forked from Yuka/c3h-nixfiles
Compare commits
18 commits
feature/pi
...
main
Author | SHA1 | Date | |
---|---|---|---|
457f4ac1af | |||
|
8d654cb086 | ||
|
70bfccd5f6 | ||
7a0544f69a | |||
51a691efbf | |||
349bc436a4 | |||
106b0cec8a | |||
3e8b76b643 | |||
8ac7010414 | |||
3c80614ee4 | |||
c7dce3b8c0 | |||
035b623b42 | |||
|
90f258df05 | ||
08cb02d7d9 | |||
c576495bb2 | |||
e2efc79686 | |||
dda25e506c | |||
ab24240216 |
16 changed files with 128 additions and 56 deletions
|
@ -1,7 +1,7 @@
|
||||||
{ lib, pkgs, ... }:
|
{ lib, pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
boot.kernelPackages = lib.mkDefault pkgs.linuxPackages_latest;
|
boot.kernelPackages = lib.mkOverride 2000 pkgs.linuxPackages_latest;
|
||||||
boot.kernelParams = [ "quiet" ];
|
boot.kernelParams = [ "quiet" ];
|
||||||
|
|
||||||
services.openssh.enable = true;
|
services.openssh.enable = true;
|
||||||
|
@ -49,5 +49,13 @@
|
||||||
ll = "exa -l";
|
ll = "exa -l";
|
||||||
la = "exa -la";
|
la = "exa -la";
|
||||||
tree = "exa -T";
|
tree = "exa -T";
|
||||||
|
apt = "echo 'please use nix-env -iA nixos.<packagename> instead to install packages.'";
|
||||||
|
};
|
||||||
|
|
||||||
|
users.mutableUsers = false;
|
||||||
|
users.users.c3h = {
|
||||||
|
isNormalUser = true;
|
||||||
|
password = "c3h";
|
||||||
|
extraGroups = [ "wheel" ];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
26
deploy.sh
26
deploy.sh
|
@ -11,12 +11,26 @@ then
|
||||||
fi
|
fi
|
||||||
|
|
||||||
mode="${1:-switch}"
|
mode="${1:-switch}"
|
||||||
host="nuc"
|
host="${2:-nuc}"
|
||||||
target="nuc@nuc.c3h"
|
target="${3:-c3h@$host.c3h}"
|
||||||
#host="${2:-nuc}"
|
|
||||||
#target="${3:-$host.c3h}"
|
|
||||||
|
|
||||||
sources=$(nix-build nix/sources-dir.nix --no-out-link)
|
if ! [ -d "hosts/$host" ]
|
||||||
|
then
|
||||||
|
echo "Host $host does not exist. Choose from:"
|
||||||
|
ls hosts
|
||||||
|
exit
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "deploying $host to $target"
|
||||||
|
sleep 1
|
||||||
|
|
||||||
|
tmp=$(mktemp -d)
|
||||||
|
trap 'rm -rf "$tmp"' EXIT
|
||||||
|
sources="$tmp/sources"
|
||||||
|
cp -r $(nix-build nix/sources-dir.nix --no-out-link) $tmp/sources
|
||||||
|
|
||||||
set -x
|
set -x
|
||||||
nixos-rebuild "$mode" --target-host "$target" --use-remote-sudo -I $sources -I "nixos-config=$PWD/hosts/$host/configuration.nix"
|
system_drv=$(nix-instantiate "<nixpkgs/nixos>" -A config.system.build.toplevel -I $sources -I "nixos-config=$PWD/hosts/$host/configuration.nix")
|
||||||
|
nix-copy-closure --to $target $system_drv
|
||||||
|
system=$(ssh $target "nix-store --realise $system_drv")
|
||||||
|
ssh $target "sudo nix-env -p /nix/var/nix/profiles/system -i $system && sudo /nix/var/nix/profiles/system/bin/switch-to-configuration $mode"
|
||||||
|
|
36
hosts/bemmer/configuration.nix
Normal file
36
hosts/bemmer/configuration.nix
Normal file
|
@ -0,0 +1,36 @@
|
||||||
|
{ modulesPath, lib, pkgs, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
imports = [
|
||||||
|
(modulesPath + "/installer/sd-card/sd-image-aarch64.nix")
|
||||||
|
<nixos-hardware/raspberry-pi/4>
|
||||||
|
../../common
|
||||||
|
|
||||||
|
# services
|
||||||
|
../../shared-services/pulseaudio.nix
|
||||||
|
../../shared-services/nfs-client.nix
|
||||||
|
../../shared-services/mpd.nix
|
||||||
|
../../shared-services/ympd.nix
|
