Go to file
Robert Gerus d9c5b5a31a
CI / nixos-x86_64-linux (push) Successful in -18s Details
CI / nixos-aarch64-linux (push) Successful in 1m29s Details
crimes
2023-10-23 15:39:48 +02:00
.forgejo/workflows ci: build sd images for aarch64 machines 2023-10-23 10:58:05 +02:00
microvms .: microvm experiments + zorigami 2023-10-14 23:24:33 +02:00
modules crimes 2023-10-23 15:39:48 +02:00
nixos crimes 2023-10-23 15:39:48 +02:00
overlays .: microvm experiments + zorigami 2023-10-14 23:24:33 +02:00
pkgs .: microvm experiments + zorigami 2023-10-14 23:24:33 +02:00
secrets ci-runners: secret available at image build time 2023-10-23 14:59:46 +02:00
.ci.sdImages.sh crimes 2023-10-23 15:39:48 +02:00
.ci.sh crimes 2023-10-23 15:39:48 +02:00
.gitignore scaffolding 2023-09-17 21:36:58 +02:00
README.md readme: typo + known warnings 2023-10-20 22:49:52 +02:00
ci-secrets.nix crimes 2023-10-23 15:39:48 +02:00
flake.lock akamanto: _rpi3 kernel supposedly not needed anymore 2023-10-23 10:29:33 +02:00
flake.nix refactor: clean up outputs arguments list 2023-10-20 20:08:26 +02:00
secrets.nix ci-runners: secret available at image build time 2023-10-23 14:59:46 +02:00

README.md

My personal NixOS infrastructure configurations

This repository contains configurations for Mostâ„¢ of my NixOS machines.

All of the host configurations are deployable using deploy-rs, colmena, and plain old nixos-rebuild. See deploy.nodes and colmena crimes in flake outputs for details how. Initial host deploment, sadly, needs to happen manually (for now at least). Secrets are managed using agenix, instead of any deployment-tool-native secret manager.

General usage

Adding new module

$ echo -e "{ config, lib, pkgs, inputs, ... }:\n\n{\n}" > modules/new-module.nix

Adding new host

$ mkdir nixos/newhost
$ echo -e "{ config, lib, pkgs, inputs, ... }:\n\n{\n}" > nixos/newhost/default.nix
$ echo -n aarch64-linux > nixos/newhost/system

Please remember about the -n flag. Otherwise you'll see Nix throw a funny error at you, like:

error: Unknown kernel: linux

Exploring generated configurations

Colmena has a nice feature here called colmena repl. Go out there and explore nodes and its attributes.

Before you commit

To keep things clean, uniform, and working at least on some basic level, remember to:

$ nix flake check --no-build
$ nix fmt

Small bit of warning: nix fmt, with formatters as configured (deadnix specifically) will remove unused variables and such. Might be annoying when things are work-in-progress.

Deploying new configurations

There are multiple options here. You can use nixos-rebuild either locally:

$ sudo nixos-rebuild switch --flake .#microlith

remotely:

$ nixos-rebuild switch --target-host root@zorigami --build-host root@zorigami --flake .#zorigami

remotely using deploy-rs:

$ deploy .#scylla

or using colmena:

$ colmena apply --on khas

All of these should generally work, though I prefer to use deploy-rs on my router (because of magic rollback) when deploying bigger changes, and colmena in most cases, because it's faster. And if the changes you're about to deploy had a chance to be built by "CI", most stuff shouldn't need to be built locally.

Warnings about colmena and deploy being unknown flake outputs are known, and will stay here at least until schemas get implemented for these.

General notes

Feel free to use this as a basis for your own configuration flakes, but while I keep things here working for me, the general state might not reflect best practices. Use caution, and if you feel like you don't really understand something (and there are some code crimes commited here), don't feel obliged to use it just because it's already here.