Compare commits
6 Commits
89f16664c5
...
a8b3f865b7
Author | SHA1 | Date | |
---|---|---|---|
a8b3f865b7 | |||
039cd98dd6 | |||
e95897a160 | |||
28132b6783 | |||
0c955ab2cc | |||
6f365c4dab |
18
flake.lock
generated
18
flake.lock
generated
@ -23,11 +23,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1641687203,
|
"lastModified": 1642190797,
|
||||||
"narHash": "sha256-W6Xrb/l1x+E+WMVLw4q5HUnNjt3x4WQFSYJtjJtopbU=",
|
"narHash": "sha256-cxeEEAtfIACnm8sV1oz0xlNp9IVk10Fxcc09ggoEZuo=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "00acdb2aa817048fbe1f91ece18fe7de09762531",
|
"rev": "3ddd960a3b575bf3230d0e59f42614b71f9e0db9",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -39,11 +39,11 @@
|
|||||||
},
|
},
|
||||||
"nur": {
|
"nur": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1629143403,
|
"lastModified": 1642392502,
|
||||||
"narHash": "sha256-Z57DBF3MUTqTnJyYjqEN+DNZLrVukEJJotcxYPHNR/M=",
|
"narHash": "sha256-ZRgwagDhwT5eQgTSqhupXz3ugQmFat0836d5Hh8ZK4Q=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "NUR",
|
"repo": "NUR",
|
||||||
"rev": "79a06a9145c61960dd4b5c2eda67e26276976db1",
|
"rev": "8993a1cfc2d6ed69725788a2ccafbe8cde0510e3",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -62,11 +62,11 @@
|
|||||||
},
|
},
|
||||||
"unstable": {
|
"unstable": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1629048390,
|
"lastModified": 1642104392,
|
||||||
"narHash": "sha256-do7HuXFSKyj4ulMlRvGigNZCqOaGD9i0M3OLkFQgEAc=",
|
"narHash": "sha256-m71b7MgMh9FDv4MnI5sg9MiBVW6DhE1zq+d/KlLWSC8=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "e41ba38114055832e5ba4a851e9c00149eef3e4a",
|
"rev": "5aaed40d22f0d9376330b6fa413223435ad6fee5",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
13
flake.nix
13
flake.nix
@ -38,6 +38,19 @@
|
|||||||
];
|
];
|
||||||
specialArgs = { inherit inputs; };
|
specialArgs = { inherit inputs; };
|
||||||
};
|
};
|
||||||
|
|
||||||
|
work = inputs.nixpkgs.lib.nixosSystem {
|
||||||
|
system = "x86_64-linux";
|
||||||
|
modules = [
|
||||||
|
./modules/containers.nix
|
||||||
|
./modules/nix.nix
|
||||||
|
./modules/vscode-server.nix
|
||||||
|
|
||||||
|
./machines/work/configuration.nix
|
||||||
|
];
|
||||||
|
specialArgs = { inherit inputs; };
|
||||||
|
};
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
homeConfigurations = {
|
homeConfigurations = {
|
||||||
|
59
machines/work/configuration.nix
Normal file
59
machines/work/configuration.nix
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{ lib, pkgs, config, modulesPath, ... }:
|
||||||
|
|
||||||
|
with lib;
|
||||||
|
let
|
||||||
|
defaultUser = "michael";
|
||||||
|
syschdemd = import ./syschdemd.nix { inherit lib pkgs config defaultUser; };
|
||||||
|
in
|
||||||
|
{
|
||||||
|
imports = [
|
||||||
|
"${modulesPath}/profiles/minimal.nix"
|
||||||
|
];
|
||||||
|
|
||||||
|
# WSL is closer to a container than anything else
|
||||||
|
boot.isContainer = true;
|
||||||
|
|
||||||
|
environment.etc.hosts.enable = false;
|
||||||
|
environment.etc."resolv.conf".enable = false;
|
||||||
|
|
||||||
|
programs.adb.enable = true;
|
||||||
|
networking.dhcpcd.enable = false;
|
||||||
|
|
||||||
|
# Proxychains
|
||||||
|
programs.proxychains = {
|
||||||
|
enable = true;
|
||||||
|
proxies.main = {
|
||||||
|
enable = true;
|
||||||
|
type = "http";
|
||||||
|
host = "172.21.32.1";
|
||||||
|
port = 1080;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
users.users.${defaultUser} = {
|
||||||
|
isNormalUser = true;
|
||||||
|
extraGroups = [ "wheel" "docker" ];
|
||||||
|
shell = pkgs.zsh;
|
||||||
|
};
|
||||||
|
|
||||||
|
users.users.root = {
|
||||||
|
shell = "${syschdemd}/bin/syschdemd";
|
||||||
|
# Otherwise WSL fails to login as root with "initgroups failed 5"
|
||||||
|
extraGroups = [ "root" ];
|
||||||
|
};
|
||||||
|
|
||||||
|
security.sudo.wheelNeedsPassword = false;
|
||||||
|
|
||||||
|
# Disable systemd units that don't make sense on WSL
|
||||||
|
systemd.services."serial-getty@ttyS0".enable = false;
|
||||||
|
systemd.services."serial-getty@hvc0".enable = false;
|
||||||
|
systemd.services."getty@tty1".enable = false;
|
||||||
|
systemd.services."autovt@".enable = false;
|
||||||
|
|
||||||
|
systemd.services.firewall.enable = false;
|
||||||
|
systemd.services.systemd-resolved.enable = false;
|
||||||
|
systemd.services.systemd-udevd.enable = false;
