From ff3d1e9bba5ee0f7b3c6ac5a5971b59e59fc0af5 Mon Sep 17 00:00:00 2001 From: Julien Moutinho <julm+julm-nix@sourcephile.fr> Date: Fri, 4 Nov 2022 15:53:06 +0100 Subject: [PATCH] nix: revamp nixos defaults --- flake.nix | 34 ++++--------- home-manager/profiles/bash.nix | 76 +++++++++++++++++++--------- home-manager/profiles/essential.nix | 1 + hosts/aubergine.nix | 2 - hosts/aubergine/networking.nix | 3 +- hosts/oignon.nix | 2 - hosts/oignon/networking.nix | 1 - hosts/patate.nix | 3 -- nixos/default.nix | 12 +++++ nixos/profiles/bash.nix | 33 ------------ nixos/profiles/graphical.nix | 20 ++++---- nixos/profiles/networking.nix | 44 +++++++++------- nixos/profiles/networking/remote.nix | 19 +++++++ nixos/profiles/system.nix | 50 ++++++++++++------ 14 files changed, 168 insertions(+), 132 deletions(-) create mode 100644 nixos/default.nix delete mode 100644 nixos/profiles/bash.nix create mode 100644 nixos/profiles/networking/remote.nix diff --git a/flake.nix b/flake.nix index 23a86bb..d8fc84d 100644 --- a/flake.nix +++ b/flake.nix @@ -42,6 +42,10 @@ }); in { + # nix -L build .#nixosConfigurations.oignon.config.system.build.toplevel + # nix -L build .#nixosConfigurations.oignon.config.boot.kernelPackages.kernel.configfile + # nix -L build .#nixosConfigurations.oignon.pkgs.hello + # nix eval --raw .#nixosConfigurations.oignon.config.networking.nftables.rulese nixosConfigurations = lib.genAttrs (builtins.attrNames (lib.filterAttrs (_n: v: v == "directory") (builtins.readDir (inputs.self + "/hosts")))) (hostName: nixosSystem { @@ -52,6 +56,7 @@ inherit inputs; }; modules = [ + nixos/default.nix (import (./hosts + "/${hostName}.nix")) { _module.args = { @@ -62,29 +67,6 @@ nixpkgs.overlays = import nixpkgs/overlays.nix; nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [ "hplip" "geogebra" ]; } - (import nixos/modules.nix) - (import nixos/options.nix) - inputs.nixpkgs.nixosModules.notDetected - ({ pkgs, ... }: { - nix.registry.nixpkgs = lib.mkDefault { flake = inputs.nixpkgs; }; - nix.package = pkgs.nixFlakes; - nix.extraOptions = "experimental-features = nix-command flakes"; - #nixpkgs.overlays = import nixpkgs/overlays.nix; - /* - system.nixos.versionSuffix = ".${ - lib.substring 0 8 (inputs.self.lastModifiedDate or inputs.self.lastModified)}.${ - inputs.self.shortRev or "dirty"}"; - system.nixos.revision = lib.mkIf (inputs.self ? rev) inputs.self.rev; - */ - # Let 'nixos-version --json' know about the Git revision of this flake. - system.configurationRevision = lib.mkIf (inputs.self ? rev) inputs.self.rev; - /* - system.configurationRevision = - if inputs.self ? rev - then inputs.self.rev - else throw "Refusing to build from a dirty Git tree!"; - */ - }) inputs.home-manager.nixosModules.home-manager { home-manager.useGlobalPkgs = true; @@ -97,12 +79,14 @@ } ]; }); + # nix -L develop or direnv allow devShell = forAllSystems ({ pkgs, system, ... }: pkgs.callPackage ./shell.nix { inherit pkgs inputs system nixpkgsPath; inherit (inputs.self.checks.${system}.pre-commit-check) shellHook; }); + # nix -L run .