Merge branch 'tmp/nixos-machines' into simkir/coffee-kai
This commit is contained in:
215
modules/desktop.nix
Normal file
215
modules/desktop.nix
Normal file
@@ -0,0 +1,215 @@
|
||||
{
|
||||
pkgs,
|
||||
config,
|
||||
lib,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.features.desktop;
|
||||
|
||||
configuration = {
|
||||
hardware.bluetooth.enable = true;
|
||||
services.pulseaudio = {
|
||||
enable = false;
|
||||
extraModules = [ ];
|
||||
extraConfig = ''
|
||||
load-module module-bluetooth-policy
|
||||
load-module module-bluetooth-discover
|
||||
'';
|
||||
};
|
||||
security.rtkit.enable = true;
|
||||
services.pipewire = {
|
||||
enable = true;
|
||||
alsa = {
|
||||
enable = true;
|
||||
support32Bit = true;
|
||||
};
|
||||
pulse.enable = true;
|
||||
wireplumber = {
|
||||
enable = true;
|
||||
# Need to generate lua config for bluetooth codecs
|
||||
configPackages = [
|
||||
(pkgs.writeTextDir "share/wireplumber/bluetooth.lua.d/51-bluez-config.lua" ''
|
||||
bluez_monitor.properties = {
|
||||
["bluez5.enable-sbc-xq"] = true,
|
||||
["bluez5.enable-msbc"] = true,
|
||||
["bluez5.enable-hw-volume"] = true,
|
||||
["bluez5.headset-roles"] = "[ hsp_hs hsp_ag hfp_hf hfp_ag ]"
|
||||
}
|
||||
'')
|
||||
];
|
||||
};
|
||||
# TODO: Is this needed?
|
||||
jack.enable = true;
|
||||
};
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
pamixer # pulseaudio sound mixer
|
||||
pavucontrol # pulseaudio volume control
|
||||
];
|
||||
|
||||
powerManagement = {
|
||||
enable = false;
|
||||
cpuFreqGovernor = "ondemand";
|
||||
};
|
||||
|
||||
programs.dconf.enable = true;
|
||||
|
||||
security.pam.services.login.enableGnomeKeyring = true;
|
||||
|
||||
services.dbus.enable = true;
|
||||
services.dbus.packages = [
|
||||
pkgs.gnome-keyring
|
||||
pkgs.gcr
|
||||
];
|
||||
|
||||
services.blueman.enable = true;
|
||||
|
||||
services.upower.enable = true;
|
||||
|
||||
services.displayManager = {
|
||||
enable = true;
|
||||
logToFile = true;
|
||||
};
|
||||
|
||||
fonts.packages = with pkgs; [
|
||||
ubuntu-sans
|
||||
ubuntu-classic
|
||||
vollkorn
|
||||
font-awesome
|
||||
caladea
|
||||
carlito
|
||||
cantarell-fonts
|
||||
comic-relief
|
||||
liberation_ttf
|
||||
fira
|
||||
fira-mono
|
||||
fira-code
|
||||
fira-code-symbols
|
||||
dejavu_fonts
|
||||
powerline-fonts
|
||||
unifont
|
||||
siji
|
||||
tamsyn
|
||||
noto-fonts
|
||||
noto-fonts-emoji
|
||||
material-icons
|
||||
nerd-fonts.jetbrains-mono
|
||||
nerd-fonts._0xproto
|
||||
nerd-fonts.droid-sans-mono
|
||||
];
|
||||
|
||||
security.pam.services.swaylock = {
|
||||
text = ''
|
||||
auth include login
|
||||
'';
|
||||
};
|
||||
};
|
||||
|
||||
x11 = {
|
||||
services.xserver = {
|
||||
enable = true;
|
||||
enableCtrlAltBackspace = true;
|
||||
xkb = {
|
||||
layout = "us";
|
||||
variant = "altgr-intl";
|
||||
options = "eurosign:e";
|
||||
};
|
||||
|
||||
desktopManager.xterm.enable = true;
|
||||
displayManager.gdm.enable = !(cfg.wayland.enable);
|
||||
wacom.enable = false;
|
||||
};
|
||||
};
|
||||
|
||||
wayland = {
|
||||
services.xserver.desktopManager.xterm.enable = false;
|
||||
services.xserver.displayManager.gdm.enable = true;
|
||||
services.xserver.displayManager.gdm.wayland = true;
|
||||
programs.regreet = {
|
||||
enable = true;
|
||||
cageArgs = [
|
||||
"-s"
|
||||
"-m"
|
||||
"extend"
|
||||
];
|
||||
settings = {
|
||||
background = {
|
||||
path = "${pkgs.nixos-artwork.wallpapers.mosaic-blue}/share/backgrounds/nixos/nix-wallpaper-mosaic-blue.png";
|
||||
fit = "Fill"; # Contain, Cover
|
||||
};
|
||||
GTK = {
|
||||
application_prefer_dark_theme = false;
|
||||
};
|
||||
appearance = {
|
||||
greeting_msg = "May the foo be with you.";
|
||||
};
|
||||
};
|
||||
};
|
||||
programs.sway.enable = true;
|
||||
# programs.river.enable = true;
|
||||
};
|
||||
|
||||
hyprland = {
|
||||
environment.sessionVariables = {
|
||||
NIXOS_OZONE_WL = "1";
|
||||
};
|
||||
|
||||
programs = {
|
||||
hyprland.enable = true;
|
||||
hyprlock.enable = true;
|
||||
waybar.enable = true;
|
||||
};
|
||||
|
||||
security = {
|
||||
pam.services.hyprlock = {
|
||||
text = ''
|
||||
auth include login
|
||||
'';
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
plasma = {
|
||||
services = {
|
||||
blueman.enable = lib.mkForce false;
|
||||
upower.enable = lib.mkForce false;
|
||||
|
||||
displayManager.sddm = {
|
||||
enable = true;
|
||||
wayland.enable = true;
|
||||
};
|
||||
|
||||
desktopManager.plasma6 = {
|
||||
enable = true;
|
||||
};
|
||||
};
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
pinentry-qt
|
||||
wl-clipboard
|
||||
];
|
||||
|
||||
environment.sessionVariables = {
|
||||
MOZ_ENABLE_WAYLAND = "1";
|
||||
};
|
||||
};
|
||||
in
|
||||
{
|
||||
options.features.desktop = {
|
||||
enable = mkEnableOption "Enable desktop configs";
|
||||
x11.enable = mkEnableOption "Enable X11";
|
||||
wayland.enable = mkEnableOption "Enable Wayland";
|
||||
hyprland.enable = mkEnableOption "Enable Hyprland";
|
||||
plasma.enable = mkEnableOption "Enable KDE Plasma";
|
||||
};
|
||||
|
||||
config = mkMerge [
|
||||
(mkIf cfg.enable configuration)
|
||||
(mkIf (cfg.enable && cfg.x11.enable) x11)
|
||||
(mkIf (cfg.enable && cfg.wayland.enable) wayland)
|
||||
(mkIf (cfg.enable && cfg.hyprland.enable) hyprland)
|
||||
(mkIf (cfg.enable && cfg.plasma.enable) plasma)
|
||||
];
|
||||
}
|
||||
115
modules/lan.nix
Normal file
115
modules/lan.nix
Normal file
@@ -0,0 +1,115 @@
|
||||
{
|
||||
pkgs,
|
||||
config,
|
||||
lib,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.features.lan;
|
||||
|
||||
configuration = {
|
||||
services.cntlm.netbios_hostname = config.networking.hostName;
|
||||
|
||||
services.samba = {
|
||||
enable = true;
|
||||
nmbd.enable = true;
|
||||
nsswins = true;
|
||||
};
|
||||
|
||||
networking.firewall = {
|
||||
allowedTCPPorts = [
|
||||
139
|
||||
445
|
||||
];
|
||||
allowedUDPPorts = [
|
||||
137
|
||||
138
|
||||
];
|
||||
};
|
||||
|
||||
security.krb5 = {
|
||||
enable = cfg.krb5.enable;
|
||||
settings = {
|
||||
libdefaults = {
|
||||
default_realm = cfg.krb5.default_realm;
|
||||
};
|
||||
domain_realm = cfg.krb5.domain_realm;
|
||||
realms = cfg.krb5.realms;
|
||||
};
|
||||
};
|
||||
|
||||
# Ugly hack because of hard coded kernel path
|
||||
system.activationScripts.symlink-requestkey = ''
|
||||
if [ ! -d /sbin ]; then
|
||||
mkdir /sbin
|
||||
fi
|
||||
ln -sfn /run/current-system/sw/bin/request-key /sbin/request-key
|
||||
'';
|
||||
|
||||
environment.systemPackages = [ pkgs.krb5 ];
|
||||
|
||||
# request-key expects a configuration file under /etc
|
||||
environment.etc."request-key.conf" = {
|
||||
text =
|
||||
let
|
||||
upcall = "${pkgs.cifs-utils}/bin/cifs.upcall";
|
||||
keyctl = "${pkgs.keyutils}/bin/keyctl";
|
||||
in
|
||||
''
