config/flake.nix

428 lines
13 KiB
Nix
Raw Permalink Normal View History

2023-03-29 17:50:55 +03:00
{
2023-03-30 16:33:03 +03:00
description = "motiejus/config";
2023-03-29 17:50:55 +03:00
inputs = {
2023-11-27 12:07:19 +02:00
nixpkgs.url = "github:NixOS/nixpkgs/nixos-23.11";
2024-03-13 13:56:38 +02:00
nixpkgs-unstable.url = "github:NixOS/nixpkgs/nixos-unstable";
2023-04-05 14:46:57 +03:00
flake-utils.url = "github:numtide/flake-utils";
2023-10-01 22:45:00 +03:00
flake-compat.url = "github:nix-community/flake-compat";
nixos-hardware.url = "github:NixOS/nixos-hardware/master";
2023-10-02 00:05:57 +03:00
nur.url = "github:nix-community/NUR";
2023-04-05 14:46:57 +03:00
2023-11-27 12:07:19 +02:00
home-manager.url = "github:nix-community/home-manager/release-23.11";
2023-08-18 13:47:27 +03:00
home-manager.inputs.nixpkgs.follows = "nixpkgs";
2023-05-30 10:03:21 +03:00
2023-11-27 18:17:27 +02:00
agenix = {
url = "github:ryantm/agenix";
inputs = {
nixpkgs.follows = "nixpkgs";
home-manager.follows = "home-manager";
darwin.follows = "";
};
};
deploy-rs = {
url = "github:serokell/deploy-rs";
inputs = {
nixpkgs.follows = "nixpkgs";
flake-compat.follows = "flake-compat";
utils.follows = "flake-utils";
};
};
2023-09-15 14:39:04 +03:00
2023-12-14 10:10:00 +02:00
nixgl = {
url = "github:guibou/nixGL";
inputs = {
nixpkgs.follows = "nixpkgs";
flake-utils.follows = "flake-utils";
};
};
2023-09-21 06:06:10 +03:00
nix-index-database.url = "github:Mic92/nix-index-database";
nix-index-database.inputs.nixpkgs.follows = "nixpkgs";
2023-10-02 00:05:57 +03:00
gitignore.url = "github:hercules-ci/gitignore.nix";
gitignore.inputs.nixpkgs.follows = "nixpkgs";
2023-11-27 18:17:27 +02:00
pre-commit-hooks = {
url = "github:cachix/pre-commit-hooks.nix";
inputs = {
nixpkgs.follows = "nixpkgs";
nixpkgs-stable.follows = "nixpkgs";
flake-compat.follows = "flake-compat";
flake-utils.follows = "flake-utils";
gitignore.follows = "gitignore";
};
};
2024-01-17 13:17:19 +02:00
e11sync = {
url = "git+https://git.jakstys.lt/motiejus/e11sync";
inputs = {
nixpkgs.follows = "nixpkgs";
flake-utils.follows = "flake-utils";
flake-compat.follows = "flake-compat";
gitignore.follows = "gitignore";
pre-commit-hooks.follows = "pre-commit-hooks";
};
};
2023-04-05 14:46:57 +03:00
};
2023-04-05 09:15:02 +03:00
2023-04-05 14:46:57 +03:00
nixConfig = {
trusted-substituters = "https://cache.nixos.org/";
trusted-public-keys = "cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=";
2023-11-30 16:44:11 +02:00
extra-experimental-features = "nix-command flakes";
2023-03-29 17:50:55 +03:00
};
2023-04-03 16:50:52 +03:00
outputs = {
self,
nixpkgs,
2024-03-13 13:56:38 +02:00
nixpkgs-unstable,
2023-04-14 14:12:45 +03:00
agenix,
2023-04-03 16:50:52 +03:00
deploy-rs,
flake-utils,
2023-08-18 13:47:27 +03:00
home-manager,
2023-09-14 21:46:01 +03:00
nixos-hardware,
2023-09-21 06:06:10 +03:00
nix-index-database,
2023-10-01 22:45:00 +03:00
pre-commit-hooks,
2023-09-15 14:39:04 +03:00
nur,
2023-12-14 10:10:00 +02:00
nixgl,
2024-01-17 13:17:19 +02:00
e11sync,
2023-10-01 22:45:00 +03:00
...
