zaphyra's git: nixfiles

zaphyra and void's nixfiles

commit 9151eec2551b38bd2c33c0d8cfd7972ab4fdfcb4
parent 02dc7f961d137191028d68bf3c8f0c580c4bd6da
Author: Katja Ramona Sophie Kwast (zaphyra) <git@zaphyra.eu>
Date: Thu, 19 Jun 2025 19:18:09 +0200

nix fmt
5 files changed, 111 insertions(+), 95 deletions(-)
M
config/nixos/modules/presets/zaphyra/dnsServer.nix
|
21
++++++++++++++++++---
M
config/nixos/modules/presets/zaphyra/networkManagerProfiles/dn42.nix
|
2
+-
M
config/nixos/modules/programs/yubikey.nix
|
57
+++++++++++++++++++++++++++++----------------------------
M
config/nixos/modules/users/void.nix
|
64
++++++++++++++++++++++++++++++++--------------------------------
M
config/nixos/modules/users/zaphyra.nix
|
62
+++++++++++++++++++++++++++++++-------------------------------
diff --git a/config/nixos/modules/presets/zaphyra/dnsServer.nix b/config/nixos/modules/presets/zaphyra/dnsServer.nix
@@ -55,7 +55,12 @@ in
         in
         {
           "zaphyra.eu" = {
-            inherit SOA NS CAA TXT;
+            inherit
+              SOA
+              NS
+              CAA
+              TXT
+              ;
 
             subdomains = {
               "acme.infra".NS = [

@@ -67,7 +72,12 @@ in
             };
           };
           "zaphyra.de" = {
-            inherit SOA NS CAA TXT;
+            inherit
+              SOA
+              NS
+              CAA
+              TXT
+              ;
           };
           "zaphyra.dn42" = {
             NS = [

@@ -84,7 +94,12 @@ in
             };
           };
           "katja.wtf" = {
-            inherit SOA NS CAA TXT;
+            inherit
+              SOA
+              NS
+              CAA
+              TXT
+              ;
 
             subdomains = {
               #legacy-stuff (zuggeschmack server)
diff --git a/config/nixos/modules/presets/zaphyra/networkManagerProfiles/dn42.nix b/config/nixos/modules/presets/zaphyra/networkManagerProfiles/dn42.nix
@@ -21,7 +21,7 @@ in
   };
 
   config = lib.mkIf cfg.enable {
-    sops.secrets."environments/networkManagerProfiles/dn42" = {};
+    sops.secrets."environments/networkManagerProfiles/dn42" = { };
 
     networking.networkmanager.ensureProfiles = {
       environmentFiles = [ config.sops.secrets."environments/networkManagerProfiles/dn42".path ];
diff --git a/config/nixos/modules/programs/yubikey.nix b/config/nixos/modules/programs/yubikey.nix
@@ -19,32 +19,34 @@ in
     default = false;
   };
 
-  config = lib.mkIf cfg.enable (lib.mkMerge [
-    (
-      #if we have home-manager enabled... but packages in the user environment
-      lib.mkIf config.modules.homeManager.enable {
-        home-manager.sharedModules = [
-          {
-            home.packages = with pkgs; [
-              yubikey-manager
-              yubioath-flutter
-            ];
-          }
-        ];
+  config = lib.mkIf cfg.enable (
+    lib.mkMerge [
+      (
+        #if we have home-manager enabled... but packages in the user environment
+        lib.mkIf config.modules.homeManager.enable {
+          home-manager.sharedModules = [
+            {
+              home.packages = with pkgs; [
+                yubikey-manager
+                yubioath-flutter
+              ];
+            }
+          ];
+        }
+      )
+      (
+        # if not... put it in the system environment
+        lib.mkIf (!config.modules.homeManager.enable) {
+          environment.systemPackages = with pkgs; [
+            yubikey-manager
+            yubioath-flutter
+          ];
+        }
+      )
+      {
+        programs.yubikey-touch-detector.enable = true;
       }
-    )
-    (
-      # if not... put it in the system environment
-      lib.mkIf (!config.modules.homeManager.enable) {
-        environment.systemPackages = with pkgs; [
-          yubikey-manager
-          yubioath-flutter
-        ];
-      }
-    )
-    {
-      programs.yubikey-touch-detector.enable = true;
-    }
-  ]);
+    ]
+  );
 
-}-
\ No newline at end of file
+}
diff --git a/config/nixos/modules/users/void.nix b/config/nixos/modules/users/void.nix
@@ -18,37 +18,37 @@ in
     default = false;
   };
 
