about summary refs log tree commit diff
diff options
context:
space:
mode:
-rw-r--r--flake.nix3
-rw-r--r--home/beets/default.nix3
-rw-r--r--home/bluetooth/default.nix3
-rw-r--r--home/direnv/default.nix3
-rw-r--r--home/drone-cli/default.nix3
-rw-r--r--home/element/default.nix3
-rw-r--r--home/emacs/default.nix3
-rw-r--r--home/eog/default.nix3
-rw-r--r--home/evince/default.nix3
-rw-r--r--home/feh/default.nix3
-rw-r--r--home/firefox/default.nix3
-rw-r--r--home/fish/default.nix3
-rw-r--r--home/flac/default.nix3
-rw-r--r--home/gcloud/default.nix3
-rw-r--r--home/git/default.nix3
-rw-r--r--home/go/default.nix3
-rw-r--r--home/gpg/default.nix3
-rw-r--r--home/gtk/default.nix3
-rw-r--r--home/mail/accounts/default.nix3
-rw-r--r--home/mail/default.nix3
-rw-r--r--home/mpv/default.nix3
-rw-r--r--home/packages/default.nix3
-rw-r--r--home/pass/default.nix3
-rw-r--r--home/pcmanfm/default.nix3
-rw-r--r--home/python/default.nix3
-rw-r--r--home/scanner/default.nix3
-rw-r--r--home/scripts/perf-flamegraph.nix3
-rw-r--r--home/seahorse/default.nix3
-rw-r--r--home/ssh/default.nix3
-rw-r--r--home/sublime-music/default.nix3
-rw-r--r--home/terminal/alacritty/default.nix3
-rw-r--r--home/terminal/default.nix3
-rw-r--r--home/tmux/default.nix3
-rw-r--r--home/transmission-remote/default.nix3
-rw-r--r--home/vlc/default.nix3
-rw-r--r--home/wm/default.nix6
-rw-r--r--home/wm/gammastep/default.nix3
-rw-r--r--home/wm/mako/default.nix3
-rw-r--r--home/wm/sway/default.nix3
-rw-r--r--home/wm/swaylock/default.nix3
-rw-r--r--home/wm/waybar/default.nix3
-rw-r--r--home/wm/wofi/default.nix3
-rw-r--r--home/xdg/default.nix3
-rw-r--r--home/yt-dlp/default.nix3
-rw-r--r--home/zsh/default.nix3
-rw-r--r--hosts/aptos/default.nix3
-rw-r--r--hosts/aptos/secrets/secrets.nix3
-rw-r--r--hosts/aptos/services.nix3
-rw-r--r--hosts/tahoe/secrets/secrets.nix3
-rw-r--r--hosts/tahoe/services.nix3
-rw-r--r--modules/hardware/amd/default.nix3
-rw-r--r--modules/hardware/bluetooth/default.nix3
-rw-r--r--modules/hardware/intel/default.nix3
-rw-r--r--modules/hardware/networking/default.nix3
-rw-r--r--modules/hardware/sound/default.nix3
-rw-r--r--modules/home/default.nix3
-rw-r--r--modules/programs/sway/default.nix3
-rw-r--r--modules/secrets/default.nix43
-rw-r--r--modules/services/avahi/default.nix3
-rw-r--r--modules/services/backup/default.nix3
-rw-r--r--modules/services/buildkite/default.nix61
-rw-r--r--modules/services/cgit/default.nix3
-rw-r--r--modules/services/drone/runner-docker/default.nix3
-rw-r--r--modules/services/drone/runner-exec/default.nix3
-rw-r--r--modules/services/drone/server/default.nix3
-rw-r--r--modules/services/gerrit/default.nix3
-rw-r--r--modules/services/gitea/default.nix3
-rw-r--r--modules/services/gnome/default.nix3
-rw-r--r--modules/services/grafana/default.nix3
-rw-r--r--modules/services/metrics-exporter/default.nix3
-rw-r--r--modules/services/navidrome/default.nix3
-rw-r--r--modules/services/nginx/default.nix3
-rw-r--r--modules/services/nginx/sso/default.nix3
-rw-r--r--modules/services/prometheus/default.nix3
-rw-r--r--modules/services/rclone/default.nix23
-rw-r--r--modules/services/samba/default.nix3
-rw-r--r--modules/services/sourcegraph/default.nix3
-rw-r--r--modules/services/syncthing/default.nix3
-rw-r--r--modules/services/tailscale/default.nix3
-rw-r--r--modules/services/thermald/default.nix3
-rw-r--r--modules/services/tlp/default.nix3
-rw-r--r--modules/services/transmission/default.nix3
-rw-r--r--modules/services/unifi/default.nix3
-rw-r--r--modules/system/boot/default.nix3
-rw-r--r--modules/system/fonts/default.nix3
-rw-r--r--modules/system/packages/default.nix3
-rw-r--r--modules/system/users/default.nix3
-rw-r--r--nix/mkSystem.nix3
-rw-r--r--nix/private-wireguard.nix27
89 files changed, 256 insertions, 156 deletions
diff --git a/flake.nix b/flake.nix
index 9627d28..86d32c8 100644
--- a/flake.nix
+++ b/flake.nix
@@ -31,7 +31,8 @@
   # Output config, or config for NixOS system
   outputs = { ... }@inputs:
     let lib = import ./nix { inherit inputs; };
-    in {
+    in
+    {
       nixosConfigurations = {
         carmel = lib.mkSystem { hostname = "carmel"; };
         aptos = lib.mkSystem { hostname = "aptos"; };
diff --git a/home/beets/default.nix b/home/beets/default.nix
index 617ff62..c88fd85 100644
--- a/home/beets/default.nix
+++ b/home/beets/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.home.beets;
-in {
+in
+{
   options.my.home.beets = with lib; {
     enable = mkEnableOption "beets configuration";
     musicDirectory = mkOption {
diff --git a/home/bluetooth/default.nix b/home/bluetooth/default.nix
index 51ecc4a..d0febca 100644
--- a/home/bluetooth/default.nix
+++ b/home/bluetooth/default.nix
@@ -1,6 +1,7 @@
 { config, lib, ... }:
 let cfg = config.my.home.bluetooth;
-in {
+in
+{
   options.my.home.bluetooth = with lib; {
     enable = mkEnableOption "bluetooth configuration";
   };
diff --git a/home/direnv/default.nix b/home/direnv/default.nix
index 26e99f2..f36a66c 100644
--- a/home/direnv/default.nix
+++ b/home/direnv/default.nix
@@ -2,7 +2,8 @@
 let
   cfg = config.my.home.direnv;
   fishEnabled = config.my.home.fish.enable;
-in {
+in
+{
   options.my.home.direnv = with lib; {
     enable = mkEnableOption "direnv configuration";
   };
diff --git a/home/drone-cli/default.nix b/home/drone-cli/default.nix
index 9eeb2e1..948e88a 100644
--- a/home/drone-cli/default.nix
+++ b/home/drone-cli/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.home.drone-cli;
-in {
+in
+{
   options.my.home.drone-cli = with lib; {
     enable = mkEnableOption "drone-cli configuration";
   };
diff --git a/home/element/default.nix b/home/element/default.nix
index 3fcb50e..30021e1 100644
--- a/home/element/default.nix
+++ b/home/element/default.nix
@@ -1,6 +1,7 @@
 { lib, config, pkgs, ... }:
 let cfg = config.my.home.element;
-in {
+in
+{
   options.my.home.element = with lib; {
     enable = mkEnableOption "element configuration";
   };
diff --git a/home/emacs/default.nix b/home/emacs/default.nix
index faac80d..4ea337e 100644
--- a/home/emacs/default.nix
+++ b/home/emacs/default.nix
@@ -1,6 +1,7 @@
 { lib, config, pkgs, ... }:
 let cfg = config.my.home.emacs;
-in {
+in
+{
   options.my.home.emacs = with lib; {
     enable = mkEnableOption "emacs configuration";
   };
diff --git a/home/eog/default.nix b/home/eog/default.nix
index c7f784b..1fa1108 100644
--- a/home/eog/default.nix
+++ b/home/eog/default.nix
@@ -1,6 +1,7 @@
 { lib, config, pkgs, ... }:
 let cfg = config.my.home.eog;
-in {
+in
+{
   options.my.home.eog = with lib; {
     enable = mkEnableOption "eog configuration";
   };
diff --git a/home/evince/default.nix b/home/evince/default.nix
index 16abc57..36dc1dd 100644
--- a/home/evince/default.nix
+++ b/home/evince/default.nix
@@ -1,6 +1,7 @@
 { lib, config, pkgs, ... }:
 let cfg = config.my.home.evince;
-in {
+in
+{
   options.my.home.evince = with lib; {
     enable = mkEnableOption "evince configuration";
   };
diff --git a/home/feh/default.nix b/home/feh/default.nix
index 0032252..eda4466 100644
--- a/home/feh/default.nix
+++ b/home/feh/default.nix
@@ -1,6 +1,7 @@
 { config, lib, ... }:
 let cfg = config.my.home.feh;
-in {
+in
+{
   options.my.home.feh = with lib; {
     enable = mkEnableOption "feh configuration";
   };
diff --git a/home/firefox/default.nix b/home/firefox/default.nix
index 7b6485d..15677b8 100644
--- a/home/firefox/default.nix
+++ b/home/firefox/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.home.firefox;
-in {
+in
+{
   options.my.home.firefox = with lib; {
     enable = mkEnableOption "firefox configuration";
   };
diff --git a/home/fish/default.nix b/home/fish/default.nix
index 85ff30d..7ff4bbe 100644
--- a/home/fish/default.nix
+++ b/home/fish/default.nix
@@ -2,7 +2,8 @@
 let
   cfg = config.my.home.fish;
   swayEnabled = config.my.home.wm.windowManager == "sway";
-in {
+in
+{
   options.my.home.fish = with lib; {
     enable = mkEnableOption "fish configuration";
   };
diff --git a/home/flac/default.nix b/home/flac/default.nix
index 137d353..42500af 100644
--- a/home/flac/default.nix
+++ b/home/flac/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.home.flac;
-in {
+in
+{
   options.my.home.flac = with lib; {
     enable = mkEnableOption "flac configuration";
   };
diff --git a/home/gcloud/default.nix b/home/gcloud/default.nix
index 0f6262b..f886586 100644
--- a/home/gcloud/default.nix
+++ b/home/gcloud/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.home.gcloud;
-in {
+in
+{
   options.my.home.gcloud = with lib; {
     enable = mkEnableOption "google cloud sdk";
   };
diff --git a/home/git/default.nix b/home/git/default.nix
index 0d99e69..8043b7b 100644
--- a/home/git/default.nix
+++ b/home/git/default.nix
@@ -1,7 +1,8 @@
 { lib, config, ... }:
 
