|
{pkgs, ...}: let
|
||||||
let
|
|
||||||
baseUrl = "paperless.ewanick.com";
|
baseUrl = "paperless.ewanick.com";
|
||||||
HOST = "localhost";
|
HOST = "localhost";
|
||||||
PORT = 28981;
|
PORT = 28981;
|
||||||
in
|
in {
|
||||||
{
|
|
||||||
services.paperless = {
|
services.paperless = {
|
||||||
enable = true;
|
enable = true;
|
||||||
address = HOST;
|
address = HOST;
|
||||||
port = PORT;
|
port = PORT;
|
||||||
passwordFile = "/run/keys/paperless-password";
|
passwordFile = "/run/keys/paperless-password";
|
||||||
};
|
};
|
||||||
systemd.services.paperless-scheduler.after = [ "var-lib-paperless.mount" ];
|
systemd.services.paperless-scheduler.after = ["var-lib-paperless.mount"];
|
||||||
systemd.services.paperless-consumer.after = [ "var-lib-paperless.mount" ];
|
systemd.services.paperless-consumer.after = ["var-lib-paperless.mount"];
|
||||||
systemd.services.paperless-web.after = [ "var-lib-paperless.mount" ];
|
systemd.services.paperless-web.after = ["var-lib-paperless.mount"];
|
||||||
|
|
||||||
services.caddy = {
|
services.caddy = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|||||||
@@ -1,16 +1,13 @@
|
|||||||
# Edit this configuration file to define what should be installed on
|
# Edit this configuration file to define what should be installed on
|
||||||
# your system. Help is available in the configuration.nix(5) man page
|
# your system. Help is available in the configuration.nix(5) man page
|
||||||
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
||||||
|
|
||||||
{
|
{
|
||||||
inputs,
|
inputs,
|
||||||
config,
|
config,
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
...
|
...
|
||||||
}:
|
}: {
|
||||||
|
|
||||||
{
|
|
||||||
imports = [
|
imports = [
|
||||||
# Include the results of the hardware scan.
|
# Include the results of the hardware scan.
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
@@ -30,7 +27,7 @@
|
|||||||
|
|
||||||
# This will add each flake input as a registry
|
# This will add each flake input as a registry
|
||||||
# To make nix3 commands consistent with your flake
|
# To make nix3 commands consistent with your flake
|
||||||
registry = lib.mapAttrs (_: value: { flake = value; }) inputs;
|
registry = lib.mapAttrs (_: value: {flake = value;}) inputs;
|
||||||
|
|
||||||
# This will additionally add your inputs to the system's legacy channels
|
# This will additionally add your inputs to the system's legacy channels
|
||||||
# Making legacy nix commands consistent as well, awesome!
|
# Making legacy nix commands consistent as well, awesome!
|
||||||
@@ -82,9 +79,9 @@
|
|||||||
packages = with pkgs; [
|
packages = with pkgs; [
|
||||||
tldr
|
tldr
|
||||||
];
|
];
|
||||||
hashedPassword = "$y$j9T$7AufeqRXQaD9CxeBmwBUt0$.qNf/QdO5BGc0peHvHzDQqs1B48D0pYw9PhIDzcYAK8";
|
hashedPassword = "$y$j9T$7AufeqRXQaD9CxeBmwBUt0$.qNf/QdO5BGc0peHvHzDQqs1B48D0pYw9PhIDzcYAK8"; # cspell:disable-line
|
||||||
openssh.authorizedKeys.keys = [
|
openssh.authorizedKeys.keys = [
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGzXqcOu6/EjS60Ke55w4hj//lY6u3S1DYPoSd7yjdR3 alice@foobar"
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGzXqcOu6/EjS60Ke55w4hj//lY6u3S1DYPoSd7yjdR3 alice@foobar" # cspell:disable-line
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
@@ -1,19 +1,23 @@
|
|||||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||||
# and may be overwritten by future invocations. Please make changes
|
# and may be overwritten by future invocations. Please make changes
|
||||||
# to /etc/nixos/configuration.nix instead.
|
# to /etc/nixos/configuration.nix instead.
|
||||||
{ config, lib, pkgs, modulesPath, ... }:
|
|
||||||
|
|
||||||
{
|
{
|
||||||
imports =
|
config,
|
||||||
[ (modulesPath + "/profiles/qemu-guest.nix")
|
lib,
|
||||||
];
|
pkgs,
|
||||||
|
modulesPath,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
imports = [
|
||||||
|
(modulesPath + "/profiles/qemu-guest.nix")
|
||||||
|
];
|
||||||
|
|
||||||
boot.initrd.availableKernelModules = [ "virtio_pci" "virtio_scsi" "ahci" "sd_mod" ];
|
boot.initrd.availableKernelModules = ["virtio_pci" "virtio_scsi" "ahci" "sd_mod"];
|
||||||
boot.initrd.kernelModules = [ ];
|
boot.initrd.kernelModules = [];
|
||||||
boot.kernelModules = [ ];
|
boot.kernelModules = [];
|
||||||
boot.extraModulePackages = [ ];
|
boot.extraModulePackages = [];
|
||||||
|
|
||||||
boot.kernelParams = [ "console=ttyS0,19200n8" ];
|
boot.kernelParams = ["console=ttyS0,19200n8"];
|
||||||
boot.loader.grub.extraConfig = ''
|
boot.loader.grub.extraConfig = ''
|
||||||
serial --speed-19200 --unit=0 --word=8 --parity=no --stop=1;
|
serial --speed-19200 --unit=0 --word=8 --parity=no --stop=1;
|
||||||
terminal_input serial;
|
terminal_input serial;
|
||||||
@@ -24,14 +28,14 @@
|
|||||||
boot.loader.grub.device = "nodev";
|
boot.loader.grub.device = "nodev";
|
||||||
boot.loader.timeout = 10;
|
boot.loader.timeout = 10;
|
||||||
|
|
||||||
fileSystems."/" =
|
fileSystems."/" = {
|
||||||
{ device = "/dev/sda";
|
device = "/dev/sda";
|
||||||
fsType = "ext4";
|
fsType = "ext4";
|
||||||
};
|
};
|
||||||
|
|
||||||
swapDevices =
|
swapDevices = [
|
||||||
[ { device = "/dev/sdb"; }
|
{device = "/dev/sdb";}
|
||||||
];
|
];
|
||||||
|
|
||||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||||
|
|||||||
Reference in New Issue
Block a user