init
This commit is contained in:
11
.dir-locals.el
Normal file
11
.dir-locals.el
Normal file
@@ -0,0 +1,11 @@
|
||||
((nil
|
||||
. ((eval . (defun dots/install-to-vm (clean-first?)
|
||||
(interactive "P")
|
||||
(let ((dest "/ssh:root@192.168.122.116:/nixos")
|
||||
(root (project-root (project-current))))
|
||||
(progn
|
||||
(when clean-first?
|
||||
(delete-directory dest t))
|
||||
(org-babel-tangle-file (file-name-concat root "README.org"))
|
||||
(copy-file root dest)
|
||||
(message "Finished installing to VM!"))))))))
|
||||
10
.gitignore
vendored
Normal file
10
.gitignore
vendored
Normal file
@@ -0,0 +1,10 @@
|
||||
# A list of files generated from README.org can be gathered and inserted by
|
||||
# evaluating the following snippet:
|
||||
# (mapc (lambda (target)
|
||||
# (insert (concat (file-relative-name target)
|
||||
# "\n")))
|
||||
# (org-babel-tangle-file "README.org"))
|
||||
|
||||
hosts/nixos-testbed/configuration.nix
|
||||
modules/system/impermanence.nix
|
||||
flake.nix
|
||||
0
.projectile
Normal file
0
.projectile
Normal file
292
README.org
Normal file
292
README.org
Normal file
@@ -0,0 +1,292 @@
|
||||
#+PROPERTY: header-args :noweb no-export :results silent :comments both :tangle no
|
||||
#+STARTUP: overview
|
||||
#+title: Madeleine's dots for the literate (=sydnix=)
|
||||
|
||||
* Top-level flake
|
||||
|
||||
#+begin_src nix :tangle flake.nix
|
||||
{
|
||||
description = "Madeleine's dots for the literate (sydnix)";
|
||||
|
||||
inputs = {
|
||||
<<flake-inputs>>
|
||||
|
||||
disko.url = "github:nix-community/disko";
|
||||
|
||||
nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
|
||||
|
||||
home-manager = {
|
||||
url = "github:nix-community/home-manager";
|
||||
inputs.nixpkgs.follows = "nixpkgs";
|
||||
};
|
||||
};
|
||||
|
||||
outputs = { nixpkgs, ... }@inputs: {
|
||||
nixosConfigurations = (
|
||||
<<flake-outputs-nixos>>
|
||||
);
|
||||
};
|
||||
}
|
||||
#+end_src
|
||||
|
||||
* Features
|
||||
|
||||
What are referred to as /features/ here largely correspond to Nix modules, but are
|
||||
not limited to Nix modules.
|
||||
|
||||
** Impermanence
|
||||
|
||||
*** Flake input
|
||||
|
||||
#+begin_src nix :noweb-ref flake-inputs
|
||||
impermanence.url = "github:nix-community/impermanence";
|
||||
#+end_src
|
||||
|
||||
*** Top-level module
|
||||
|
||||
#+begin_src nix :tangle modules/system/impermanence.nix
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with lib;
|
||||
|
||||
let
|
||||
cfg = config.sydnix.impermanence;
|
||||
in {
|
||||
options = {
|
||||
sydnix.impermanence = {
|
||||
<<sydnix-impermanence-options>>
|
||||
};
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable (mkMerge [
|
||||
|
||||
]);
|
||||
}
|
||||
#+end_src
|
||||
|
||||
*** Options
|
||||
|
||||
**** =enable=
|
||||
|
||||
#+begin_src nix :noweb-ref sydnix-impermanence-options
|
||||
enable = mkOption {
|
||||
type = types.bool;
|
||||
default = false;
|
||||
};
|
||||
#+end_src
|
||||
|
||||
* Machines
|
||||
|
||||
For every ~./hosts/NAME/configuration.nix~, define the system under the name ~NAME~.