#oignon.switch apps = forAllSystems ({ pkgs, system, ... }: with builtins; @@ -120,7 +104,7 @@ '').outPath; }; in - rec { + { # Example: nix run .#aubergine.switch "switch" = scriptApp "switch" [ ] '' shopt -s globstar @@ -152,6 +136,7 @@ ''; }) inputs.self.nixosConfigurations); + # nix flake check checks = forAllSystems (args: with args; { pre-commit-check = inputs.pre-commit-hooks.lib.${system}.run { @@ -161,6 +146,7 @@ }; }; }); + # nix fmt formatter = forAllSystems ({ pkgs, ... }: inputs.nix-formatter-pack.lib.mkFormatter { diff --git a/home-manager/profiles/bash.nix b/home-manager/profiles/bash.nix index 02d4f92..85cb858 100644 --- a/home-manager/profiles/bash.nix +++ b/home-manager/profiles/bash.nix @@ -1,7 +1,8 @@ { pkgs, lib, ... }: +with lib; { programs.bash = { - enable = lib.mkDefault true; + enable = mkDefault true; shellAliases = { black-on-white = "echo -e '\\033]11;black\\007\\033]10;white\\007'"; c = "bat"; @@ -42,12 +43,18 @@ yt = "yt-dlp"; zfs-umount = "zfs-unmount"; }; + sessionVariables = { + HISTCONTROL = "erasedups:ignorespace"; + HISTSIZE = "42000"; + PS1 = ''\[\033[1;32m\]\[\e]0;\u@\h: \w\a\]\W\[\033[0m\] \$(e=\$?; if [ \$e != 0 ]; then echo '\[\e[0;91m\]'\$e'\[\e[0m\]'; fi)\$ ''; + }; initExtra = '' # Alias completion . ${pkgs.complete-alias}/bin/complete_alias complete -F _complete_alias "''${!BASH_ALIASES[@]}" shopt -s globstar + shopt -s histappend shopt -s histreedit shopt -s histverify # Disable ctrl-s/ctrl-q flow control @@ -85,6 +92,9 @@ sed -e "s\$^\$$device @ \$" | column -ts@ } + stress-mem() { fac="$1"; stress-ng --vm 1 --vm-keep --vm-bytes $(awk "/MemAvailable/{ printf \"%d\n\", \$2 * $fac; }" </proc/meminfo)k; } + sysenter() { srv="$1"; shift; nsenter -a -t "$(systemctl show --property MainPID --value "$srv")" "$@"; } + systrace() { srv="$1"; shift; strace -f -p "$(systemctl show --property MainPID --value "$srv")" "$@"; } swaplist () { lastpid= swap=0 @@ -117,43 +127,61 @@ zfs-unmount () { sudo zfs unmount -u "$@"; } ''; profileExtra = '' - ''; + ''; }; programs.direnv.enableBashIntegration = true; #programs.broot.enableBashIntegration = true; - home.sessionVariables = { - PS1 = ''\[\033[1;32m\]\[\e]0;\u@\h: \w\a\]\W\[\033[0m\] \$(e=\$?; if [ \$e != 0 ]; then echo '\[\e[0;91m\]'\$e'\[\e[0m\]'; fi)\$ ''; - }; programs.readline = { - enable = lib.mkDefault true; + enable = mkDefault true; includeSystemConfig = true; bindings = { - "\\eOF" = "end-of-line"; - "\\eOH" = "beginning-of-line"; + # Up/Down + "\\e[A" = "history-search-backward"; + "\\e[B" = "history-search-forward"; + + # Ctrl-Left/Ctrl-Right "\\e[1;5C" = "forward-word"; "\\e[1;5D" = "backward-word"; - "\\e[1~" = "beginning-of-line"; - "\\e[4~" = "end-of-line"; "\\e[5C" = "forward-word"; "\\e[5D" = "backward-word"; - "\\e[7~" = "beginning-of-line"; - "\\e[8~" = "end-of-line"; - "\\e[A" = "history-search-backward"; - "\\e[B" = "history-search-forward"; - "\\e[F" = "end-of-line"; - "\\e[H" = "beginning-of-line"; "\\e\\e[C" = "forward-word"; "\\e\\e[D" = "backward-word"; + + # Home/End + "\\e[1~" = "beginning-of-line"; + "\\e[4~" = "end-of-line"; + + # Delete/Insert + "\\e[3~" = "delete-char"; + "\\e[2~" = "quoted-insert"; + + # For non RH/Debian