Compare commits

..

No commits in common. "1a6b8afdce78e22c56ca4287c0882a26b4e447f0" and "9305b3be8f98e8b31337b4018b0bf24a04ac5508" have entirely different histories.

9 changed files with 33 additions and 83 deletions

View file

@ -12,17 +12,10 @@ run `rg /etc/secrets/` to see where you need to add secret files when deploying
unfortunately, as a consequence of this secret method, you need to do impure builds unfortunately, as a consequence of this secret method, you need to do impure builds
## hosts
each host should have these files:
- `default.nix`, contains everything relating to the basic system
- `hardware.nix`, hardware-specific configuration
- `meta.nix`, extra things passed thru to `mkHost`
## todo ## todo
- find a better way to do cloudflare ips - find a better way to do cloudflare ips
- per-host architecture selection, atm it is hardcoded to `aarch64`
- swap back to hardened kernel - swap back to hardened kernel
- wtaf is going on w/ our user management?? - wtaf is going on w/ our user management??
- Jellyfin... yea,,, - Jellyfin... yea,,,

18
flake.lock generated
View file

@ -21,7 +21,7 @@
}, },
"flake-utils": { "flake-utils": {
"inputs": { "inputs": {
"systems": "systems_3" "systems": "systems_2"
}, },
"locked": { "locked": {
"lastModified": 1681202837, "lastModified": 1681202837,
@ -124,7 +124,6 @@
"hardware": "hardware", "hardware": "hardware",
"home-manager": "home-manager", "home-manager": "home-manager",
"nixpkgs": "nixpkgs_2", "nixpkgs": "nixpkgs_2",
"systems": "systems_2",
"vscode-server": "vscode-server" "vscode-server": "vscode-server"
} }
}, },
@ -144,21 +143,6 @@
} }
}, },
"systems_2": { "systems_2": {
"locked": {
"lastModified": 1689347949,
"narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=",
"owner": "nix-systems",
"repo": "default-linux",
"rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default-linux",
"type": "github"
}
},
"systems_3": {
"locked": { "locked": {
"lastModified": 1681028828, "lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=", "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",

View file

@ -3,7 +3,6 @@
inputs = { inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable"; nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
systems.url = "github:nix-systems/default-linux";
home-manager.url = "github:nix-community/home-manager"; home-manager.url = "github:nix-community/home-manager";
home-manager.inputs.nixpkgs.follows = "nixpkgs"; home-manager.inputs.nixpkgs.follows = "nixpkgs";
@ -15,50 +14,41 @@
vscode-server.url = "github:nix-community/nixos-vscode-server"; vscode-server.url = "github:nix-community/nixos-vscode-server";
}; };
outputs = inputs @ { self, nixpkgs, systems, ... }: outputs = inputs @ { self, nixpkgs, ... }:
let let
inherit (lib.my) mapModules mapModulesRec mapHosts; inherit (lib.my) mapModules mapModulesRec mapHosts;
eachSystem = nixpkgs.lib.genAttrs (import systems); system = "aarch64-linux";
lib = nixpkgs.lib.extend (final: prev: { mkPkgs = pkgs: extraOverlays:
my = import ./lib {
inherit inputs;
lib = final;
pkgs = null;
};
});
mkPkgs = system: pkgs: extraOverlays:
import pkgs { import pkgs {
inherit system; inherit system;
config.allowUnfree = true; config.allowUnfree = true;
config.allowAliases = true; config.allowAliases = true;
overlays = extraOverlays ++ (lib.attrValues self.overlays); overlays = extraOverlays ++ (lib.attrValues self.overlays);
}; };
pkgs = mkPkgs nixpkgs [ self.overlays.default ];
pkgsFor = eachSystem (system: lib = nixpkgs.lib.extend (final: prev: {
mkPkgs system nixpkgs [ my = import ./lib {
self.overlays.default inherit pkgs inputs;
inputs.niri.overlays.niri lib = final;
] };
); });
in { in {
lib = lib.my; lib = lib.my;
overlays = (mapModules ./overlays import) // { overlays =
default = final: prev: { (mapModules ./overlays import)
my = self.packages.${final.stdenv.hostPlatform.system}; // {
default = final: prev: {
my = self.packages.${system};
};
}; };
};
packages = eachSystem (system: let packages."${system}" = mapModules ./packages (p: pkgs.callPackage p {});
pkgs = pkgsFor.${system};
in
mapModules ./packages (p: pkgs.callPackage p {})
);
nixosModules = mapModulesRec ./modules import; nixosModules = mapModulesRec ./modules import;
nixosConfigurations = mapHosts ./hosts { inherit pkgsFor; }; nixosConfigurations = mapHosts ./hosts {};
}; };
} }

