Compare commits

..

7 commits

Author SHA1 Message Date
23fdba786d
upgrade memory to resolve oom 2025-07-01 17:48:47 +02:00
f6c4485ade
[wip] handling env file (still fails) 2025-06-22 12:02:26 +02:00
f79f332690
use templating fork 2025-06-21 16:03:56 +02:00
0672f2aac6
add tests, fix some things 2025-06-21 08:40:40 +02:00
07f760c9b7
unrelated improvements 2025-06-20 13:27:45 +02:00
8d5d18cf62
move from dev to operator 2025-06-19 18:12:37 +02:00
277527f293
WIP: add attic cache, see #92
flesh out attic

TODO keys nginx-port testing

fix key

fix key
2025-06-19 18:12:37 +02:00
70 changed files with 81 additions and 227 deletions

View file

@ -2,22 +2,20 @@ name: update-dependencies
on: on:
workflow_dispatch: # allows manual triggering workflow_dispatch: # allows manual triggering
# FIXME: re-enable when manual run works schedule:
# schedule: - cron: '0 0 1 * *' # monthly
# - cron: '0 0 1 * *' # monthly
jobs: jobs:
lockfile: lockfile:
runs-on: native runs-on: ubuntu-latest
steps: steps:
- name: Checkout repository - name: Checkout repository
uses: actions/checkout@v4 uses: actions/checkout@v4
- name: Update pins - name: Install Nix
run: nix-shell --run "npins update" uses: cachix/install-nix-action@v31
- name: Create PR - name: Install npins
uses: peter-evans/create-pull-request@v7 run: nix profile install 'nixpkgs#npins'
- name: Update npins sources
uses: getchoo/update-npins@v0
with: with:
token: "${{ secrets.DEPLOY_KEY }}" token: "${{ secrets.DEPLOY_KEY }}"
branch: npins-update
commit-message: "npins: update sources"
title: "npins: update sources"

View file

@ -10,8 +10,6 @@ let
gitignore gitignore
; ;
inherit (pkgs) lib; inherit (pkgs) lib;
inherit (import sources.flake-inputs) import-flake;
inherit ((import-flake { src = ./.; }).inputs) nixops4;
pre-commit-check = pre-commit-check =
(import "${git-hooks}/nix" { (import "${git-hooks}/nix" {
inherit nixpkgs system; inherit nixpkgs system;
@ -57,15 +55,8 @@ in
}; };
in in
[ [
pkgs.npins
pkgs.nil
(pkgs.callPackage "${sources.agenix}/pkgs/agenix.nix" { })
pkgs.openssh
pkgs.httpie
pkgs.jq
pkgs.nix-unit pkgs.nix-unit
test-loop test-loop
nixops4.packages.${system}.default
]; ];
}; };

View file

@ -17,8 +17,6 @@ let
in in
{ {
_class = "flake";
perSystem = perSystem =
{ pkgs, ... }: { pkgs, ... }:
{ {

View file

@ -1,8 +1,6 @@
{ inputs, ... }: { inputs, ... }:
{ {
_class = "nixosTest";
name = "deployment-basic"; name = "deployment-basic";
nodes.deployer = nodes.deployer =

View file

@ -21,8 +21,6 @@ let
in in
{ {
_class = "flake";
perSystem = perSystem =
{ pkgs, ... }: { pkgs, ... }:
{ {

View file

@ -7,8 +7,6 @@ let
in in
{ {
_class = "nixosTest";
name = "deployment-cli"; name = "deployment-cli";
nodes.deployer = nodes.deployer =

View file

@ -18,8 +18,6 @@ let
in in
{ {
_class = "nixos";
imports = [ ./sharedOptions.nix ]; imports = [ ./sharedOptions.nix ];
options.system.extraDependenciesFromModule = mkOption { options.system.extraDependenciesFromModule = mkOption {

