Run alejandra

This commit is contained in:
ItsDrike 2024-07-27 01:07:07 +02:00
parent 286920def4
commit c00134da1c
Signed by: ItsDrike
GPG key ID: FA2745890B7048C0
152 changed files with 827 additions and 721 deletions

View file

@ -1,4 +1,8 @@
{ config, lib, ... }: let
{
config,
lib,
...
}: let
inherit (lib) mkDefault optionals;
cfg = config.myOptions.system.boot;
@ -25,7 +29,7 @@ in {
tmp = {
# /tmp on tmpfs, lets it live on your ram
# it defaults to false, which means you will use disk space instead of ram
# it defaults to false, which means you will use disk space instead of ram
# enable tmpfs tmp on anything where you have ram to spare
useTmpfs = cfg.tmpOnTmpfs;
@ -39,7 +43,7 @@ in {
tmpfsSize = mkDefault "50%";
};
kernelParams = (optionals cfg.silentBoot [
kernelParams = optionals cfg.silentBoot [
# tell the kernel to not be verbose
"quiet"
@ -53,6 +57,6 @@ in {
# disable systemd status messages
"systemd.show_status=auto"
"rd.systemd.show_status=auto"
]);
];
};
}

View file

@ -1,4 +1,8 @@
{ config, lib, ... }: let
{
config,
lib,
...
}: let
cfg = config.myOptions.system.boot;
in {
boot.loader.systemd-boot = {

View file

@ -1,4 +1,4 @@
{ pkgs, ... }: {
{pkgs, ...}: {
boot.initrd.systemd = {
# Include setleds binary in the initrd
# (the nix store doesn't exists in there yet, so we need to include
@ -12,12 +12,12 @@
services."numlock" = {
enable = true;
description = "Activate Numlock";
wantedBy = [ "initrd.target" ];
wantedBy = ["initrd.target"];
# Delay disk decryption until this unit is started
before = [ "systemd-cryptsetup@cryptfs.service" ];
before = ["systemd-cryptsetup@cryptfs.service"];
unitConfig.DefaultDependencies = "no";
serviceConfig.Type = "oneshot";
# This is essentially runs the same code as present in the
# This is essentially runs the same code as present in the
# mkinitcpio-numlock hook on Arch Linux (AUR).
script = ''
#!/bin/bash

View file

@ -1,20 +1,26 @@
{ config, lib, pkgs, ...}: let
{
config,
lib,
pkgs,
...
}: let
inherit (lib) mkIf;
cfg = config.myOptions.system.boot.plymouth;
in {
config = mkIf cfg.enable {
boot = {
plymouth = {
enable = true;
theme = cfg.selectedTheme;
}
// lib.optionalAttrs cfg.withThemes {
themePackages = [
(pkgs.adi1090x-plymouth-themes.override {
selected_themes = [ cfg.selectedTheme ];
})
];
};
plymouth =
{
enable = true;
theme = cfg.selectedTheme;
}
// lib.optionalAttrs cfg.withThemes {
themePackages = [
(pkgs.adi1090x-plymouth-themes.override {
selected_themes = [cfg.selectedTheme];
})
];
};
kernelParams = ["splash"];
};

View file

@ -1,11 +1,16 @@
{ config, pkgs, lib, ... }: let
{
config,
pkgs,
lib,
...
}: let
inherit (lib) mkIf;
cfg = config.myOptions.system.boot.secure-boot;
in {
config = mkIf cfg.enable {
# Secure Boot Key Manager
environment.systemPackages = [ pkgs.sbctl ];
environment.systemPackages = [pkgs.sbctl];
# Persist the secure boot keys (for impermanence)
myOptions.system.impermanence.root.extraDirectories = [