|
||||
#OP TYPE DESCRIPTION CALLOUT_INFO PROGRAM
|
||||
# -t is required for DFS share servers...
|
||||
create cifs.spnego * * ${upcall} -t %k
|
||||
create dns_resolver * * ${upcall} %k
|
||||
# Everything below this point is essentially the default configuration,
|
||||
# modified minimally to work under NixOS. Notably, it provides debug
|
||||
# logging.
|
||||
create user debug:* negate ${keyctl} negate %k 30 %S
|
||||
create user debug:* rejected ${keyctl} reject %k 30 %c %S
|
||||
create user debug:* expired ${keyctl} reject %k 30 %c %S
|
||||
create user debug:* revoked ${keyctl} reject %k 30 %c %S
|
||||
create user debug:loop:* * |${pkgs.coreutils}/bin/cat
|
||||
create user debug:* * ${pkgs.keyutils}/share/keyutils/request-key-debug.sh %k %d %c %S
|
||||
negate * * * ${keyctl} negate %k 30 %S
|
||||
'';
|
||||
};
|
||||
};
|
||||
in
|
||||
{
|
||||
options.features.lan = {
|
||||
enable = mkEnableOption "Enable LAN configs";
|
||||
|
||||
domain = mkOption {
|
||||
type = types.str;
|
||||
default = "";
|
||||
};
|
||||
|
||||
domainSearch = mkOption {
|
||||
type = types.listOf types.str;
|
||||
default = [ cfg.lan.domain ];
|
||||
};
|
||||
|
||||
krb5 = {
|
||||
enable = mkEnableOption "Enable Kerberos";
|
||||
|
||||
default_realm = mkOption {
|
||||
type = types.str;
|
||||
default = "";
|
||||
};
|
||||
|
||||
domain_realm = mkOption {
|
||||
type = types.attrs;
|
||||
default = { };
|
||||
};
|
||||
|
||||
realms = mkOption {
|
||||
type = types.attrs;
|
||||
default = { };
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
config = mkMerge [
|
||||
(mkIf cfg.enable configuration)
|
||||
];
|
||||
}
|
||||
60
modules/laptop.nix
Normal file
60
modules/laptop.nix
Normal file
@@ -0,0 +1,60 @@
|
||||
{
|
||||
config,
|
||||
pkgs,
|
||||
lib,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.features.laptop;
|
||||
|
||||
hibernateEnvironment = {
|
||||
HIBERNATE_SECONDS = "10800";
|
||||
HIBERNATE_LOCK = "/var/run/autohibernate.lock";
|
||||
};
|
||||
|
||||
configuration = {
|
||||
services.libinput.touchpad.disableWhileTyping = true;
|
||||
|
||||
systemd.services."awake-after-suspend-for-a-time" = {
|
||||
description = "Sets up the suspend so that it'll wake for hibernation";
|
||||
wantedBy = [ "suspend.target" ];
|
||||
before = [ "systemd-suspend.service" ];
|
||||
environment = hibernateEnvironment;
|
||||
script = ''
|
||||
curtime=$(date +%s)
|
||||
echo "$curtime $1" >> /tmp/autohibernate.log
|
||||
echo "$curtime" > $HIBERNATE_LOCK
|
||||
${pkgs.utillinux}/bin/rtcwake -m no -s $HIBERNATE_SECONDS
|
||||
'';
|
||||
serviceConfig.Type = "simple";
|
||||
};
|
||||
|
||||
systemd.services."hibernate-after-recovery" = {
|
||||
description = "Hibernates after a suspend recovery due to timeout";
|
||||
wantedBy = [ "suspend.target" ];
|
||||
after = [ "systemd-suspend.service" ];
|
||||
environment = hibernateEnvironment;
|
||||
script = ''
|
||||
curtime=$(date +%s)
|
||||
sustime=$(cat $HIBERNATE_LOCK)
|
||||
rm $HIBERNATE_LOCK
|
||||
if [ $(($curtime - $sustime)) -ge $HIBERNATE_SECONDS ] ; then
|
||||
systemctl hibernate
|
||||
else
|
||||
${pkgs.utillinux}/bin/rtcwake -m no -s 1
|
||||
fi
|
||||
'';
|
||||
serviceConfig.Type = "simple";
|
||||
};
|
||||
};
|
||||
in
|
||||
{
|
||||
options.features.laptop = {
|
||||
enable = mkEnableOption "Enable laptop configs";
|
||||
};
|
||||
|
||||
config = mkMerge [
|
||||
(mkIf cfg.enable configuration)
|
||||
];
|
||||
}
|
||||
179
modules/os.nix
Normal file
179
modules/os.nix
Normal file
@@ -0,0 +1,179 @@
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.features.os;
|
||||
|
||||
configuration = {
|
||||
networking = {
|
||||
networkmanager = {
|
||||
enable = cfg.networkmanager.enable;
|
||||
unmanaged = [
|
||||
"interface-name:veth*"
|
||||
"interface-name:docker*"
|
||||
];
|
||||
};
|
||||
firewall.trustedInterfaces = [
|
||||
"docker0"
|
||||
"cbr0"
|
||||
"veth+"
|
||||
];
|
||||
};
|
||||
|
||||
users.extraUsers.admin.openssh.authorizedKeys.keys = cfg.adminAuthorizedKeys;
|
||||
users.extraUsers.root.openssh.authorizedKeys.keys = cfg.adminAuthorizedKeys;
|
||||
|
||||
programs.vim.defaultEditor = true;
|
||||
programs.vim.enable = true;
|
||||
programs.fish.enable = true;
|
||||
programs.tmux.enable = true;
|
||||
|
||||
services.openssh.enable = true;
|
||||
services.gvfs.enable = true;
|
||||
services.fwupd.enable = true;
|
||||
|
||||
security.sudo.extraConfig = ''
|
||||
Defaults env_keep+=SSH_AUTH_SOCK
|
||||
Defaults lecture=never
|
||||
Defaults shell_noargs
|
||||
root ALL=(ALL) SETENV: ALL
|
||||
%wheel ALL=(ALL) NOPASSWD: ALL, SETENV: ALL
|
||||
'';
|
||||
|
||||
security.rtkit.enable = true;
|
||||
security.pam.services.sshd.googleAuthenticator.enable = true;
|
||||
|
||||
# $ ecryptfs-migrate-home -u <username>
|
||||
# security.pam.enableEcryptfs = true;
|
||||
|
||||
# The NixOS release to be compatible with for stateful data such as databases.
|
||||
system.stateVersion = "21.05";
|
||||
system.autoUpgrade = {
|
||||
enable = false;
|
||||
dates = "02:00";
|
||||
randomizedDelaySec = "45min";
|
||||
channel = "https://nixos.org/channels/nixos-25.05";
|
||||
};
|
||||
nixpkgs.config.allowUnfree = true;
|
||||
|
||||
boot = {
|
||||
tmp.cleanOnBoot = true;
|
||||
# Boot animation
|
||||
plymouth.enable = true;
|
||||
initrd = {
|
||||
checkJournalingFS = false;
|
||||
# Quiet boot
|
||||
verbose = false;
|
||||
# Use zstd compression instead of gzip for initrd
|
||||
compressor = "zstd";
|
||||
# Make boot more reliable by using systemd inside initrd
|
||||
systemd.enable = true;
|
||||
};
|
||||
};
|
||||
|
||||
nix = {
|
||||
package = pkgs.nixVersions.stable;
|
||||
# package = pkgs.nixVersions.nix_2_23;
|
||||
settings = {
|
||||
# Cleanup
|
||||
auto-optimise-store = true;
|
||||
# Keep them for debugging
|
||||
keep-derivations = true;
|
||||
keep-outputs = true;
|
||||
experimental-features = [
|
||||
"nix-command"
|
||||
"flakes"
|
||||
"pipe-operators"
|
||||
];
|
||||
};
|
||||
gc = {
|
||||
automatic = true;
|
||||
dates = "weekly";
|
||||
options = "--delete-older-than 14d";
|
||||
};
|
||||
extraOptions = ''
|
||||
# See https://jackson.dev/post/nix-reasonable-defaults/
|
||||
connect-timeout = 5
|
||||
download-attempts = 2
|
||||
log-lines = 25
|
||||
warn-dirty = false
|
||||
fallback = true
|
||||
# Only brings pain
|
||||
flake-registry = ""
|
||||
'';
|
||||
};
|
||||
};
|
||||
|
||||
docker = {
|
||||
virtualisation.docker.enable = cfg.docker.enable;
|
||||
virtualisation.docker.autoPrune.enable = true;