View file

@ -42,8 +42,6 @@ let
in in
{ {
_class = "nixosTest";
imports = [ imports = [
./sharedOptions.nix ./sharedOptions.nix
]; ];

View file

@ -11,7 +11,6 @@ let
inherit (lib) mkOption types; inherit (lib) mkOption types;
in in
# `config` not set and imported from multiple places: no fixed module class
{ {
options = { options = {
targetMachines = mkOption { targetMachines = mkOption {

View file

@ -12,8 +12,6 @@ let
in in
{ {
_class = "nixos";
imports = [ imports = [
(modulesPath + "/profiles/qemu-guest.nix") (modulesPath + "/profiles/qemu-guest.nix")
(modulesPath + "/../lib/testing/nixos-test-base.nix") (modulesPath + "/../lib/testing/nixos-test-base.nix")

View file

@ -12,8 +12,6 @@ let
in in
{ {
_class = "nixops4Resource";
imports = [ ./sharedOptions.nix ]; imports = [ ./sharedOptions.nix ];
options = { options = {

View file

@ -24,8 +24,6 @@ let
in in
{ {
_class = "flake";
perSystem = perSystem =
{ pkgs, ... }: { pkgs, ... }:
{ {

View file

@ -123,8 +123,6 @@ let
in in
{ {
_class = "nixosTest";
name = "deployment-panel"; name = "deployment-panel";
## The panel's module sets `nixpkgs.overlays` which clashes with ## The panel's module sets `nixpkgs.overlays` which clashes with
@ -157,6 +155,7 @@ in
SECRET_KEY = dummyFile; SECRET_KEY = dummyFile;
}; };
port = panelPort; port = panelPort;
nixops4Package = inputs.nixops4.packages.${pkgs.system}.default;
deployment = { deployment = {
flake = "/run/fedipanel/flake"; flake = "/run/fedipanel/flake";

View file

@ -11,8 +11,6 @@ let
}).config; }).config;
in in
{ {
_class = "nix-unit";
test-eval = { test-eval = {
expr = expr =
let let

View file

@ -7,8 +7,6 @@ let
in in
with types; with types;
{ {
_class = "nixops4Deployment";
options = { options = {
runtime-environments = mkOption { runtime-environments = mkOption {
description = "Collection of runtime environments into which applications can be deployed"; description = "Collection of runtime environments into which applications can be deployed";

View file

@ -67,8 +67,6 @@ let
cfg = config.deployment; cfg = config.deployment;
in in
{ {
_class = "nixops4Deployment";
options = { options = {
deployment = lib.mkOption { deployment = lib.mkOption {
description = '' description = ''

View file

@ -1,6 +1,4 @@
{ {
_class = "flake";
imports = [ imports = [
./check/basic/flake-part.nix ./check/basic/flake-part.nix
./check/cli/flake-part.nix ./check/cli/flake-part.nix

View file

@ -17,8 +17,6 @@ let
inherit (lib) types mkOption; inherit (lib) types mkOption;
in in
{ {
_class = "nixops4Deployment";
options = { options = {
enable = lib.mkEnableOption "Fediversity configuration"; enable = lib.mkEnableOption "Fediversity configuration";
domain = mkOption { domain = mkOption {

