config/flake.nix

238 lines
7.3 KiB
Nix
Raw Normal View History

2023-03-29 17:50:55 +03:00
{
2023-03-30 16:33:03 +03:00
description = "motiejus/config";
2023-03-29 17:50:55 +03:00
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-23.05";
2023-04-05 14:46:57 +03:00
flake-utils.url = "github:numtide/flake-utils";
2023-08-18 13:47:27 +03:00
home-manager.url = "github:nix-community/home-manager/release-23.05";
home-manager.inputs.nixpkgs.follows = "nixpkgs";
2023-05-30 10:03:21 +03:00
2023-09-14 21:46:01 +03:00
nixos-hardware.url = "github:NixOS/nixos-hardware/master";
2023-04-14 14:12:45 +03:00
agenix.url = "github:ryantm/agenix";
agenix.inputs.nixpkgs.follows = "nixpkgs";
2023-08-18 13:47:27 +03:00
agenix.inputs.home-manager.follows = "home-manager";
2023-04-14 14:12:45 +03:00
agenix.inputs.darwin.follows = "";
2023-03-30 16:33:03 +03:00
2023-04-03 16:50:52 +03:00
deploy-rs.url = "github:serokell/deploy-rs";
deploy-rs.inputs.nixpkgs.follows = "nixpkgs";
deploy-rs.inputs.utils.follows = "flake-utils";
2023-09-15 14:39:04 +03:00
2023-09-21 06:06:10 +03:00
nix-index-database.url = "github:Mic92/nix-index-database";
nix-index-database.inputs.nixpkgs.follows = "nixpkgs";
2023-09-15 14:39:04 +03:00
nur.url = "github:nix-community/NUR";
2023-04-05 14:46:57 +03:00
};
2023-04-05 09:15:02 +03:00
2023-04-05 14:46:57 +03:00
nixConfig = {
trusted-substituters = "https://cache.nixos.org/";
trusted-public-keys = "cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=";
2023-03-29 17:50:55 +03:00
};
2023-04-03 16:50:52 +03:00
outputs = {
self,
nixpkgs,
2023-04-14 14:12:45 +03:00
agenix,
2023-04-03 16:50:52 +03:00
deploy-rs,
flake-utils,
2023-08-18 13:47:27 +03:00
home-manager,
2023-09-14 21:46:01 +03:00
nixos-hardware,
2023-09-21 06:06:10 +03:00
nix-index-database,
2023-09-15 14:39:04 +03:00
nur,
2023-04-05 23:19:56 +03:00
} @ inputs: let
2023-04-05 09:15:02 +03:00
myData = import ./data.nix;
2023-10-01 22:29:59 +03:00
mkDeployPkgs = system:
import nixpkgs {
system = system;
overlays = [
deploy-rs.overlay
(_self: super: {
deploy-rs = {
inherit (import nixpkgs {system = system;}) deploy-rs;
lib = super.deploy-rs.lib;
};
})
];
};
deployPkgsIA64 = mkDeployPkgs "x86_64-linux";
deployPkgsArm64 = mkDeployPkgs "aarch64-linux";
2023-04-05 09:15:02 +03:00
in
2023-04-03 16:50:52 +03:00
{
2023-07-22 16:05:44 +03:00
#nixosConfigurations.vm = nixpkgs.lib.nixosSystem {
# system = "x86_64-linux";
# modules = [
# ./hosts/vm/configuration.nix
# ./modules
# ];
2023-07-17 16:35:45 +03:00
2023-07-22 16:05:44 +03:00
# specialArgs = {inherit myData;} // inputs;
#};
2023-07-17 16:35:45 +03:00
2023-07-22 16:05:44 +03:00
nixosConfigurations.vno1-oh2 = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
./hosts/vno1-oh2/configuration.nix
./modules
agenix.nixosModules.default
home-manager.nixosModules.home-manager
2023-07-22 16:05:44 +03:00
{
age.secrets.motiejus-passwd-hash.file = ./secrets/motiejus_passwd_hash.age;
age.secrets.root-passwd-hash.file = ./secrets/root_passwd_hash.age;
2023-08-26 23:45:03 +03:00
age.secrets.zfs-passphrase-fra1-a.file = ./secrets/fra1-a/zfs-passphrase.age;
2023-07-26 14:23:12 +03:00
age.secrets.headscale-client-oidc.file = ./secrets/headscale/oidc_client_secret2.age;
2023-07-26 14:23:12 +03:00
age.secrets.sasl-passwd.file = ./secrets/postfix_sasl_passwd.age;
age.secrets.borgbackup-password.file = ./secrets/vno1-oh2/borgbackup/password.age;
age.secrets.grafana-oidc.file = ./secrets/grafana.jakstys.lt/oidc.age;
age.secrets.letsencrypt-account-key.file = ./secrets/letsencrypt/account.key.age;
2023-09-07 13:04:38 +03:00
age.secrets.vaultwarden-secrets-env.file = ./secrets/vaultwarden/secrets.env.age;
2023-08-25 15:55:06 +03:00
age.secrets.synapse-jakstys-signing-key.file = ./secrets/synapse/jakstys_lt_signing_key.age;
age.secrets.synapse-registration-shared-secret.file = ./secrets/synapse/registration_shared_secret.age;
age.secrets.synapse-macaroon-secret-key.file = ./secrets/synapse/macaroon_secret_key.age;
2023-07-22 16:05:44 +03:00
}
];
specialArgs = {inherit myData;} // inputs;
};
2023-09-13 12:17:43 +03:00
