mirror of
https://github.com/foo-dogsquared/nixos-config.git
synced 2025-01-30 22:57:55 +00:00
chore: reformat codebase
This commit is contained in:
parent
52b66fa47d
commit
53f7cf6e83
@ -33,9 +33,11 @@ in
|
||||
${lib.concatStringsSep "\n" perUserSchemas}
|
||||
'';
|
||||
|
||||
settings = let
|
||||
settings =
|
||||
let
|
||||
credsDir = path: "/run/credentials/postgresql.service/${path}";
|
||||
in {
|
||||
in
|
||||
{
|
||||
# Still doing the secure schema usage pattern.
|
||||
search_path = "\"$user\"";
|
||||
|
||||
@ -58,7 +60,8 @@ in
|
||||
# Setting this up for TLS.
|
||||
systemd.services.postgresql = {
|
||||
requires = [ "acme-finished-${postgresqlDomain}.target" ];
|
||||
serviceConfig.LoadCredential = let
|
||||
serviceConfig.LoadCredential =
|
||||
let
|
||||
certDirectory = config.security.acme.certs."${postgresqlDomain}".directory;
|
||||
certCredentialPath = path: "${path}:${certDirectory}/${path}";
|
||||
in
|
||||
|
@ -16,14 +16,16 @@ in
|
||||
{
|
||||
environment.systemPackages = [ pkgs.wireguard-tools ];
|
||||
|
||||
sops.secrets = let
|
||||
sops.secrets =
|
||||
let
|
||||
getKey = key: {
|
||||
inherit key;
|
||||
sopsFile = ../../secrets/secrets.yaml;
|
||||
};
|
||||
|
||||
getSecrets = secrets:
|
||||
(lib.mapAttrs' (name: config:
|
||||
(lib.mapAttrs'
|
||||
(name: config:
|
||||
lib.nameValuePair
|
||||
"plover/${name}"
|
||||
((getKey name) // config))
|
||||
|
@ -46,9 +46,11 @@ in {
|
||||
};
|
||||
|
||||
# A fuzzy finder that enables fuzzy finding not furry finding, a common misconception.
|
||||
programs.fzf = let
|
||||
programs.fzf =
|
||||
let
|
||||
fd = "${lib.getBin pkgs.fd}/bin/fd";
|
||||
in {
|
||||
in
|
||||
{
|
||||
enable = true;
|
||||
changeDirWidgetCommand = "${fd} --type d";
|
||||
defaultCommand = "${fd} --type f";
|
||||
|
Loading…
Reference in New Issue
Block a user