View file

@ -11,7 +11,7 @@
let let
sources = import ./npins; sources = import ./npins;
inherit (import sources.flake-inputs) import-flake; inherit (import sources.flake-inputs) import-flake;
inherit (sources) git-hooks; inherit (sources) git-hooks agenix;
# XXX(@fricklerhandwerk): this atrocity is required to splice in a foreign Nixpkgs via flake-parts # XXX(@fricklerhandwerk): this atrocity is required to splice in a foreign Nixpkgs via flake-parts
# XXX - this is just importing a flake # XXX - this is just importing a flake
nixpkgs = import-flake { src = sources.nixpkgs; }; nixpkgs = import-flake { src = sources.nixpkgs; };
@ -43,7 +43,7 @@
]; ];
imports = [ imports = [
"${git-hooks}/flake-module.nix" (import "${git-hooks}/flake-module.nix")
inputs.nixops4.modules.flake.default inputs.nixops4.modules.flake.default
./deployment/flake-part.nix ./deployment/flake-part.nix
@ -54,6 +54,7 @@
{ {
pkgs, pkgs,
lib, lib,
inputs',
... ...
}: }:
{ {
@ -72,6 +73,21 @@
trim-trailing-whitespace.enable = true; trim-trailing-whitespace.enable = true;
shellcheck.enable = true; shellcheck.enable = true;
}; };
devShells.default = pkgs.mkShell {
packages = [
pkgs.npins
pkgs.nil
(pkgs.callPackage "${agenix}/pkgs/agenix.nix" { })
pkgs.openssh
pkgs.httpie
pkgs.jq
# exposing this env var as a hack to pass info in from form
(inputs'.nixops4.packages.default.overrideAttrs {
impureEnvVars = [ "DEPLOYMENT" ];
})
];
};
}; };
} }
); );

View file

@ -5,8 +5,6 @@ let
in in
{ {
_class = "nixos";
imports = [ imports = [
./hardware.nix ./hardware.nix
./networking.nix ./networking.nix

View file

@ -1,8 +1,6 @@
{ modulesPath, ... }: { modulesPath, ... }:
{ {
_class = "nixos";
imports = [ (modulesPath + "/profiles/qemu-guest.nix") ]; imports = [ (modulesPath + "/profiles/qemu-guest.nix") ];
boot = { boot = {

View file

@ -1,64 +1,63 @@
{ config, lib, ... }: { config, lib, ... }:
let let
inherit (lib) mkDefault mkIf mkMerge; inherit (lib) mkDefault;
in in
{ {
_class = "nixos";
config = { config = {
services.openssh = { services.openssh = {
enable = true; enable = true;
settings.PasswordAuthentication = false; settings.PasswordAuthentication = false;
}; };
networking = mkMerge [ networking = {
{ hostName = config.fediversityVm.name;
hostName = config.fediversityVm.name; domain = config.fediversityVm.domain;
domain = config.fediversityVm.domain;
## REVIEW: Do we actually need that, considering that we have static IPs? ## REVIEW: Do we actually need that, considering that we have static IPs?
useDHCP = mkDefault true; useDHCP = mkDefault true;
## Disable the default firewall and use nftables instead, with a custom interfaces = {
## Procolix-made ruleset. eth0 = {
firewall.enable = false; ipv4 = {
nftables = { addresses = [
enable = true; {
rulesetFile = ./nftables-ruleset.nft; inherit (config.fediversityVm.ipv4) address prefixLength;
}
];
};
ipv6 = {
addresses = [
{
inherit (config.fediversityVm.ipv6) address prefixLength;
}
];
};
}; };
} };
## IPv4 defaultGateway = {
(mkIf config.fediversityVm.ipv4.enable { address = config.fediversityVm.ipv4.gateway;
interfaces.${config.fediversityVm.ipv4.interface}.ipv4.addresses = [ interface = "eth0";
{ inherit (config.fediversityVm.ipv4) address prefixLength; } };
]; defaultGateway6 = {
defaultGateway = { address = config.fediversityVm.ipv6.gateway;
address = config.fediversityVm.ipv4.gateway; interface = "eth0";
interface = config.fediversityVm.ipv4.interface; };
};
nameservers = [
"95.215.185.6"
"95.215.185.7"
];
})
## IPv6 nameservers = [
(mkIf config.fediversityVm.ipv6.enable { "95.215.185.6"
interfaces.${config.fediversityVm.ipv6.interface}.ipv6.addresses = [ "95.215.185.7"
{ inherit (config.fediversityVm.ipv6) address prefixLength; } "2a00:51c0::5fd7:b906"
]; "2a00:51c0::5fd7:b907"
defaultGateway6 = { ];
address = config.fediversityVm.ipv6.gateway;
interface = config.fediversityVm.ipv6.interface; firewall.enable = false;
}; nftables = {
nameservers = [ enable = true;
"2a00:51c0::5fd7:b906" rulesetFile = ./nftables-ruleset.nft;
"2a00:51c0::5fd7:b907" };
]; };
})
];
}; };
} }