nixosConfigurations.fwminex = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
2023-09-15 15:05:25 +03:00
{nixpkgs.overlays = [nur.overlay];}
2023-09-13 12:17:43 +03:00
./hosts/fwminex/configuration.nix
./modules
2023-09-14 21:52:10 +03:00
./modules/profiles/desktop
2023-09-13 12:17:43 +03:00
2023-09-15 14:39:04 +03:00
nur.nixosModules.nur
2023-09-13 12:17:43 +03:00
agenix.nixosModules.default
home-manager.nixosModules.home-manager
2023-09-14 21:46:01 +03:00
nixos-hardware.nixosModules.framework-12th-gen-intel
2023-09-21 06:06:10 +03:00
nix-index-database.nixosModules.nix-index
2023-09-13 12:17:43 +03:00
{
2023-09-15 13:23:52 +03:00
age.secrets.motiejus-passwd-hash.file = ./secrets/motiejus_passwd_hash.age;
age.secrets.root-passwd-hash.file = ./secrets/root_passwd_hash.age;
age.secrets.sasl-passwd.file = ./secrets/postfix_sasl_passwd.age;
2023-09-13 12:17:43 +03:00
}
];
specialArgs = {inherit myData;} // inputs;
};
nixosConfigurations.vno3-rp3b = nixpkgs.lib.nixosSystem {
2023-08-15 07:09:11 +03:00
modules = [
./hosts/vno3-rp3b/configuration.nix
2023-08-15 07:09:11 +03:00
./modules
agenix.nixosModules.default
home-manager.nixosModules.home-manager
2023-08-15 07:09:11 +03:00
{
age.secrets.motiejus-passwd-hash.file = ./secrets/motiejus_passwd_hash.age;
age.secrets.root-passwd-hash.file = ./secrets/root_passwd_hash.age;
age.secrets.sasl-passwd.file = ./secrets/postfix_sasl_passwd.age;
age.secrets.datapool-passphrase.file = ./secrets/vno3-rp3b/datapool-passphrase.age;
2023-08-15 07:09:11 +03:00
}
];
specialArgs = {inherit myData;} // inputs;
};
2023-08-26 07:18:27 +03:00
nixosConfigurations.fra1-a = nixpkgs.lib.nixosSystem {
modules = [
./hosts/fra1-a/configuration.nix
./modules
agenix.nixosModules.default
home-manager.nixosModules.home-manager
{
2023-08-26 23:45:03 +03:00
age.secrets.zfs-passphrase-vno1-oh2.file = ./secrets/vno1-oh2/zfs-passphrase.age;
2023-08-26 07:18:27 +03:00
age.secrets.motiejus-passwd-hash.file = ./secrets/motiejus_passwd_hash.age;
age.secrets.root-passwd-hash.file = ./secrets/root_passwd_hash.age;
age.secrets.sasl-passwd.file = ./secrets/postfix_sasl_passwd.age;
}
];
specialArgs = {inherit myData;} // inputs;
};
2023-07-22 16:05:44 +03:00
deploy.nodes.vno1-oh2 = {
2023-07-28 15:37:19 +03:00
hostname = myData.hosts."vno1-oh2.servers.jakst".jakstIP;
2023-07-22 16:05:44 +03:00
profiles = {
system = {
2023-07-22 20:27:49 +03:00
sshUser = "motiejus";
2023-07-22 16:05:44 +03:00
path =
deployPkgsIA64.deploy-rs.lib.activate.nixos self.nixosConfigurations.vno1-oh2;
2023-07-22 16:05:44 +03:00
user = "root";
};
};
};
2023-09-15 15:05:25 +03:00
deploy.nodes.fwminex = {
hostname = myData.hosts."fwminex.motiejus.jakst".jakstIP;
profiles = {
system = {
sshUser = "motiejus";
path =
deployPkgsIA64.deploy-rs.lib.activate.nixos self.nixosConfigurations.fwminex;
2023-09-15 15:05:25 +03:00
user = "root";
};
};
};
deploy.nodes.vno3-rp3b = {
hostname = myData.hosts."vno3-rp3b.servers.jakst".jakstIP;
2023-08-16 15:58:35 +03:00
profiles = {
system = {
2023-08-16 16:16:49 +03:00
sshUser = "motiejus";
2023-08-16 15:58:35 +03:00
path =
deployPkgsArm64.deploy-rs.lib.activate.nixos self.nixosConfigurations.vno3-rp3b;
2023-08-16 15:58:35 +03:00
user = "root";
};
};
};
2023-08-15 07:09:11 +03:00
2023-08-26 07:18:27 +03:00
deploy.nodes.fra1-a = {
hostname = myData.hosts."fra1-a.servers.jakst".jakstIP;
profiles = {
system = {
sshUser = "motiejus";
path =
deployPkgsArm64.deploy-rs.lib.activate.nixos self.nixosConfigurations.fra1-a;
2023-08-26 07:18:27 +03:00
user = "root";
};
};
};
2023-09-30 17:06:41 +03:00
checks = builtins.mapAttrs (_system: deployLib:
deployLib.deployChecks self.deploy)
deploy-rs.lib;
2023-04-03 16:50:52 +03:00
}
// flake-utils.lib.eachDefaultSystem (system: let
pkgs = import nixpkgs {inherit system;};
in {
2023-09-30 16:55:45 +03:00
devShells.default = pkgs.mkShellNoCC {
packages = [
pkgs.rage
pkgs.ssh-to-age
pkgs.age-plugin-yubikey
pkgs.deploy-rs
agenix.packages.${system}.agenix
];
};
2023-04-03 16:50:52 +03:00
formatter = pkgs.alejandra;
2023-04-03 16:43:34 +03:00
});
2023-03-29 17:50:55 +03:00
}