|
||||
|
||||
#+begin_src nix :noweb-ref flake-outputs-nixos
|
||||
let mkHost = k: v: nixpkgs.lib.nixosSystem {
|
||||
specialArgs = inputs;
|
||||
system = import ./hosts/${k}/system.nix;
|
||||
modules = [
|
||||
./hosts/${k}/configuration.nix
|
||||
# Directory name should always match host name.
|
||||
({ ... }: { networking.hostName = k; })
|
||||
];
|
||||
};
|
||||
in
|
||||
builtins.mapAttrs mkHost (builtins.readDir ./hosts)
|
||||
#+end_src
|
||||
|
||||
** =nixos-testbed=
|
||||
|
||||
#+begin_src nix :tangle hosts/nixos-testbed/configuration.nix
|
||||
{ config, pkgs, lib, disko, ... }:
|
||||
{
|
||||
imports = [
|
||||
./hardware-configuration.nix
|
||||
./disko-config.nix
|
||||
disko.nixosModules.disko
|
||||
];
|
||||
|
||||
# boot.initrd.postDeviceCommands = ''
|
||||
# if zfs list -t snapshot -H -o name \
|
||||
# | grep -qE '^rpool/local/root@previous$'; then
|
||||
# zfs destroy -r rpool/local/root@previous \
|
||||
# && echo ">> >> previous previous snapshot destroyed << <<"
|
||||
# else
|
||||
# echo ">> >> no previous previous snapshot found << <<"
|
||||
# fi
|
||||
|
||||
# zfs snapshot -r rpool/local/root@previous \
|
||||
# && echo ">> >> pre-rollback snapshot taken << <<"
|
||||
|
||||
# zfs rollback -r rpool/local/root@blank \
|
||||
# && echo ">> >> rollback complete << <<"
|
||||
# '';
|
||||
|
||||
# boot.initrd.supportedFilesystems = [ "zfs" ];
|
||||
# boot.supportedFilesystems = [ "zfs" ];
|
||||
|
||||
boot.initrd.enable = true;
|
||||
boot.initrd.systemd.enable = true;
|
||||
|
||||
boot.initrd.systemd.initrdBin = with pkgs; [
|
||||
zfs
|
||||
coreutils
|
||||
gnugrep
|
||||
gawk
|
||||
];
|
||||
|
||||
boot.initrd.systemd.services.erase-darlings = {
|
||||
description = "Rollback filesystem to a blank state on boot";
|
||||
wantedBy = [
|
||||
"initrd.target"
|
||||
];
|
||||
after = [
|
||||
# "zfs-import.service"
|
||||
"zfs-import-rpool.service"
|
||||
];
|
||||
before = [
|
||||
"sysroot.mount"
|
||||
];
|
||||
path = [ pkgs.zfs ];
|
||||
unitConfig.DefaultDependencies = "no";
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = /* bash */ ''
|
||||
zfs rollback -r rpool/local/root@blank \
|
||||
&& echo ">> >> rollback complete << <<"
|
||||
'';
|
||||
};
|
||||
|
||||
systemd.services.erase-home-darlings = {
|
||||
description = "Rollback home to a blank state on boot";
|
||||
wantedBy = [
|
||||
"multi-user.target"
|
||||
];
|
||||
before = [
|
||||
# "basic.target"
|
||||
];
|
||||
after = [
|
||||
"home.mount"
|
||||
];
|
||||
path = [ pkgs.zfs pkgs.coreutils pkgs.gnugrep pkgs.gawk pkgs.util-linux ];
|
||||
# unitConfig.DefaultDependencies = "no";
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
stopIfChanged = false;
|
||||
restartIfChanged = false;
|
||||
script = /* bash */ ''
|
||||
set -xe
|
||||
set -o pipefail
|
||||
|
||||
command -v findmnt || echo "can't find findmnt on PATH"
|
||||
command -v awk || echo "can't find awk on PATH"
|
||||
|
||||
# findmnt -no TARGET rpool/darlings/persist
|
||||
PREVDIR=$(findmnt -no TARGET rpool/darlings/persist)/previous
|
||||
# PREVDIR=/sysroot/persist/previous
|
||||
|
||||
echo "PREVDIR=$PREVDIR"
|
||||
mkdir -p $PREVDIR/home
|
||||
|
||||
[ -e $PREVDIR/home/3 ] && rm -rf $PREVDIR/home/3
|
||||
[ -e $PREVDIR/home/2 ] && mv $PREVDIR/home/2 $PREVDIR/home/3
|
||||
[ -e $PREVDIR/home/1 ] && mv $PREVDIR/home/1 $PREVDIR/home/2