View file

@ -1,6 +1,4 @@
{ {
_class = "nixos";
users.users = { users.users = {
procolix = { procolix = {
isNormalUser = true; isNormalUser = true;

View file

@ -6,8 +6,6 @@ let
in in
{ {
# `config` not set and imported from multiple places: no fixed module class
options.fediversityVm = { options.fediversityVm = {
########################################################################## ##########################################################################
@ -91,17 +89,6 @@ in
}; };
ipv4 = { ipv4 = {
enable = mkOption {
default = true;
};
interface = mkOption {
description = ''
The interface that carries the machine's IPv4 network.
'';
default = "eth0";
};
address = mkOption { address = mkOption {
description = '' description = ''
The IP address of the machine, version 4. It will be injected as a The IP address of the machine, version 4. It will be injected as a
@ -127,17 +114,6 @@ in
}; };
ipv6 = { ipv6 = {
enable = mkOption {
default = true;
};
interface = mkOption {
description = ''
The interface that carries the machine's IPv6 network.
'';
default = "eth0";
};
address = mkOption { address = mkOption {
description = '' description = ''
The IP address of the machine, version 6. It will be injected as a The IP address of the machine, version 6. It will be injected as a

View file

@ -18,8 +18,6 @@ let
in in
{ {
_class = "nixops4Resource";
imports = [ ./options.nix ]; imports = [ ./options.nix ];
fediversityVm.hostPublicKey = mkDefault keys.systems.${config.fediversityVm.name}; fediversityVm.hostPublicKey = mkDefault keys.systems.${config.fediversityVm.name};

View file

@ -159,8 +159,6 @@ let
in in
{ {
_class = "flake";
## - Each normal or test machine gets a NixOS configuration. ## - Each normal or test machine gets a NixOS configuration.
## - Each normal or test machine gets a VM options entry. ## - Each normal or test machine gets a VM options entry.
## - Each normal machine gets a deployment. ## - Each normal machine gets a deployment.

View file

@ -1,6 +1,4 @@
{ {
_class = "nixops4Resource";
fediversityVm = { fediversityVm = {
vmId = 200; vmId = 200;
proxmox = "fediversity"; proxmox = "fediversity";

View file

@ -1,6 +1,4 @@
{ {
_class = "nixops4Resource";
fediversityVm = { fediversityVm = {
vmId = 201; vmId = 201;
proxmox = "fediversity"; proxmox = "fediversity";

View file

@ -6,8 +6,6 @@ let
name = "panel"; name = "panel";
in in
{ {
_class = "nixos";
imports = [ imports = [
(import ../../../panel { }).module (import ../../../panel { }).module
]; ];

View file

@ -1,6 +1,4 @@
{ {
_class = "nixops4Resource";
fediversityVm = { fediversityVm = {
vmId = 2116; vmId = 2116;
proxmox = "procolix"; proxmox = "procolix";

View file

@ -5,8 +5,6 @@ let
in in
{ {
_class = "nixos";
services.forgejo = { services.forgejo = {
enable = true; enable = true;

View file

@ -1,6 +1,4 @@
{ {
_class = "nixops4Resource";
fediversityVm = { fediversityVm = {
vmId = 2187; vmId = 2187;
proxmox = "procolix"; proxmox = "procolix";

View file

@ -1,8 +1,6 @@
{ config, ... }: { config, ... }:
{ {
_class = "nixos";
services.phpfpm.pools.mediawiki.phpOptions = '' services.phpfpm.pools.mediawiki.phpOptions = ''
upload_max_filesize = 1024M; upload_max_filesize = 1024M;
post_max_size = 1024M; post_max_size = 1024M;