View file

@ -25,7 +25,7 @@
# needed for initial framebuffer logs to appear on raspberry pi # needed for initial framebuffer logs to appear on raspberry pi
# i think. this fixes it but idk if they are all required # i think. this fixes it but idk if they are all required
boot.kernelParams = [ boot.kernelParams = [
"8250.nr_uarts=1" "8250.nr_uarts=1"
"cma=128M" "cma=128M"
"console=tty0" "console=tty0"
@ -44,4 +44,6 @@
networking.useDHCP = lib.mkDefault true; networking.useDHCP = lib.mkDefault true;
# networking.interfaces.end0.useDHCP = lib.mkDefault true; # networking.interfaces.end0.useDHCP = lib.mkDefault true;
# networking.interfaces.wlan0.useDHCP = lib.mkDefault true; # networking.interfaces.wlan0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux";
} }

View file

@ -1,3 +0,0 @@
{
system = "aarch64-linux";
}

View file

@ -4,7 +4,7 @@
in rec { in rec {
# attrsToList # attrsToList
attrsToList = attrs: attrsToList = attrs:
mapAttrsToList (name: value: { inherit name value; }) attrs; mapAttrsToList (name: value: {inherit name value;}) attrs;
# mapFilterAttrs :: # mapFilterAttrs ::
# (name -> value -> bool) # (name -> value -> bool)

View file

@ -1,42 +1,35 @@
{ {
inputs, inputs,
lib, lib,
pkgs,
self, self,
... ...
}: let }: let
inherit (inputs.nixpkgs.lib) nixosSystem; inherit (inputs.nixpkgs.lib) nixosSystem;
inherit (builtins) baseNameOf elem;
inherit (lib.attrsets) filterAttrs;
inherit (lib.modules) mkDefault; inherit (lib.modules) mkDefault;
inherit (lib.strings) removeSuffix; inherit (lib.strings) removeSuffix;
inherit (self.modules) mapModules; inherit (self.modules) mapModules;
in rec { in rec {
mkHost = path: { mkHost = path: attrs @ {system ? "aarch64-linux", ...}:
system,
pkgsFor,
...
}:
nixosSystem { nixosSystem {
inherit system; inherit system;
specialArgs = { inherit lib inputs system; }; specialArgs = {inherit lib inputs system;};
modules = [ modules = [
{ {
nixpkgs.pkgs = pkgsFor.${system}; nixpkgs.pkgs = pkgs;
nixpkgs.hostPlatform = lib.mkDefault system;
networking.hostName = networking.hostName =
mkDefault (removeSuffix ".nix" (baseNameOf path)); mkDefault (removeSuffix ".nix" (baseNameOf path));
} }
(filterAttrs (n: v: !elem n ["system"]) attrs)
../. # /default.nix ../. # /default.nix
(import path) (import path)
]; ];
}; };
mapHosts = dir: attrs: mapHosts = dir: attrs @ {system ? system, ...}:
mapModules dir (hostPath: mapModules dir (hostPath: mkHost hostPath attrs);
let
metaPath = "${hostPath}/meta.nix";
meta = import metaPath;
in
mkHost hostPath (attrs // meta)
);
} }

View file

@ -1,7 +0,0 @@
{lib, ...}: let
inherit (lib.options) mkOption;
in {
mkOpt = type: default: mkOption { inherit type default; };
mkOpt' = type: default: description: mkOption { inherit type default description; };
}

View file

@ -59,8 +59,6 @@ in {
# while this is on by default, i am going to explicitly specify this # while this is on by default, i am going to explicitly specify this
networking.firewall.enable = true; networking.firewall.enable = true;
services.fwupd.enable = true;
} // (mkIf cfg.useDoas { } // (mkIf cfg.useDoas {
security.sudo.enable = false; security.sudo.enable = false;
security.doas.enable = true; security.doas.enable = true;