liminix-fork/default.nix

65 lines
1.5 KiB
Nix
Raw Normal View History

{
2023-01-29 21:29:36 +01:00
device
, liminix-config ? <liminix-config>
2023-02-05 23:38:21 +01:00
, nixpkgs ? <nixpkgs>
2023-02-20 18:46:07 +01:00
, borderVmConf ? ./bordervm.conf.nix
}:
let
overlay = import ./overlay.nix;
2023-02-05 23:38:21 +01:00
pkgs = import nixpkgs (device.system // {
overlays = [overlay];
2023-02-20 18:46:07 +01:00
config = {
allowUnsupportedSystem = true; # mipsel
permittedInsecurePackages = [
"python-2.7.18.6" # kernel backports needs python <3
];
};
});
2023-02-11 00:10:44 +01:00
config = (pkgs.lib.evalModules {
modules = [
{ _module.args = { inherit pkgs; lib = pkgs.lib; }; }
./modules/hardware.nix
./modules/base.nix
./modules/busybox.nix
2023-03-08 23:11:59 +01:00
./modules/hostname.nix
device.module
liminix-config
./modules/s6
./modules/users.nix
./modules/outputs.nix
];
}).config;
2022-10-05 22:52:30 +02:00
borderVm = ((import <nixpkgs/nixos/lib/eval-config.nix>) {
system = builtins.currentSystem;
modules = [
({ ... } : { nixpkgs.overlays = [ overlay ]; })
(import ./bordervm-configuration.nix)
2023-02-20 18:46:07 +01:00
borderVmConf
];
2023-02-14 23:08:52 +01:00
}).config.system;
in {
outputs = config.system.outputs // {
default = config.system.outputs.${config.hardware.defaultOutput};
2023-02-11 00:10:44 +01:00
};
2022-09-25 14:18:26 +02:00
# this is just here as a convenience, so that we can get a
# cross-compiling nix-shell for any package we're customizing
2023-02-07 00:19:35 +01:00
inherit pkgs;
2023-02-08 19:10:11 +01:00
buildEnv = pkgs.mkShell {
packages = with pkgs.pkgsBuildBuild; [
tufted
routeros.routeros
routeros.ros-exec-script
2023-09-20 19:33:08 +02:00
run-liminix-vm
2023-02-14 23:08:52 +01:00
borderVm.build.vm
go-l2tp
2023-05-12 00:53:25 +02:00
min-copy-closure
fennelrepl
2023-02-08 19:10:11 +01:00
];
};
}