View file

@ -1,6 +1,4 @@
{ {
_class = "nixops4Resource";
fediversityVm = { fediversityVm = {
vmId = 7001; vmId = 7001;
proxmox = "fediversity"; proxmox = "fediversity";

View file

@ -1,6 +1,4 @@
{ {
_class = "nixops4Resource";
fediversityVm = { fediversityVm = {
vmId = 7002; vmId = 7002;
proxmox = "fediversity"; proxmox = "fediversity";

View file

@ -1,6 +1,4 @@
{ {
_class = "nixops4Resource";
fediversityVm = { fediversityVm = {
vmId = 7003; vmId = 7003;
proxmox = "fediversity"; proxmox = "fediversity";

View file

@ -1,6 +1,4 @@
{ {
_class = "nixops4Resource";
fediversityVm = { fediversityVm = {
vmId = 7004; vmId = 7004;
proxmox = "fediversity"; proxmox = "fediversity";

View file

@ -1,6 +1,4 @@
{ {
_class = "nixops4Resource";
fediversityVm = { fediversityVm = {
vmId = 7005; vmId = 7005;
proxmox = "fediversity"; proxmox = "fediversity";

View file

@ -1,6 +1,4 @@
{ {
_class = "nixops4Resource";
fediversityVm = { fediversityVm = {
vmId = 7006; vmId = 7006;
proxmox = "fediversity"; proxmox = "fediversity";

View file

@ -1,6 +1,4 @@
{ {
_class = "nixops4Resource";
fediversityVm = { fediversityVm = {
vmId = 7011; vmId = 7011;
proxmox = "fediversity"; proxmox = "fediversity";

View file

@ -1,6 +1,4 @@
{ {
_class = "nixops4Resource";
fediversityVm = { fediversityVm = {
vmId = 7012; vmId = 7012;
proxmox = "fediversity"; proxmox = "fediversity";

View file

@ -1,6 +1,4 @@
{ {
_class = "nixops4Resource";
fediversityVm = { fediversityVm = {
vmId = 7013; vmId = 7013;
proxmox = "fediversity"; proxmox = "fediversity";

View file

@ -1,6 +1,4 @@
{ {
_class = "nixops4Resource";
fediversityVm = { fediversityVm = {
vmId = 7014; vmId = 7014;
proxmox = "fediversity"; proxmox = "fediversity";

View file

@ -22,12 +22,12 @@ in
manage manage
# NixOps4 and its dependencies # NixOps4 and its dependencies
pkgs.nixops4 # FIXME: grab NixOps4 and add it here
pkgs.nix pkgs.nix
pkgs.openssh pkgs.openssh
]; ];
env = { env = {
DEPLOYMENT_FLAKE = toString ../.; DEPLOYMENT_FLAKE = ../.;
DEPLOYMENT_NAME = "test"; DEPLOYMENT_NAME = "test";
NPINS_DIRECTORY = toString ../npins; NPINS_DIRECTORY = toString ../npins;
CREDENTIALS_DIRECTORY = toString ./.credentials; CREDENTIALS_DIRECTORY = toString ./.credentials;

View file

@ -76,8 +76,6 @@ in
# https://git.dgnum.eu/mdebray/djangonix/ # https://git.dgnum.eu/mdebray/djangonix/
# unlicensed at the time of writing, but surely worth taking some inspiration from... # unlicensed at the time of writing, but surely worth taking some inspiration from...
{ {
_class = "nixos";
options.services.${name} = { options.services.${name} = {
enable = mkEnableOption "Service configuration for `${name}`"; enable = mkEnableOption "Service configuration for `${name}`";
production = mkOption { production = mkOption {
@ -147,7 +145,6 @@ in
NixOps4 from the package's npins-based code, we will have to do with NixOps4 from the package's npins-based code, we will have to do with
this workaround. this workaround.
''; '';
default = pkgs.nixops4;
}; };
deployment = { deployment = {

