From d97549d7947fe5fa8f73db2fe18d33c0040817c3 Mon Sep 17 00:00:00 2001 From: Grisha Shipunov Date: Sun, 19 Jan 2025 20:47:09 +0100 Subject: [PATCH] treefmt --- flake.nix | 22 +++++++++++----------- hosts/cloud/proxy/auth.nix | 4 ++-- hosts/cloud/proxy/default.nix | 5 ++++- 3 files changed, 17 insertions(+), 14 deletions(-) diff --git a/flake.nix b/flake.nix index 77e0dd8..8f5ed17 100644 --- a/flake.nix +++ b/flake.nix @@ -113,18 +113,18 @@ ]; }; - radicale = nixpkgs-stable.lib.nixosSystem { - system = "x86_64-linux"; - specialArgs = { inherit inputs; }; - modules = [ - sops-nix.nixosModules.sops - microvm.nixosModules.microvm + radicale = nixpkgs-stable.lib.nixosSystem { + system = "x86_64-linux"; + specialArgs = { inherit inputs; }; + modules = [ + sops-nix.nixosModules.sops + microvm.nixosModules.microvm - ./hosts/radicale - ./modules/server - ./modules/wg - ]; + ./hosts/radicale + ./modules/server + ./modules/wg + ]; + }; }; }; - }; } diff --git a/hosts/cloud/proxy/auth.nix b/hosts/cloud/proxy/auth.nix index 27ee2ee..b8e10d5 100644 --- a/hosts/cloud/proxy/auth.nix +++ b/hosts/cloud/proxy/auth.nix @@ -2,8 +2,8 @@ { services.nginx.upstreams.keycloak = { servers = { - "10.89.88.11:38080" = {}; - "[fd31:185d:722f::11]:38080" = {}; + "10.89.88.11:38080" = { }; + "[fd31:185d:722f::11]:38080" = { }; }; }; diff --git a/hosts/cloud/proxy/default.nix b/hosts/cloud/proxy/default.nix index 798b34d..1b0becf 100644 --- a/hosts/cloud/proxy/default.nix +++ b/hosts/cloud/proxy/default.nix @@ -4,7 +4,10 @@ ./auth.nix ]; - networking.firewall.allowedTCPPorts = [ 80 443 ]; + networking.firewall.allowedTCPPorts = [ + 80 + 443 + ]; services.nginx = { enable = true;