|
||||
|
||||
DIFFFILE="$(mktemp "erase-home-darlings-zfs-diff-XXXXXX")"
|
||||
|
||||
zfs diff -HF rpool/local/home@blank rpool/local/home \
|
||||
> "$DIFFFILE"
|
||||
awk '{if ($2 == "F" || $2 == "/") print $3}' < "$DIFFFILE" \
|
||||
| while read -r line; do
|
||||
DEST="$PREVDIR/home/1/$(dirname "$line")/$(basename "$line")"
|
||||
mkdir -p "$(dirname "$DEST")"
|
||||
mv "$line" "$DEST" && \
|
||||
echo "$line -> $DEST"
|
||||
done \
|
||||
&& echo ">> previous home backed up to $PREVDIR/home/1 <<"
|
||||
|
||||
zfs rollback -r rpool/local/home@blank \
|
||||
&& echo ">> home rolled back <<"
|
||||
'';
|
||||
};
|
||||
|
||||
# boot.loader.grub = {
|
||||
# enable = true;
|
||||
# device = "nodev";
|
||||
# # device = "/dev/vda";
|
||||
# efiSupport = true;
|
||||
# efiInstallAsRemovable = true;
|
||||
# };
|
||||
boot.loader.systemd-boot.enable = true;
|
||||
boot.loader.efi.canTouchEfiVariables = false;
|
||||
|
||||
# networking.hostName = "nixos-testbed";
|
||||
networking.hostId = "238e9b1e"; # head -c 8 /etc/machine-id
|
||||
|
||||
time.timeZone = "America/Denver";
|
||||
|
||||
i18n.defaultLocale = "en_US.UTF-8";
|
||||
console = {
|
||||
font = "Lat2-Terminus16";
|
||||
# keyMap = "us";
|
||||
useXkbConfig = true; # use xkb.options in tty.
|
||||
};
|
||||
|
||||
services.xserver.enable = true;
|
||||
# services.displayManager.sddm.enable = true;
|
||||
# services.desktopManager.plasma6.enable = true;
|
||||
|
||||
services.xserver.xkb.layout = "us";
|
||||
services.xserver.xkb.options = "caps:escape";
|
||||
|
||||
users.users.crumb = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "wheel" ]; # Enable ‘sudo’ for the user.
|
||||
# Change this immediately after installation!
|
||||
initialPassword = "password123";
|
||||
};
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
neovim
|
||||
];
|
||||
|
||||
services.openssh.enable = true;
|
||||
services.openssh.settings.PermitRootLogin = "yes";
|
||||
|
||||
# This option defines the first version of NixOS you have installed on this
|
||||
# particular machine, and is used to maintain compatibility with application
|
||||
# data (e.g. databases) created on older NixOS versions.
|
||||
#
|
||||
# Most users should NEVER change this value after the initial install, for any
|
||||
# reason, even if you've upgraded your system to a new NixOS release.
|
||||
#
|
||||
# This value does NOT affect the Nixpkgs version your packages and OS are
|
||||
# pulled from, so changing it will NOT upgrade your system - see
|
||||
# https://nixos.org/manual/nixos/stable/#sec-upgrading for how to actually do
|
||||
# that.
|
||||
#
|
||||
# This value being lower than the current NixOS release does NOT mean your
|
||||
# system is out of date, out of support, or vulnerable.
|
||||
#
|
||||
# Do NOT change this value unless you have manually inspected all the changes
|
||||
# it would make to your configuration, and migrated your data accordingly.
|
||||
#
|
||||
# For more information, see `man configuration.nix` or
|
||||
# https://nixos.org/manual/nixos/stable/options#opt-system.stateVersion .
|
||||
system.stateVersion = "24.05"; # Did you read the comment?
|
||||
}
|
||||
#+end_src
|
||||
|
||||
** =guix-rebound=
|
||||
|
||||
The primary desktop of a girl done with her plebian phase, and done with Guix's
|
||||
bullshit.