|
||||
virtualisation.docker.extraOptions = "--insecure-registry 10.0.0.0/8";
|
||||
networking = {
|
||||
nat.enable = true;
|
||||
nat.internalInterfaces = [ "veth+" ];
|
||||
nat.externalInterface = if cfg.externalInterface == null then [ ] else cfg.externalInterface;
|
||||
};
|
||||
};
|
||||
|
||||
nfs = {
|
||||
networking = {
|
||||
firewall.allowedTCPPorts = [
|
||||
111
|
||||
2049
|
||||
];
|
||||
firewall.allowedUDPPorts = [
|
||||
111
|
||||
2049
|
||||
24007
|
||||
24008
|
||||
];
|
||||
};
|
||||
|
||||
environment.systemPackages = with pkgs; [ nfs-utils ];
|
||||
|
||||
services.nfs.server = {
|
||||
enable = true;
|
||||
exports = cfg.nfs.exports;
|
||||
};
|
||||
};
|
||||
|
||||
in
|
||||
{
|
||||
options.features.os = {
|
||||
networkmanager.enable = mkEnableOption "Enable NetworkManager";
|
||||
|
||||
docker.enable = mkEnableOption "Enable Docker";
|
||||
|
||||
externalInterface = mkOption {
|
||||
type = types.nullOr types.str;
|
||||
default = null;
|
||||
description = "External interface (i.e. for Docker nat)";
|
||||
};
|
||||
|
||||
adminAuthorizedKeys = mkOption {
|
||||
type = types.listOf types.str;
|
||||
default = [ ];
|
||||
};
|
||||
|
||||
nfs = {
|
||||
enable = mkEnableOption "Enable nfs fileserver";
|
||||
|
||||
exports = mkOption {
|
||||
type = types.str;
|
||||
default = "";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
config = mkMerge [
|
||||
configuration
|
||||
|
||||
(mkIf cfg.docker.enable docker)
|
||||
|
||||
(mkIf cfg.nfs.enable nfs)
|
||||
];
|
||||
}
|
||||
68
modules/packages.nix
Normal file
68
modules/packages.nix
Normal file
@@ -0,0 +1,68 @@
|
||||
{
|
||||
pkgs,
|
||||
config,
|
||||
lib,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.features.packages;
|
||||
|
||||
configuration = {
|
||||
environment.systemPackages = with pkgs; [
|
||||
stdenv
|
||||
findutils
|
||||
coreutils
|
||||
psmisc
|
||||
iputils
|
||||
nettools
|
||||
netcat
|
||||
inetutils
|
||||
rsync
|
||||
iotop
|
||||
wget
|
||||
neovim-unwrapped
|
||||
helix
|
||||
unzip
|
||||
zip
|
||||
bind
|
||||
file
|
||||
bc
|
||||
bun
|
||||
sshuttle
|
||||
lsof
|
||||
patchelf
|
||||
binutils
|
||||
git
|
||||
gcc
|
||||
nmap
|
||||
gnupg
|
||||
nixos-container
|
||||
nix-prefetch-git
|
||||
cachix
|
||||
cifs-utils
|
||||
keyutils
|
||||
fuse
|
||||
home-manager
|
||||
google-authenticator
|
||||
surf
|
||||
zathura
|
||||
cmake
|
||||
doxygen
|
||||
graphviz
|
||||
];
|
||||
};
|
||||
in
|
||||
{
|
||||
options.features.packages = {
|
||||
enable = mkOption {
|
||||
type = types.bool;
|
||||
default = true;
|
||||
description = "Enable default system packages";
|
||||
};
|
||||
};
|
||||
|
||||
config = mkMerge [
|
||||
(mkIf cfg.enable configuration)
|
||||
];
|
||||
}
|
||||
210
modules/pki.nix
Normal file
210
modules/pki.nix
Normal file
@@ -0,0 +1,210 @@
|
||||
{
|
||||
pkgs,
|
||||
config,
|
||||
lib,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.features.pki;
|
||||
|
||||
certName = attrs: {
|
||||
CN = "${attrs.name}";
|
||||
O = "${attrs.o}";
|
||||
OU = "${attrs.name}.pki.caSpec";
|
||||
L = "certmgr";
|
||||
};
|
||||
|
||||
ca_csr = pkgs.writeText "${cfg.name}-csr.json" (
|
||||
builtins.toJSON {
|
||||
CN = "${cfg.name}";
|
||||
key = {
|
||||
algo = cfg.algo;
|
||||
size = if cfg.algo == "ecdsa" then 256 else 2048;
|
||||
};
|
||||
names = [ (certName cfg) ];
|
||||
}
|
||||
);
|
||||
|
||||
# make ca derivation sha depend on initca cfssl output
|
||||
initca = pkgs.stdenv.mkDerivation {
|
||||
name = cfg.name;
|
||||
src =
|
||||
if cfg.ca != ./. then
|
||||
cfg.ca
|
||||
else
|
||||
pkgs.runCommand "initca" { buildInputs = [ pkgs.cfssl ]; } ''
|
||||
cfssl genkey -initca ${ca_csr} | cfssljson -bare ca;
|
||||
mkdir -p $out; cp *.pem $out
|
||||
'';
|
||||
buildCommand = ''
|
||||
mkdir -p $out;
|
||||
cp -r $src/* $out
|
||||
'';
|
||||
};
|
||||
|
||||
ca = {
|
||||
key = "${initca}/ca-key.pem";
|
||||
cert = "${initca}/ca.pem";
|
||||
};
|
||||
|
||||
ca-config = pkgs.writeText "ca-config.json" ''
|
||||
{
|
||||
"signing": {
|
||||
"default": {
|
||||
"expiry": "8760h"
|
||||
},
|
||||
"profiles": {
|
||||
"default": {
|
||||
"usages": [
|
||||
"signing",
|
||||
"key encipherment",
|
||||
"server auth",
|
||||
"client auth"
|
||||
],
|
||||
"expiry": "8760h"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
'';
|
||||
|
||||
gencsr =
|
||||
args:
|
||||
let
|
||||
csr = {
|
||||
CN = "${args.cn}";
|
||||
key = {
|
||||
algo = cfg.algo;
|
||||
size = if cfg.algo == "ecdsa" then 256 else 2048;
|
||||
};
|
||||
names = [ (certName args) ];
|
||||
hosts = args.hosts;
|
||||
};
|
||||
in
|
||||
pkgs.writeText "${args.cn}-csr.json" (builtins.toJSON csr);
|
||||
|
||||
# Example usage:
|
||||
# gencert { cn = "test"; ca = ca; o = "test; };
|
||||
gencert =
|
||||
cn: attrs:
|
||||
let
|
||||
conf = {
|
||||
inherit ca cn;
|
||||
csr = gencsr {
|
||||
cn = cn;
|
||||
hosts = attrs.hosts;
|
||||
};
|
||||
};
|
||||
cfssl = conf: ''
|
||||
cfssl gencert -ca ${ca.cert} -ca-key ${ca.key} \
|
||||
-config=${ca-config} -profile=default ${conf.csr} | \
|
||||
cfssljson -bare cert; \
|
||||
mkdir -p $out; cp *.pem $out
|
||||
'';
|
||||
in
|
||||
pkgs.runCommand "${cn}" {
|
||||
buildInputs = [ pkgs.cfssl ];
|
||||
} (cfssl conf);
|
||||
|
||||
certmgr = {
|
||||
services.certmgr = {
|
||||
enable = true;
|
||||
package = pkgs.certmgr-selfsigned;
|
||||
svcManager = "command";
|
||||
specs =
|
||||
let
|
||||
secret = name: "/var/lib/secrets/${name}.pem";
|
||||
mkSpec = name: cert: {
|
||||
service = name;
|
||||
action = "reload";
|
||||
authority = {
|
||||
file.path = ca.cert;
|
||||
};
|
||||
certificate = {
|
||||
path = secret name;
|
||||
};
|
||||
private_key = {
|
||||
owner = "root";
|
||||
group = "root";
|
||||
mode = "0600";
|
||||
path = secret "${name}-key";
|
||||
};
|
||||
request = {
|
||||
CN = name;
|
||||
hosts = [ name ] ++ cert.hosts;
|
||||
key = {
|
||||
algo = "rsa";
|
||||
size = 2048;
|
||||
};
|
||||
names = certName cfg;
|
||||
};
|
||||
};
|
||||
in
|
||||
mapAttrs mkSpec cfg.certs;
|
||||
};
|
||||
};
|
||||
|
||||
# gencerts = {
|
||||
# mapAttrs gencert cfg.certs;
|
||||
# };
|
||||
|
||||
configuration = {
|
||||
security.pki.certificateFiles = [ ca.cert ];
|
||||
};
|
||||
in
|
||||
{
|
||||
options.features.pki = {
|
||||
enable = mkEnableOption "Enable default system packages";
|
||||
|
||||
ca = mkOption {
|
||||
type = types.path;
|
||||
default = ./.;
|
||||
description = "Path to ca certificate to use as Root CA.";