 let cfg = config.my.home.git;
-in {
+in
+{
   options.my.home.git = with lib; {
     enable = mkEnableOption "git configuration";
   };
diff --git a/home/go/default.nix b/home/go/default.nix
index 24748d0..4cc15ef 100644
--- a/home/go/default.nix
+++ b/home/go/default.nix
@@ -1,6 +1,7 @@
 { lib, config, ... }:
 let cfg = config.my.home.go;
-in {
+in
+{
   options.my.home.go = with lib; {
     enable = mkEnableOption "go configuration";
   };
diff --git a/home/gpg/default.nix b/home/gpg/default.nix
index d96c3aa..c3bcd50 100644
--- a/home/gpg/default.nix
+++ b/home/gpg/default.nix
@@ -1,6 +1,7 @@
 { config, lib, ... }:
 let cfg = config.my.home.gpg;
-in {
+in
+{
   options.my.home.gpg = with lib; {
     enable = mkEnableOption "gpg configuration";
     pinentry = mkOption {
diff --git a/home/gtk/default.nix b/home/gtk/default.nix
index 0dd62cb..4c55f0c 100644
--- a/home/gtk/default.nix
+++ b/home/gtk/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.home.gtk;
-in {
+in
+{
   options.my.home.gtk = with lib; {
     enable = mkEnableOption "GTK configuration";
   };
diff --git a/home/mail/accounts/default.nix b/home/mail/accounts/default.nix
index 1bc1c37..83358f0 100644
--- a/home/mail/accounts/default.nix
+++ b/home/mail/accounts/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.home.mail;
-in {
+in
+{
   config = lib.mkIf cfg.enable {
     accounts.email = {
       accounts = {
diff --git a/home/mail/default.nix b/home/mail/default.nix
index 4f36e87..88cae37 100644
--- a/home/mail/default.nix
+++ b/home/mail/default.nix
@@ -2,7 +2,8 @@
 let
   cfg = config.my.home.mail;
   mkRelatedOption = desc: lib.mkEnableOption desc // { default = cfg.enable; };
-in {
+in
+{
   imports = [ ./accounts ];
   options.my.home.mail = with lib; {
     enable = mkEnableOption "email configuration";
diff --git a/home/mpv/default.nix b/home/mpv/default.nix
index b6c2c60..380ce69 100644
--- a/home/mpv/default.nix
+++ b/home/mpv/default.nix
@@ -1,6 +1,7 @@
 { lib, config, pkgs, ... }:
 let cfg = config.my.home.mpv;
-in {
+in
+{
   options.my.home.mpv = with lib; {
     enable = mkEnableOption "mpv configuration";
   };
diff --git a/home/packages/default.nix b/home/packages/default.nix
index 806ce31..e6dac4c 100644
--- a/home/packages/default.nix
+++ b/home/packages/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.home.packages;
-in {
+in
+{
   options.my.home.packages = with lib; {
     enable = mkEnableOption "user packages";
     additionalPackages = mkOption {
diff --git a/home/pass/default.nix b/home/pass/default.nix
index 3ea7892..d79d486 100644
--- a/home/pass/default.nix
+++ b/home/pass/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.home.pass;
-in {
+in
+{
   options.my.home.pass = with lib; {
     enable = mkEnableOption "pass configuration";
   };
diff --git a/home/pcmanfm/default.nix b/home/pcmanfm/default.nix
index cca8f9a..2babf0c 100644
--- a/home/pcmanfm/default.nix
+++ b/home/pcmanfm/default.nix
@@ -1,6 +1,7 @@
 { lib, config, pkgs, ... }:
 let cfg = config.my.home.pcmanfm;
-in {
+in
+{
   options.my.home.pcmanfm = with lib; {
     enable = mkEnableOption "pcmanfm configuration";
   };
diff --git a/home/python/default.nix b/home/python/default.nix
index b34f978..9e72569 100644
--- a/home/python/default.nix
+++ b/home/python/default.nix
@@ -1,6 +1,7 @@
 { config, pkgs, lib, ... }:
 let cfg = config.my.home.python;
-in {
+in
+{
   options.my.home.python = with lib; {
     enable = mkEnableOption "python configuration";
   };
diff --git a/home/scanner/default.nix b/home/scanner/default.nix
index aa3da7c..fefbd54 100644
--- a/home/scanner/default.nix
+++ b/home/scanner/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.home.scanner;
-in {
+in
+{
   options.my.home.scanner = with lib; {
     enable = mkEnableOption "scanner configuration";
   };
diff --git a/home/scripts/perf-flamegraph.nix b/home/scripts/perf-flamegraph.nix
index f379591..b974e6b 100644
--- a/home/scripts/perf-flamegraph.nix
+++ b/home/scripts/perf-flamegraph.nix
@@ -14,7 +14,8 @@ let
         | ${pkgs.flamegraph}/bin/stackcollapse-perf.pl \
         | ${pkgs.flamegraph}/bin/flamegraph.pl > "''${OUT_SVG}"
     '';
-in {
+in
+{
   config = {
     home.packages = with pkgs; [ flamegraph perf-flamegraph-process ];
   };
diff --git a/home/seahorse/default.nix b/home/seahorse/default.nix
index 54688a1..d37395e 100644
--- a/home/seahorse/default.nix
+++ b/home/seahorse/default.nix
@@ -1,6 +1,7 @@
 { lib, config, pkgs, ... }:
 let cfg = config.my.home.seahorse;
-in {
+in
+{
   options.my.home.seahorse = with lib; {
     enable = mkEnableOption "seahorse configuration";
   };
diff --git a/home/ssh/default.nix b/home/ssh/default.nix
index 1088e80..eecca99 100644
--- a/home/ssh/default.nix
+++ b/home/ssh/default.nix
@@ -1,6 +1,7 @@
 { config, lib, ... }:
 let cfg = config.my.home.ssh;
-in {
+in
+{
   options.my.home.ssh = with lib; {
     enable = mkEnableOption "ssh configuration";
   };
diff --git a/home/sublime-music/default.nix b/home/sublime-music/default.nix
index fad10ac..aa44520 100644
--- a/home/sublime-music/default.nix
+++ b/home/sublime-music/default.nix
@@ -1,6 +1,7 @@
 { lib, config, pkgs, ... }:
 let cfg = config.my.home.sublime-music;
-in {
+in
+{
   options.my.home.sublime-music = with lib; {
     enable = mkEnableOption "sublime-music configuration";
   };
diff --git a/home/terminal/alacritty/default.nix b/home/terminal/alacritty/default.nix
index 2bcd041..85d8e4a 100644
--- a/home/terminal/alacritty/default.nix
+++ b/home/terminal/alacritty/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.home.terminal;
-in {
+in
+{
   config = lib.mkIf (cfg.program == "alacritty") {
     programs.alacritty = {
       enable = true;
diff --git a/home/terminal/default.nix b/home/terminal/default.nix
index e1ff0d7..68dcf4b 100644
--- a/home/terminal/default.nix
+++ b/home/terminal/default.nix
@@ -1,6 +1,7 @@
 { config, lib, ... }:
 let cfg = config.my.home.terminal;
-in {
+in
+{
   imports = [ ./alacritty ];
   options.my.home = with lib; {
     terminal = {
diff --git a/home/tmux/default.nix b/home/tmux/default.nix
index 499a64b..a30bd28 100644
--- a/home/tmux/default.nix
+++ b/home/tmux/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.home.tmux;
-in {
+in
+{
   options.my.home.tmux = with lib; {
     enable = mkEnableOption "tmux terminal multiplexer";
   };
diff --git a/home/transmission-remote/default.nix b/home/transmission-remote/default.nix
index 29c070b..629e382 100644
--- a/home/transmission-remote/default.nix
+++ b/home/transmission-remote/default.nix
@@ -1,6 +1,7 @@
 { lib, config, pkgs, ... }:
 let cfg = config.my.home.transmission-remote;
-in {
+in
+{
   options.my.home.transmission-remote = with lib; {
     enable = mkEnableOption "transmission-remote configuration";
   };
diff --git a/home/vlc/default.nix b/home/vlc/default.nix
index f7ad141..c06994b 100644
--- a/home/vlc/default.nix
+++ b/home/vlc/default.nix
@@ -1,6 +1,7 @@
 { lib, config, pkgs, ... }:
 let cfg = config.my.home.vlc;
-in {
+in
+{
   options.my.home.vlc = with lib; {
     enable = mkEnableOption "vlc configuration";
   };
diff --git a/home/wm/default.nix b/home/wm/default.nix
index 27a8bf4..0125dd1 100644
--- a/home/wm/default.nix
+++ b/home/wm/default.nix
@@ -2,10 +2,12 @@
 let
   mkRelatedOption = description: relatedWMs:
     let isActivatedWm = wm: config.my.home.wm.windowManager == wm;
-    in (lib.mkEnableOption description) // {
+    in
+    (lib.mkEnableOption description) // {
       default = builtins.any isActivatedWm relatedWMs;
     };
-in {
+in
+{
   imports = [ ./sway ./waybar ./mako ./swaylock ./wofi ./gammastep ];
   options.my.home.wm = with lib; {
     windowManager = mkOption {
diff --git a/home/wm/gammastep/default.nix b/home/wm/gammastep/default.nix
index 0a9c684..4530126 100644
--- a/home/wm/gammastep/default.nix
+++ b/home/wm/gammastep/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let isEnabled = config.my.home.wm.windowManager == "sway";
-in {
+in
+{
   config = lib.mkIf isEnabled {
     services.gammastep = {
       enable = true;
diff --git a/home/wm/mako/default.nix b/home/wm/mako/default.nix
index 3a13620..665707d 100644
--- a/home/wm/mako/default.nix
+++ b/home/wm/mako/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let isEnabled = config.my.home.wm.windowManager == "sway";
-in {
+in
+{
   config = lib.mkIf isEnabled {
     home.packages = [
       pkgs.libnotify # to send notifications
diff --git a/home/wm/sway/default.nix b/home/wm/sway/default.nix
index ba70992..d3b758d 100644
--- a/home/wm/sway/default.nix
+++ b/home/wm/sway/default.nix
@@ -3,7 +3,8 @@ let
   isEnabled = config.my.home.wm.windowManager == "sway";
   terminal = config.my.home.terminal.program;
   modifier = "Mod4"; # `Super` key
-in {
+in
+{
   config = lib.mkIf isEnabled {
     home.packages = with pkgs; [
       wlogout
diff --git a/home/wm/swaylock/default.nix b/home/wm/swaylock/default.nix
index 3df802a..803a7c3 100644
--- a/home/wm/swaylock/default.nix
+++ b/home/wm/swaylock/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let isEnabled = config.my.home.wm.windowManager == "sway";
-in {
+in
+{
   config = lib.mkIf isEnabled {
     xdg.configFile."swaylock/config" = { source = ./config; };
 
