nix-scripts/nixops/rpi.nix

64 lines
1.7 KiB
Nix
Raw Normal View History

2019-10-22 20:09:56 +08:00
{ host, rpi4 }:
2019-10-21 21:26:44 +08:00
2019-10-22 20:09:56 +08:00
{ config, pkgs, ... }:
let
2019-10-22 20:09:56 +08:00
m-labs = import (fetchTarball https://nixbld.m-labs.hk/channel/custom/artiq/full/artiq-full/nixexprs.tar.xz) { inherit pkgs; };
in
{
2019-10-21 21:26:44 +08:00
deployment.targetHost = host;
nixpkgs.system = "aarch64-linux";
2019-10-22 20:09:56 +08:00
boot.loader.grub.enable = false;
2019-10-21 21:26:44 +08:00
2019-10-22 20:09:56 +08:00
boot.loader.generic-extlinux-compatible.enable = !rpi4;
boot.loader.raspberryPi = pkgs.lib.mkIf rpi4 {
enable = true;
version = 4;
};
2020-06-15 18:13:31 +08:00
boot.kernelPackages = pkgs.lib.mkIf rpi4 pkgs.linuxPackages_latest;
2019-10-22 20:09:56 +08:00
fileSystems = if rpi4 then {
"/boot" = {
device = "/dev/disk/by-label/FIRMWARE";
fsType = "vfat";
};
"/" = {
device = "/dev/disk/by-label/NIXOS_SD";
fsType = "ext4";
};
} else {
"/" = {
device = "/dev/disk/by-label/NIXOS_SD";
fsType = "ext4";
};
};
services.openssh.enable = true;
services.openssh.passwordAuthentication = false;
2019-10-21 21:26:44 +08:00
networking.hostName = host;
time.timeZone = "Asia/Hong_Kong";
users.extraGroups.plugdev = { };
2020-06-17 12:24:17 +08:00
users.mutableUsers = false;
users.defaultUserShell = pkgs.fish;
users.extraUsers = (import ./common-users.nix) // {
nix = {
isNormalUser = true;
};
2020-05-07 12:55:08 +08:00
};
2020-06-17 12:24:17 +08:00
security.sudo.wheelNeedsPassword = false;
services.udev.packages = [ m-labs.openocd ];
documentation.enable = false;
environment.systemPackages = with pkgs; [
psmisc wget vim git usbutils lm_sensors file telnet mosh tmux xc3sprog m-labs.openocd screen gdb minicom picocom
];
programs.fish.enable = true;
2020-06-17 12:24:17 +08:00
programs.wireshark.enable = true;
nix.binaryCachePublicKeys = ["nixbld.m-labs.hk-1:5aSRVA5b320xbNvu30tqxVPXpld73bhtOeH6uAjRyHc="];
nix.binaryCaches = ["https://cache.nixos.org" "https://nixbld.m-labs.hk"];
2019-04-08 23:45:30 +08:00
nix.trustedUsers = ["root" "nix"];
}