View file

@ -8,17 +8,4 @@ let
in in
{ {
python3 = prev.lib.attrsets.recursiveUpdate prev.python3 { pkgs = extraPython3Packages; }; python3 = prev.lib.attrsets.recursiveUpdate prev.python3 { pkgs = extraPython3Packages; };
nixops4 =
let
sources = import ../../npins;
inherit (import sources.flake-inputs) import-flake;
inherit
(import-flake {
src = ../../.;
})
inputs
;
inherit (inputs) nixops4;
in
nixops4.packages.${prev.system}.default;
} }

View file

@ -60,8 +60,6 @@ let
]; ];
in in
python3.pkgs.buildPythonPackage { python3.pkgs.buildPythonPackage {
_class = "package";
pname = name; pname = name;
inherit (pyproject.project) version; inherit (pyproject.project) version;
pyproject = true; pyproject = true;

View file

@ -8,8 +8,6 @@
}: }:
buildPythonPackage rec { buildPythonPackage rec {
_class = "package";
pname = "django-pydantic-field"; pname = "django-pydantic-field";
version = "v0.3.12"; version = "v0.3.12";
pyproject = true; pyproject = true;

View file

@ -10,8 +10,6 @@
}: }:
buildPythonPackage rec { buildPythonPackage rec {
_class = "package";
pname = "drf-pydantic"; pname = "drf-pydantic";
version = "v2.7.1"; version = "v2.7.1";
pyproject = true; pyproject = true;

View file

@ -13,6 +13,7 @@ let
secrets = { secrets = {
SECRET_KEY = pkgs.writeText "SECRET_KEY" "secret"; SECRET_KEY = pkgs.writeText "SECRET_KEY" "secret";
}; };
nixops4Package = pkgs.hello; # FIXME: actually pass NixOps4
}; };
virtualisation = { virtualisation = {

View file

@ -6,8 +6,8 @@
}: }:
{ {
tests = { tests = {
mastodon = pkgs.nixosTest ./tests/mastodon.nix; mastodon = import ./tests/mastodon.nix { inherit pkgs; };
pixelfed-garage = pkgs.nixosTest ./tests/pixelfed-garage.nix; pixelfed-garage = import ./tests/pixelfed-garage.nix { inherit pkgs; };
peertube = pkgs.nixosTest ./tests/peertube.nix; peertube = import ./tests/peertube.nix { inherit pkgs; };
}; };
} }

View file

@ -6,8 +6,6 @@ let
in in
{ {
_class = "nixos";
imports = [ imports = [
./garage ./garage
./mastodon ./mastodon

View file

@ -97,8 +97,6 @@ let
in in
{ {
_class = "nixos";
imports = [ ./options.nix ]; imports = [ ./options.nix ];
config = mkIf config.fediversity.garage.enable { config = mkIf config.fediversity.garage.enable {

View file

@ -5,8 +5,6 @@ let
in in
{ {
_class = "nixos";
options.fediversity.garage = { options.fediversity.garage = {
enable = mkEnableOption "Enable a Garage server on the machine"; enable = mkEnableOption "Enable a Garage server on the machine";

View file

@ -11,8 +11,6 @@ let
in in
{ {
_class = "nixos";
imports = [ ./options.nix ]; imports = [ ./options.nix ];
config = mkMerge [ config = mkMerge [

View file

@ -1,8 +1,6 @@
{ config, lib, ... }: { config, lib, ... }:
{ {
_class = "nixos";
options.fediversity.mastodon = options.fediversity.mastodon =
(import ../sharedOptions.nix { (import ../sharedOptions.nix {
inherit config lib; inherit config lib;