2023-04-05 23:19:56 +03:00
} @ inputs: let
2023-04-05 09:15:02 +03:00
myData = import ./data.nix;
2024-02-02 15:44:59 +02:00
2024-02-02 15:39:22 +02:00
overlays = [
2023-11-15 09:20:23 +02:00
nur.overlay
2024-02-02 15:49:31 +02:00
nixgl.overlay
2024-01-20 12:13:58 +02:00
e11sync.overlays.default
2024-02-02 15:29:53 +02:00
2024-02-02 15:39:22 +02:00
(_self: super: {deploy-rs-pkg = super.deploy-rs;})
2024-02-02 15:29:53 +02:00
deploy-rs.overlay
(_self: super: {
deploy-rs = {
2024-02-02 15:39:22 +02:00
deploy-rs = super.deploy-rs-pkg;
2024-02-02 15:29:53 +02:00
inherit (super.deploy-rs) lib;
};
2024-03-13 13:56:38 +02:00
deploy-rs-pkg = null;
2024-02-02 15:29:53 +02:00
})
2024-02-05 09:19:16 +02:00
(_: super: {
inherit (super.callPackage ./pkgs/compress-drv.nix {}) compressDrvWeb;
2024-02-05 09:19:16 +02:00
tmuxbash = super.callPackage ./pkgs/tmuxbash.nix {};
nicer = super.callPackage ./pkgs/nicer.nix {};
2024-03-13 13:23:50 +02:00
# TODO: copied from 24.05
turbo = super.callPackage ./pkgs/turbo.nix {};
2024-03-13 13:56:38 +02:00
2024-03-13 14:05:52 +02:00
pkgs-unstable = import nixpkgs-unstable {
2024-03-13 13:56:38 +02:00
inherit (super) system;
};
2024-03-07 11:47:15 +02:00
crossArm64 = import nixpkgs {
system = "x86_64-linux";
hostPlatform.config = "aarch64-linux";
buildPlatform.config = "x86_64-linux";
};
})
2023-11-15 09:20:23 +02:00
];
mkVM = system:
nixpkgs.lib.nixosSystem {
inherit system;
modules = [
{nixpkgs.overlays = overlays;}
./hosts/vm/configuration.nix
./modules
./modules/profiles/desktop
home-manager.nixosModules.home-manager
];
specialArgs = {inherit myData;} // inputs;
};
2023-04-05 09:15:02 +03:00
in
2023-04-03 16:50:52 +03:00
{
2023-11-27 18:17:27 +02:00
nixosConfigurations = {
vm-x86_64 = mkVM "x86_64-linux";
vm-aarch64 = mkVM "aarch64-linux";
2024-02-04 16:18:47 +02:00
2024-02-26 15:20:57 +02:00
op5p = nixpkgs.lib.nixosSystem {
system = "aarch64-linux";
modules = [
{nixpkgs.overlays = overlays;}
./hosts/op5p/configuration.nix
2024-03-06 11:51:26 +02:00
home-manager.nixosModules.home-manager
2024-02-26 15:20:57 +02:00
];
specialArgs = {inherit myData;} // inputs;
};
2024-03-06 15:41:07 +02:00
vno1-op5p = nixpkgs.lib.nixosSystem {
system = "aarch64-linux";
modules = [
{nixpkgs.overlays = overlays;}
./hosts/vno1-op5p/configuration.nix
home-manager.nixosModules.home-manager
2024-04-04 12:06:15 +03:00
agenix.nixosModules.default
{
age.secrets = {
motiejus-passwd-hash.file = ./secrets/motiejus_passwd_hash.age;
root-passwd-hash.file = ./secrets/root_passwd_hash.age;
sasl-passwd.file = ./secrets/postfix_sasl_passwd.age;
};
}
2024-03-06 15:41:07 +02:00
];
specialArgs = {inherit myData;} // inputs;
};
2024-03-12 21:26:31 +02:00
mtworx = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