|
||||
|
||||
* References
|
||||
|
||||
- My darling dearest Faye's =wishsys= }:D
|
||||
- [[https://github.com/rasendubi/dotfiles][rasendubi/dotfiles]]
|
||||
- [[https://github.com/hlissner/dotfiles/][hlissner/dotfiles]]
|
||||
- [[https://github.com/Shawn8901/nix-configuration/tree/af71d51998a6772a300f842795b947e27202fa73][Shawn8901/nix-configuration]]
|
||||
64
flake.lock
generated
Normal file
64
flake.lock
generated
Normal file
@@ -0,0 +1,64 @@
|
||||
{
|
||||
"nodes": {
|
||||
"home-manager": {
|
||||
"inputs": {
|
||||
"nixpkgs": [
|
||||
"nixpkgs"
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1731235328,
|
||||
"narHash": "sha256-NjavpgE9/bMe/ABvZpyHIUeYF1mqR5lhaep3wB79ucs=",
|
||||
"owner": "nix-community",
|
||||
"repo": "home-manager",
|
||||
"rev": "60bb110917844d354f3c18e05450606a435d2d10",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "nix-community",
|
||||
"repo": "home-manager",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"impermanence": {
|
||||
"locked": {
|
||||
"lastModified": 1731242966,
|
||||
"narHash": "sha256-B3C3JLbGw0FtLSWCjBxU961gLNv+BOOBC6WvstKLYMw=",
|
||||
"owner": "nix-community",
|
||||
"repo": "impermanence",
|
||||
"rev": "3ed3f0eaae9fcc0a8331e77e9319c8a4abd8a71a",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "nix-community",
|
||||
"repo": "impermanence",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs": {
|
||||
"locked": {
|
||||
"lastModified": 1731245184,
|
||||
"narHash": "sha256-vmLS8+x+gHRv1yzj3n+GTAEObwmhxmkkukB2DwtJRdU=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "aebe249544837ce42588aa4b2e7972222ba12e8f",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "NixOS",
|
||||
"ref": "nixpkgs-unstable",
|
||||
"repo": "nixpkgs",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"root": {
|
||||
"inputs": {
|
||||
"home-manager": "home-manager",
|
||||
"impermanence": "impermanence",
|
||||
"nixpkgs": "nixpkgs"
|
||||
}
|
||||
}
|
||||
},
|
||||
"root": "root",
|
||||
"version": 7
|
||||
}
|
||||
155
hosts/nixos-testbed/disko-config.nix
Normal file
155
hosts/nixos-testbed/disko-config.nix
Normal file
@@ -0,0 +1,155 @@
|
||||
# sudo nix --experimental-features "nix-command flakes" run github:nix-community/disko/latest -- --mode disko /nixos/hosts/nixos-testbed/disko-config.nix
|
||||
# time sudo nixos-install --flake /nixos#nixos-testbed
|
||||
{ lib, ... }:
|
||||
{
|
||||
# imports = [ inputs.disko.nixosModules.disko ];
|
||||
boot.zfs.extraPools = [ "rpool" ];
|
||||
boot.zfs.devNodes = "/dev/disk/by-path";
|
||||
boot.initrd.supportedFilesystems = [ "zfs" ];
|
||||
boot.supportedFilesystems = [ "zfs" ];
|
||||
|
||||
disko.devices = {
|
||||
disk = {
|
||||
broot = {
|
||||
type = "disk";
|
||||
device = "/dev/vda";
|
||||
content = {
|
||||
type = "gpt";
|
||||
partitions = {
|
||||
ESP = {
|
||||
size = "512M";
|
||||
# start = "1MiB";
|
||||
# end = "512M";
|
||||
type = "EF00";
|
||||
content = {
|
||||
type = "filesystem";
|
||||
format = "vfat";
|
||||
mountpoint = "/boot";
|
||||
mountOptions = [ "umask=0077" ];
|
||||
};
|
||||
};
|
||||
root = {
|
||||
# start = "512M";
|
||||
# end = "100%";
|
||||
size = "100%";
|
||||
content = {
|
||||
type = "zfs";
|
||||
pool = "rpool";
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
zpool = {
|
||||
rpool = {
|
||||
type = "zpool";