||||||
|
../../shared-services/spotifyd.nix
|
||||||
|
../../shared-services/desktop.nix
|
||||||
|
../../shared-services/vnc.nix
|
||||||
|
../../shared-services/webserver.nix
|
||||||
|
];
|
||||||
|
|
||||||
|
# We import sd-image-aarch64.nix so we can build a config.system.build.sdImage
|
||||||
|
# But it imports some modules we don't want, so disable them
|
||||||
|
disabledModules = [
|
||||||
|
"profiles/base.nix"
|
||||||
|
"profiles/all-hardware.nix"
|
||||||
|
];
|
||||||
|
|
||||||
|
networking.hostName = "bemmer";
|
||||||
|
networking.domain = "c3h";
|
||||||
|
networking.useDHCP = true;
|
||||||
|
|
||||||
|
nixpkgs.system = "aarch64-linux";
|
||||||
|
hardware.raspberry-pi."4".fkms-3d.enable = true;
|
||||||
|
boot.tmpOnTmpfs = true; # building stuff on sd-card is slow
|
||||||
|
|
||||||
|
system.stateVersion = "21.05";
|
||||||
|
}
|
|
@ -3,17 +3,18 @@
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
|
<nixos-hardware/common/cpu/intel>
|
||||||
../../common
|
../../common
|
||||||
|
|
||||||
# services
|
# services
|
||||||
./pulseaudio.nix
|
../../shared-services/pulseaudio.nix
|
||||||
./nfs-server.nix
|
../../shared-services/nfs-client.nix
|
||||||
./mpd.nix
|
../../shared-services/mpd.nix
|
||||||
./ympd.nix
|
../../shared-services/ympd.nix
|
||||||
./spotifyd.nix
|
../../shared-services/spotifyd.nix
|
||||||
./desktop.nix
|
../../shared-services/desktop.nix
|
||||||
./vnc.nix
|
../../shared-services/vnc.nix
|
||||||
./webserver.nix
|
../../shared-services/webserver.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
networking.hostName = "nuc";
|
networking.hostName = "nuc";
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
fsType = "vfat";
|
fsType = "vfat";
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/mnt" =
|
fileSystems."/mnt/hdd" =
|
||||||
{ device = "/dev/disk/by-uuid/ff18a6f9-ee3b-452c-8671-38b74508a74c";
|
{ device = "/dev/disk/by-uuid/ff18a6f9-ee3b-452c-8671-38b74508a74c";
|
||||||
fsType = "btrfs";
|
fsType = "btrfs";
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,17 +0,0 @@
|
||||||
{ ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
services.nfs.server = {
|
|
||||||
enable = true;
|
|
||||||
exports = ''
|
|
||||||
/mnt 10.23.42.0/24(rw,fsid=0,insecure,no_subtree_check)
|
|
||||||
'';
|
|
||||||
|
|
||||||
statdPort = 4000;
|
|
||||||
lockdPort = 4001;
|
|
||||||
mountdPort = 4002;
|
|
||||||
};
|
|
||||||
|
|
||||||
networking.firewall.interfaces.enp3s0.allowedTCPPorts = [ 2049 4000 4001 4002 111 ];
|
|
||||||
networking.firewall.interfaces.enp3s0.allowedUDPPorts = [ 2049 4000 4001 4002 111 ];
|
|
||||||
}
|
|
|
@ -1,12 +0,0 @@
|
||||||
{ ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
services.spotifyd = {
|
|
||||||
enable = true;
|
|
||||||
config = ''
|
|
||||||
zeroconf_port = 18572
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 18572 ];
|
|
||||||
}
|
|
|
@ -11,16 +11,28 @@
|
||||||
"url": "https://github.com/nmattia/niv/archive/e0ca65c81a2d7a4d82a189f1e23a48d59ad42070.tar.gz",
|
"url": "https://github.com/nmattia/niv/archive/e0ca65c81a2d7a4d82a189f1e23a48d59ad42070.tar.gz",
|
||||||
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
||||||
},
|
},
|
||||||
|
"nixos-hardware": {
|
||||||
|
"branch": "master",
|
||||||
|
"description": "A collection of NixOS modules covering hardware quirks.",
|
||||||
|
"homepage": "",
|
||||||
|
"owner": "NixOS",
|
||||||
|
"repo": "nixos-hardware",
|
||||||
|
"rev": "3aabf78bfcae62f5f99474f2ebbbe418f1c6e54f",
|
||||||
|
"sha256": "10g240brgjz7qi20adwajxwqrqb5zxc79ii1mc20fasgqlf2a8sx",
|
||||||
|
"type": "tarball",
|
||||||
|
"url": "https://github.com/NixOS/nixos-hardware/archive/3aabf78bfcae62f5f99474f2ebbbe418f1c6e54f.tar.gz",
|
||||||
|
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
||||||
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"branch": "nixos-21.05",
|
"branch": "nixos-unstable",
|
||||||
"description": "Nix Packages collection",
|
"description": "Nix Packages collection",
|
||||||
"homepage": "",
|
"homepage": "",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "70904d4a9927a4d6e05c72c4aaac4370e05107f3",
|
"rev": "34ad3ffe08adfca17fcb4e4a47bb5f3b113687be",
|
||||||
"sha256": "08vvir0npyrdx85ypiannwzvyryqdw3749bghffhdsq2dgz1cx8z",
|
"sha256": "02li241rz5668nfyp88zfjilxf0mr9yansa93fbl38hjwkhf3ix6",
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/NixOS/nixpkgs/archive/70904d4a9927a4d6e05c72c4aaac4370e05107f3.tar.gz",
|
"url": "https://github.com/NixOS/nixpkgs/archive/34ad3ffe08adfca17fcb4e4a47bb5f3b113687be.tar.gz",
|
||||||
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,13 +1,17 @@
|
||||||
{ pkgs, ... }:
|
{ pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
users.mutableUsers = false;
|
users.users.c3h.packages = with pkgs; [
|
||||||
users.users.c3h = {
|
chromium
|
||||||
isNormalUser = true;
|
firefox
|
||||||
password = "c3h";
|
mpv
|
||||||
extraGroups = [ "wheel" ];
|
youtube-dl
|
||||||
packages = with pkgs; [ chromium firefox mpv youtube-dl ];
|
pavucontrol
|
||||||
};
|
dosbox
|
||||||
|
vlc
|
||||||
|
ffmpeg-full
|
||||||
|
sox
|
||||||
|
];
|
||||||
|
|
||||||
services.xserver = {
|
services.xserver = {
|
||||||
enable = true;
|
enable = true;
|
15
shared-services/nfs-client.nix
Normal file
15
shared-services/nfs-client.nix
Normal file
|
@ -0,0 +1,15 @@
|
||||||
|
{ ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
boot.supportedFilesystems = [ "nfs" ];
|
||||||
|
fileSystems."/mnt/Music" = {
|
||||||
|
device = "10.23.42.126:/music";
|
||||||
|
fsType = "nfs";
|
||||||
|
options = [
|
||||||
|
"nfsvers=4.1"
|
||||||
|
"noauto"
|
||||||
|
"x-systemd.automount"
|
||||||
|
"x-systemd.idle-timeout=600"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
}
|
|
@ -8,4 +8,5 @@
|
||||||
hardware.pulseaudio.package = pkgs.pulseaudio;
|
hardware.pulseaudio.package = pkgs.pulseaudio;
|
||||||
hardware.pulseaudio.tcp.enable = true;
|
hardware.pulseaudio.tcp.enable = true;
|
||||||
hardware.pulseaudio.tcp.anonymousClients.allowedIpRanges = [ "127.0.0.0/8" "::/64" "10.23.42.0/24" ];
|
hardware.pulseaudio.tcp.anonymousClients.allowedIpRanges = [ "127.0.0.0/8" "::/64" "10.23.42.0/24" ];
|
||||||
|
environment.variables.PULSE_SERVER = "127.0.0.1";
|
||||||
}
|
}
|
10
shared-services/spotifyd.nix
Normal file
10
shared-services/spotifyd.nix
Normal file
|
@ -0,0 +1,10 @@
|
||||||
|
{ config, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
services.spotifyd = {
|
||||||
|
enable = true;
|
||||||
|
settings.zeroconf_port = 18572;
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.firewall.allowedTCPPorts = [ config.services.spotifyd.settings.zeroconf_port ];
|
||||||
|
}
|
Loading…
Reference in a new issue