mirror of
https://github.com/ItsDrike/nixdots
synced 2025-06-29 07:00:41 +00:00
Run alejandra
This commit is contained in:
parent
286920def4
commit
c00134da1c
152 changed files with 827 additions and 721 deletions
|
@ -1,4 +1,9 @@
|
|||
{ config, lib, pkgs, ...}: let
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}: let
|
||||
inherit (lib) mkOption mkEnableOption literalExpression;
|
||||
|
||||
cfg = config.myOptions.system.boot;
|
||||
|
@ -16,17 +21,17 @@ in {
|
|||
description = "The kernel to use for the system.";
|
||||
};
|
||||
|
||||
tmpOnTmpfs =
|
||||
tmpOnTmpfs = mkEnableOption ''
|
||||
`/tmp` living on tmpfs. false means it will be cleared manually on each reboot
|
||||
|
||||
This option defaults to `true` if the host provides patches to the kernel package in
|
||||
`boot.kernelPatches`
|
||||
'';
|
||||
|
||||
silentBoot =
|
||||
mkEnableOption ''
|
||||
`/tmp` living on tmpfs. false means it will be cleared manually on each reboot
|
||||
|
||||
This option defaults to `true` if the host provides patches to the kernel package in
|
||||
`boot.kernelPatches`
|
||||
'';
|
||||
|
||||
silentBoot = mkEnableOption ''
|
||||
almost entirely silent boot process through `quiet` kernel parameter
|
||||
''
|
||||
// { default = cfg.plymouth.enable; };
|
||||
almost entirely silent boot process through `quiet` kernel parameter
|
||||
''
|
||||
// {default = cfg.plymouth.enable;};
|
||||
};
|
||||
}
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{ lib, ... }: with lib; let
|
||||
{lib, ...}:
|
||||
with lib; let
|
||||
inherit (lib) mkEnableOption mkOption types;
|
||||
in
|
||||
{
|
||||
in {
|
||||
options.myOptions.system.boot.plymouth = {
|
||||
enable = mkEnableOption ''
|
||||
Plymouth boot splash.
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{ lib, ... }: with lib; let
|
||||
{lib, ...}:
|
||||
with lib; let
|
||||
inherit (lib) mkEnableOption;
|
||||
in
|
||||
{
|
||||
in {
|
||||
options.myOptions.system.boot.secure-boot = {
|
||||
enable = mkEnableOption ''
|
||||
enable = mkEnableOption ''
|
||||
secure-boot using lanzaboote.
|
||||
|
||||
Note that you will need to have UEFI firmware, and the rebuild
|
||||
|
@ -18,6 +18,6 @@ in
|
|||
sudo sbctl enroll-keys -m
|
||||
```
|
||||
Then reboot, and secure-boot should be enabled.
|
||||
'';
|
||||
'';
|
||||
};
|
||||
}
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{ lib, ... }: with lib; let
|
||||
{lib, ...}:
|
||||
with lib; let
|
||||
inherit (lib) mkOption;
|
||||
in
|
||||
{
|
||||
in {
|
||||
imports = [
|
||||
./boot
|
||||
./impermanence.nix
|
||||
|
|
|
@ -1,9 +1,13 @@
|
|||
{ lib, config, ... }: with lib; let
|
||||
{
|
||||
lib,
|
||||
config,
|
||||
...
|
||||
}:
|
||||
with lib; let
|
||||
inherit (lib) mkEnableOption mkOption literalExpression types;
|
||||
|
||||
cfg = config.myOptions.system.impermanence;
|
||||
in
|
||||
{
|
||||
in {
|
||||
options.myOptions.system.impermanence = {
|
||||
root = {
|
||||
enable = mkEnableOption ''
|
||||
|
@ -88,7 +92,7 @@ in
|
|||
This does not create any subdirectories, all of the persistent home files
|
||||
fill be put directly in here. The user should be the owner of this directory.
|
||||
|
||||
If you don't wish to distinguish between data and system / configuration files,
|
||||
If you don't wish to distinguish between data and system / configuration files,
|
||||
you can point this to the same location.
|
||||
'';
|
||||
};
|
||||
|
@ -129,16 +133,16 @@ in
|
|||
};
|
||||
in {
|
||||
enable = mkEnableOption ''
|
||||
automatic wiping of specified BTRFS subvolumes from initrd.
|
||||
automatic wiping of specified BTRFS subvolumes from initrd.
|
||||
|
||||
If you're using BTRFS, you will generally want to enable this, however
|
||||
with a non-BTRFS system, or in case you wish to set up some custom handling
|
||||
which this module doesn't support, you will need to write your own logic
|
||||
for automatic root wiping.
|
||||
If you're using BTRFS, you will generally want to enable this, however
|
||||
with a non-BTRFS system, or in case you wish to set up some custom handling
|
||||
which this module doesn't support, you will need to write your own logic
|
||||
for automatic root wiping.
|
||||
|
||||
One option is is to simply have your root get mounted from tmpfs, making it
|
||||
live in RAM. This does however require dedicating a concrete chunk of RAM.
|
||||
'';
|
||||
One option is is to simply have your root get mounted from tmpfs, making it
|
||||
live in RAM. This does however require dedicating a concrete chunk of RAM.
|
||||
'';
|
||||
|
||||
devices = mkOption {
|
||||
default = {};
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue