flake.nix: add old channel, Marisa: downgrade to cgroupv1

This commit is contained in:
2022-02-03 12:23:24 +05:30
parent b729daba56
commit c9e27b621d
5 changed files with 28 additions and 6 deletions

17
flake.lock generated
View File

@@ -461,6 +461,22 @@
"type": "github" "type": "github"
} }
}, },
"old": {
"locked": {
"lastModified": 1642244250,
"narHash": "sha256-vWpUEqQdVP4srj+/YLJRTN9vjpTs4je0cdWKXPbDItc=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "0fd9ee1aa36ce865ad273f4f07fdc093adeb5c00",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-21.05",
"repo": "nixpkgs",
"type": "github"
}
},
"root": { "root": {
"inputs": { "inputs": {
"agenix": "agenix", "agenix": "agenix",
@@ -474,6 +490,7 @@
"nixpkgs": "nixpkgs_7", "nixpkgs": "nixpkgs_7",
"nur": "nur", "nur": "nur",
"nvim": "nvim", "nvim": "nvim",
"old": "old",
"rust": "rust", "rust": "rust",
"stable": "stable", "stable": "stable",
"utils": "utils_4" "utils": "utils_4"

View File

@@ -1,6 +1,7 @@
{ {
inputs = { inputs = {
stable.url = github:nixos/nixpkgs/nixos-21.11; stable.url = github:nixos/nixpkgs/nixos-21.11;
old.url = github:nixos/nixpkgs/nixos-21.05;
nixpkgs.url = github:nixos/nixpkgs/nixpkgs-unstable; nixpkgs.url = github:nixos/nixpkgs/nixpkgs-unstable;
master.url = github:nixos/nixpkgs/master; master.url = github:nixos/nixpkgs/master;
home-manager.url = github:nix-community/home-manager; home-manager.url = github:nix-community/home-manager;
@@ -16,7 +17,7 @@
rust.url = github:oxalica/rust-overlay; rust.url = github:oxalica/rust-overlay;
}; };
outputs = inputs@{self, nixpkgs, stable, master, ... }: outputs = inputs@{self, nixpkgs, stable, master, old, ... }:
inputs.utils.lib.eachDefaultSystem (system: inputs.utils.lib.eachDefaultSystem (system:
let let
mkPkgs = channel: system: import channel { mkPkgs = channel: system: import channel {
@@ -27,6 +28,7 @@
stable = mkPkgs stable prev.system; stable = mkPkgs stable prev.system;
unstable = mkPkgs nixpkgs prev.system; unstable = mkPkgs nixpkgs prev.system;
master = mkPkgs master prev.system; master = mkPkgs master prev.system;
old = mkPkgs old prev.system;
}; };
overlays = [ overlays = [
(import ./overlays/overridesandshit.nix) (import ./overlays/overridesandshit.nix)
@@ -64,10 +66,10 @@
./modules/vault-agent.nix ./modules/vault-agent.nix
]; ];
serverModules = [ serverModules = [
./modules/builder.nix
./modules/min-pkgs.nix ./modules/min-pkgs.nix
./modules/min-stuff.nix ./modules/min-stuff.nix
]; ];
builder = [ ./modules/builder.nix ];
in in
{ {
hm-configs = { hm-configs = {
@@ -131,7 +133,8 @@
} }
] ]
++ commonModules ++ commonModules
++ serverModules; ++ serverModules
++ builder;
}; };
}; };
}); });

View File

@@ -3,7 +3,7 @@
networking = { networking = {
hostName = "Marisa"; hostName = "Marisa";
firewall = { firewall = {
allowedTCPPorts = [ 22 80 6060 5001 8800 7777 4444 4646 8500 8888 22001 ]; allowedTCPPorts = [ 22 80 6060 5001 8800 5555 4444 4646 8500 22001 ];
allowedUDPPorts = [ 17840 ]; allowedUDPPorts = [ 17840 ];
}; };
wireless = { wireless = {

View File

@@ -2,6 +2,7 @@
{ {
# Add secrets to nomad, consul and vault # Add secrets to nomad, consul and vault
systemd.enableUnifiedCgroupHierarchy = false;
systemd.tmpfiles.rules = lib.singleton "d /run/vault - vault vault 1h"; systemd.tmpfiles.rules = lib.singleton "d /run/vault - vault vault 1h";
systemd.services.vault.preStart = systemd.services.vault.preStart =
let let
@@ -11,7 +12,7 @@
path = "vault"; path = "vault";
token = "+++vault_consul_token+++"; token = "+++vault_consul_token+++";
}; };
api_addr = "https://127.0.0.1:8800"; api_addr = "https://10.55.0.2:8800";
ui = true; ui = true;
}); });
in in
@@ -216,6 +217,7 @@
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPX1HDzWpoaOcU8GDEGuDzXgxkCpyeqxRR6gLs/8JgHw" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPX1HDzWpoaOcU8GDEGuDzXgxkCpyeqxRR6gLs/8JgHw"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOSQnDNrNP69tIK7U2D7qaMjycfIjpgx0at4U2D5Ufib" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOSQnDNrNP69tIK7U2D7qaMjycfIjpgx0at4U2D5Ufib"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK5V/hdkTTQSkDLXaEwY8xb/T8+sWtw5c6UjYOPaTrO8" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK5V/hdkTTQSkDLXaEwY8xb/T8+sWtw5c6UjYOPaTrO8"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKFyKi0HYfkgvEDvjzmDRGwAq2z2KOkfv7scTVSnonBh"
]; ];
security.pki.certificateFiles = [ ../../cert.pem ../../consul-agent-ca.pem ]; security.pki.certificateFiles = [ ../../cert.pem ../../consul-agent-ca.pem ];