{nixpkgs.overlays = overlays;}
./hosts/mtworx/configuration.nix
home-manager.nixosModules.home-manager
nixos-hardware.nixosModules.lenovo-thinkpad-x1-11th-gen
2024-03-13 14:12:44 +02:00
nix-index-database.nixosModules.nix-index
2024-03-12 21:26:31 +02:00
2024-03-18 17:46:17 +02:00
agenix.nixosModules.default
{
age.secrets = {
motiejus-work-passwd-hash.file = ./secrets/motiejus_work_passwd_hash.age;
root-work-passwd-hash.file = ./secrets/root_work_passwd_hash.age;
#sasl-passwd.file = ./secrets/postfix_sasl_passwd.age;
};
}
2024-03-12 21:26:31 +02:00
];
specialArgs = {inherit myData;} // inputs;
};
2024-02-06 09:53:14 +02:00
vno1-oh2 = nixpkgs.lib.nixosSystem {
2023-11-27 18:17:27 +02:00
system = "x86_64-linux";
modules = [
2024-02-02 15:39:22 +02:00
{nixpkgs.overlays = overlays;}
2023-11-27 18:17:27 +02:00
./hosts/vno1-oh2/configuration.nix
./modules
agenix.nixosModules.default
home-manager.nixosModules.home-manager
{
age.secrets = {
motiejus-passwd-hash.file = ./secrets/motiejus_passwd_hash.age;
root-passwd-hash.file = ./secrets/root_passwd_hash.age;
zfs-passphrase-fra1-a.file = ./secrets/fra1-a/zfs-passphrase.age;
2023-12-28 23:33:47 +02:00
photoprism-admin-passwd.file = ./secrets/photoprism/admin_password.age;
2023-11-27 18:17:27 +02:00
headscale-client-oidc.file = ./secrets/headscale/oidc_client_secret2.age;
sasl-passwd.file = ./secrets/postfix_sasl_passwd.age;
borgbackup-password.file = ./secrets/vno1-oh2/borgbackup/password.age;
grafana-oidc.file = ./secrets/grafana.jakstys.lt/oidc.age;
letsencrypt-account-key.file = ./secrets/letsencrypt/account.key.age;
vaultwarden-secrets-env.file = ./secrets/vaultwarden/secrets.env.age;
synapse-jakstys-signing-key.file = ./secrets/synapse/jakstys_lt_signing_key.age;
synapse-registration-shared-secret.file = ./secrets/synapse/registration_shared_secret.age;
synapse-macaroon-secret-key.file = ./secrets/synapse/macaroon_secret_key.age;
};
}
];
2023-07-22 16:05:44 +03:00
2023-11-27 18:17:27 +02:00
specialArgs = {inherit myData;} // inputs;
};
2023-07-22 16:05:44 +03:00
2024-02-06 09:53:14 +02:00
fwminex = nixpkgs.lib.nixosSystem {
2023-11-27 18:17:27 +02:00
system = "x86_64-linux";
modules = [
2024-02-02 15:39:22 +02:00
{nixpkgs.overlays = overlays;}
2023-11-27 18:17:27 +02:00
./hosts/fwminex/configuration.nix
2023-11-27 18:17:27 +02:00
./modules
./modules/profiles/desktop
nur.nixosModules.nur
agenix.nixosModules.default
home-manager.nixosModules.home-manager
nixos-hardware.nixosModules.framework-12th-gen-intel
nix-index-database.nixosModules.nix-index
{
age.secrets = {
motiejus-passwd-hash.file = ./secrets/motiejus_passwd_hash.age;
root-passwd-hash.file = ./secrets/root_passwd_hash.age;
sasl-passwd.file = ./secrets/postfix_sasl_passwd.age;
};
}
];
2023-09-13 12:17:43 +03:00
