mirror of
https://github.com/foo-dogsquared/nixos-config.git
synced 2025-04-24 18:19:11 +00:00
chore: format the codebase
This commit is contained in:
parent
f2cdf732cb
commit
04e460142a
@ -5,7 +5,8 @@
|
||||
|
||||
let
|
||||
atuinDomain = "atuin.${config.networking.domain}";
|
||||
in {
|
||||
in
|
||||
{
|
||||
# Atuin sync server because why not.
|
||||
services.atuin = {
|
||||
enable = true;
|
||||
|
@ -6,7 +6,8 @@
|
||||
|
||||
let
|
||||
codeForgeDomain = "code.${config.networking.domain}";
|
||||
in {
|
||||
in
|
||||
{
|
||||
services.gitea = {
|
||||
enable = true;
|
||||
appName = "foodogsquared's code forge";
|
||||
|
@ -9,7 +9,8 @@ let
|
||||
keycloakDbName = if config.services.keycloak.database.createLocally then keycloakUser else config.services.keycloak.database.username;
|
||||
|
||||
certs = config.security.acme.certs;
|
||||
in {
|
||||
in
|
||||
{
|
||||
# Hey, the hub for your application sign-in.
|
||||
services.keycloak = {
|
||||
enable = true;
|
||||
|
@ -16,7 +16,8 @@ in
|
||||
# deployed server.
|
||||
services.openvpn.servers = {
|
||||
server = {
|
||||
config = let
|
||||
config =
|
||||
let
|
||||
certDirectory = certs."${acmeName}".directory;
|
||||
dhParams = config.security.dhparams.params;
|
||||
in
|
||||
@ -52,7 +53,8 @@ in
|
||||
# For key generation, debugging, panic configuration, anything else.
|
||||
environment.systemPackages = [ pkgs.openvpn ];
|
||||
|
||||
systemd.network = let
|
||||
systemd.network =
|
||||
let
|
||||
vpnBridgeIFName = "vpn-bridge";
|
||||
vpnTapIFName = "vpn-tap";
|
||||
in
|
||||
|
@ -5,7 +5,8 @@
|
||||
|
||||
let
|
||||
ldapDomain = "ldap.${config.networking.domain}";
|
||||
in {
|
||||
in
|
||||
{
|
||||
services.portunus = {
|
||||
enable = true;
|
||||
|
||||
@ -18,7 +19,8 @@ in {
|
||||
tls = true;
|
||||
};
|
||||
|
||||
seedPath = let
|
||||
seedPath =
|
||||
let
|
||||
seedData = {
|
||||
groups = [
|
||||
{
|
||||
@ -37,9 +39,11 @@ in {
|
||||
given_name = "Gabriel";
|
||||
family_name = "Arazas";
|
||||
email = "foodogsquared@${config.networking.domain}";
|
||||
ssh_public_keys = let
|
||||
ssh_public_keys =
|
||||
let
|
||||
readFiles = list: lib.lists.map (path: lib.readFile path) list;
|
||||
in readFiles [
|
||||
in
|
||||
readFiles [
|
||||
../../../../users/home-manager/foo-dogsquared/files/ssh-key.pub
|
||||
../../../../users/home-manager/foo-dogsquared/files/ssh-key-2.pub
|
||||
];
|
||||
@ -48,7 +52,8 @@ in {
|
||||
];
|
||||
};
|
||||
settingsFormat = pkgs.formats.json { };
|
||||
in settingsFormat.generate "portunus-seed" seedData;
|
||||
in
|
||||
settingsFormat.generate "portunus-seed" seedData;
|
||||
};
|
||||
|
||||
# Getting this to be accessible in the reverse proxy of choice.
|
||||
|
@ -10,7 +10,8 @@ let
|
||||
|
||||
# However, this is set on our own.
|
||||
vaultwardenDbName = "vaultwarden";
|
||||
in {
|
||||
in
|
||||
{
|
||||
services.vaultwarden = {
|
||||
enable = true;
|
||||
dbBackend = "postgresql";
|
||||
|
Loading…
Reference in New Issue
Block a user