nichts/modules/system/nix/module.nix

163 lines
5 KiB
Nix

# credits to raf
{
config,
inputs,
lib,
pkgs,
...
}: let
inherit (lib.attrsets) mapAttrsToList;
inherit (lib.modules) mkForce;
in {
imports = [
./documentation.nix # nixos documentation
./nixpkgs.nix # global nixpkgs configuration
inputs.lix-module.nixosModules.default
];
nix = {
# package = pkgs.lix;
# fuck channels, no thanks
channel.enable = mkForce false;
# this is taken from sioodmy.
# pin the registry to avoid downloading and evaling a new nixpkgs version every time
registry =
lib.mapAttrs (_: v: {flake = v;}) inputs
// {system.flake = inputs.self;};
# Add inputs to the system's legacy channels
# to make legacy nix commands consistent as well
nixPath = mapAttrsToList (key: _: "${key}=flake:${key}") config.nix.registry;
# Run the Nix daemon on lowest possible priority
daemonCPUSchedPolicy = "idle";
daemonIOSchedClass = "idle";
daemonIOSchedPriority = 7;
# Collect garbage
# NOTE: I use nh for this.
gc = {
automatic = false;
dates = "20:00";
options = "--delete-older-than 7d";
persistent = false;
};
# Automatically optimize nix store by removing hard links
optimise = {
automatic = true;
dates = ["21:00"];
};
settings = {
# Tell nix to use the xdg spec for base directories
# while transitioning, any state must be carried over
# manually, as Nix won't do it for us.
use-xdg-base-directories = true;
# Automatically optimise symlinks
auto-optimise-store = true;
# Allow sudo users to mark the following values as trusted
allowed-users = ["root" "@wheel" "nix-builder"];
# Only allow sudo users to manage the nix store
trusted-users = ["root" "@wheel" "nix-builder"];
# Let the system decide the number of max jobs
# based on available system specs. Usually this is
# the same as the number of cores your CPU has.
max-jobs = 2;
# If set, Nix will perform builds in a sandboxed environment
# that it will set up automatically for each build.
# This prevents impurities in builds by disallowing access
# to dependencies outside of the Nix store by using network
# and mount namespaces in a chroot environment.
sandbox = true;
sandbox-fallback = false;
# Continue building derivations even if one fails
keep-going = true;
# If we haven't received data for >= 20s, retry the download
stalled-download-timeout = 20;
# Show more logs when a build fails and decides to display
# a bunch of lines. `nix log` would normally provide more
# information, but this may save us some time and keystrokes.
log-lines = 30;
# Extra features of Nix that are considered unstable
# and experimental. By default we should always include
# `flakes` and `nix-command`, while others are usually
# optional.
extra-experimental-features = [
"flakes" # flakes
"nix-command" # experimental nix commands
"cgroups" # allow nix to execute builds inside cgroups
"repl-flake" # nh os repl needs this on lix
"pipe-operator"
];
# Ensures that the result of Nix expressions is fully determined by
# explicitly declared inputs, and not influenced by external state.
# In other words, fully stateless evaluation by Nix at all times.
pure-eval = false;
# Don't warn me that my git tree is dirty, I know.
warn-dirty = false;
# Maximum number of parallel TCP connections
# used to fetch imports and binary caches.
# 0 means no limit, default is 25.
http-connections = 50; # lower values fare better on slow connections
# Whether to accept nix configuration from a flake
# without displaying a Y/N prompt. For those obtuse
# enough to keep this true, I wish the best of luck.
# tl;dr: this is a security vulnerability.
accept-flake-config = false;
# Whether to execute builds inside cgroups. cgroups are
# "a Linux kernel feature that limits, accounts for, and
# isolates the resource usage (CPU, memory, disk I/O, etc.)
# of a collection of processes."
# See:
# <https://en.wikipedia.org/wiki/Cgroups>
use-cgroups = pkgs.stdenv.isLinux; # only supported on Linux
# for direnv GC roots
keep-derivations = true;
keep-outputs = true;
# Use binary cache
builders-use-substitutes = true;
# Substituters to pull from.
substituters = [
"https://cache.nixos.org"
];
trusted-public-keys = [
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
];
};
};
systemd.services = {
# WE DONT WANT TO BUILD STUFF ON TMPFS
# ITS NOT A GOOD IDEA
nix-daemon = {
environment.TMPDIR = "/var/tmp";
};
# Do not run garbage collection on AC power.
# This makes for a quite nice difference in battery life.
nix-gc = {
unitConfig.ConditionACPower = true;
};
};
}