docs: initialize NixOS infrastructure with AI assistant
Creates PROJECT.md with vision and requirements. Creates config.json with interactive workflow mode.
This commit is contained in:
59
.planning/PROJECT.md
Normal file
59
.planning/PROJECT.md
Normal file
@@ -0,0 +1,59 @@
|
||||
# NixOS Infrastructure with AI Assistant
|
||||
|
||||
## What This Is
|
||||
|
||||
This project manages a NixOS-based infrastructure with Docker services, integrated with OpenCode AI assistant for automated management. The system supports:
|
||||
|
||||
- Reproducible NixOS infrastructure configuration
|
||||
- Docker service management via Docker Compose
|
||||
- AI-assisted infrastructure operations
|
||||
- Automatic service deployment and lifecycle management
|
||||
- Integration with existing Docker stacks (ai, cloudstorage, homeautomation, network, passwordmanager, versioncontrol)
|
||||
|
||||
## Core Value
|
||||
|
||||
The core value is a **reproducible and evolvable NixOS infrastructure** that can be managed through natural language interactions with the OpenCode AI assistant. The system should automatically detect and integrate new Docker services while maintaining consistency across all deployments.
|
||||
|
||||
## Requirements
|
||||
|
||||
### Validated
|
||||
|
||||
- NixOS configuration management with flakes
|
||||
- Docker service integration via docker_manager.nix
|
||||
- Traefik reverse proxy with automatic TLS certificates
|
||||
- Environment variable management via agenix secrets
|
||||
- Standardized service patterns across all Docker stacks
|
||||
|
||||
### Active
|
||||
|
||||
- [ ] Automatic detection and integration of new Docker Compose files in `assets/compose/`
|
||||
- [ ] AI assistant integration for service lifecycle management
|
||||
- [ ] Service health monitoring and logging verification
|
||||
- [ ] Documentation of integration patterns in SKILL.md
|
||||
- [ ] Automated system update workflow (`nh os switch`)
|
||||
|
||||
### Out of Scope
|
||||
|
||||
- Full n8n integration for automated workflows - deferring to future milestone
|
||||
- Self-healing infrastructure with automatic problem detection - future enhancement
|
||||
- Multi-host orchestration - single-host focus for v1
|
||||
|
||||
## Key Decisions
|
||||
|
||||
| Decision | Rationale | Outcome |
|
||||
|----------|-----------|---------|
|
||||
| NixOS with Flakes | Reproducible infrastructure, better dependency management | Good |
|
||||
| Docker Compose integration | Preserves existing service configurations, flexibility | Good |
|
||||
| agenix for secrets | Secure secrets management, Nix native integration | Good |
|
||||
| Traefik reverse proxy | Unified HTTPS entrypoint, automatic certificate management | Good |
|
||||
| Standardized service patterns | Consistency across services, easier maintenance | Pending |
|
||||
|
||||
## Context
|
||||
|
||||
- **Existing Services**: ai (Llama.cpp, Open WebUI, n8n), cloudstorage (Nextcloud), homeautomation (Home Assistant), network (Traefik, DDNS), passwordmanager (Vaultwarden), versioncontrol (Gitea)
|
||||
- **Tech Stack**: NixOS unstable, Docker, Docker Compose, Traefik, agenix, OpenCode AI
|
||||
- **Hardware**: AMD MI50 GPUs for AI workloads
|
||||
- **Network**: Traefik-net bridge network for all services
|
||||
- **Storage**: `/mnt/HoardingCow_docker_data/<service>` for persistent data
|
||||
|
||||
**Last updated: 2026-01-01 after init**
|
||||
17
.planning/config.json
Normal file
17
.planning/config.json
Normal file
@@ -0,0 +1,17 @@
|
||||
{
|
||||
"mode": "interactive",
|
||||
"gates": {
|
||||
"confirm_project": true,
|
||||
"confirm_phases": true,
|
||||
"confirm_roadmap": true,
|
||||
"confirm_breakdown": true,
|
||||
"confirm_plan": true,