xterm, can't hurt for RH/Debian xterm + "\\eOF" = "end-of-line"; + "\\eOH" = "beginning-of-line"; + + # For freebsd console + "\\e[F" = "end-of-line"; + "\\e[H" = "beginning-of-line"; + + # $if term=rxvt + "\\e[7~" = "beginning-of-line"; + "\\e[8~" = "end-of-line"; + "\\eOc" = "forward-word"; + "\\eOd" = "backward-word"; + # $endif }; variables = { - colored-completion-prefix = lib.mkDefault true; - colored-stats = lib.mkDefault true; # Note that this may cause completion text blink in some terminals (e.g. xterm). - echo-control-characters = lib.mkDefault true; - mark-symlinked-directories = lib.mkDefault true; - menu-complete-display-prefix = lib.mkDefault true; - show-all-if-ambiguous = lib.mkDefault true; - show-all-if-unmodified = lib.mkDefault true; - visible-stats = lib.mkDefault false; # Append char to indicate type + # Be 8 bit clean. + input-meta = mkDefault true; + output-meta = mkDefault true; + colored-completion-prefix = mkDefault true; + colored-stats = mkDefault true; # Note that this may cause completion text blink in some terminals (e.g. xterm). + echo-control-characters = mkDefault true; + mark-symlinked-directories = mkDefault true; + menu-complete-display-prefix = mkDefault true; + show-all-if-ambiguous = mkDefault true; + show-all-if-unmodified = mkDefault true; + visible-stats = mkDefault false; # Append char to indicate type }; }; } diff --git a/home-manager/profiles/essential.nix b/home-manager/profiles/essential.nix index 26b858c..2dc6520 100644 --- a/home-manager/profiles/essential.nix +++ b/home-manager/profiles/essential.nix @@ -25,6 +25,7 @@ pkgs.hdparm pkgs.hwinfo pkgs.iotop + pkgs.iperf pkgs.lm_sensors pkgs.lsof pkgs.lsscsi diff --git a/hosts/aubergine.nix b/hosts/aubergine.nix index 328139f..02a525c 100644 --- a/hosts/aubergine.nix +++ b/hosts/aubergine.nix @@ -3,8 +3,6 @@ imports = [ #../nixos/profiles/debug.nix ../nixos/profiles/lang-fr.nix - ../nixos/profiles/security.nix - ../nixos/profiles/system.nix #../nixos/profiles/tor.nix aubergine/hardware.nix aubergine/networking.nix diff --git a/hosts/aubergine/networking.nix b/hosts/aubergine/networking.nix index 47df732..5042349 100644 --- a/hosts/aubergine/networking.nix +++ b/hosts/aubergine/networking.nix @@ -7,7 +7,6 @@ with (import networking/names-and-numbers.nix); networking/wifi.nix networking/lte.nix networking/nftables.nix - ../../nixos/profiles/networking.nix ../../nixos/profiles/dnscrypt-proxy2.nix ../../nixos/profiles/wireguard/wg-intra.nix ]; @@ -32,7 +31,9 @@ with (import networking/names-and-numbers.nix); } ''; + services.avahi.enable = true; services.avahi.openFirewall = true; + services.avahi.publish.enable = true; services.dnscrypt-proxy2.settings.listen_addresses = [ "127.0.0.1:53" "[::1]:53" diff --git a/hosts/oignon.nix b/hosts/oignon.nix index 762d01e..7a1dcf7 100644 --- a/hosts/oignon.nix +++ b/hosts/oignon.nix @@ -6,8 +6,6 @@ ../nixos/profiles/graphical.nix ../nixos/profiles/lang-fr.nix ../nixos/profiles/printing.nix - ../nixos/profiles/security.nix - ../nixos/profiles/system.nix ../nixos/profiles/tor.nix ../nixos/profiles/irssi.nix oignon/backup.nix diff --git