|
||||
};
|
||||
|
||||
algo = mkOption {
|
||||
type = types.str;
|
||||
default = "rsa";
|
||||
};
|
||||
|
||||
name = mkOption {
|
||||
type = types.str;
|
||||
default = "ca";
|
||||
};
|
||||
|
||||
o = mkOption {
|
||||
type = types.str;
|
||||
default = "NixOS";
|
||||
};
|
||||
|
||||
certs = mkOption {
|
||||
type = types.attrsOf types.attrs;
|
||||
default = { };
|
||||
example = {
|
||||
"example.local" = {
|
||||
hosts = [ ];
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
certmgr = {
|
||||
enable = mkEnableOption "Enable certmgr";
|
||||
|
||||
domain = mkOption {
|
||||
type = types.str;
|
||||
default = "local";
|
||||
};
|
||||
};
|
||||
|
||||
static.enable = mkEnableOption "Generate static cert derivations";
|
||||
};
|
||||
|
||||
config = mkMerge [
|
||||
(mkIf cfg.enable configuration)
|
||||
|
||||
(mkIf (cfg.enable && cfg.certmgr.enable) certmgr)
|
||||
|
||||
# (mkIf (cfg.enable && cfg.static.enable) gencerts)
|
||||
];
|
||||
}
|
||||
37
modules/server.nix
Normal file
37
modules/server.nix
Normal file
@@ -0,0 +1,37 @@
|
||||
{
|
||||
pkgs,
|
||||
config,
|
||||
lib,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.features.server;
|
||||
|
||||
configuration = {
|
||||
environment.systemPackages = with pkgs; [
|
||||
nmap
|
||||
];
|
||||
|
||||
powerManagement = {
|
||||
enable = false;
|
||||
cpuFreqGovernor = "ondemand";
|
||||
};
|
||||
|
||||
systemd.targets = {
|
||||
sleep.enable = false;
|
||||
suspend.enable = false;
|
||||
hibernate.enable = false;
|
||||
hybrid-sleep.enable = false;
|
||||
};
|
||||
};
|
||||
in
|
||||
{
|
||||
options.features.server = {
|
||||
enable = mkEnableOption "Enable server configs";
|
||||
};
|
||||
|
||||
config = mkMerge [
|
||||
(mkIf cfg.enable configuration)
|
||||
];
|
||||
}
|
||||
191
tos/hive.nix
Normal file
191
tos/hive.nix
Normal file
@@ -0,0 +1,191 @@
|
||||
let
|
||||
sources = import ./nix;
|
||||
pkgs = import sources.nixos-2505 { };
|
||||
dashboard = "https://grafana.adm.oceanbox.io/d/ba1383fb-b53d-4a90-bd0c-bc76c75450bc/umami?orgId=1&kiosk&refresh=5m&from=now-7d&to=now&timezone=browser&var-groups=$__all";
|
||||
krdp = pkgs.callPackage packages/krdp.nix { };
|
||||
in
|
||||
{
|
||||
meta = {
|
||||
nixpkgs = sources.nixos-2505;
|
||||
};
|
||||
|
||||
hashmap =
|
||||
{ ... }:
|
||||
{
|
||||
imports = [
|
||||
(import hosts/hashmap/configuration.nix)
|
||||
(import ./modules)
|
||||
(import "${sources.nixos-hardware}/common/cpu/intel/comet-lake")
|
||||
];
|
||||
|
||||
deployment = {
|
||||
# NOTE: Build on hashmap
|
||||
buildOnTarget = true;
|
||||
targetHost = "hashmap.ts.obx";
|
||||
tags = [
|
||||
"tos"
|
||||
"dashboard"
|
||||
];
|
||||
};
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
htop
|
||||
btop
|
||||
];
|
||||
|
||||
features = {
|
||||
lan.enable = pkgs.lib.mkForce false;
|
||||
};
|
||||
|
||||
networking = {
|
||||
firewall.enable = false;
|
||||
};
|
||||
|
||||
users.groups = {
|
||||
"coffee-kai" = {
|
||||
gid = 1002;
|
||||
};
|
||||
};
|
||||
|
||||
users.users.coffee-kai = {
|
||||
createHome = true;
|
||||
isNormalUser = true;
|
||||
uid = 1002;
|
||||
description = "Coffee Kai";
|
||||
hashedPassword = "$y$j9T$9PDWdg.Hrz8pLABo4DngQ.$DSVTPzzTlU5/fHWsjlwsTJfPRErXXtlNllKij6tUWO8";
|
||||
group = "coffee-kai";
|
||||
extraGroups = [
|
||||
"users"
|
||||
"wheel"
|
||||
"root"
|
||||
"adm"
|
||||
"cdrom"
|
||||
"docker"
|
||||
"fuse"
|
||||
"wireshark"
|
||||
"libvirtd"
|
||||
"networkmanager"
|
||||
"tty"
|
||||
"keys"
|
||||
];
|
||||
shell = pkgs.fish;
|
||||
useDefaultShell = false;
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKiAS30ZO+wgfAqDE9Y7VhRunn2QszPHA5voUwo+fGOf jonas-3"
|
||||
"ssh-rsa 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 jonas.juselius@juselius.io"
|
||||
"ssh-rsa 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 ski027@uit.no"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII77Aa2MFZMTha8PdkNg32UR8y6Hwb4R0aR9Ad9qifNq"
|
||||
];
|
||||
packages = with pkgs; [
|
||||
ghostty
|
||||
flatpak
|
||||
openssl
|
||||
kdePackages.kconfig
|
||||
];
|
||||
};
|
||||
|
||||
services = {
|
||||
displayManager = {
|
||||
defaultSession = "plasma";
|
||||
autoLogin = {
|
||||
enable = true;
|
||||
user = "coffee-kai";
|
||||
};
|
||||
};
|
||||
|
||||
# TODO: Create module
|
||||
gitlab-runner = {
|
||||
enable = true;
|
||||
settings = {
|
||||
concurrent = 16;
|
||||
};
|
||||
services = {
|
||||
nix = {
|
||||
registrationConfigFile = "/run/secrets/gitlab-runner-registration";
|
||||
|
||||
dockerImage = "alpine";
|
||||
dockerVolumes = [
|
||||
"/nix/store:/nix/store:ro"
|
||||
"/nix/var/nix/db:/nix/var/nix/db:ro"
|
||||
"/nix/var/nix/daemon-socket:/nix/var/nix/daemon-socket:ro"
|
||||
];
|
||||
dockerDisableCache = true;
|
||||
|
||||
preBuildScript = pkgs.writeScript "setup-container" ''
|
||||
mkdir -p -m 0755 /nix/var/log/nix/drvs
|
||||
mkdir -p -m 0755 /nix/var/nix/gcroots
|
||||
mkdir -p -m 0755 /nix/var/nix/profiles
|
||||
mkdir -p -m 0755 /nix/var/nix/temproots
|
||||
mkdir -p -m 0755 /nix/var/nix/userpool
|
||||
mkdir -p -m 1777 /nix/var/nix/gcroots/per-user
|
||||
mkdir -p -m 1777 /nix/var/nix/profiles/per-user
|
||||
mkdir -p -m 0755 /nix/var/nix/profiles/per-user/root
|
||||
mkdir -p -m 0700 "$HOME/.nix-defexpr"
|
||||
. ${pkgs.nix}/etc/profile.d/nix-daemon.sh
|
||||
${pkgs.nix}/bin/nix-channel --add https://nixos.org/channels/nixos-25.05 nixpkgs
|
||||
${pkgs.nix}/bin/nix-channel --update nixpkgs
|
||||
'';
|
||||
|
||||
environmentVariables = {
|
||||
ENV = "/etc/profile";
|
||||
USER = "root";
|
||||
NIX_REMOTE = "daemon";
|
||||
# Taken from https://cobalt.rocks/posts/nix-gitlab/
|
||||
PATH =
|
||||
(pkgs.lib.strings.makeSearchPathOutput "bin" "bin" (
|
||||
with pkgs;
|
||||
[
|
||||
gnugrep
|
||||
coreutils
|
||||
nix
|
||||
openssh
|
||||
bash
|
||||
git
|
||||
skopeo
|
||||
]
|
||||
))
|
||||
+ ":/nix/var/nix/profiles/default/bin:/usr/local/bin:/usr/local/sbin:/nix/var/nix/profiles/default/sbin:/bin:/sbin:/usr/bin:/usr/sbin";
|
||||
};
|
||||
|
||||
tagList = [ "nix" ];
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
systemd.user.services.krdp = {
|
||||
enable = true;
|
||||
description = "KDE RDP server";
|
||||
after = [
|
||||
"plasma-core.target"
|
||||
"plasma-xdg-desktop-portal-kde.service"
|
||||
];
|
||||
wantedBy = [ "default.target" ];
|
||||
serviceConfig = {
|
||||
Type = "exec";
|
||||
ExecStart = "${krdp}/bin/krdpserver -u admin -p 'en to tre fire'";
|
||||
# Restart when closed/on-failure
|