|
||||||
|
|
||||||
|
# Don't allow emergency mode, because we don't have a console.
|
||||||
|
systemd.enableEmergencyMode = false;
|
||||||
|
}
|
15
machines/work/syschdemd.nix
Normal file
15
machines/work/syschdemd.nix
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{ lib, pkgs, config, defaultUser, ... }:
|
||||||
|
|
||||||
|
pkgs.substituteAll {
|
||||||
|
name = "syschdemd";
|
||||||
|
src = ./syschdemd.sh;
|
||||||
|
dir = "bin";
|
||||||
|
isExecutable = true;
|
||||||
|
|
||||||
|
buildInputs = with pkgs; [ daemonize ];
|
||||||
|
|
||||||
|
inherit (pkgs) daemonize;
|
||||||
|
inherit defaultUser;
|
||||||
|
inherit (config.security) wrapperDir;
|
||||||
|
fsPackagesPath = lib.makeBinPath config.system.fsPackages;
|
||||||
|
}
|
26
machines/work/syschdemd.sh
Normal file
26
machines/work/syschdemd.sh
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
#! @shell@
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
sw="/nix/var/nix/profiles/system/sw/bin"
|
||||||
|
systemPath=`${sw}/readlink -f /nix/var/nix/profiles/system`
|
||||||
|
|
||||||
|
# Needs root to work
|
||||||
|
if [[ $EUID -ne 0 ]]; then
|
||||||
|
echo "[ERROR] Requires root! :( Make sure the WSL default user is set to root"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ ! -e "/run/current-system" ]; then
|
||||||
|
/nix/var/nix/profiles/system/activate
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ ! -e "/run/systemd.pid" ]; then
|
||||||
|
PATH=/run/current-system/systemd/lib/systemd:@fsPackagesPath@ \
|
||||||
|
LOCALE_ARCHIVE=/run/current-system/sw/lib/locale/locale-archive \
|
||||||
|
@daemonize@/bin/daemonize /run/current-system/sw/bin/unshare -fp --mount-proc systemd
|
||||||
|
/run/current-system/sw/bin/pgrep -xf systemd > /run/systemd.pid
|
||||||
|
fi
|
||||||
|
|
||||||
|
userShell=$($sw/getent passwd @defaultUser@ | $sw/cut -d: -f7)
|
||||||
|
exec $sw/nsenter -t $(< /run/systemd.pid) -p -m --wd="$PWD" -- @wrapperDir@/su -s $userShell @defaultUser@ "$@"
|
@ -7,6 +7,7 @@
|
|||||||
./flatpak.nix
|
./flatpak.nix
|
||||||
./fonts.nix
|
./fonts.nix
|
||||||
./gnome.nix
|
./gnome.nix
|
||||||
|
./nix.nix
|
||||||
./sound.nix
|
./sound.nix
|
||||||
];
|
];
|
||||||
}
|
}
|
8
modules/nix.nix
Normal file
8
modules/nix.nix
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
nix.extraOptions = ''
|
||||||
|
experimental-features = flakes nix-command
|
||||||
|
'';
|
||||||
|
# this is required until nix 2.4 is released
|
||||||
|
nix.package = pkgs.nixUnstable;
|
||||||
|
}
|
7
modules/vscode-server.nix
Normal file
7
modules/vscode-server.nix
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
{
|
||||||
|
imports = [
|
||||||
|
(fetchTarball "https://github.com/msteen/nixos-vscode-server/tarball/master")
|
||||||
|
];
|
||||||
|
|
||||||
|
services.vscode-server.enable = true;
|
||||||
|
}
|
@ -1,6 +1,7 @@
|
|||||||
{ config, pkgs, libs, ... }:
|
{ config, pkgs, libs, ... }:
|
||||||
{
|
{
|
||||||
home.packages = with pkgs; [
|
home.packages = with pkgs; [
|
||||||
|
nodejs
|
||||||
nodePackages.yarn
|
nodePackages.yarn
|
||||||
php
|
php
|
||||||
];
|
];
|
||||||
|
Loading…
x
Reference in New Issue
Block a user