|
||||
|
||||
# Workaround: cannot import 'rpool': I/O error in disko tests
|
||||
# options.cachefile = "none";
|
||||
|
||||
# rootFsOptions = {
|
||||
# # I don't know.
|
||||
# # https://wiki.archlinux.org/title/Systemd#systemd-tmpfiles-setup.service_fails_to_start_at_boot
|
||||
# acltype = "posixacl";
|
||||
# # atime = "off";
|
||||
# # compression = "zstd";
|
||||
# mountpoint = "none";
|
||||
# # xattr = "sa";
|
||||
# "com.sun:auto-snapshot" = "false";
|
||||
# };
|
||||
|
||||
# mountpoint = "/";
|
||||
|
||||
datasets =
|
||||
let dataset = options:
|
||||
let default = {
|
||||
type = "zfs_fs";
|
||||
mountOptions = [ "noauto" ];
|
||||
options = {
|
||||
"com.sun:auto-snapshot" = "false";
|
||||
};
|
||||
};
|
||||
in lib.recursiveUpdate default options;
|
||||
in
|
||||
{
|
||||
"local" = dataset {};
|
||||
"darlings" = dataset {};
|
||||
"local/root" = dataset {
|
||||
mountpoint = "/";
|
||||
postCreateHook = ''
|
||||
zfs list -t snapshot -H -o name \
|
||||
| grep -E '^rpool/local/root@blank$' \
|
||||
|| zfs snapshot rpool/local/root@blank
|
||||
'';
|
||||
};
|
||||
"local/nix" = dataset { mountpoint = "/nix"; };
|
||||
"local/home" = dataset {
|
||||
mountpoint = "/home";
|
||||
postCreateHook = ''
|
||||
zfs list -t snapshot -H -o name \
|
||||
| grep -E '^rpool/local/home@blank$' \
|
||||
|| zfs snapshot rpool/local/home@blank
|
||||
'';
|
||||
};
|
||||
"darlings/persist" = dataset { mountpoint = "/persist"; };
|
||||
"darlings/home" = dataset {
|
||||
mountpoint = "/persist/home";
|
||||
};
|
||||
"reserved" = dataset {
|
||||
mountpoint = null;
|
||||
options = {
|
||||
canmount = "off";
|
||||
mountpoint = "none";
|
||||
reservation = "5GiB";
|
||||
};
|
||||
};
|
||||
# "local" = {
|
||||
# type = "zfs_fs";
|
||||
# options.mountpoint = "none";
|
||||
# };
|
||||
# "safe" = {
|
||||
# type = "zfs_fs";
|
||||
# options.mountpoint = "none";
|
||||
# };
|
||||
# "local/root" = {
|
||||
# type = "zfs_fs";
|
||||
# options.mountpoint = "legacy";
|
||||
# mountpoint = "/";
|
||||
# options."com.sun:auto-snapshot" = "false";
|
||||
# postCreateHook = ''
|
||||
# zfs list -t snapshot -H -o name \
|
||||
# | grep -E '^rpool/local/root@blank$' \
|
||||
# || zfs snapshot rpool/local/root@blank
|
||||
# '';
|
||||
# };
|
||||
# "local/home" = {
|
||||
|
||||
# };
|
||||
# "local/nix" = {
|
||||
# type = "zfs_fs";
|
||||
# options.mountpoint = "legacy";
|
||||
# mountpoint = "/nix";
|
||||
# options."com.sun:auto-snapshot" = "false";
|
||||
# };
|
||||
# "safe/persist" = {
|
||||
# type = "zfs_fs";
|
||||
# options.mountpoint = "legacy";
|
||||
# mountpoint = "/persist";
|
||||
# options."com.sun:auto-snapshot" = "false";
|
||||
# };
|
||||
# # zfs uses copy on write and requires some free space to delete files when the disk is completely filled
|
||||
# "reserved" = lib.recursiveUpdate (dataset "reserved") {
|
||||
# mountpoint = null;
|
||||
# options = {
|
||||
# canmount = "off";
|
||||
# mountpoint = "none";
|
||||
# reservation = "5GiB";
|
||||
# };
|
||||
# type = "zfs_fs";
|
||||
# };
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
24
hosts/nixos-testbed/hardware-configuration.nix
Normal file
24
hosts/nixos-testbed/hardware-configuration.nix
Normal file
@@ -0,0 +1,24 @@
|
||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||
# and may be overwritten by future invocations. Please make changes
|
||||
# to /etc/nixos/configuration.nix instead.
|
||||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/profiles/qemu-guest.nix")
|
||||
];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "ahci" "xhci_pci" "virtio_pci" "sr_mod" "virtio_blk" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-intel" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||
# still possible to use this option, but it's recommended to use it in conjunction
|
||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||
networking.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.enp1s0.useDHCP = lib.mkDefault true;
|
||||
|
||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||
}
|
||||
1
hosts/nixos-testbed/system.nix
Normal file
1
hosts/nixos-testbed/system.nix
Normal file
@@ -0,0 +1 @@
|
||||
"x86_64-linux"
|
||||
Reference in New Issue
Block a user