||||
Restart = "on-abnormal";
|
||||
};
|
||||
unitConfig.ConditionUser = "coffee-kai";
|
||||
};
|
||||
|
||||
systemd.user.services.dashboard = {
|
||||
enable = true;
|
||||
description = "Kiosk Dashboard";
|
||||
after = [
|
||||
"plasma-core.target"
|
||||
"plasma-xdg-desktop-portal-kde.service"
|
||||
];
|
||||
wantedBy = [ "plasma-workspace.target" ];
|
||||
serviceConfig = {
|
||||
Type = "exec";
|
||||
ExecStart = "${pkgs.chromium}/bin/chromium-browser --kiosk ${dashboard}";
|
||||
# Restart when closed/on-failure
|
||||
Restart = "always";
|
||||
RestartSec = 3;
|
||||
};
|
||||
unitConfig.ConditionUser = "coffee-kai";
|
||||
};
|
||||
};
|
||||
}
|
||||
121
tos/hosts/hashmap/certificates.nix
Normal file
121
tos/hosts/hashmap/certificates.nix
Normal file
@@ -0,0 +1,121 @@
|
||||
{ ... }:
|
||||
{
|
||||
security.pki.certificates = [
|
||||
''
|
||||
obx-k8s
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIBijCCATCgAwIBAgIRAML2sKHuRRU3o+LiyniC3hEwCgYIKoZIzj0EAwIwFTET
|
||||
MBEGA1UEChMKa3ViZXJuZXRlczAeFw0yNDAxMTUxMDU4MDRaFw0zNDAxMTIxMDU4
|
||||
MDRaMBUxEzARBgNVBAoTCmt1YmVybmV0ZXMwWTATBgcqhkjOPQIBBggqhkjOPQMB
|
||||
BwNCAARGTPqkfZeik3pQDZTEOercIIumiQ2PJ+DIHc1rHFZA6EFRXrQr7PZ6bQ+k
|
||||
D0cBS1u0yFDrkEcbOflyT8e/HK51o2EwXzAOBgNVHQ8BAf8EBAMCAoQwHQYDVR0l
|
||||
BBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O
|
||||
BBYEFIhf9uRytHnvdZSbeTjY6MFRk4VjMAoGCCqGSM49BAMCA0gAMEUCIQDDfa7E
|
||||
JyLQDORiYilpKejnWF/Pxe4pGNQ4SRNLUUJcoAIgYVoSEsqOoH2Kdk92fkS+yxoT
|
||||
m9H0cfSnZwsuwl6yETI=
|
||||
-----END CERTIFICATE-----
|
||||
''
|
||||
''
|
||||
ceph.tos
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIBijCCAS+gAwIBAgIQa1qcHNH1wha2lnjxPTw+kjAKBggqhkjOPQQDAjAVMRMw
|
||||
EQYDVQQKEwprdWJlcm5ldGVzMB4XDTI0MDIxNDEyNDYxMVoXDTM0MDIxMTEyNDYx
|
||||
MVowFTETMBEGA1UEChMKa3ViZXJuZXRlczBZMBMGByqGSM49AgEGCCqGSM49AwEH
|
||||
A0IABPFCzfx6UxuVF8m+Fal8TZ9KP9eU+s2iVAIx6kvXocs6plP45BPL1qgVNg0Q
|
||||
T4k380v+fQHgqfznY9oGC12kGDajYTBfMA4GA1UdDwEB/wQEAwIChDAdBgNVHSUE
|
||||
FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E
|
||||
FgQU1/QQCU1nqqrME7vGo6SocbTAi8AwCgYIKoZIzj0EAwIDSQAwRgIhAKoCk3uy
|
||||
YYTdOlpVUixfLHZvqONxw2P3hp72C9g2f7QmAiEA9CortHSI65qpp3e60o/KDRG5
|
||||
SgnWAwqepG3NkF8JUJQ=
|
||||
-----END CERTIFICATE-----
|
||||
''
|
||||
''
|
||||
ceph.vtn
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIBizCCATCgAwIBAgIRAO7mPhBLSHaiEwRW7508ATowCgYIKoZIzj0EAwIwFTET
|
||||
MBEGA1UEChMKa3ViZXJuZXRlczAeFw0yNTA5MDcxNjM4NTRaFw0zNTA5MDUxNjM4
|
||||
NTRaMBUxEzARBgNVBAoTCmt1YmVybmV0ZXMwWTATBgcqhkjOPQIBBggqhkjOPQMB
|
||||
BwNCAASgQ+z/9GFDF1oxmVpfpxVM1NvfC4knReLtkjpkM/xD1vijjW9ciHReN528
|
||||
Kv5kLR1aPXvUZPid0rhpdHszBWxso2EwXzAOBgNVHQ8BAf8EBAMCAoQwHQYDVR0l
|
||||
BBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O
|
||||
BBYEFMj2igyysGf9JQZPPQyFOAPFKxyDMAoGCCqGSM49BAMCA0kAMEYCIQDCZK6c
|
||||
f6M48oIvD1VQh1PjzyMGwDqA9DXjETyKCVso7wIhAN6Zicfo/R6KjDbVZiMAE6Z8
|
||||
6YhFZPOGyTLixULH+Dxe
|
||||
-----END CERTIFICATE-----
|
||||
''
|
||||
''
|
||||
smtpgw
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIC1jCCAb6gAwIBAgIQRHJDmL39XbdAQsx0s3DNqjANBgkqhkiG9w0BAQUFADAU
|
||||
MRIwEAYDVQQDEwlEbXotUmVsYXkwHhcNMTkwMzI1MTQ1MTIzWhcNMjAwMzI1MDAw
|
||||
MDAwWjAUMRIwEAYDVQQDEwlEbXotUmVsYXkwggEiMA0GCSqGSIb3DQEBAQUAA4IB
|
||||
DwAwggEKAoIBAQC2yTIs8x+Hr6IP1dpi8LduuGNQ59ZbinQLE/8m3Exk/AIHkjc3
|
||||
62tj+vvP4MrLGq3MNm8Jm45zBeTTHbRIYHqtiedMjUzC1bVLY02GWsfYjCx4VM56
|
||||
mLvTQI+NroZ1TX6Nxeddpl3Zz5XV2hiBMrwZDSQt/6aK+oAEp5uhp4lY737tnSnL
|
||||
QwRTeLb07/6ZIN5DPpw8SV0oZ04c9Bo279TfTtFEu8XOQhBN+hnNf3hL9XsJTsnS
|
||||
iyD7Snyis79nw0z2gE1H9xo3a7kMH02NpFwHiFIP64qqloHnNi2KMhqrsdXb/FTo
|
||||
oepUjkRrxCljxKN37PRREKRWtSPTxAfAt4+hAgMBAAGjJDAiMAsGA1UdDwQEAwIE
|
||||
MDATBgNVHSUEDDAKBggrBgEFBQcDATANBgkqhkiG9w0BAQUFAAOCAQEAChhkabIm
|
||||
pYf9s+7JDGY2ifCCd1wcTkKTbXXYMy76EmznI6lQlCB2MGOUVJOuV0WpbEjanrSL
|
||||
9+oTWUfFzQdyF0eTSLfIClfnX1nJUP6AINVoqbXv9wmaWZbb7rQrGFWxS4p8MyfI
|
||||
dCp+G97dyLsMgF72z/QgFjUm6PHlV7syqz2bsGoYmW1XTDhESdJAURM6SCsNylES
|
||||
YjTEK1BAObn27Ac4RuiwGElLjODMsVIfWeyk2Dq1vwTCemrvlE1X70WU233kFuUT
|
||||
nOLWmrFSom1HDCSpdkWVY+OMf4By01Le35wZPMkYiPNjP398/MrklXnN9vLVyfg0
|
||||
+9jRUc3Bl9nOmQ==
|
||||
-----END CERTIFICATE-----
|
||||
''
|
||||
''
|
||||
letsencrypt-stg-root-x1
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFmDCCA4CgAwIBAgIQU9C87nMpOIFKYpfvOHFHFDANBgkqhkiG9w0BAQsFADBm
|
||||
MQswCQYDVQQGEwJVUzEzMDEGA1UEChMqKFNUQUdJTkcpIEludGVybmV0IFNlY3Vy
|
||||
aXR5IFJlc2VhcmNoIEdyb3VwMSIwIAYDVQQDExkoU1RBR0lORykgUHJldGVuZCBQ
|
||||
ZWFyIFgxMB4XDTE1MDYwNDExMDQzOFoXDTM1MDYwNDExMDQzOFowZjELMAkGA1UE
|
||||
BhMCVVMxMzAxBgNVBAoTKihTVEFHSU5HKSBJbnRlcm5ldCBTZWN1cml0eSBSZXNl
|
||||
YXJjaCBHcm91cDEiMCAGA1UEAxMZKFNUQUdJTkcpIFByZXRlbmQgUGVhciBYMTCC
|
||||
AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALbagEdDTa1QgGBWSYkyMhsc
|
||||
ZXENOBaVRTMX1hceJENgsL0Ma49D3MilI4KS38mtkmdF6cPWnL++fgehT0FbRHZg
|
||||
jOEr8UAN4jH6omjrbTD++VZneTsMVaGamQmDdFl5g1gYaigkkmx8OiCO68a4QXg4
|
||||
wSyn6iDipKP8utsE+x1E28SA75HOYqpdrk4HGxuULvlr03wZGTIf/oRt2/c+dYmD
|
||||
oaJhge+GOrLAEQByO7+8+vzOwpNAPEx6LW+crEEZ7eBXih6VP19sTGy3yfqK5tPt
|
||||
TdXXCOQMKAp+gCj/VByhmIr+0iNDC540gtvV303WpcbwnkkLYC0Ft2cYUyHtkstO
|
||||
fRcRO+K2cZozoSwVPyB8/J9RpcRK3jgnX9lujfwA/pAbP0J2UPQFxmWFRQnFjaq6
|
||||
rkqbNEBgLy+kFL1NEsRbvFbKrRi5bYy2lNms2NJPZvdNQbT/2dBZKmJqxHkxCuOQ
|
||||
FjhJQNeO+Njm1Z1iATS/3rts2yZlqXKsxQUzN6vNbD8KnXRMEeOXUYvbV4lqfCf8
|
||||
mS14WEbSiMy87GB5S9ucSV1XUrlTG5UGcMSZOBcEUpisRPEmQWUOTWIoDQ5FOia/
|
||||
GI+Ki523r2ruEmbmG37EBSBXdxIdndqrjy+QVAmCebyDx9eVEGOIpn26bW5LKeru
|
||||
mJxa/CFBaKi4bRvmdJRLAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMB
|
||||
Af8EBTADAQH/MB0GA1UdDgQWBBS182Xy/rAKkh/7PH3zRKCsYyXDFDANBgkqhkiG
|
||||
9w0BAQsFAAOCAgEAncDZNytDbrrVe68UT6py1lfF2h6Tm2p8ro42i87WWyP2LK8Y
|
||||
nLHC0hvNfWeWmjZQYBQfGC5c7aQRezak+tHLdmrNKHkn5kn+9E9LCjCaEsyIIn2j
|
||||
qdHlAkepu/C3KnNtVx5tW07e5bvIjJScwkCDbP3akWQixPpRFAsnP+ULx7k0aO1x
|
||||
qAeaAhQ2rgo1F58hcflgqKTXnpPM02intVfiVVkX5GXpJjK5EoQtLceyGOrkxlM/
|
||||
sTPq4UrnypmsqSagWV3HcUlYtDinc+nukFk6eR4XkzXBbwKajl0YjztfrCIHOn5Q
|
||||
CJL6TERVDbM/aAPly8kJ1sWGLuvvWYzMYgLzDul//rUF10gEMWaXVZV51KpS9DY/
|
||||
5CunuvCXmEQJHo7kGcViT7sETn6Jz9KOhvYcXkJ7po6d93A/jy4GKPIPnsKKNEmR
|
||||
xUuXY4xRdh45tMJnLTUDdC9FIU0flTeO9/vNpVA8OPU1i14vCz+MU8KX1bV3GXm/
|
||||
fxlB7VBBjX9v5oUep0o/j68R/iDlCOM4VVfRa8gX6T2FU7fNdatvGro7uQzIvWof
|
||||
gN9WUwCbEMBy/YhBSrXycKA8crgGg3x1mIsopn88JKwmMBa68oS7EHM9w7C4y71M
|
||||
7DiA+/9Qdp9RBWJpTS9i/mDnJg1xvo8Xz49mrrgfmcAXTCJqXi24NatI3Oc=
|
||||
-----END CERTIFICATE-----
|
||||
''
|
||||
''
|
||||