2023-11-27 18:17:27 +02:00
specialArgs = {inherit myData;} // inputs;
};
2023-09-13 12:17:43 +03:00
2024-02-06 09:53:14 +02:00
vno3-rp3b = nixpkgs.lib.nixosSystem {
2023-11-27 18:17:27 +02:00
system = "aarch64-linux";
modules = [
2024-02-02 15:39:22 +02:00
{nixpkgs.overlays = overlays;}
2023-11-27 18:17:27 +02:00
./hosts/vno3-rp3b/configuration.nix
2023-11-27 18:17:27 +02:00
./modules
2023-08-15 07:09:11 +03:00
2023-11-27 18:17:27 +02:00
agenix.nixosModules.default
home-manager.nixosModules.home-manager
2023-08-15 07:09:11 +03:00
2023-11-27 18:17:27 +02:00
{
age.secrets = {
motiejus-passwd-hash.file = ./secrets/motiejus_passwd_hash.age;
root-passwd-hash.file = ./secrets/root_passwd_hash.age;
sasl-passwd.file = ./secrets/postfix_sasl_passwd.age;
2023-11-27 18:17:27 +02:00
datapool-passphrase.file = ./secrets/vno3-rp3b/datapool-passphrase.age;
};
}
];
2023-08-15 07:09:11 +03:00
2023-11-27 18:17:27 +02:00
specialArgs = {inherit myData;} // inputs;
};
2023-08-15 07:09:11 +03:00
2024-02-06 09:53:14 +02:00
fra1-a = nixpkgs.lib.nixosSystem {
2023-11-27 18:17:27 +02:00
system = "aarch64-linux";
modules = [
2024-02-02 15:39:22 +02:00
{nixpkgs.overlays = overlays;}
e11sync.nixosModules.e11sync
2023-11-27 18:17:27 +02:00
agenix.nixosModules.default
home-manager.nixosModules.home-manager
2023-08-26 07:18:27 +03:00
2024-01-17 13:17:19 +02:00
./hosts/fra1-a/configuration.nix
./modules
2023-11-27 18:17:27 +02:00
{
age.secrets = {
zfs-passphrase-vno1-oh2.file = ./secrets/vno1-oh2/zfs-passphrase.age;
2024-01-25 14:48:17 +02:00
borgbackup-password.file = ./secrets/fra1-a/borgbackup-password.age;
2024-01-17 13:17:19 +02:00
e11sync-secret-key.file = ./secrets/e11sync/secret-key.age;
2023-11-27 18:17:27 +02:00
motiejus-passwd-hash.file = ./secrets/motiejus_passwd_hash.age;
root-passwd-hash.file = ./secrets/root_passwd_hash.age;
sasl-passwd.file = ./secrets/postfix_sasl_passwd.age;
};
}
];
2023-08-26 07:18:27 +03:00
2023-11-27 18:17:27 +02:00
specialArgs = {inherit myData;} // inputs;
};
2023-08-26 07:18:27 +03:00
};
2023-11-27 18:17:27 +02:00
deploy.nodes = {
vno1-oh2 = {
hostname = myData.hosts."vno1-oh2.servers.jakst".jakstIP;
profiles = {
system = {
sshUser = "motiejus";
path =
2024-02-02 15:44:59 +02:00
self.nixosConfigurations.vno1-oh2.pkgs.deploy-rs.lib.activate.nixos self.nixosConfigurations.vno1-oh2;
2023-11-27 18:17:27 +02:00
user = "root";
};
2023-07-22 16:05:44 +03:00
};
};
2023-11-27 18:17:27 +02:00
fwminex = {
hostname = myData.hosts."fwminex.motiejus.jakst".jakstIP;
profiles = {
system = {
sshUser = "motiejus";
path =
2024-02-02 15:44:59 +02:00
self.nixosConfigurations.fwminex.pkgs.deploy-rs.lib.activate.nixos self.nixosConfigurations.fwminex;
2023-11-27 18:17:27 +02:00
user = "root";
};
2023-09-15 15:05:25 +03:00
};
