From 0e00b442e116807d8a6d4ed24523600514675f71 Mon Sep 17 00:00:00 2001 From: osbm Date: Fri, 18 Oct 2024 00:01:32 +0300 Subject: [PATCH] applied nixfmt --- configuration.nix | 29 +++++++++++++++-------------- flake.nix | 30 +++++++++++++----------------- 2 files changed, 28 insertions(+), 31 deletions(-) diff --git a/configuration.nix b/configuration.nix index 0ac3037..243536a 100644 --- a/configuration.nix +++ b/configuration.nix @@ -5,10 +5,9 @@ { config, pkgs, pkgs-unstable, system-label, ... }: { - imports = - [ # Include the results of the hardware scan. - ./hardware-configuration.nix - ]; + imports = [ # Include the results of the hardware scan. + ./hardware-configuration.nix + ]; # Bootloader. boot.loader.systemd-boot.enable = true; @@ -96,7 +95,7 @@ users.users.osbm = { isNormalUser = true; description = "osbm"; - extraGroups = [ "networkmanager" "wheel" "docker"]; + extraGroups = [ "networkmanager" "wheel" "docker" ]; packages = with pkgs; [ kdePackages.kate vscode @@ -117,7 +116,7 @@ nixpkgs.config.allowUnfree = true; # enable nix flakes - nix.settings.experimental-features = [ "nix-command" "flakes"]; + nix.settings.experimental-features = [ "nix-command" "flakes" ]; nix.gc = { automatic = true; @@ -130,12 +129,14 @@ programs.steam = { enable = true; - remotePlay.openFirewall = true; # Open ports in the firewall for Steam Remote Play - dedicatedServer.openFirewall = true; # Open ports in the firewall for Source Dedicated Server - localNetworkGameTransfers.openFirewall = true; # Open ports in the firewall for Steam Local Network Game Transfers + remotePlay.openFirewall = + true; # Open ports in the firewall for Steam Remote Play + dedicatedServer.openFirewall = + true; # Open ports in the firewall for Source Dedicated Server + localNetworkGameTransfers.openFirewall = + true; # Open ports in the firewall for Steam Local Network Game Transfers }; - # List packages installed in system profile. To search, run: # $ nix search wget environment.systemPackages = with pkgs; [ @@ -174,11 +175,11 @@ enabled = "fcitx5"; # waylandFrontend = true; fcitx5.addons = with pkgs; [ - fcitx5-gtk # alternatively, kdePackages.fcitx5-qt - fcitx5-mozc # table input method support - fcitx5-nord # a color theme + fcitx5-gtk # alternatively, kdePackages.fcitx5-qt + fcitx5-mozc # table input method support + fcitx5-nord # a color theme ]; - }; + }; # List services that you want to enable: # Enable the OpenSSH daemon. diff --git a/flake.nix b/flake.nix index c22eac7..aa361a3 100644 --- a/flake.nix +++ b/flake.nix @@ -7,25 +7,21 @@ }; - outputs = inputs@{ - self, - nixpkgs, - nixpkgs-unstable, - ... - }: { - nixosConfigurations = { - # revision = self.shortRev or self.dirtyShortRev or self.lastModified or "unknown"; - tartarus = nixpkgs.lib.nixosSystem rec { - system = "x86_64-linux"; - modules = [ ./configuration.nix ]; - specialArgs = { - pkgs-unstable = import nixpkgs-unstable { - inherit system; - config.allowUnfree = true; - }; - system-label = self.shortRev or self.dirtyShortRev or self.lastModified or "unknown"; + outputs = inputs@{ self, nixpkgs, nixpkgs-unstable, ... }: { + nixosConfigurations = { + # revision = self.shortRev or self.dirtyShortRev or self.lastModified or "unknown"; + tartarus = nixpkgs.lib.nixosSystem rec { + system = "x86_64-linux"; + modules = [ ./configuration.nix ]; + specialArgs = { + pkgs-unstable = import nixpkgs-unstable { + inherit system; + config.allowUnfree = true; }; + system-label = + self.shortRev or self.dirtyShortRev or self.lastModified or "unknown"; }; }; }; + }; }