letsencrypt-stg-root-x2
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICTjCCAdSgAwIBAgIRAIPgc3k5LlLVLtUUvs4K/QcwCgYIKoZIzj0EAwMwaDEL
|
||||
MAkGA1UEBhMCVVMxMzAxBgNVBAoTKihTVEFHSU5HKSBJbnRlcm5ldCBTZWN1cml0
|
||||
eSBSZXNlYXJjaCBHcm91cDEkMCIGA1UEAxMbKFNUQUdJTkcpIEJvZ3VzIEJyb2Nj
|
||||
b2xpIFgyMB4XDTIwMDkwNDAwMDAwMFoXDTQwMDkxNzE2MDAwMFowaDELMAkGA1UE
|
||||
BhMCVVMxMzAxBgNVBAoTKihTVEFHSU5HKSBJbnRlcm5ldCBTZWN1cml0eSBSZXNl
|
||||
YXJjaCBHcm91cDEkMCIGA1UEAxMbKFNUQUdJTkcpIEJvZ3VzIEJyb2Njb2xpIFgy
|
||||
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEOvS+w1kCzAxYOJbA06Aw0HFP2tLBLKPo
|
||||
FQqR9AMskl1nC2975eQqycR+ACvYelA8rfwFXObMHYXJ23XLB+dAjPJVOJ2OcsjT
|
||||
VqO4dcDWu+rQ2VILdnJRYypnV1MMThVxo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYD
|
||||
VR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU3tGjWWQOwZo2o0busBB2766XlWYwCgYI
|
||||
KoZIzj0EAwMDaAAwZQIwRcp4ZKBsq9XkUuN8wfX+GEbY1N5nmCRc8e80kUkuAefo
|
||||
uc2j3cICeXo1cOybQ1iWAjEA3Ooawl8eQyR4wrjCofUE8h44p0j7Yl/kBlJZT8+9
|
||||
vbtH7QiVzeKCOTQPINyRql6P
|
||||
-----END CERTIFICATE-----
|
||||
''
|
||||
];
|
||||
}
|
||||
163
tos/hosts/hashmap/configuration.nix
Normal file
163
tos/hosts/hashmap/configuration.nix
Normal file
@@ -0,0 +1,163 @@
|
||||
{ pkgs, config, ... }:
|
||||
{
|
||||
networking = {
|
||||
hostName = "hashmap";
|
||||
domain = "local";
|
||||
search = [ "local" ];
|
||||
firewall.allowedTCPPorts = [ 3389 ];
|
||||
firewall.extraCommands = '''';
|
||||
};
|
||||
|
||||
boot = {
|
||||
consoleLogLevel = 3;
|
||||
kernel = {
|
||||
sysctl = {
|
||||
"net.ipv4.ip_forward" = true;
|
||||
};
|
||||
};
|
||||
kernelParams = [
|
||||
# Quite boot
|
||||
"quiet"
|
||||
"udev.log_level=3"
|
||||
];
|
||||
supportedFilesystems = [ "ntfs" ];
|
||||
loader.systemd-boot.enable = true;
|
||||
loader.efi.canTouchEfiVariables = true;
|
||||
initrd.luks.devices = {
|
||||
luksroot = {
|
||||
device = "/dev/nvme0n1p1";
|
||||
preLVM = true;
|
||||
allowDiscards = true;
|
||||
};
|
||||
luks-data = {
|
||||
device = "/dev/sda1";
|
||||
preLVM = true;
|
||||
allowDiscards = true;
|
||||
};
|
||||
};
|
||||
loader.grub = {
|
||||
enable = false;
|
||||
device = "/dev/sda1";
|
||||
configurationLimit = 3;
|
||||
};
|
||||
};
|
||||
|
||||
console = {
|
||||
font = "Lat2-Terminus16";
|
||||
keyMap = "us";
|
||||
};
|
||||
|
||||
i18n = {
|
||||
defaultLocale = "en_US.UTF-8";
|
||||
extraLocaleSettings = {
|
||||
LC_CTYPE = "en_DK.UTF-8";
|
||||
LC_TIME = "en_DK.UTF-8";
|
||||
LC_PAPER = "en_DK.UTF-8";
|
||||
LC_NAME = "en_DK.UTF-8";
|
||||
LC_ADDRESS = "en_DK.UTF-8";
|
||||
LC_TELEPHONE = "en_DK.UTF-8";
|
||||
LC_MEASUREMENT = "en_DK.UTF-8";
|
||||
LC_IDENTIFICATION = "en_DK.UTF-8";
|
||||
};
|
||||
};
|
||||
|
||||
time.timeZone = "Europe/Oslo";
|
||||
|
||||
features = {
|
||||
desktop.enable = true;
|
||||
laptop.enable = false;
|
||||
desktop.wayland.enable = false;
|
||||
desktop.plasma.enable = true;
|
||||
desktop.hyprland.enable = false;
|
||||
|
||||
pki = {
|
||||
enable = false;
|
||||
certmgr.enable = true;
|
||||
certs = {
|
||||
foo = {
|
||||
hosts = [ "localhost" ];
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
os = {
|
||||
networkmanager.enable = true;
|
||||
externalInterface = "eno2";
|
||||
|
||||
docker.enable = true;
|
||||
|
||||
adminAuthorizedKeys = [
|
||||
"ssh-rsa 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 jonas.juselius@juselius.io"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFbrEhm1acesXmbgfO5lN1gcTFXqusq61QyCZXunYJpl"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIdcJteh9d/N1o8BbdEMRVxeMjm28saon/Oh2tV0+TYj"
|
||||
"ssh-rsa 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 Simen Kirkvik (gitlab.com)"
|
||||
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC2tox0uyFGfU1zPNU6yAVSoGOUkeU959aiTMrqu1U9MCCOP2o4IhZIlRpZ08XVnUU/AhycCUF4HgGqdcco8oIVX0P0Cn83KJoD/DOqAiz+1VwIUUV1ylrRdNqCgf4wnmLni3sUPHJdQnuq57+pzDDjHMr9CcBL2KzOHD/QanfR+jZmv9K3OS5oDcWquSCziXkpbkWQURPactmtyzGK2FRRxONZgYrB8gRTDstlWQg/t6GHNVelzuJ7SEf+t8pk/S2e/XAvfZyRJhrVJ35iZKpmxkIn5v0g1Z+z0yX/KRSAPRtNg9uM44cmto77MFx7iFs0CuleL3zHvRvZYW1ZnsKAiP07UkEK87luMpkTzFr9CSHJGpgk1RZYA3qidQti44n6NU9YRNhzO4v+KQE6XDqO80gZCJboSXr3fnYn/QHpPXzK5JcZNWmClyMURYj10qv9So3Fh0o3LV5GThA6JgN874vUywUZanPEdn8ePBcAsjLRzA4YBGEuvJCc6FELSuY2s+/pFba8NXQvrOdJKSRC0g5USQFfaWDln4Q4zZ1G5z76p1u6GtRWxvakkUQ0fze9KAW7msxeKaw+B7uMtyvCL8V2zEE8WKFP1sNyYEe7Sgp3RVfym2VPMNTZVhEImfM/3D+WbzfoJztnJvFKXeeMCcne4G8swyef3o1s3b+CvQ== Simen Kirkvik (gitlab.com)"
|
||||
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDIQUQsPdS3Wvl46cPl6rBrAPDLX9r8tx1V7yVkr1GhP07hVYVcLV0wojMaB8Zi5kvr/sgBpiuU6oKNqx4+5gN70uQC+JbM5Orna8SoN4L2jfO2WgTMFZEqmDoyzCCglUl2EiqFDvKEC/dvFSjn/qJG6eUdEGpTuB/VQljidZMJrloq0kf4iYy0uaXdrkoKLlBEjXo1forlr2KAYq48PsTovyQxrDqG25UcRhjmoq0Ag7ZGquQXB8Ouwe+H/lVWQFJU+Vy4nqqvv1Fq/bQHW92dZDnlwrMyY6lVsp6Cgc3jzcB5dTfN9Zt+iaVFSE+Tojl04n1oKU4Z5kMbTPRTLLDgjlVRY9JGHOXNO8bqEPG0E7sNXBGSncie9nXnfDoVhXAd8KoVkvXCXYvS+pk82ig0ET+8HC7KRZysB5sqD++GbexbPZFYrOhEZYfvY00sOAVvFCh8h6sC1tXAvXZqUgvTClOINDh42NBs/vTmg6RoG57z1moTa5RsGlVAguKqaiE= Simen Kirkvik (gitlab.com)"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII77Aa2MFZMTha8PdkNg32UR8y6Hwb4R0aR9Ad9qifNq"
|
||||
];
|
||||
|
||||
nfs.enable = false;
|
||||
# nfs.exports = ''
|
||||
# /exports 10.1.1.0/24(insecure,ro,async,crossmnt,no_subtree_check,fsid=0,no_root_squash)
|
||||
# '';
|
||||
};
|
||||
|
||||
lan = {
|
||||
enable = true;
|
||||
|
||||
krb5 = {
|
||||
enable = false;
|
||||
default_realm = "ACME";
|
||||
|
||||
domain_realm = {
|
||||
"acme.com" = "ACME";
|
||||
};
|
||||
|
||||
realms = {
|
||||
"ACME" = {
|
||||
admin_server = "dc.acme.com";
|
||||
kdc = "dc.acme.com";
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
services.pcscd.enable = false; # For Yubikey ykman
|
||||
|
||||
security.pam.yubico = {
|
||||
enable = false;
|
||||
mode = "client"; # "challenge-response";
|
||||
id = "92753";
|
||||
control = "sufficient";
|
||||
};
|
||||
|
||||
services.udev.extraRules = ''
|
||||
ACTION=="remove",\
|
||||
ENV{ID_BUS}=="usb",\
|
||||
ENV{ID_MODEL_ID}=="0407",\
|
||||
ENV{ID_VENDOR_ID}=="1050",\
|
||||
ENV{ID_VENDOR}=="Yubico",\
|
||||
RUN+="${pkgs.systemd}/bin/loginctl lock-sessions"
|
||||
'';
|
||||
|
||||
nixpkgs.config.allowUnfreee = true;
|
||||
|
||||
services.tailscale = {
|
||||
enable = true;
|
||||
useRoutingFeatures = "client";
|
||||
extraUpFlags = [
|
||||
"--login-server=https://headscale.svc.oceanbox.io"
|
||||
"--accept-dns=true"
|
||||
"--accept-routes"
|
||||
];
|
||||
};
|
||||
|
||||
imports = [
|
||||
./.
