format clean up

This commit is contained in:
naturallaw77 2024-08-31 23:30:23 -07:00
parent 5fe30e3f4c
commit b8a31f1f6d

View File

@ -48,7 +48,7 @@ in
device = "LABEL=BTCEcoandBackup"; device = "LABEL=BTCEcoandBackup";
fsType = "ext4"; fsType = "ext4";
options = [ "nofail" ]; options = [ "nofail" ];
}; };
fileSystems."/boot/efi".options = [ "umask=0077" "defaults" ]; fileSystems."/boot/efi".options = [ "umask=0077" "defaults" ];
@ -190,13 +190,13 @@ in
programs.nixvim = { programs.nixvim = {
enable = true; enable = true;
colorschemes.catppuccin.enable = true;
colorschemes.catppuccin.enable = true; plugins.lualine.enable = true;
plugins.lualine.enable = true;
}; };
programs.bash.promptInit = "fish"; programs.bash.promptInit = "fish";
programs.fish = { programs.fish = {
enable = true; enable = true;
promptInit = "neofetch"; promptInit = "neofetch";
@ -241,17 +241,17 @@ in
}; };
"${personalization.nextcloud_url}" = { "${personalization.nextcloud_url}" = {
extraConfig = '' extraConfig = ''
encode gzip zstd encode gzip zstd
root * /var/lib/www/nextcloud root * /var/lib/www/nextcloud
php_fastcgi unix//run/phpfpm/mypool.sock php_fastcgi unix//run/phpfpm/mypool.sock
file_server file_server
redir /.well-known/carddav /remote.php/dav/ 301 redir /.well-known/carddav /remote.php/dav/ 301
redir /.well-known/caldav /remote.php/dav/ 301 redir /.well-known/caldav /remote.php/dav/ 301
header { header {
Strict-Transport-Security max-age=31536000; Strict-Transport-Security max-age=31536000;
} }
''; '';
}; };
"${personalization.matrix_url}" = { "${personalization.matrix_url}" = {
@ -293,8 +293,8 @@ in
###### CREATE DATABASE (WORDPRESS, MATRIX_SYNAPSE, AND NEXTCLOUD) ####### ###### CREATE DATABASE (WORDPRESS, MATRIX_SYNAPSE, AND NEXTCLOUD) #######
services.postgresql = { services.postgresql = {
enable = true; enable = true;
}; };
services.postgresql.authentication = lib.mkForce '' services.postgresql.authentication = lib.mkForce ''
@ -307,9 +307,9 @@ in
services.mysql = { services.mysql = {
enable = true; enable = true;
package = pkgs.mariadb; package = pkgs.mariadb;
}; };
services.postgresql.initialScript = pkgs.writeText "begin-init.sql" '' services.postgresql.initialScript = pkgs.writeText "begin-init.sql" ''
@ -360,7 +360,7 @@ backup /var/lib/ localhost/
backup /etc/nixos/ localhost/ backup /etc/nixos/ localhost/
backup /etc/nix-bitcoin-secrets/ localhost/ backup /etc/nix-bitcoin-secrets/ localhost/
''; '';
cronIntervals = { cronIntervals = {
daily = "50 21 * * *"; daily = "50 21 * * *";
hourly = "0 * * * *"; hourly = "0 * * * *";
}; };
@ -381,8 +381,8 @@ backup /etc/nix-bitcoin-secrets/ localhost/
####### TOR ####### ####### TOR #######
services.tor = { services.tor = {
enable = true; enable = true;
client.enable = true; client.enable = true;
torsocks.enable = true; torsocks.enable = true;
}; };
services.privoxy.enableTor = true; services.privoxy.enableTor = true;
@ -415,10 +415,10 @@ backup /etc/nix-bitcoin-secrets/ localhost/
####### Open ports in the firewall ####### ####### Open ports in the firewall #######
networking.firewall.allowedTCPPorts = [ 80 443 5349 8448 3050 3051 ]; networking.firewall.allowedTCPPorts = [ 80 443 5349 8448 3050 3051 ];
networking.firewall.allowedUDPPorts = [ 80 443 5349 8448 3050 3051 ]; networking.firewall.allowedUDPPorts = [ 80 443 5349 8448 3050 3051 ];
networking.firewall.allowedUDPPortRanges = [
{ from=49152; to=65535; } # TURN relay
];
networking.firewall.allowedUDPPortRanges = [
{ from=49152; to=65535; } # TURN relay
];
networking.firewall.enable = true; networking.firewall.enable = true;