config/flake.nix

109 lines
3.3 KiB
Nix
Raw Normal View History

2023-03-29 17:50:55 +03:00
{
2023-03-30 16:33:03 +03:00
description = "motiejus/config";
2023-03-29 17:50:55 +03:00
inputs = {
2023-05-30 10:03:21 +03:00
nixpkgs.url = "github:NixOS/nixpkgs/nixos-23.05";
2023-04-05 14:46:57 +03:00
flake-utils.url = "github:numtide/flake-utils";
2023-05-30 10:03:21 +03:00
# TODO: called with unexpected argument 'home-manager'
#home-manager.url = "github:nix-community/home-manager/release-23.05";
#home-manager.inputs.nixpkgs.follows = "nixpkgs";
2023-04-14 14:12:45 +03:00
agenix.url = "github:ryantm/agenix";
agenix.inputs.nixpkgs.follows = "nixpkgs";
2023-05-30 10:03:21 +03:00
# see home-manager above
#agenix.inputs.home-manager.follows = "home-manager";
agenix.inputs.home-manager.follows = "";
2023-04-14 14:12:45 +03:00
agenix.inputs.darwin.follows = "";
2023-03-30 16:33:03 +03:00
2023-04-03 16:50:52 +03:00
deploy-rs.url = "github:serokell/deploy-rs";
deploy-rs.inputs.nixpkgs.follows = "nixpkgs";
deploy-rs.inputs.utils.follows = "flake-utils";
2023-04-05 14:46:57 +03:00
};
2023-04-05 09:15:02 +03:00
2023-04-05 14:46:57 +03:00
nixConfig = {
trusted-substituters = "https://cache.nixos.org/";
trusted-public-keys = "cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=";
2023-03-29 17:50:55 +03:00
};
2023-04-03 16:50:52 +03:00
outputs = {
self,
nixpkgs,
2023-04-14 14:12:45 +03:00
agenix,
2023-04-03 16:50:52 +03:00
deploy-rs,
flake-utils,
2023-04-05 23:19:56 +03:00
} @ inputs: let
2023-04-05 09:15:02 +03:00
myData = import ./data.nix;
in
2023-04-03 16:50:52 +03:00
{
2023-07-17 16:35:45 +03:00
nixosConfigurations.vm = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
./hosts/vm/configuration.nix
./modules
];
specialArgs = {inherit myData;} // inputs;
};
2023-04-03 16:50:52 +03:00
nixosConfigurations.hel1-a = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
2023-04-14 14:12:45 +03:00
./hosts/hel1-a/configuration.nix
./hosts/hel1-a/hardware-configuration.nix
./hosts/hel1-a/zfs.nix
./modules
agenix.nixosModules.default
{
age.secrets.borgbackup-password.file = ./secrets/hel1-a/borgbackup/password.age;
age.secrets.sasl-passwd.file = ./secrets/hel1-a/postfix/sasl_passwd.age;
age.secrets.turn-static-auth-secret.file = ./secrets/hel1-a/turn/static_auth_secret.age;
age.secrets.synapse-jakstys-signing-key.file = ./secrets/hel1-a/synapse/jakstys_lt_signing_key.age;
age.secrets.synapse-registration-shared-secret.file = ./secrets/hel1-a/synapse/registration_shared_secret.age;
age.secrets.synapse-macaroon-secret-key.file = ./secrets/hel1-a/synapse/macaroon_secret_key.age;
age.secrets.motiejus-passwd-hash.file = ./secrets/motiejus_passwd_hash.age;
age.secrets.root-passwd-hash.file = ./secrets/root_passwd_hash.age;
}
2023-04-03 16:50:52 +03:00
];
2023-04-05 23:19:56 +03:00
2023-04-14 14:12:45 +03:00
specialArgs = {inherit myData;} // inputs;
2023-04-03 16:50:52 +03:00
};
2023-03-30 16:33:03 +03:00
2023-04-03 17:17:40 +03:00
deploy.nodes.hel1-a = {
2023-04-03 16:50:52 +03:00
hostname = "hel1-a.servers.jakst";
profiles = {
system = {
sshUser = "motiejus";
path =
deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.hel1-a;
user = "root";
};
2023-03-30 16:33:03 +03:00
};
2023-03-29 17:50:55 +03:00
};
2023-03-30 16:33:03 +03:00
2023-04-03 16:50:52 +03:00
checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib;
}
// flake-utils.lib.eachDefaultSystem (system: let
pkgs = import nixpkgs {inherit system;};
in {
devShells.default = with pkgs;
mkShell {
2023-04-05 14:46:57 +03:00
packages = [
2023-04-14 14:12:45 +03:00
pkgs.rage
2023-04-05 22:48:04 +03:00
pkgs.ssh-to-age
2023-04-14 14:12:45 +03:00
pkgs.age-plugin-yubikey
2023-07-17 17:46:10 +03:00
pkgs.borgbackup
2023-04-14 14:12:45 +03:00
agenix.packages.${system}.agenix
2023-04-05 22:48:04 +03:00
deploy-rs.packages.${system}.deploy-rs
2023-04-05 14:46:57 +03:00
];
2023-04-03 16:50:52 +03:00
};
formatter = pkgs.alejandra;
2023-04-03 16:43:34 +03:00
});
2023-03-29 17:50:55 +03:00
}