|
||||
"execute_next_plan": true,
|
||||
"issues_review": true,
|
||||
"confirm_transition": true
|
||||
},
|
||||
"safety": {
|
||||
"always_confirm_destructive": true,
|
||||
"always_confirm_external_services": true
|
||||
}
|
||||
}
|
||||
36
modules/nixos/services/docker_manager.nix
Normal file
36
modules/nixos/services/docker_manager.nix
Normal file
@@ -0,0 +1,36 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with lib;
|
||||
|
||||
{
|
||||
options.services.myDockerStacks = mkOption {
|
||||
type = types.attrsOf (types.submodule {
|
||||
options = {
|
||||
path = mkOption { type = types.path; };
|
||||
ports = mkOption { type = types.listOf types.int; default = []; };
|
||||
};
|
||||
});
|
||||
default = {};
|
||||
description = "Attribute set of docker-compose stacks to run.";
|
||||
};
|
||||
|
||||
config = {
|
||||
# Generate the systemd services based on the options provided above
|
||||
systemd.services = mapAttrs' (name: value: nameValuePair "${name}_stack" {
|
||||
description = "${name} via Docker Compose";
|
||||
after = [ "network-online.target" "docker.service" ];
|
||||
wants = [ "network-online.target" "docker.service" ];
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
serviceConfig = {
|
||||
WorkingDirectory = value.path;
|
||||
ExecStartPre = "${pkgs.docker-compose}/bin/docker-compose down";
|
||||
ExecStart = "${pkgs.docker-compose}/bin/docker-compose up -d";
|
||||
ExecStop = "${pkgs.docker-compose}/bin/docker-compose down";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
}) config.services.myDockerStacks;
|
||||
|
||||
# Automatically open firewall ports
|
||||
networking.firewall.allowedTCPPorts = flatten (mapAttrsToList (n: v: v.ports) config.services.myDockerStacks);
|
||||
};
|
||||
}
|
||||
37
modules/nixos/services/fancontrol.nix
Normal file
37
modules/nixos/services/fancontrol.nix
Normal file
@@ -0,0 +1,37 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with lib;
|
||||
|
||||
let
|
||||
cfg = config.services.systemd-fancon;
|
||||
in
|
||||
{
|
||||
options.services.systemd-fancon = {
|
||||
enable = mkEnableOption "systemd-fancon service for fan control";
|
||||
config = mkOption {
|
||||
type = types.lines;
|
||||
default = "";
|
||||
description = "Configuration for systemd-fancon.";
|
||||
};
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
environment.systemPackages = with pkgs; [
|
||||
systemd-fancon
|
||||
lm_sensors
|
||||
];
|
||||
|
||||
boot.kernelModules = [ "amdgpu" ];
|
||||
|
||||
systemd.services.systemd-fancon = {
|
||||
description = "systemd-fancon service";
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
after = [ "network-online.target" ];
|
||||
serviceConfig = {
|
||||
ExecStart = "${pkgs.systemd-fancon}/bin/systemd-fancon -c ${cfg.configFile}";
|
||||
Restart = "on-failure";
|
||||
};
|
||||
configFile = pkgs.writeText "systemd-fancon.conf" cfg.config;
|
||||
};
|
||||
};
|
||||
}
|
||||
31
modules/nixos/services/ollama_init_custom_models.nix
Normal file
31
modules/nixos/services/ollama_init_custom_models.nix
Normal file
@@ -0,0 +1,31 @@
|
||||
systemd.services.init-ollama-model = {
|
||||
description = "Initialize nemotron 3 with extra context in Ollama Docker";
|
||||
after = [ "docker-ollama.service" ]; # Ensure it runs after your ollama container
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
script = ''
|
||||
# Wait for Ollama
|
||||
while ! ${pkgs.curl}/bin/curl -s http://localhost:11434/api/tags > /dev/null; do
|
||||
sleep 2
|
||||
done
|
||||
|
||||
# Check if the model already exists in the persistent volume
|
||||
if ! ${pkgs.docker}/bin/docker exec ollama ollama list | grep -q "nemotron-3-nano:30b-128k"; then
|
||||
echo "nemotron-3-nano:30b-128k not found, creating..."
