cleanup whitespace and module layout

This commit is contained in:
tdback 2024-11-12 18:30:19 -05:00
parent 638421a283
commit bb4e47bacf
10 changed files with 22 additions and 43 deletions

View file

@ -7,7 +7,6 @@ in
services.gotosocial = { services.gotosocial = {
enable = true; enable = true;
package = pkgs.unstable.gotosocial; package = pkgs.unstable.gotosocial;
settings = { settings = {
application-name = "gotosocial"; application-name = "gotosocial";
host = "${domain}"; host = "${domain}";

View file

@ -41,6 +41,13 @@ in
${adminCmd} create --admin --email ${email} --username ${user} --password "$(tr -d '\n' < ${pwd})" || true ${adminCmd} create --admin --email ${email} --username ${user} --password "$(tr -d '\n' < ${pwd})" || true
''; '';
services.openssh.settings.AllowUsers = [ "forgejo" ];
services.caddy.virtualHosts."${domain}".extraConfig = ''
encode zstd gzip
reverse_proxy http://localhost:${builtins.toString port}
'';
age.secrets.forgejoRunnerToken.file = ../../secrets/forgejoRunnerToken.age; age.secrets.forgejoRunnerToken.file = ../../secrets/forgejoRunnerToken.age;
services.gitea-actions-runner = { services.gitea-actions-runner = {
package = pkgs.unstable.forgejo-runner; package = pkgs.unstable.forgejo-runner;
@ -55,11 +62,4 @@ in
]; ];
}; };
}; };
services.openssh.settings.AllowUsers = [ "forgejo" ];
services.caddy.virtualHosts."${domain}".extraConfig = ''
encode zstd gzip
reverse_proxy http://localhost:${builtins.toString port}
'';
} }

View file

@ -6,8 +6,7 @@
"${inputs.nixpkgs-unstable}/nixos/modules/services/databases/redis.nix" "${inputs.nixpkgs-unstable}/nixos/modules/services/databases/redis.nix"
]; ];
services = { services.immich = {
immich = {
enable = true; enable = true;
package = pkgs.unstable.immich; package = pkgs.unstable.immich;
host = "localhost"; host = "localhost";
@ -17,8 +16,8 @@
IMMICH_LOG_LEVEL = "log"; IMMICH_LOG_LEVEL = "log";
}; };
}; };
postgresql.package = pkgs.unstable.postgresql;
}; services.postgresql.package = pkgs.unstable.postgresql;
services.caddy.virtualHosts."photographs.tdback.net".extraConfig = '' services.caddy.virtualHosts."photographs.tdback.net".extraConfig = ''
encode zstd gzip encode zstd gzip

View file

@ -1,23 +1,15 @@
{ config, ... }: { config, ... }:
{ {
hardware.nvidia = { hardware.nvidia = {
package = config.boot.kernelPackages.nvidiaPackages.stable;
open = false;
nvidiaSettings = true;
forceFullCompositionPipeline = true;
modesetting.enable = true; modesetting.enable = true;
powerManagement = { powerManagement = {
enable = false; enable = false;
finegrained = false; finegrained = false;
}; };
# Don't use the open-source driver!
open = false;
nvidiaSettings = true;
# Fix screen tearing.
forceFullCompositionPipeline = true;
# Optional, but specify version of driver.
package = config.boot.kernelPackages.nvidiaPackages.stable;
}; };
services.xserver.videoDrivers = [ "nvidia" ]; services.xserver.videoDrivers = [ "nvidia" ];

View file

@ -2,13 +2,11 @@
{ {
virtualisation = { virtualisation = {
containers.enable = true; containers.enable = true;
oci-containers.backend = "podman";
podman = { podman = {
enable = true; enable = true;
dockerCompat = true; dockerCompat = true;
defaultNetwork.settings.dns_enabled = true; defaultNetwork.settings.dns_enabled = true;
}; };
oci-containers.backend = "podman";
}; };
} }

View file

@ -7,20 +7,17 @@ in
enable = true; enable = true;
package = pkgs.searxng; package = pkgs.searxng;
environmentFile = "/var/lib/searx/env"; environmentFile = "/var/lib/searx/env";
settings = { settings = {
general = { general = {
debug = false; debug = false;
instance_name = "searx"; instance_name = "searx";
}; };
search = { search = {
safe_search = 1; safe_search = 1;
autocomplete = "duckduckgo"; autocomplete = "duckduckgo";
autocomplete_min = 4; autocomplete_min = 4;
default_lang = "en-US"; default_lang = "en-US";
}; };
server = { server = {
port = port; port = port;
bind_address = "0.0.0.0"; bind_address = "0.0.0.0";
@ -28,7 +25,6 @@ in
public_instance = false; public_instance = false;
image_proxy = true; image_proxy = true;
}; };
ui.static_use_hash = true; ui.static_use_hash = true;
}; };
}; };

View file

@ -4,7 +4,6 @@
enable = true; enable = true;
package = pkgs.sftpgo; package = pkgs.sftpgo;
dataDir = "/var/lib/sftpgo"; dataDir = "/var/lib/sftpgo";
settings = { settings = {
httpd.bindings = [{ httpd.bindings = [{
port = 8080; port = 8080;

View file

@ -5,7 +5,6 @@
startWhenNeeded = true; startWhenNeeded = true;
ports = [ 2222 ]; ports = [ 2222 ];
openFirewall = true; openFirewall = true;
settings = { settings = {
AllowUsers = [ "tdback" ]; AllowUsers = [ "tdback" ];
PermitRootLogin = "no"; PermitRootLogin = "no";

View file

@ -4,7 +4,6 @@
enable = true; enable = true;
package = pkgs.xonotic-dedicated; package = pkgs.xonotic-dedicated;
openFirewall = true; openFirewall = true;
settings = { settings = {
hostname = "tdback's Xonotic Server"; hostname = "tdback's Xonotic Server";
net_address = "0.0.0.0"; net_address = "0.0.0.0";

View file

@ -14,10 +14,8 @@
ZED_EMAIL_ADDR = [ "root" ]; ZED_EMAIL_ADDR = [ "root" ];
ZED_EMAIL_PROG = "/run/current-system/sw/bin/pushover"; ZED_EMAIL_PROG = "/run/current-system/sw/bin/pushover";
ZED_EMAIL_OPTS = "-t '@SUBJECT@'"; ZED_EMAIL_OPTS = "-t '@SUBJECT@'";
ZED_NOTIFY_INTERVAL_SECS = 3600; ZED_NOTIFY_INTERVAL_SECS = 3600;
ZED_NOTIFY_VERBOSE = true; ZED_NOTIFY_VERBOSE = true;
ZED_USE_ENCLOSURE_LEDS = true; ZED_USE_ENCLOSURE_LEDS = true;
ZED_SCRUB_AFTER_RESILVER = true; ZED_SCRUB_AFTER_RESILVER = true;
}; };