View file

@ -5,8 +5,6 @@ let
in in
{ {
_class = "nixos";
imports = [ ./options.nix ]; imports = [ ./options.nix ];
config = mkMerge [ config = mkMerge [

View file

@ -6,8 +6,6 @@ let
in in
{ {
_class = "nixos";
options.fediversity.peertube = options.fediversity.peertube =
(import ../sharedOptions.nix { (import ../sharedOptions.nix {
inherit config lib; inherit config lib;

View file

@ -15,8 +15,6 @@ let
in in
{ {
_class = "nixos";
imports = [ ./options.nix ]; imports = [ ./options.nix ];
config = mkMerge [ config = mkMerge [

View file

@ -1,8 +1,6 @@
{ config, lib, ... }: { config, lib, ... }:
{ {
_class = "nixos";
options.fediversity.pixelfed = options.fediversity.pixelfed =
(import ../sharedOptions.nix { (import ../sharedOptions.nix {
inherit config lib; inherit config lib;

View file

@ -14,8 +14,6 @@ let
in in
{ {
_class = "nixos";
enable = mkEnableOption "Enable a ${serviceDocName} server on the machine"; enable = mkEnableOption "Enable a ${serviceDocName} server on the machine";
s3AccessKeyFile = mkOption { s3AccessKeyFile = mkOption {

View file

@ -42,7 +42,7 @@ let
''; '';
in in
{ pkgs.nixosTest {
name = "mastodon"; name = "mastodon";
nodes = { nodes = {

View file

@ -161,7 +161,7 @@ let
''; '';
in in
{ pkgs.nixosTest {
name = "peertube"; name = "peertube";
nodes = { nodes = {

View file

@ -114,7 +114,7 @@ let
${seleniumQuit}''; ${seleniumQuit}'';
in in
{ pkgs.nixosTest {
name = "test-pixelfed-garage"; name = "test-pixelfed-garage";
nodes = { nodes = {

View file

@ -127,8 +127,6 @@ let
preOverride = pkgs.nixosTest ( preOverride = pkgs.nixosTest (
test test
// { // {
_class = "nixosTest";
interactive = (test.interactive or { }) // { interactive = (test.interactive or { }) // {
# no need to // with test.interactive.nodes here, since we are iterating # no need to // with test.interactive.nodes here, since we are iterating
# over all of them, and adding back in the config via `imports` # over all of them, and adding back in the config via `imports`

View file

@ -10,8 +10,6 @@ let
in in
{ {
_class = "nixos";
imports = [ (modulesPath + "/virtualisation/qemu-vm.nix") ]; imports = [ (modulesPath + "/virtualisation/qemu-vm.nix") ];
fediversity.garage.enable = true; fediversity.garage.enable = true;

View file

@ -1,8 +1,6 @@
# customize nixos-rebuild build-vm to be a bit more convenient # customize nixos-rebuild build-vm to be a bit more convenient
{ pkgs, ... }: { pkgs, ... }:
{ {
_class = "nixos";
# let us log in # let us log in
users.mutableUsers = false; users.mutableUsers = false;
users.users.root.hashedPassword = ""; users.users.root.hashedPassword = "";

View file

@ -6,7 +6,6 @@
... ...
}: }:
{ {
_class = "nixos";
imports = [ (modulesPath + "/virtualisation/qemu-vm.nix") ]; imports = [ (modulesPath + "/virtualisation/qemu-vm.nix") ];

View file

@ -5,8 +5,6 @@
}: }:
{ {
_class = "nixos";
imports = [ (modulesPath + "/virtualisation/qemu-vm.nix") ]; imports = [ (modulesPath + "/virtualisation/qemu-vm.nix") ];
fediversity = { fediversity = {

View file

@ -11,8 +11,6 @@ let
in in
{ {
_class = "nixos";
imports = [ (modulesPath + "/virtualisation/qemu-vm.nix") ]; imports = [ (modulesPath + "/virtualisation/qemu-vm.nix") ];
fediversity = { fediversity = {