|
||||
./kernel.nix
|
||||
./hardware-configuration.nix
|
||||
#"${builtins.fetchGit { url = "https://github.com/NixOS/nixos-hardware.git"; }}/lenovo/thinkpad/x1/7th-gen"
|
||||
];
|
||||
|
||||
}
|
||||
7
tos/hosts/hashmap/default.nix
Normal file
7
tos/hosts/hashmap/default.nix
Normal file
@@ -0,0 +1,7 @@
|
||||
{
|
||||
imports = [
|
||||
./users.nix
|
||||
./hosts.nix
|
||||
./certificates.nix
|
||||
];
|
||||
}
|
||||
48
tos/hosts/hashmap/hardware-configuration.nix
Normal file
48
tos/hosts/hashmap/hardware-configuration.nix
Normal file
@@ -0,0 +1,48 @@
|
||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||
# and may be overwritten by future invocations. Please make changes
|
||||
# to /etc/nixos/configuration.nix instead.
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
modulesPath,
|
||||
...
|
||||
}:
|
||||
|
||||
{
|
||||
imports = [
|
||||
(modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = [
|
||||
"xhci_pci"
|
||||
"ahci"
|
||||
"nvme"
|
||||
"usbhid"
|
||||
"sd_mod"
|
||||
];
|
||||
boot.initrd.kernelModules = [ "dm-snapshot" ];
|
||||
boot.kernelModules = [ "kvm-intel" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" = {
|
||||
device = "/dev/disk/by-uuid/954fb6f1-a95d-41ef-bca3-991e2716b415";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
fileSystems."/boot" = {
|
||||
device = "/dev/disk/by-uuid/EDC0-FC90";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
swapDevices = [
|
||||
{ device = "/dev/disk/by-uuid/062df612-c520-4067-b300-65908ea882bb"; }
|
||||
];
|
||||
|
||||
fileSystems."/data" = {
|
||||
device = "/dev/vg1/data";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
|
||||
}
|
||||
4
tos/hosts/hashmap/hosts.nix
Normal file
4
tos/hosts/hashmap/hosts.nix
Normal file
@@ -0,0 +1,4 @@
|
||||
{ ... }:
|
||||
{
|
||||
networking.extraHosts = '''';
|
||||
}
|
||||
17
tos/hosts/hashmap/kernel.nix
Normal file
17
tos/hosts/hashmap/kernel.nix
Normal file
@@ -0,0 +1,17 @@
|
||||
{
|
||||
pkgs,
|
||||
stdenv,
|
||||
fetchurl,
|
||||
config,
|
||||
...
|
||||
}:
|
||||
let
|
||||
in
|
||||
{
|
||||
nixpkgs.overlays = [ ];
|
||||
|
||||
boot = {
|
||||
extraModulePackages = [ ];
|
||||
# kernelPackages = pkgs.linuxPackages_6_2;
|
||||
};
|
||||
}
|
||||
107
tos/hosts/hashmap/users.nix
Normal file
107
tos/hosts/hashmap/users.nix
Normal file
@@ -0,0 +1,107 @@
|
||||
{ pkgs, ... }:
|
||||
{
|
||||
users.extraGroups = {
|
||||
admin = {
|
||||
gid = 10000;
|
||||
};
|
||||
bast = {
|
||||
gid = 1000;
|
||||
};
|
||||
stig = {
|
||||
gid = 1001;
|
||||
};
|
||||
};
|
||||
|
||||
users.extraUsers.admin = {
|
||||
description = "Administrator";
|
||||
home = "/home/admin";
|
||||
group = "admin";
|
||||
extraGroups = [
|
||||
"users"
|
||||
"wheel"
|
||||
"root"
|
||||
"adm"
|
||||
"cdrom"
|
||||
"docker"
|
||||
"fuse"
|
||||
"wireshark"
|
||||
"libvirtd"
|
||||
"networkmanager"
|
||||
"tty"
|
||||
"keys"
|
||||
];
|
||||
uid = 10000;
|
||||
isNormalUser = true;
|
||||
createHome = true;
|
||||
useDefaultShell = false;
|
||||
shell = pkgs.fish;
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKiAS30ZO+wgfAqDE9Y7VhRunn2QszPHA5voUwo+fGOf jonas-3"
|
||||
"ssh-rsa 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 jonas.juselius@juselius.io"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFbrEhm1acesXmbgfO5lN1gcTFXqusq61QyCZXunYJpl"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIdcJteh9d/N1o8BbdEMRVxeMjm28saon/Oh2tV0+TYj"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKfgY468dPNpdXZCkD9jw1p2qA0+z56Wi/c1VYE+riki"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII77Aa2MFZMTha8PdkNg32UR8y6Hwb4R0aR9Ad9qifNq"
|
||||
];
|
||||
};
|
||||
|
||||
users.extraUsers.stig = {
|
||||
description = "Stig Rune Jensen";
|
||||
home = "/home/stig";
|
||||
group = "stig";
|
||||
extraGroups = [
|
||||
"users"
|
||||
"wheel"
|
||||
"root"
|
||||
"adm"
|
||||
"cdrom"
|
||||
"docker"
|
||||
"fuse"
|
||||
"wireshark"
|
||||
"libvirtd"
|
||||
"networkmanager"
|
||||
"video"
|
||||
"render"
|
||||
"tty"
|
||||
"keys"
|
||||
];
|
||||
uid = 1001;
|
||||
isNormalUser = true;
|
||||
createHome = true;
|
||||
useDefaultShell = false;
|
||||
shell = pkgs.fish;
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKfgY468dPNpdXZCkD9jw1p2qA0+z56Wi/c1VYE+riki"
|
||||
];
|
||||
};
|
||||
|
||||
users.extraUsers.bast = {
|
||||
description = "Radovan Bast";
|
||||
home = "/home/bast";
|
||||
group = "bast";
|
||||
extraGroups = [
|
||||
"users"
|
||||
"wheel"
|
||||
"root"
|
||||
"adm"
|
||||
"cdrom"
|
||||
"docker"
|
||||
"fuse"
|
||||
"wireshark"
|
||||
"libvirtd"
|
||||
"networkmanager"
|
||||
"video"
|
||||
"render"
|
||||
"tty"
|
||||
];
|
||||
uid = 1000;
|
||||
isNormalUser = true;
|
||||
createHome = true;
|
||||
useDefaultShell = false;
|
||||
shell = pkgs.fish;
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFbrEhm1acesXmbgfO5lN1gcTFXqusq61QyCZXunYJpl"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIdcJteh9d/N1o8BbdEMRVxeMjm28saon/Oh2tV0+TYj"
|
||||
];
|
||||
};
|
||||
}
|
||||
146
tos/nix/default.nix
Normal file
146
tos/nix/default.nix
Normal file
@@ -0,0 +1,146 @@
|
||||
/*
|
||||
This file is provided under the MIT licence:
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
|
||||
|
||||
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
*/
|
||||
# Generated by npins. Do not modify; will be overwritten regularly
|
||||
let
|
||||
data = builtins.fromJSON (builtins.readFile ./sources.json);
|
||||
version = data.version;
|
||||
|
||||
# https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/lists.nix#L295
|
||||
range =
|
||||
first: last: if first > last then [ ] else builtins.genList (n: first + n) (last - first + 1);
|
||||
|
||||
# https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/strings.nix#L257
|
||||
stringToCharacters = s: map (p: builtins.substring p 1 s) (range 0 (builtins.stringLength s - 1));
|
||||
|
||||
# https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/strings.nix#L269
|
||||
stringAsChars = f: s: concatStrings (map f (stringToCharacters s));
|
||||
concatMapStrings = f: list: concatStrings (map f list);
|
||||
concatStrings = builtins.concatStringsSep "";
|
||||
|
||||
# If the environment variable NPINS_OVERRIDE_${name} is set, then use
|
||||
# the path directly as opposed to the fetched source.
|
||||
# (Taken from Niv for compatibility)
|
||||
mayOverride =
|
||||
name: path:
|
||||
let
|
||||
envVarName = "NPINS_OVERRIDE_${saneName}";
|
||||
saneName = stringAsChars (c: if (builtins.match "[a-zA-Z0-9]" c) == null then "_" else c) name;
|
||||
ersatz = builtins.getEnv envVarName;
|
||||
in
|
||||
if ersatz == "" then
|
||||
path
|
||||
else
|
||||
# this turns the string into an actual Nix path (for both absolute and
|
||||
# relative paths)
|
||||
builtins.trace "Overriding path of \"${name}\" with \"${ersatz}\" due to set \"${envVarName}\"" (
|
||||
if builtins.substring 0 1 ersatz == "/" then
|
||||
/. + ersatz
|
||||
else
|
||||
/. + builtins.getEnv "PWD" + "/${ersatz}"
|
||||
);
|
||||
|
||||
mkSource =
|
||||
name: spec:
|
||||
assert spec ? type;
|
||||
let
|
||||
path =
|
||||
if spec.type == "Git" then
|
||||
mkGitSource spec
|
||||
else if spec.type == "GitRelease" then
|
||||
mkGitSource spec
|
||||
else if spec.type == "PyPi" then
|
||||
mkPyPiSource spec
|
||||
else if spec.type == "Channel" then
|
||||
mkChannelSource spec
|
||||
else if spec.type == "Tarball" then
|
||||
mkTarballSource spec
|
||||
else
|
||||
builtins.throw "Unknown source type ${spec.type}";
|
||||
in
|
||||
spec // { outPath = mayOverride name path; };
|
||||
|
||||
mkGitSource =
|
||||
{
|
||||
repository,
|
||||
revision,
|
||||
url ? null,
|
||||
submodules,
|
||||
hash,
|
||||
branch ? null,
|
||||
...
|
||||
}:
|
||||
assert repository ? type;
|
||||
# At the moment, either it is a plain git repository (which has an url), or it is a GitHub/GitLab repository
|
||||
# In the latter case, there we will always be an url to the tarball
|
||||
if url != null && !submodules then
|
||||
builtins.fetchTarball {
|
||||
inherit url;
|
||||
sha256 = hash; # FIXME: check nix version & use SRI hashes
|
||||
}
|
||||
else
|
||||
let
|
||||
url =
|
||||
if repository.type == "Git" then
|
||||
repository.url
|
||||
else if repository.type == "GitHub" then
|
||||
"https://github.com/${repository.owner}/${repository.repo}.git"
|
||||
else if repository.type == "GitLab" then
|
||||
"${repository.server}/${repository.repo_path}.git"
|
||||
else
|
||||
throw "Unrecognized repository type ${repository.type}";
|
||||
urlToName =
|
||||
url: rev:
|
||||
let
|
||||
matched = builtins.match "^.*/([^/]*)(\\.git)?$" url;
|
||||
|
||||
short = builtins.substring 0 7 rev;
|
||||
|
||||
appendShort = if (builtins.match "[a-f0-9]*" rev) != null then "-${short}" else "";
|
||||
in
|
||||
"${if matched == null then "source" else builtins.head matched}${appendShort}";
|
||||
name = urlToName url revision;
|
||||
in
|
||||
builtins.fetchGit {
|
||||
rev = revision;
|
||||
inherit name;
|
||||
# hash = hash;
|
||||
inherit url submodules;
|
||||
};
|
||||
|
||||
mkPyPiSource =
|
||||
{ url, hash, ... }:
|
||||
builtins.fetchurl {
|
||||
inherit url;
|
||||
sha256 = hash;
|
||||
};
|
||||
|
||||
mkChannelSource =
|
||||
{ url, hash, ... }:
|
||||
builtins.fetchTarball {
|
||||
inherit url;
|
||||
sha256 = hash;
|
||||
};
|
||||
|
||||
mkTarballSource =
|
||||
{
|
||||
url,
|
||||
locked_url ? url,
|
||||
hash,
|
||||
...
|
||||
}:
|
||||
builtins.fetchTarball {
|
||||
url = locked_url;
|
||||
sha256 = hash;
|
||||
};
|
||||
in
|
||||
if version == 5 then
|
||||
builtins.mapAttrs mkSource data.pins
|
||||
else
|
||||
throw "Unsupported format version ${toString version} in sources.json. Try running `npins upgrade`"
|
||||
37
tos/nix/sources.json
Normal file
37
tos/nix/sources.json
Normal file
@@ -0,0 +1,37 @@
|
||||
{
|
||||
"pins": {
|
||||
"nixos-2505": {
|
||||
"type": "Git",
|
||||
"repository": {
|
||||
"type": "GitHub",
|
||||
"owner": "nixos",
|
||||
"repo": "nixpkgs"
|
||||
},
|
||||
"branch": "nixos-25.05",
|
||||
"submodules": false,
|
||||
"revision": "1c8ba8d3f7634acac4a2094eef7c32ad9106532c",
|
||||
"url": "https://github.com/nixos/nixpkgs/archive/1c8ba8d3f7634acac4a2094eef7c32ad9106532c.tar.gz",
|
||||
"hash": "0kal9wdvh0f9kcgh0ya1dpiir9331ykmkvsdh6a37lq77ln6m3vm"
|
||||
},
|
||||
"nixos-hardware": {
|
||||
"type": "Git",
|
||||
"repository": {
|
||||
"type": "GitHub",
|
||||
"owner": "nixos",
|
||||
"repo": "nixos-hardware"
|
||||
},
|
||||
"branch": "master",
|
||||
"submodules": false,
|
||||
"revision": "da17006633ca9cda369be82893ae36824a2ddf1a",
|
||||
"url": "https://github.com/nixos/nixos-hardware/archive/da17006633ca9cda369be82893ae36824a2ddf1a.tar.gz",
|
||||
"hash": "050i03nvf0nrhighs9g4nfcfp5c3pbh7yg7dsri84wqh1cnjslvg"
|
||||
},
|
||||
"nixpkgs": {
|
||||
"type": "Channel",
|
||||
"name": "nixpkgs-unstable",
|
||||
"url": "https://releases.nixos.org/nixpkgs/nixpkgs-26.05pre902880.5c46f3bd9814/nixexprs.tar.xz",
|
||||
"hash": "0s8yjnxhp28nyfc40a0pjsqqdnx7jv7nakx5h2lcgp5br546100j"
|
||||
}
|
||||
},
|
||||
"version": 5
|
||||
}
|
||||
55
tos/packages/krdp.nix
Normal file
55
tos/packages/krdp.nix
Normal file
@@ -0,0 +1,55 @@
|
||||
{ }:
|
||||
let
|
||||
nixpkgs = fetchTarball "https://github.com/nixos/nixpkgs/tarball/nixos-unstable";
|
||||
pkgs = import nixpkgs {
|
||||
config = { };
|
||||
overlays = [ ];
|
||||
};
|
||||
in
|
||||
pkgs.stdenv.mkDerivation rec {
|
||||
name = "krdp";
|
||||
version = "6.5.3";
|
||||
|
||||
outputs = [
|
||||
"out"
|
||||
];
|
||||
|
||||
src = pkgs.fetchFromGitLab {
|
||||
domain = "invent.kde.org";
|
||||
owner = "plasma";
|
||||
repo = "krdp";
|
||||
tag = "v${version}";
|
||||
hash = "sha256-J4lPMh1ZqwoHOXfmOJOa2M/KUf/z0ZsyVqVrPpuvPzk=";
|
||||
};
|
||||
|
||||
nativeBuildInputs = with pkgs; [
|
||||
cmake
|
||||
pkg-config
|
||||
|
||||
qt6.qtbase
|
||||
qt6.wrapQtAppsNoGuiHook
|
||||
|
||||
kdePackages.extra-cmake-modules
|
||||
kdePackages.kcmutils
|
||||
kdePackages.kconfig
|
||||
kdePackages.kcrash
|
||||
kdePackages.kguiaddons
|
||||
kdePackages.ki18n
|
||||
kdePackages.kpipewire
|
||||
kdePackages.kstatusnotifieritem
|
||||
kdePackages.qtkeychain
|
||||
kdePackages.qtquick3d
|
||||
];
|
||||
|
||||
buildInputs = with pkgs; [
|
||||
freerdp
|
||||
pam
|
||||
kdePackages.qtwayland
|
||||
];
|
||||
|
||||
cmakeFlags = [
|
||||
"-DQT_MAJOR_VERSION=6"
|
||||
];
|
||||
|
||||
env.LANG = "C.UTF-8";
|
||||
}
|
||||
13
tos/shell.nix
Normal file
13
tos/shell.nix
Normal file
@@ -0,0 +1,13 @@
|
||||
{
|
||||
sources ? import ./nix,
|
||||
pkgs ? import sources.nixos-2505 { },
|
||||
}:
|
||||
pkgs.mkShellNoCC {
|
||||
packages = with pkgs; [
|
||||
npins
|
||||
colmena
|
||||
nixfmt-rfc-style
|
||||
];
|
||||
|
||||
NPINS_DIRECTORY = "nix";
|
||||
}
|
||||
Reference in New Issue
Block a user