};
2024-04-04 19:54:51 +03:00
mtworx = {
hostname = myData.hosts."mtworx.motiejus.jakst".jakstIP;
profiles = {
system = {
sshUser = "motiejus";
path =
self.nixosConfigurations.mtworx.pkgs.deploy-rs.lib.activate.nixos self.nixosConfigurations.mtworx;
user = "root";
};
};
};
vno1-op5p = {
2024-03-11 15:17:53 +02:00
hostname = myData.hosts."vno1-op5p.servers.jakst".jakstIP;
profiles = {
system = {
sshUser = "motiejus";
path =
2024-03-10 14:57:01 +02:00
self.nixosConfigurations.vno1-op5p.pkgs.deploy-rs.lib.activate.nixos self.nixosConfigurations.vno1-op5p;
user = "root";
};
};
};
2023-11-27 18:17:27 +02:00
vno3-rp3b = {
hostname = myData.hosts."vno3-rp3b.servers.jakst".jakstIP;
profiles = {
system = {
sshUser = "motiejus";
path =
2024-02-02 15:44:59 +02:00
self.nixosConfigurations.vno3-rp3b.pkgs.deploy-rs.lib.activate.nixos self.nixosConfigurations.vno3-rp3b;
2023-11-27 18:17:27 +02:00
user = "root";
};
2023-08-16 15:58:35 +03:00
};
};
2023-08-15 07:09:11 +03:00
2023-11-27 18:17:27 +02:00
fra1-a = {
hostname = myData.hosts."fra1-a.servers.jakst".jakstIP;
profiles = {
system = {
sshUser = "motiejus";
path =
2024-02-02 15:44:59 +02:00
self.nixosConfigurations.fra1-a.pkgs.deploy-rs.lib.activate.nixos self.nixosConfigurations.fra1-a;
2023-11-27 18:17:27 +02:00
user = "root";
};
2023-08-26 07:18:27 +03:00
};
};
};
2023-10-01 22:45:00 +03:00
checks =
2023-10-01 22:51:53 +03:00
builtins.mapAttrs (
system: deployLib:
deployLib.deployChecks self.deploy
// {
pre-commit-check = inputs.pre-commit-hooks.lib.${system}.run {
2023-10-01 22:51:53 +03:00
src = ./.;
hooks = {
alejandra.enable = true;
deadnix.enable = true;
2023-11-27 17:54:44 +02:00
statix.enable = true;
2023-10-01 22:51:53 +03:00
};
};
2024-02-24 19:43:19 +02:00
2024-03-04 17:25:29 +02:00
#compress-drv-tests = let
# pkgs = import nixpkgs {inherit system;};
#in
# pkgs.callPackage ./pkgs/compress-drv-tests.nix {};
2023-10-01 22:51:53 +03:00
}
)
deploy-rs.lib;
2023-04-03 16:50:52 +03:00
}
// flake-utils.lib.eachDefaultSystem (system: let
2024-02-02 15:49:31 +02:00
pkgs = import nixpkgs {inherit system overlays;};
2023-04-03 16:50:52 +03:00
in {
2023-09-30 16:55:45 +03:00
devShells.default = pkgs.mkShellNoCC {
2024-03-10 17:20:09 +02:00
GIT_AUTHOR_EMAIL = "motiejus@jakstys.lt";
2023-09-30 16:55:45 +03:00
packages = [
2024-03-06 12:12:21 +02:00
pkgs.nix-output-monitor
2023-09-30 16:55:45 +03:00
pkgs.rage
pkgs.age-plugin-yubikey
2024-02-02 15:49:31 +02:00
pkgs.deploy-rs.deploy-rs
2023-09-30 16:55:45 +03:00
agenix.packages.${system}.agenix
];
2024-02-02 22:31:00 +02:00
inherit (self.checks.${system}.pre-commit-check) shellHook;
2023-09-30 16:55:45 +03:00
};
2023-04-03 16:50:52 +03:00
formatter = pkgs.alejandra;
2023-04-03 16:43:34 +03:00
});
2023-03-29 17:50:55 +03:00
}