Run alejandra

This commit is contained in:
ItsDrike 2024-07-27 01:07:07 +02:00
parent 286920def4
commit c00134da1c
Signed by: ItsDrike
GPG key ID: FA2745890B7048C0
152 changed files with 827 additions and 721 deletions

View file

@ -1,4 +1,9 @@
{ config, lib, pkgs, ...}: let
{
config,
lib,
pkgs,
...
}: let
inherit (lib) mkOption mkEnableOption literalExpression;
cfg = config.myOptions.system.boot;
@ -16,17 +21,17 @@ in {
description = "The kernel to use for the system.";
};
tmpOnTmpfs =
tmpOnTmpfs = mkEnableOption ''
`/tmp` living on tmpfs. false means it will be cleared manually on each reboot
This option defaults to `true` if the host provides patches to the kernel package in
`boot.kernelPatches`
'';
silentBoot =
mkEnableOption ''
`/tmp` living on tmpfs. false means it will be cleared manually on each reboot
This option defaults to `true` if the host provides patches to the kernel package in
`boot.kernelPatches`
'';
silentBoot = mkEnableOption ''
almost entirely silent boot process through `quiet` kernel parameter
''
// { default = cfg.plymouth.enable; };
almost entirely silent boot process through `quiet` kernel parameter
''
// {default = cfg.plymouth.enable;};
};
}

View file

@ -1,7 +1,7 @@
{ lib, ... }: with lib; let
{lib, ...}:
with lib; let
inherit (lib) mkEnableOption mkOption types;
in
{
in {
options.myOptions.system.boot.plymouth = {
enable = mkEnableOption ''
Plymouth boot splash.

View file

@ -1,9 +1,9 @@
{ lib, ... }: with lib; let
{lib, ...}:
with lib; let
inherit (lib) mkEnableOption;
in
{
in {
options.myOptions.system.boot.secure-boot = {
enable = mkEnableOption ''
enable = mkEnableOption ''
secure-boot using lanzaboote.
Note that you will need to have UEFI firmware, and the rebuild
@ -18,6 +18,6 @@ in
sudo sbctl enroll-keys -m
```
Then reboot, and secure-boot should be enabled.
'';
'';
};
}

View file

@ -1,7 +1,7 @@
{ lib, ... }: with lib; let
{lib, ...}:
with lib; let
inherit (lib) mkOption;
in
{
in {
imports = [
./boot
./impermanence.nix

View file

@ -1,9 +1,13 @@
{ lib, config, ... }: with lib; let
{
lib,
config,
...
}:
with lib; let
inherit (lib) mkEnableOption mkOption literalExpression types;
cfg = config.myOptions.system.impermanence;
in
{
in {
options.myOptions.system.impermanence = {
root = {
enable = mkEnableOption ''
@ -88,7 +92,7 @@ in
This does not create any subdirectories, all of the persistent home files
fill be put directly in here. The user should be the owner of this directory.
If you don't wish to distinguish between data and system / configuration files,
If you don't wish to distinguish between data and system / configuration files,
you can point this to the same location.
'';
};
@ -129,16 +133,16 @@ in
};
in {
enable = mkEnableOption ''
automatic wiping of specified BTRFS subvolumes from initrd.
automatic wiping of specified BTRFS subvolumes from initrd.
If you're using BTRFS, you will generally want to enable this, however
with a non-BTRFS system, or in case you wish to set up some custom handling
which this module doesn't support, you will need to write your own logic
for automatic root wiping.
If you're using BTRFS, you will generally want to enable this, however
with a non-BTRFS system, or in case you wish to set up some custom handling
which this module doesn't support, you will need to write your own logic
for automatic root wiping.
One option is is to simply have your root get mounted from tmpfs, making it
live in RAM. This does however require dedicating a concrete chunk of RAM.
'';
One option is is to simply have your root get mounted from tmpfs, making it
live in RAM. This does however require dedicating a concrete chunk of RAM.
'';
devices = mkOption {
default = {};