forked from DGNum/liminix
e0ea576674
we are also using "device" for "network device" (as in eth0, wlan0 etc) so this makes it a bit less confusing perhaps
60 lines
1.4 KiB
Nix
60 lines
1.4 KiB
Nix
{
|
|
device
|
|
, liminix-config ? <liminix-config>
|
|
, nixpkgs ? <nixpkgs>
|
|
, borderVmConf ? ./bordervm.conf.nix
|
|
}:
|
|
|
|
let
|
|
overlay = import ./overlay.nix;
|
|
pkgs = import nixpkgs (device.system // {
|
|
overlays = [overlay];
|
|
config = {
|
|
allowUnsupportedSystem = true; # mipsel
|
|
permittedInsecurePackages = [
|
|
"python-2.7.18.6" # kernel backports needs python <3
|
|
];
|
|
};
|
|
});
|
|
|
|
config = (pkgs.lib.evalModules {
|
|
modules = [
|
|
{ _module.args = { inherit pkgs; lib = pkgs.lib; }; }
|
|
./modules/hardware.nix
|
|
./modules/base.nix
|
|
device.module
|
|
liminix-config
|
|
./modules/s6
|
|
./modules/users.nix
|
|
./modules/outputs.nix
|
|
];
|
|
}).config;
|
|
|
|
borderVm = ((import <nixpkgs/nixos/lib/eval-config.nix>) {
|
|
system = builtins.currentSystem;
|
|
modules = [
|
|
({ ... } : { nixpkgs.overlays = [ overlay ]; })
|
|
(import ./bordervm-configuration.nix)
|
|
borderVmConf
|
|
];
|
|
}).config.system;
|
|
in {
|
|
outputs = config.outputs // {
|
|
default = config.outputs.${config.hardware.defaultOutput};
|
|
};
|
|
|
|
# this is just here as a convenience, so that we can get a
|
|
# cross-compiling nix-shell for any package we're customizing
|
|
inherit pkgs;
|
|
|
|
buildEnv = pkgs.mkShell {
|
|
packages = with pkgs.pkgsBuildBuild; [
|
|
tufted
|
|
routeros.routeros
|
|
routeros.ros-exec-script
|
|
mips-vm
|
|
borderVm.build.vm
|
|
go-l2tp
|
|
];
|
|
};
|
|
}
|