diff --git a/home/wm/waybar/default.nix b/home/wm/waybar/default.nix
index c1bf601..1aab182 100644
--- a/home/wm/waybar/default.nix
+++ b/home/wm/waybar/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let isEnabled = config.my.home.wm.windowManager == "sway";
-in {
+in
+{
   config = lib.mkIf isEnabled {
     programs.waybar = {
       enable = true;
diff --git a/home/wm/wofi/default.nix b/home/wm/wofi/default.nix
index ad3c759..7f8a92b 100644
--- a/home/wm/wofi/default.nix
+++ b/home/wm/wofi/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let isEnabled = config.my.home.wm.windowManager == "sway";
-in {
+in
+{
   config = lib.mkIf isEnabled {
     home.packages = with pkgs; [ wofi ];
     xdg.configFile."wofi/config".source = ./config;
diff --git a/home/xdg/default.nix b/home/xdg/default.nix
index 133b0ad..eda2211 100644
--- a/home/xdg/default.nix
+++ b/home/xdg/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.home.xdg;
-in {
+in
+{
   options.my.home.xdg = with lib; {
     enable = mkEnableOption "XDG configuration";
   };
diff --git a/home/yt-dlp/default.nix b/home/yt-dlp/default.nix
index 4e9cdf4..4ac1fb9 100644
--- a/home/yt-dlp/default.nix
+++ b/home/yt-dlp/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.home.yt-dlp;
-in {
+in
+{
   options.my.home.yt-dlp = with lib; {
     enable = mkEnableOption "yt-dlp configuration";
   };
diff --git a/home/zsh/default.nix b/home/zsh/default.nix
index 086c17e..21dbedd 100644
--- a/home/zsh/default.nix
+++ b/home/zsh/default.nix
@@ -1,6 +1,7 @@
 { config, pkgs, lib, ... }:
 let cfg = config.my.home.zsh;
-in {
+in
+{
   options.my.home.zsh = with lib; {
     enable = mkEnableOption "zsh configuration";
   };
diff --git a/hosts/aptos/default.nix b/hosts/aptos/default.nix
index 70a79ed..8c26668 100644
--- a/hosts/aptos/default.nix
+++ b/hosts/aptos/default.nix
@@ -1,7 +1,8 @@
 { config, pkgs, hostname, ... }:
 
