nixos-config/flake.nix

220 lines
7.3 KiB
Nix

rec {
description = "felschr's NixOS configuration";
nixConfig = {
extra-substituters = [
"https://nix-community.cachix.org"
"https://wurzelpfropf.cachix.org" # ragenix
"https://felschr.cachix.org"
];
extra-trusted-public-keys = [
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
"wurzelpfropf.cachix.org-1:ilZwK5a6wJqVr7Fyrzp4blIEkGK+LJT0QrpWr1qBNq0="
"felschr.cachix.org-1:raomy5XA2tsVkBoG6wo70ARIn+V24IXhWaSe3QZo12A="
];
};
inputs = {
nixpkgs.url = "https://flakehub.com/f/NixOS/nixpkgs/0.2311.tar.gz";
nixpkgs-unstable.url = "https://flakehub.com/f/NixOS/nixpkgs/0.1.tar.gz";
nixos-hardware.url =
"https://flakehub.com/f/NixOS/nixos-hardware/0.1.tar.gz";
fh = {
url = "https://flakehub.com/f/DeterminateSystems/fh/0.1.tar.gz";
inputs.nixpkgs.follows = "nixpkgs";
};
flake-parts = {
url = "github:hercules-ci/flake-parts";
inputs.nixpkgs-lib.follows = "nixpkgs";
};
flake-utils.url = "https://flakehub.com/f/numtide/flake-utils/0.1.tar.gz";
home-manager = {
url = "https://flakehub.com/f/nix-community/home-manager/0.2311.tar.gz";
inputs.nixpkgs.follows = "nixpkgs";
};
firefox-addons = {
url = "gitlab:rycee/nur-expressions?dir=pkgs/firefox-addons";
inputs.nixpkgs.follows = "nixpkgs";
};
arkenfox-userjs = {
url = "github:arkenfox/user.js";
flake = false;
};
agenix = {
url = "github:yaxitech/ragenix";
inputs.nixpkgs.follows = "nixpkgs";
inputs.flake-utils.follows = "flake-utils";
};
deploy-rs = {
url = "github:serokell/deploy-rs";
inputs.nixpkgs.follows = "nixpkgs";
inputs.utils.follows = "flake-utils";
};
pre-commit-hooks = {
url = "github:cachix/pre-commit-hooks.nix";
inputs.nixpkgs.follows = "nixpkgs";
inputs.nixpkgs-stable.follows = "nixpkgs";
inputs.flake-utils.follows = "flake-utils";
};
matrix-appservices = {
url = "gitlab:coffeetables/nix-matrix-appservices";
inputs.nixpkgs.follows = "nixpkgs";
};
nvim-kitty-navigator = {
url = "github:hermitmaster/nvim-kitty-navigator";
flake = false;
};
};
outputs = { self, nixpkgs, nixpkgs-unstable, ... }@inputs:
inputs.flake-parts.lib.mkFlake { inherit inputs; } {
systems = [ "x86_64-linux" "aarch64-linux" ];
imports = [ ./lib ./overlays.nix ];
flake = {
inherit nixConfig;
nixosModules = {
flakeDefaults = import ./modules/flakeDefaults.nix;
systemdNotify = import ./modules/systemdNotify.nix;
inadyn = import ./modules/inadyn.nix;
};
homeManagerModules = {
git = import ./home/modules/git.nix;
firefox = import ./home/modules/firefox/firefox.nix;
tor-browser = import ./home/modules/firefox/tor-browser.nix;
mullvad-browser = import ./home/modules/firefox/mullvad-browser.nix;
};
nixosConfigurations = {
home-pc = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
nixpkgs.nixosModules.notDetected
inputs.nixos-hardware.nixosModules.common-pc
inputs.nixos-hardware.nixosModules.common-pc-ssd
inputs.nixos-hardware.nixosModules.common-cpu-amd-pstate
inputs.nixos-hardware.nixosModules.common-gpu-amd
(self.lib.createSystem "home-pc" {
hardwareConfig = ./hardware/home-pc.nix;
config = ./hosts/home-pc.nix;
})
self.lib.createMediaGroup
(self.lib.createUser "felschr" {
user.extraGroups =
[ "wheel" "audio" "disk" "libvirtd" "qemu-libvirtd" "media" ];
modules = [ self.homeManagerModules.git ];
config = ./home/felschr.nix;
usesContainers = true;
})
({ pkgs, ... }: {
environment.systemPackages =
[ inputs.deploy-rs.defaultPackage.x86_64-linux ];
})
];
specialArgs = { inherit inputs; };
};
pilot1 = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
nixpkgs.nixosModules.notDetected
inputs.nixos-hardware.nixosModules.common-pc
inputs.nixos-hardware.nixosModules.common-pc-ssd
inputs.nixos-hardware.nixosModules.common-cpu-intel
(self.lib.createSystem "pilot1" {
hardwareConfig = ./hardware/pilot1.nix;
config = ./hosts/work-pc.nix;
})
(self.lib.createUser "felschr" {
user.extraGroups = [ "wheel" "audio" "disk" ];
modules = [ self.homeManagerModules.git ];
config = ./home/felschr-work.nix;
usesContainers = true;
})
];
specialArgs = { inherit inputs; };
};
home-server = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
nixpkgs.nixosModules.notDetected
inputs.nixos-hardware.nixosModules.common-pc
inputs.nixos-hardware.nixosModules.common-pc-ssd
inputs.nixos-hardware.nixosModules.common-cpu-intel-kaby-lake
inputs.matrix-appservices.nixosModule
(self.lib.createSystem "home-server" {
hardwareConfig = ./hardware/lattepanda.nix;
config = ./hosts/home-server.nix;
})
self.lib.createMediaGroup
(self.lib.createUser "felschr" {
user = {
extraGroups = [ "wheel" "audio" "disk" "media" ];
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP751vlJUnB7Pfe1KNr6weWkx/rkP4J3lTYpAekHdOgV"
];
};
modules = [ self.homeManagerModules.git ];
config = ./home/felschr-server.nix;
})
];
specialArgs = { inherit inputs; };
};
};
deploy.nodes.home-server = {
hostname = "192.168.1.102";
profiles.system = {
sshUser = "felschr";
sshOpts = [ "-t" ];
user = "root";
path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos
self.nixosConfigurations.home-server;
magicRollback = false; # otherwise password prompt won't work
};
};
};
perSystem = { system, config, pkgs, ... }: {
_module.args.pkgs = import nixpkgs {
inherit system;
config.allowUnfree = true;
};
packages = import ./pkgs { inherit pkgs; };
apps = {
deconz =
inputs.flake-utils.lib.mkApp { drv = config.packages.deconz; };
};
devShells.default =
pkgs.mkShell { inherit (config.checks.pre-commit) shellHook; };
checks = inputs.deploy-rs.lib.${system}.deployChecks self.deploy // {
pre-commit = inputs.pre-commit-hooks.lib.${system}.run {
src = ./.;
hooks = {
nixfmt.enable = true;
shellcheck.enable = true;
};
};
};
formatter = pkgs.nixfmt;
};
};
}