|
||||
|
||||
${pkgs.docker}/bin/docker exec ollama sh -c 'cat <<EOF > /root/.ollama/nemotron-3-nano:30b-128k.modelfile
|
||||
FROM nemotron-3-nano:30b
|
||||
PARAMETER num_ctx 131072
|
||||
PARAMETER num_predict 4096
|
||||
PARAMETER repeat_penalty 1.1
|
||||
EOF'
|
||||
|
||||
${pkgs.docker}/bin/docker exec ollama ollama create nemotron-3-nano:30b-128k -f /root/.ollama/nemotron-3-nano:30b-128k.modelfile
|
||||
else
|
||||
echo "nemotron-3-nano:30b-128k already exists, skipping creation."
|
||||
fi
|
||||
'';
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
};
|
||||
67
modules/nixos/services/open_code_server.nix
Normal file
67
modules/nixos/services/open_code_server.nix
Normal file
@@ -0,0 +1,67 @@
|
||||
{ config, pkgs, lib, ... }:
|
||||
|
||||
let
|
||||
cfg = config.services.opencode;
|
||||
in {
|
||||
options.services.opencode = {
|
||||
enable = lib.mkEnableOption "OpenCode AI Service";
|
||||
port = lib.mkOption {
|
||||
type = lib.types.port;
|
||||
default = 4099;
|
||||
};
|
||||
ollamaUrl = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = "http://127.0.0.1:11434/v1";
|
||||
};
|
||||
};
|
||||
|
||||
config = lib.mkIf cfg.enable {
|
||||
programs.nix-ld.enable = true;
|
||||
|
||||
environment.etc."opencode/opencode.json".text = builtins.toJSON {
|
||||
"$schema" = "https://opencode.ai/config.json";
|
||||
|
||||
"model" = "ollama/nemotron-3-nano:30b";
|
||||
|
||||
"provider" = {
|
||||
"ollama" = {
|
||||
"name" = "Ollama (Local)";
|
||||
"npm" = "@ai-sdk/openai-compatible";
|
||||
"options" = {
|
||||
"baseURL" = cfg.ollamaUrl;
|
||||
};
|
||||
"models" = {
|
||||
# The exact model ID as seen in 'ollama list'
|
||||
"nemotron-3-nano:30b" = {
|
||||
"name" = "NVIDIA Nemotron 3 Nano (30B)";
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
systemd.services.opencode = {
|
||||
description = "OpenCode AI Coding Agent Server";
|
||||
after = [ "network.target" "ai_stack.service" ];
|
||||
requires = [ "ai_stack.service" ];
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
|
||||
serviceConfig = {
|
||||
Type = "simple";
|
||||
User = "gortium";
|
||||
ExecStart = "${pkgs.nodejs}/bin/npx -y opencode-ai serve --hostname 0.0.0.0 --port ${toString cfg.port}";
|
||||
Restart = "on-failure";
|
||||
# Loads your ANTHROPIC_API_KEY etc from your single Agenix file
|
||||
# EnvironmentFile = config.age.secrets.opencode-secrets.path;
|
||||
};
|
||||
|
||||
environment = {
|
||||
OLLAMA_BASE_URL = "http://127.0.0.1:11434";
|
||||
OPENCODE_CONFIG = "/etc/opencode/opencode.json";
|
||||
HOME = "/home/gortium";
|
||||
};
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [ cfg.port ];
|
||||
};
|
||||
}
|
||||
BIN
secrets/n8n_ssh_key.age
Normal file
BIN
secrets/n8n_ssh_key.age
Normal file
Binary file not shown.
11
users/n8n-worker.nix
Normal file
11
users/n8n-worker.nix
Normal file
@@ -0,0 +1,11 @@
|
||||
{ pkgs, inputs, config, keys, ... }: {
|
||||
users.users.n8n-worker = {
|
||||
isSystemUser = true;
|
||||
group = "n8n-worker";
|
||||
extraGroups = [ "docker" ];
|
||||
shell = pkgs.bashInteractive;
|
||||
openssh.authorizedKeys.keys = [
|
||||
keys.users.n8n-worker.main
|
||||
];
|
||||
};
|
||||
users.groups.n8n-worker = {};
|
||||
Reference in New Issue
Block a user