-  config = lib.mkIf cfg.enable (lib.mkMerge [
-    {
-      sops.secrets.voidPassword = {
-        neededForUsers = true;
-        sopsFile = inputs.self.sopsSecrets.common;
-      };
+  config = lib.mkIf cfg.enable (
+    lib.mkMerge [
+      {
+        sops.secrets.voidPassword = {
+          neededForUsers = true;
+          sopsFile = inputs.self.sopsSecrets.common;
+        };
 
-      users.users.void = {
-        uid = 1000;
-        description = "Hannah";
-        hashedPasswordFile = config.sops.secrets.voidPassword.path;
-        isNormalUser = true;
-        extraGroups = [
-          "audio"
-          "dialout"
-          "docker"
-          "input"
-          "networkmanager"
-          "ssh"
-          "tss"
-          "video"
-          "wheel"
-        ];
-        openssh.authorizedKeys.keys = [
-          "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOFsnTwRtKRrn2KqbkTvXgwZniD1p90A7iqvQduhoDL6 openpgp:0x03F32AB3"
-        ];
-      };
-    }
+        users.users.void = {
+          uid = 1000;
+          description = "Hannah";
+          hashedPasswordFile = config.sops.secrets.voidPassword.path;
+          isNormalUser = true;
+          extraGroups = [
+            "audio"
+            "dialout"
+            "docker"
+            "input"
+            "networkmanager"
+            "ssh"
+            "tss"
+            "video"
+            "wheel"
+          ];
+          openssh.authorizedKeys.keys = [
+            "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOFsnTwRtKRrn2KqbkTvXgwZniD1p90A7iqvQduhoDL6 openpgp:0x03F32AB3"
+          ];
+        };
+      }
 
-    (
-      lib.mkIf config.modules.homeManager.enable {
+      (lib.mkIf config.modules.homeManager.enable {
         home-manager.users.void.imports = lib.concatLists [
           [
             homeManagerModules.void.home

@@ -58,8 +58,8 @@ in
             #homeManagerModules.void.impermanence # FIXME: implement impermanence
           ])
         ];
-      }
-    )
-  ]);
+      })
+    ]
+  );
 
 }
diff --git a/config/nixos/modules/users/zaphyra.nix b/config/nixos/modules/users/zaphyra.nix
@@ -19,35 +19,35 @@ in
     default = false;
   };
 
-  config = lib.mkIf cfg.enable (lib.mkMerge [
-    {
-      sops.secrets.zaphyraPassword = {
-        neededForUsers = true;
-        sopsFile = inputs.self.sopsSecrets.common;
-      };
-
-      users.users.zaphyra = {
-        uid = 1001;
-        description = "Katja";
-        hashedPasswordFile = config.sops.secrets.zaphyraPassword.path;
-        isNormalUser = true;
-        extraGroups =
-          [
-            "ssh"
-            "wheel"
-          ]
-          ++ lib.optionals config.networking.networkmanager.enable [
-            "networkmanager"
+  config = lib.mkIf cfg.enable (
+    lib.mkMerge [
+      {
+        sops.secrets.zaphyraPassword = {
+          neededForUsers = true;
+          sopsFile = inputs.self.sopsSecrets.common;
+        };
+
+        users.users.zaphyra = {
+          uid = 1001;
+          description = "Katja";
+          hashedPasswordFile = config.sops.secrets.zaphyraPassword.path;
+          isNormalUser = true;
+          extraGroups =
+            [
+              "ssh"
+              "wheel"
+            ]
+            ++ lib.optionals config.networking.networkmanager.enable [
+              "networkmanager"
+            ];
+          openssh.authorizedKeys.keys = [
+            (builtins.readFile "${pkgs.zaphyra-website}/ssh_pubkey.asc")
+            "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPnNyOCX+PopTHuNrfBwEmPM7FC6oM7nFgW/2tvW7ddT"
           ];
-        openssh.authorizedKeys.keys = [
-          (builtins.readFile "${pkgs.zaphyra-website}/ssh_pubkey.asc")
-          "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPnNyOCX+PopTHuNrfBwEmPM7FC6oM7nFgW/2tvW7ddT"
-        ];
-      };
-    }
+        };
+      }
 
-    (
-      lib.mkIf config.modules.homeManager.enable {
+      (lib.mkIf config.modules.homeManager.enable {
         home-manager.users.zaphyra.imports = lib.concatLists [
           [
             homeManagerModules.zaphyra.home

@@ -108,9 +108,9 @@ in
               gnomeExtensions.bluetoothBatteryMeter
             ]
           ))
-        ];        
-      }
-    )
-  ]);
+        ];
+      })
+    ]
+  );
 
 }