a/hosts/oignon/networking.nix b/hosts/oignon/networking.nix index 9949057..7df4154 100644 --- a/hosts/oignon/networking.nix +++ b/hosts/oignon/networking.nix @@ -1,7 +1,6 @@ { pkgs, lib, ... }: { imports = [ - ../../nixos/profiles/networking.nix ../../nixos/profiles/dnscrypt-proxy2.nix ../../nixos/profiles/wireguard/wg-intra.nix networking/nftables.nix diff --git a/hosts/patate.nix b/hosts/patate.nix index 8d42a4b..ea448a4 100644 --- a/hosts/patate.nix +++ b/hosts/patate.nix @@ -4,10 +4,7 @@ ../nixos/profiles/dnscrypt-proxy2.nix ../nixos/profiles/graphical.nix ../nixos/profiles/lang-fr.nix - ../nixos/profiles/networking.nix ../nixos/profiles/printing.nix - ../nixos/profiles/security.nix - ../nixos/profiles/system.nix ../nixos/profiles/wireguard/wg-intra.nix patate/backup.nix patate/hardware.nix diff --git a/nixos/default.nix b/nixos/default.nix new file mode 100644 index 0000000..166ba7e --- /dev/null +++ b/nixos/default.nix @@ -0,0 +1,12 @@ +{ pkgs, lib, inputs, ... }: +with lib; +{ + imports = [ + inputs.nixpkgs.nixosModules.notDetected + ./options.nix + ./modules.nix + ./profiles/networking.nix + ./profiles/security.nix + ./profiles/system.nix + ]; +} diff --git a/nixos/profiles/bash.nix b/nixos/profiles/bash.nix deleted file mode 100644 index ae9d215..0000000 --- a/nixos/profiles/bash.nix +++ /dev/null @@ -1,33 +0,0 @@ -{ - programs.bash = { - interactiveShellInit = '' - bind '"\e[A":history-search-backward' - bind '"\e[B":history-search-forward' - - # Ignore duplicate commands, ignore commands starting with a space - export HISTCONTROL=erasedups:ignorespace - export HISTSIZE=42000 - # Append to the history instead of overwriting (good for multiple connections) - shopt -s histappend - - # Utilities - mkcd () { mkdir -p "$1"; cd "$1"; } - ''; - shellAliases = { - cl = "clear"; - grep = "grep --color"; - l = "ls -alh"; - ll = "ls -al"; - ls = "ls --color=tty"; - mem = "ps -e -orss=,user=,args= | sort -b -k1,1n"; - - s = "sudo systemctl"; - st = "sudo systemctl status"; - j = "sudo journalctl -u"; - jb = "sudo journalctl -b"; - - nix-history = "sudo nix-env --list-generations --profile /nix/var/nix/profiles/system"; - mv = "mv -i"; - }; - }; -} diff --git a/nixos/profiles/graphical.nix b/nixos/profiles/graphical.nix index 429b75e..356f8d8 100644 --- a/nixos/profiles/graphical.nix +++ b/nixos/profiles/graphical.nix @@ -1,21 +1,23 @@ { pkgs, lib, ... }: +with lib; { - console.useXkbConfig = lib.mkDefault true; + console.useXkbConfig = mkDefault true; environment.systemPackages = [ pkgs.paprefs ]; - hardware.pulseaudio.enable = lib.mkDefault true; + hardware.pulseaudio.enable = mkDefault true; # Allow members of the "adbusers" group to mount Android devices via MTP. programs.adb.enable = true; programs.dconf.enable = true; services.dbus.packages = [ pkgs.dconf ]; - services.gvfs.enable = lib.mkDefault true; - sound.enable = lib.mkDefault true; + services.gvfs.enable = mkDefault true; + services.avahi.enable = mkDefault true; + sound.enable = mkDefault true; services.xserver = { - enable = lib.mkDefault true; - libinput.enable = lib.mkDefault true; - exportConfiguration = lib.mkDefault true; # link /usr/share/X11/ properly + enable = mkDefault true; + libinput.enable = mkDefault true; + exportConfiguration = mkDefault true; # link /usr/share/X11/ properly desktopManager = { session = [ # Let the session be generated by home-manager @@ -27,8 +29,8 @@ ''; } ]; - xterm.enable = lib.mkDefault false; + xterm.enable = mkDefault false; }; - displayManager.autoLogin.enable = lib.mkDefault true; + displayManager.autoLogin.enable = mkDefault true; }; } diff --git a/nixos/profiles/networking.nix b/nixos/profiles/networking.nix index 20a6335..c69b29e 100644 --- a/nixos/profiles/networking.nix +++ b/nixos/profiles/networking.nix @@ -1,48 +1,56 @@ { config, pkgs, lib, hostName, ... }: +with lib; { imports = [ networking/nftables.nix ]; + + boot.kernel.sysctl = { + # Improve MTU detection + # This can thaw TCP connections stalled by a host + # requiring a lower MTU along the path, + # though it would do so after a little delay + # so it's better to set a low MTU when possible. + "net/ipv4/tcp_mtu_probing" = 1; + }; + networking = { inherit hostName; - domain = lib.mkDefault "wg"; + domain = mkDefault "wg"; #search = [ "sourcephile.fr" ]; firewall = { - enable = lib.mkDefault true; - allowPing = lib.mkDefault true; + enable = mkDefault true; + allowPing = mkDefault true; }; networkmanager = { - enable = lib.mkDefault config.services.xserver.enable; + enable = mkDefault config.services.xserver.enable; #dhcp = "dhcpcd"; - logLevel = lib.mkDefault "INFO"; + logLevel = mkDefault "INFO"; wifi = { #backend = "iwd"; #backend = "wpa_supplicant"; - powersave = lib.mkDefault false; + powersave = mkDefault false; }; }; usePredictableInterfaceNames = true; }; programs.mtr.enable = true; + programs.traceroute.enable = mkDefault true; programs.usbtop.enable = true; - environment.systemPackages = [ - pkgs.iperf - ]; services.avahi = { - enable = lib.mkDefault true; - nssmdns = lib.mkDefault true; - openFirewall = lib.mkDefault false; - publish.enable = lib.mkDefault false; + nssmdns = mkDefault true; + openFirewall = mkDefault false; + publish.enable = mkDefault false; }; - networking.nftables.ruleset = lib.mkIf config.services.avahi.enable ('' + networking.nftables.ruleset = mkIf config.services.avahi.enable ('' table inet filter { chain output-lan { skuid root udp sport mdns udp dport mdns comment "avahi: multicast DNS" } } - '' + lib.optionalString config.services.avahi.openFirewall '' + '' + optionalString config.services.avahi.openFirewall '' table inet filter { chain input-lan { udp dport mdns comment "avahi: multicast DNS" @@ -51,9 +59,9 @@ ''); services.openssh = { - enable = lib.mkDefault true; - forwardX11 = lib.mkDefault true; - openFirewall = lib.mkDefault false; + enable = mkDefault true; + forwardX11 = mkDefault true; + openFirewall = mkDefault false; # Enable to switch-to-configuration # with the same ssh call remotely and locally listenAddresses = [ diff --git a/nixos/profiles/networking/remote.nix b/nixos/profiles/networking/remote.nix new file mode 100644 index 0000000..0430669 --- /dev/null +++ b/nixos/profiles/networking/remote.nix @@ -0,0 +1,19 @@ +{ + # On a remote headless server: always reboot on a kernel panic, + # to not have to physically go power cycle the server. + # Which may happen for instance if the wrong ZFS password is used + # but the boot is manually forced to continue. + # Using kernelParams instead of kernel.sysctl + # sets this up as soon as the initrd. + boot.kernelParams = [ "panic=10" ]; + + programs.gnupg.agent.pinentryFlavor = "curses"; + programs.mosh.enable = mkDefault true; + + # Always try to start all the units (default.target) + # because systemd's emergency shell does not try to start sshd. + # https://wiki.archlinux.org/index.php/systemd#Disable_emergency_mode_on_remote_host + systemd.enableEmergencyMode = false; + + services.openssh.enable = true; +} diff --git a/nixos/profiles/system.nix b/nixos/profiles/system.nix index 2af4c86..a5f3206 100644 --- a/nixos/profiles/system.nix +++ b/nixos/profiles/system.nix @@ -1,20 +1,23 @@ -{ pkgs, lib, ... }: +{ pkgs, lib, inputs, ... }: +with lib; { - imports = [ - ./bash.nix - ]; + boot.cleanTmpDir = mkDefault true; + boot.tmpOnTmpfs = mkDefault true; + services.logrotate.enable = true; + # NOTE: mostly useless on a server, and CPU intensive. documentation = { - enable = lib.mkDefault true; - dev.enable = lib.mkDefault false; - doc.enable = lib.mkDefault true; - info.enable = lib.mkDefault false; - man.enable = lib.mkDefault true; - nixos.enable = lib.mkDefault false; + enable = mkDefault true; + dev.enable = mkDefault false; + doc.enable = mkDefault true; + info.enable = mkDefault false; + man.enable = mkDefault true; + nixos.enable = mkDefault false; }; environment.variables = { EDITOR = "vim"; PAGER = "less -R"; SYSTEMD_LESS = "FKMRX"; + NIXPKGS_CONFIG = mkForce ""; }; home-manager.users.root = { imports = [ @@ -26,11 +29,14 @@ ${pkgs.nix}/bin/nix-env --delete-generations +1 --profile /nix/var/nix/profiles/per-user/root/home-manager ''; nix = { - settings.auto-optimise-store = lib.mkDefault true; - gc.automatic = lib.mkDefault true; - gc.dates = lib.mkDefault "weekly"; - gc.options = lib.mkDefault "--delete-older-than 7d"; - nixPath = lib.mkForce [ ]; + settings.auto-optimise-store = mkDefault true; + gc.automatic = mkDefault true; + gc.dates = mkDefault "weekly"; + gc.options = mkDefault "--delete-older-than 7d"; + nixPath = mkForce [ ]; + registry.nixpkgs = mkDefault { flake = inputs.nixpkgs; }; + package = pkgs.nixFlakes; + extraOptions = "experimental-features = nix-command flakes"; }; security.lockKernelModules = false; services.journald = { @@ -41,5 +47,19 @@ SystemMaxUse=100M ''; }; + /* + system.nixos.versionSuffix = ".${ + substring 0 8 (inputs.self.lastModifiedDate or inputs.self.lastModified)}.${ + inputs.self.shortRev or "dirty"}"; + system.nixos.revision = mkIf (inputs.self ? rev) inputs.self.rev; + */ + # Let 'nixos-version --json' know about the Git revision of this flake. + system.configurationRevision = mkIf (inputs.self ? rev) inputs.self.rev; + /* + system.configurationRevision = + if inputs.self ? rev + then inputs.self.rev + else throw "Refusing to build from a dirty Git tree!"; + */ users.mutableUsers = false; } -- 2.47.2