 {
-  imports = [ # Include the results of the hardware scan.
+  imports = [
+    # Include the results of the hardware scan.
     ./hardware.nix
     ./sound.nix
     ./networking.nix
diff --git a/hosts/aptos/secrets/secrets.nix b/hosts/aptos/secrets/secrets.nix
index 9e503b2..674af9b 100644
--- a/hosts/aptos/secrets/secrets.nix
+++ b/hosts/aptos/secrets/secrets.nix
@@ -3,7 +3,8 @@ let
     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIdlm/qoR/dnMjZhVSTtqFzkgN3Yf9eQ3pgKMiipg+dl";
   aptos =
     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOTcPGaiL+/Mwl8JzLHrBwas7QvWPjix4lnaAA1tw+5t";
-in {
+in
+{
   "wireguard_privatekey.age".publicKeys = [ fcuny aptos ];
 
   "syncthing/key.age" = {
diff --git a/hosts/aptos/services.nix b/hosts/aptos/services.nix
index ab8efe5..1886ca7 100644
--- a/hosts/aptos/services.nix
+++ b/hosts/aptos/services.nix
@@ -1,6 +1,7 @@
 { config, ... }:
 let secrets = config.age.secrets;
-in {
+in
+{
   my.services = {
     # monitors and controls temperature
     thermald.enable = true;
diff --git a/hosts/tahoe/secrets/secrets.nix b/hosts/tahoe/secrets/secrets.nix
index 79273b8..031426f 100644
--- a/hosts/tahoe/secrets/secrets.nix
+++ b/hosts/tahoe/secrets/secrets.nix
@@ -4,7 +4,8 @@ let
   tahoe =
     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEq1IQRvj2jofCHOO6M28w2SRdgtHU06NJvwAwv/b69F";
   all = [ fcuny_aptos tahoe ];
-in {
+in
+{
   "wireguard_privatekey.age".publicKeys = all;
 
   "acme/credentials.age".publicKeys = all;
diff --git a/hosts/tahoe/services.nix b/hosts/tahoe/services.nix
index a9c3605..75aea22 100644
--- a/hosts/tahoe/services.nix
+++ b/hosts/tahoe/services.nix
@@ -1,6 +1,7 @@
 { config, ... }:
 let secrets = config.age.secrets;
-in {
+in
+{
   my.services = {
     samba = {
       enable = true;
diff --git a/modules/hardware/amd/default.nix b/modules/hardware/amd/default.nix
index 05362db..e8b80b0 100644
--- a/modules/hardware/amd/default.nix
+++ b/modules/hardware/amd/default.nix
@@ -1,6 +1,7 @@
 { config, lib, ... }:
 let cfg = config.my.hardware.amd;
-in {
+in
+{
   options.my.hardware.amd = with lib; {
     enable = mkEnableOption "AMD related configuration";
   };
diff --git a/modules/hardware/bluetooth/default.nix b/modules/hardware/bluetooth/default.nix
index 0ac2cf8..b48c51c 100644
--- a/modules/hardware/bluetooth/default.nix
+++ b/modules/hardware/bluetooth/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.hardware.bluetooth;
-in {
+in
+{
   options.my.hardware.bluetooth = with lib; {
     enable = mkEnableOption "bluetooth configuration";
   };
diff --git a/modules/hardware/intel/default.nix b/modules/hardware/intel/default.nix
index 9a53f35..26d9877 100644
--- a/modules/hardware/intel/default.nix
+++ b/modules/hardware/intel/default.nix
@@ -1,6 +1,7 @@
 { config, lib, ... }:
 let cfg = config.my.hardware.intel;
-in {
+in
+{
   options.my.hardware.intel = with lib; {
     enable = mkEnableOption "intel related configuration";
   };
diff --git a/modules/hardware/networking/default.nix b/modules/hardware/networking/default.nix
index d19388b..fac6c30 100644
--- a/modules/hardware/networking/default.nix
+++ b/modules/hardware/networking/default.nix
@@ -1,6 +1,7 @@
 { config, lib, ... }:
 let cfg = config.my.hardware.networking;
-in {
+in
+{
   options.my.hardware.networking = with lib; {
     wireless = { enable = mkEnableOption "wireless configuration"; };
   };
diff --git a/modules/hardware/sound/default.nix b/modules/hardware/sound/default.nix
index dc9f079..edb937e 100644
--- a/modules/hardware/sound/default.nix
+++ b/modules/hardware/sound/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.hardware.sound;
-in {
+in
+{
   options.my.hardware.sound = with lib; {
     pipewire = { enable = mkEnableOption "pipewire configuration"; };
   };
diff --git a/modules/home/default.nix b/modules/home/default.nix
index 0261128..d90e6d2 100644
--- a/modules/home/default.nix
+++ b/modules/home/default.nix
@@ -4,7 +4,8 @@ let
   aliasPath = [ "my" "home" ];
 
   cfg = config.my.user.home;
-in {
+in
+{
   imports = [
     inputs.home-manager.nixosModule # enable home-manager options
     (lib.mkAliasOptionModule aliasPath
diff --git a/modules/programs/sway/default.nix b/modules/programs/sway/default.nix
index 1fb4c00..afb3204 100644
--- a/modules/programs/sway/default.nix
+++ b/modules/programs/sway/default.nix
@@ -1,6 +1,7 @@
 { pkgs, config, lib, ... }:
 let cfg = config.my.programs.sway;
-in {
+in
+{
   options.my.programs.sway = with lib; {
     enable = mkEnableOption "sway configuration";
   };
diff --git a/modules/secrets/default.nix b/modules/secrets/default.nix
index 04d1bfe..912d556 100644
--- a/modules/secrets/default.nix
+++ b/modules/secrets/default.nix
@@ -4,31 +4,34 @@ with lib;
 let
   secretsDir = "${toString ../../hosts}/${config.networking.hostName}/secrets";
   secretsFile = "${secretsDir}/secrets.nix";
-in {
+in
+{
   imports = [ inputs.agenix.nixosModules.age ];
 
   config.age = {
-    secrets = let
-      toName = lib.removeSuffix ".age";
-      userExists = u: builtins.hasAttr u config.users.users;
-      groupExists = g: builtins.hasAttr g config.users.groups;
+    secrets =
+      let
+        toName = lib.removeSuffix ".age";
+        userExists = u: builtins.hasAttr u config.users.users;
+        groupExists = g: builtins.hasAttr g config.users.groups;
 
-      # Only set the user and/or group if they exist, to avoid warnings
-      userIfExists = u: if userExists u then u else "root";
-      groupIfExists = g: if groupExists g then g else "root";
+        # Only set the user and/or group if they exist, to avoid warnings
+        userIfExists = u: if userExists u then u else "root";
+        groupIfExists = g: if groupExists g then g else "root";
 
-      toSecret = name:
-        { owner ? "root", group ? "root", mode ? "0400", ... }: {
-          file = "${secretsDir}/${name}";
-          owner = lib.mkDefault (userIfExists owner);
-          group = lib.mkDefault (groupIfExists group);
-          mode = mode;
-        };
-    in if pathExists secretsFile then
-      mapAttrs' (n: v: nameValuePair (toName n) (toSecret n v))
-      (import secretsFile)
-    else
-      { };
+        toSecret = name:
+          { owner ? "root", group ? "root", mode ? "0400", ... }: {
+            file = "${secretsDir}/${name}";
+            owner = lib.mkDefault (userIfExists owner);
+            group = lib.mkDefault (groupIfExists group);
+            mode = mode;
+          };
+      in
+      if pathExists secretsFile then
+        mapAttrs' (n: v: nameValuePair (toName n) (toSecret n v))
+          (import secretsFile)
+      else
+        { };
     identityPaths = options.age.identityPaths.default ++ (filter pathExists
       [ "${config.users.users.fcuny.home}/.ssh/id_ed25519" ]);
   };
diff --git a/modules/services/avahi/default.nix b/modules/services/avahi/default.nix
index bef6b17..8275f02 100644
--- a/modules/services/avahi/default.nix
+++ b/modules/services/avahi/default.nix
@@ -1,6 +1,7 @@
 { config, pkgs, lib, ... }:
 let cfg = config.my.services.avahi;
-in {
+in
+{
   options.my.services.avahi = with lib; {
     enable = mkEnableOption "avahi service";
   };
diff --git a/modules/services/backup/default.nix b/modules/services/backup/default.nix
index e935b64..04b4e1f 100644
--- a/modules/services/backup/default.nix
+++ b/modules/services/backup/default.nix
@@ -5,7 +5,8 @@ let
     with pkgs;
     "--exclude-file="
     + (writeText "excludes.txt" (concatStringsSep "\n" cfg.exclude));
-in {
+in
+{
   options.my.services.backup = with lib; {
     enable = mkEnableOption "Enable backups for this host";
 
diff --git a/modules/services/buildkite/default.nix b/modules/services/buildkite/default.nix
index 72d5e08..45c7e4f 100644
--- a/modules/services/buildkite/default.nix
+++ b/modules/services/buildkite/default.nix
@@ -14,7 +14,8 @@ let
     ln -s ${my-gerrit-hook "post-command"} $out/bin/post-command
   '';
 
-in {
+in
+{
   options.my.services.buildkite = with lib; {
     enable = mkEnableOption "buildkite agent";
   };
@@ -22,37 +23,41 @@ in {
   config = lib.mkIf cfg.enable {
     # see https://buildkite.com/docs/agent/v3
     # and https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/services/continuous-integration/buildkite-agents.nix
-    services.buildkite-agents = lib.listToAttrs (map (n: rec {
-      name = "builder-${toString n}";
-      value = {
-        inherit name;
-        enable = true;
-        tokenPath = secrets."buildkite/agent".path;
-        hooks.post-command = "${buildkiteHooks}/bin/post-command";
-        runtimePackages = with pkgs; [
-          bash
-          coreutils
-          curl
-          git
-          gnutar
-          gzip
-          jq
-          nix
-        ];
-      };
-    }) agents);
+    services.buildkite-agents = lib.listToAttrs (map
+      (n: rec {
+        name = "builder-${toString n}";
+        value = {
+          inherit name;
+          enable = true;
+          tokenPath = secrets."buildkite/agent".path;
+          hooks.post-command = "${buildkiteHooks}/bin/post-command";
+          runtimePackages = with pkgs; [
+            bash
+            coreutils
+            curl
+            git
+            gnutar
+            gzip
+            jq
+            nix
+          ];
+        };
+      })
+      agents);
 
     # Set up a group for all Buildkite agent users
     users = {
       groups.buildkite-agents = { };
-      users = builtins.listToAttrs (map (n: rec {
-        name = "buildkite-agent-builder-${toString n}";
-        value = {
-          isSystemUser = true;
-          group = lib.mkForce "buildkite-agents";
-          extraGroups = [ name "docker" ];
-        };
-      }) agents);
+      users = builtins.listToAttrs (map
+        (n: rec {
+          name = "buildkite-agent-builder-${toString n}";
+          value = {
+            isSystemUser = true;
+            group = lib.mkForce "buildkite-agents";
+            extraGroups = [ name "docker" ];
+          };
+        })
+        agents);
     };
   };
 }
diff --git a/modules/services/cgit/default.nix b/modules/services/cgit/default.nix
index 84f8e01..26e5296 100644
--- a/modules/services/cgit/default.nix
+++ b/modules/services/cgit/default.nix
@@ -49,7 +49,8 @@ let
     project-list=/var/lib/cgit/cache/projects.list
     scan-path=/var/lib/gerrit/git
   '';
-in {
+in
+{
   options.my.services.cgit = with lib; {
     enable = mkEnableOption "git web viewer";
   };
diff --git a/modules/services/drone/runner-docker/default.nix b/modules/services/drone/runner-docker/default.nix
index d701c18..428a8d6 100644
--- a/modules/services/drone/runner-docker/default.nix
+++ b/modules/services/drone/runner-docker/default.nix
@@ -3,7 +3,8 @@ let
   cfg = config.my.services.drone;
   hasRunner = (name: builtins.elem name cfg.runners);
   dockerPkg = pkgs.drone-runner-docker;
-in {
+in
+{
   config = lib.mkIf (cfg.enable && hasRunner "docker") {
     systemd.services.drone-runner-docker = {
       wantedBy = [ "multi-user.target" ];
diff --git a/modules/services/drone/runner-exec/default.nix b/modules/services/drone/runner-exec/default.nix
index 9222200..01cc11b 100644
--- a/modules/services/drone/runner-exec/default.nix
+++ b/modules/services/drone/runner-exec/default.nix
@@ -3,7 +3,8 @@ let
   cfg = config.my.services.drone;
   hasRunner = (name: builtins.elem name cfg.runners);
   execPkg = pkgs.drone-runner-exec;
-in {
+in
+{
   config = lib.mkIf (cfg.enable && hasRunner "exec") {
     systemd.services.drone-runner-exec = {
       wantedBy = [ "multi-user.target" ];
diff --git a/modules/services/drone/server/default.nix b/modules/services/drone/server/default.nix
index abd323f..97e20a3 100644
--- a/modules/services/drone/server/default.nix
+++ b/modules/services/drone/server/default.nix
@@ -2,7 +2,8 @@
 let
   cfg = config.my.services.drone;
   secrets = config.age.secrets;
-in {
+in
+{
   config = lib.mkIf cfg.enable {
     systemd.services.drone-server = {
       wantedBy = [ "multi-user.target" ];
diff --git a/modules/services/gerrit/default.nix b/modules/services/gerrit/default.nix
index 81a30e7..a55bdda 100644
--- a/modules/services/gerrit/default.nix
+++ b/modules/services/gerrit/default.nix
@@ -17,7 +17,8 @@ let
       "https://github.com/davido/gerrit-oauth-provider/releases/download/v3.5.1/gerrit-oauth-provider.jar";
     sha256 = "312dc494c454ac15f89a289f95ea4c11344add26804aaa6a3b79d49fd92adc69";
   };
-in {
+in
+{
   options.my.services.gerrit = with lib; {
     enable = mkEnableOption "gerrit git server";
     vhostName = mkOption {
diff --git a/modules/services/gitea/default.nix b/modules/services/gitea/default.nix
index e5a3db7..ece75de 100644
--- a/modules/services/gitea/default.nix
+++ b/modules/services/gitea/default.nix
@@ -1,6 +1,7 @@
 { config, pkgs, lib, ... }:
 let cfg = config.my.services.gitea;
-in {
+in
+{
   options.my.services.gitea = with lib; {
     enable = mkEnableOption "gitea git server";
     stateDir = mkOption {
diff --git a/modules/services/gnome/default.nix b/modules/services/gnome/default.nix
index 0fc91e5..0ea32d2 100644
--- a/modules/services/gnome/default.nix
+++ b/modules/services/gnome/default.nix
@@ -1,6 +1,7 @@
 { config, pkgs, lib, ... }:
 let cfg = config.my.services.gnome;
-in {
+in
+{
   options.my.services.gnome = with lib; { enable = mkEnableOption "gnome"; };
 
   config = lib.mkIf cfg.enable {
diff --git a/modules/services/grafana/default.nix b/modules/services/grafana/default.nix
index fd80263..063a1c9 100644
--- a/modules/services/grafana/default.nix
+++ b/modules/services/grafana/default.nix
@@ -2,7 +2,8 @@
 let
   cfg = config.my.services.grafana;
   secrets = config.age.secrets;
-in {
+in
+{
   options.my.services.grafana = with lib; {
     enable = mkEnableOption "grafana observability stack";
     vhostName = mkOption {
diff --git a/modules/services/metrics-exporter/default.nix b/modules/services/metrics-exporter/default.nix
index b461bd2..f489f78 100644
--- a/modules/services/metrics-exporter/default.nix
+++ b/modules/services/metrics-exporter/default.nix
@@ -1,6 +1,7 @@
 { config, pkgs, lib, ... }:
 let cfg = config.my.services.metrics-exporter;
-in {
+in
+{
   options.my.services.metrics-exporter = with lib; {
     enable = mkEnableOption "Prometheus metrics exporter";
   };
diff --git a/modules/services/navidrome/default.nix b/modules/services/navidrome/default.nix
index 55c7345..280da90 100644
--- a/modules/services/navidrome/default.nix
+++ b/modules/services/navidrome/default.nix
@@ -2,7 +2,8 @@
 let
   cfg = config.my.services.navidrome;
   secrets = config.age.secrets;
-in {
+in
+{
   options.my.services.navidrome = with lib; {
     enable = mkEnableOption "Navidrome Music Server";
     vhostName = mkOption {
diff --git a/modules/services/nginx/default.nix b/modules/services/nginx/default.nix
index ad15f33..d93da7a 100644
--- a/modules/services/nginx/default.nix
+++ b/modules/services/nginx/default.nix
@@ -1,6 +1,7 @@
 { config, lib, pkgs, ... }:
 let cfg = config.my.services.nginx;
-in {
+in
+{
   options.my.services.nginx = with lib; { enable = mkEnableOption "Nginx"; };
   config = lib.mkIf cfg.enable {
     services.nginx = {
diff --git a/modules/services/nginx/sso/default.nix b/modules/services/nginx/sso/default.nix
index 27ed7d6..d7a6c7f 100644
--- a/modules/services/nginx/sso/default.nix
+++ b/modules/services/nginx/sso/default.nix
@@ -4,7 +4,8 @@ let
   cfg = config.services.nginx.sso;
   pkg = lib.getBin cfg.package;
   confPath = "/var/lib/nginx-sso/config.json";
-in {
+in
+{
   disabledModules = [ "services/security/nginx-sso.nix" ];
   options.services.nginx.sso = with lib; {
     enable = mkEnableOption "nginx-sso service";
diff --git a/modules/services/prometheus/default.nix b/modules/services/prometheus/default.nix
index 0c66f47..5228083 100644
--- a/modules/services/prometheus/default.nix
+++ b/modules/services/prometheus/default.nix
@@ -46,7 +46,8 @@ let
       regex = "192.168.6.20:(.*)";
     }
   ];
-in {
+in
+{
   options.my.services.prometheus = with lib; {
     enable = mkEnableOption "Prometheus monitoring solution";
   };
diff --git a/modules/services/rclone/default.nix b/modules/services/rclone/default.nix
index afba321..cbef0c3 100644
--- a/modules/services/rclone/default.nix
+++ b/modules/services/rclone/default.nix
@@ -2,7 +2,8 @@
 let
   cfg = config.my.services.rclone;
   secrets = config.age.secrets;
-in {
+in
+{
   options.my.services.rclone = with lib; {
     enable = mkEnableOption "rclone backup service";
   };
@@ -18,19 +19,21 @@ in {
       };
       services.rclone-sync = {
         description = "synchronize restic repository to GCS";
-        serviceConfig = let
-          rcloneOptions = "--config=${
+        serviceConfig =
+          let
+            rcloneOptions = "--config=${
               secrets."rclone/config.ini".path
             } --gcs-service-account-file=${
               secrets."rclone/gcs_service_account.json".path
             } --fast-list --verbose";
-        in {
-          Type = "oneshot";
-          ExecStart = [
-            "${pkgs.rclone}/bin/rclone ${rcloneOptions} sync /data/slow/backups/systems gbackup:fcuny-backups-systems"
-            "${pkgs.rclone}/bin/rclone ${rcloneOptions} sync /data/slow/backups/users gbackup:fcuny-backups-users"
-          ];
-        };
+          in
+          {
+            Type = "oneshot";
+            ExecStart = [
+              "${pkgs.rclone}/bin/rclone ${rcloneOptions} sync /data/slow/backups/systems gbackup:fcuny-backups-systems"
+              "${pkgs.rclone}/bin/rclone ${rcloneOptions} sync /data/slow/backups/users gbackup:fcuny-backups-users"
+            ];
+          };
       };
     };
   };
diff --git a/modules/services/samba/default.nix b/modules/services/samba/default.nix
index b5d150d..6dc6671 100644
--- a/modules/services/samba/default.nix
+++ b/modules/services/samba/default.nix
@@ -12,7 +12,8 @@ let
       "force user" = "nobody";
     };
   };
-in {
+in
+{
   options.my.services.samba = with lib; {
     enable = mkEnableOption "Samba";
     publicShares = mkOption {
diff --git a/modules/services/sourcegraph/default.nix b/modules/services/sourcegraph/default.nix
index e533b9d..10c1880 100644
--- a/modules/services/sourcegraph/default.nix
+++ b/modules/services/sourcegraph/default.nix
@@ -2,7 +2,8 @@
 let
   cfg = config.my.services.sourcegraph;
   secrets = config.age.secrets;
-in {
+in
+{
   options.my.services.sourcegraph = with lib; {
     enable = mkEnableOption "sourcegraph server";
     vhostName = mkOption {
diff --git a/modules/services/syncthing/default.nix b/modules/services/syncthing/default.nix
index 7f7ed3a..7f795bf 100644
--- a/modules/services/syncthing/default.nix
+++ b/modules/services/syncthing/default.nix
@@ -2,7 +2,8 @@
 let
   cfg = config.my.services.syncthing;
   secrets = config.age.secrets;
-in {
+in
+{
   options.my.services.syncthing = with lib; {
     enable = mkEnableOption "syncthing service";
   };
diff --git a/modules/services/tailscale/default.nix b/modules/services/tailscale/default.nix
index 73cf06b..14753f4 100644
--- a/modules/services/tailscale/default.nix
+++ b/modules/services/tailscale/default.nix
@@ -1,6 +1,7 @@
 { config, lib, ... }:
 let cfg = config.my.services.tailscale;
-in {
+in
+{
 
   options.my.services.tailscale = with lib; {
     enable = mkEnableOption "tailscale configuration";
diff --git a/modules/services/thermald/default.nix b/modules/services/thermald/default.nix
index 8325b86..78a1ac4 100644
--- a/modules/services/thermald/default.nix
+++ b/modules/services/thermald/default.nix
@@ -1,7 +1,8 @@
 # thermal control management
 { config, lib, ... }:
 let cfg = config.my.services.thermald;
-in {
+in
+{
   options.my.services.thermald = {
     enable = lib.mkEnableOption "thermald configuration";
   };
diff --git a/modules/services/tlp/default.nix b/modules/services/tlp/default.nix
index 2f818e5..dc640f7 100644
--- a/modules/services/tlp/default.nix
+++ b/modules/services/tlp/default.nix
@@ -1,7 +1,8 @@
 # TLP power management
 { config, lib, ... }:
 let cfg = config.my.services.tlp;
-in {
+in
+{
   options.my.services.tlp = {
     enable = lib.mkEnableOption "TLP power management configuration";
   };
diff --git a/modules/services/transmission/default.nix b/modules/services/transmission/default.nix
index 57bea77..c44034b 100644
--- a/modules/services/transmission/default.nix
+++ b/modules/services/transmission/default.nix
@@ -2,7 +2,8 @@
 let
   cfg = config.my.services.transmission;
   secrets = config.age.secrets;
-in {
+in
+{
   options.my.services.transmission = with lib; {
     enable = mkEnableOption "transmission torrent server";
     vhostName = mkOption {
diff --git a/modules/services/unifi/default.nix b/modules/services/unifi/default.nix
index 3c70238..a311755 100644
--- a/modules/services/unifi/default.nix
+++ b/modules/services/unifi/default.nix
@@ -17,7 +17,8 @@ let
       10001 # UDP port used for device discovery.
     ];
   };
-in {
+in
+{
   options.my.services.unifi = with lib; {
     enable = mkEnableOption "Unifi controller";
     vhostName = mkOption {
diff --git a/modules/system/boot/default.nix b/modules/system/boot/default.nix
index b037f63..cac1cec 100644
--- a/modules/system/boot/default.nix
+++ b/modules/system/boot/default.nix
@@ -1,6 +1,7 @@
 { pkgs, config, lib, ... }:
 let cfg = config.my.system.boot;
-in {
+in
+{
   options.my.system.boot = with lib; {
     tmp = { clean = mkEnableOption "clean `/tmp` on boot."; };
     initrd = {
diff --git a/modules/system/fonts/default.nix b/modules/system/fonts/default.nix
index df01140..71a7fdb 100644
--- a/modules/system/fonts/default.nix
+++ b/modules/system/fonts/default.nix
@@ -1,6 +1,7 @@
 { pkgs, config, lib, ... }:
 let cfg = config.my.systems.fonts;
-in {
+in
+{
   options.my.systems.fonts = with lib; {
     enable = mkEnableOption "fonts configuration";
   };
diff --git a/modules/system/packages/default.nix b/modules/system/packages/default.nix
index d260f20..84cfac2 100644
--- a/modules/system/packages/default.nix
+++ b/modules/system/packages/default.nix
@@ -2,7 +2,8 @@
 { config, lib, pkgs, ... }:
 with lib;
 let linuxpkgs = config.boot.kernelPackages;
-in {
+in
+{
 
   # It's always useful to have bash around
   environment.shells = with pkgs; [ bashInteractive ];
diff --git a/modules/system/users/default.nix b/modules/system/users/default.nix
index 3086f18..98e9801 100644
--- a/modules/system/users/default.nix
+++ b/modules/system/users/default.nix
@@ -2,7 +2,8 @@
 let
   groupExists = grp: builtins.hasAttr grp config.users.groups;
   groupsIfExist = builtins.filter groupExists;
-in {
+in
+{
   # Users are managed through this configuration. If a user is added
   # manually, it will be removed on system activation.
   users.mutableUsers = false;
diff --git a/nix/mkSystem.nix b/nix/mkSystem.nix
index 28e42b1..88d6f99 100644
--- a/nix/mkSystem.nix
+++ b/nix/mkSystem.nix
@@ -21,7 +21,8 @@ inputs.nixpkgs.lib.nixosSystem {
       };
       # Add each input as a registry
       nix.registry = inputs.nixpkgs.lib.mapAttrs'
-        (n: v: inputs.nixpkgs.lib.nameValuePair (n) ({ flake = v; })) inputs;
+        (n: v: inputs.nixpkgs.lib.nameValuePair (n) ({ flake = v; }))
+        inputs;
     }
   ];
 }
diff --git a/nix/private-wireguard.nix b/nix/private-wireguard.nix
index 706dfd8..8e5d74c 100644
--- a/nix/private-wireguard.nix
+++ b/nix/private-wireguard.nix
@@ -10,7 +10,8 @@ let
   allPeers = wgcfg.peers;
   thisPeer = allPeers."${hostname}" or null;
   otherPeers = lib.filterAttrs (n: v: n != hostname) allPeers;
-in {
+in
+{
   options.networking.private-wireguard = {
     enable = mkEnableOption "Enable private wireguard vpn connection";
   };
@@ -24,17 +25,19 @@ in {
           "${wgcfg.subnet4}.${toString thisPeer.ipv4}/${toString wgcfg.mask4}"
         ];
 
-        peers = lib.mapAttrsToList (name: peer:
-          {
-            allowedIPs = [
-              "${wgcfg.subnet4}.${toString peer.ipv4}/${toString wgcfg.mask4}"
-            ];
-            publicKey = peer.key;
-          } // lib.optionalAttrs (peer ? externalIp) {
-            endpoint = "${peer.externalIp}:${toString port}";
-          } // lib.optionalAttrs (!(thisPeer ? externalIp)) {
-            persistentKeepalive = 10;
-          }) otherPeers;
+        peers = lib.mapAttrsToList
+          (name: peer:
+            {
+              allowedIPs = [
+                "${wgcfg.subnet4}.${toString peer.ipv4}/${toString wgcfg.mask4}"
+              ];
+              publicKey = peer.key;
+            } // lib.optionalAttrs (peer ? externalIp) {
+              endpoint = "${peer.externalIp}:${toString port}";
+            } // lib.optionalAttrs (!(thisPeer ? externalIp)) {
+              persistentKeepalive = 10;
+            })
+          otherPeers;
       };
     };
   };