nixos-config/flake.nix

240 lines
7.7 KiB
Nix

{
inputs.nixpkgs.url = "github:NixOS/nixpkgs/nixos-22.11";
inputs.nixpkgs-unstable.url = "github:NixOS/nixpkgs/nixos-unstable";
inputs.nixpkgs-glslls.url = "github:felschr/nixpkgs/glsl-language-server";
inputs.nixpkgs-mullvad-browser.url = "github:felschr/nixpkgs/mullvad-browser";
inputs.nixos-hardware.url = "github:NixOS/nixos-hardware/master";
inputs.flake-utils.url = "github:numtide/flake-utils";
inputs.home-manager = {
url = "github:nix-community/home-manager/release-22.11";
inputs.nixpkgs.follows = "nixpkgs";
inputs.utils.follows = "flake-utils";
};
inputs.nur.url = "github:nix-community/NUR/master";
inputs.agenix = {
url = "github:ryantm/agenix";
inputs.nixpkgs.follows = "nixpkgs";
};
inputs.deploy-rs = {
url = "github:serokell/deploy-rs";
inputs.nixpkgs.follows = "nixpkgs";
inputs.utils.follows = "flake-utils";
};
inputs.pre-commit-hooks = {
url = "github:cachix/pre-commit-hooks.nix";
inputs.nixpkgs.follows = "nixpkgs";
inputs.nixpkgs-stable.follows = "nixpkgs";
inputs.flake-utils.follows = "flake-utils";
};
inputs.nvim-kitty-navigator = {
url = "github:hermitmaster/nvim-kitty-navigator";
flake = false;
};
outputs = { self, nixpkgs, nixpkgs-unstable, nixos-hardware, flake-utils
, home-manager, nur, agenix, deploy-rs, pre-commit-hooks
, nvim-kitty-navigator, nixpkgs-glslls, nixpkgs-mullvad-browser }@inputs:
let
nixpkgsConfig.allowUnfree = true;
overlays = {
unstable = final: prev: {
unstable = import nixpkgs-unstable {
inherit (prev) system;
config = nixpkgsConfig;
};
};
neovim = final: prev:
let
buildVimPlugin = name: input:
prev.pkgs.vimUtils.buildVimPluginFrom2Nix {
pname = name;
version = input.rev;
versionSuffix = "-git";
src = input;
};
in {
vimPlugins = prev.vimPlugins // {
nvim-kitty-navigator =
buildVimPlugin "nvim-kitty-navigator" nvim-kitty-navigator;
};
};
deconz = final: prev: {
deconz = final.qt5.callPackage ./pkgs/deconz { };
};
glslls = final: prev: {
inherit (nixpkgs-glslls.legacyPackages.${final.system})
glsl-language-server;
};
mullvad-browser = final: prev: {
inherit (nixpkgs-mullvad-browser.legacyPackages.${final.system})
mullvad-browser;
};
};
nixosModules = {
flakeDefaults = import ./modules/flakeDefaults.nix;
systemdNotify = import ./modules/systemdNotify.nix;
};
homeManagerModules = {
git = import ./home/modules/git.nix;
firefox = import ./home/modules/firefox/firefox.nix;
mullvad-browser = import ./home/modules/firefox/mullvad-browser.nix;
tor-browser = import ./home/modules/firefox/tor-browser.nix;
};
systemDefaults = {
modules = [ nixosModules.flakeDefaults agenix.nixosModules.default ];
overlays = with overlays; [
unstable
nur.overlay
neovim
deconz
glslls
mullvad-browser
];
};
lib = rec {
createSystem = hostName:
{ hardwareConfig, config }:
({ pkgs, lib, ... }: {
networking.hostName = hostName;
nixpkgs.overlays = systemDefaults.overlays;
imports = systemDefaults.modules ++ [
hardwareConfig
config
{
# make arguments available to modules
_module.args = { inherit self inputs; };
}
];
environment.systemPackages = with pkgs;
[ agenix.packages.x86_64-linux.default ];
});
createUser' = import ./lib/createUser.nix;
createUser = name: args:
({ pkgs, ... }@args2:
(createUser' name args) ({ inherit home-manager; } // args2));
createMediaGroup = _: { users.groups.media.gid = 600; };
};
in rec {
inherit lib overlays nixosModules homeManagerModules;
nixosConfigurations.home-pc = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
nixpkgs.nixosModules.notDetected
nixos-hardware.nixosModules.common-pc
nixos-hardware.nixosModules.common-pc-ssd
nixos-hardware.nixosModules.common-cpu-amd-pstate
nixos-hardware.nixosModules.common-gpu-amd
(lib.createSystem "home-pc" {
hardwareConfig = ./hardware/home-pc.nix;
config = ./home-pc.nix;
})
lib.createMediaGroup
(lib.createUser "felschr" {
user.extraGroups = [ "wheel" "audio" "disk" "media" ];
modules = [ homeManagerModules.git ];
config = ./home/felschr.nix;
})
({ pkgs, ... }: {
environment.systemPackages = with pkgs;
[ deploy-rs.defaultPackage.x86_64-linux ];
})
];
};
nixosConfigurations.pilot1 = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
nixpkgs.nixosModules.notDetected
nixos-hardware.nixosModules.common-pc
nixos-hardware.nixosModules.common-pc-ssd
nixos-hardware.nixosModules.common-cpu-intel
(lib.createSystem "pilot1" {
hardwareConfig = ./hardware/pilot1.nix;
config = ./work-pc.nix;
})
(lib.createUser "felschr" {
user.extraGroups = [ "wheel" "audio" "disk" ];
modules = [ homeManagerModules.git ];
config = ./home/felschr-work.nix;
})
];
};
nixosConfigurations.home-server = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
nixpkgs.nixosModules.notDetected
nixos-hardware.nixosModules.common-pc
nixos-hardware.nixosModules.common-pc-ssd
nixos-hardware.nixosModules.common-cpu-intel-kaby-lake
(lib.createSystem "home-server" {
hardwareConfig = ./hardware/lattepanda.nix;
config = ./home-server.nix;
})
lib.createMediaGroup
(lib.createUser "felschr" {
user = {
extraGroups = [ "wheel" "audio" "disk" "media" ];
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP751vlJUnB7Pfe1KNr6weWkx/rkP4J3lTYpAekHdOgV"
];
};
modules = [ homeManagerModules.git ];
config = ./home/felschr-server.nix;
})
];
};
deploy.nodes.home-server = {
hostname = "192.168.1.102";
profiles.system = {
user = "felschr";
path = deploy-rs.lib.x86_64-linux.activate.nixos
self.nixosConfigurations.home-server;
};
};
} // flake-utils.lib.eachSystem [ "x86_64-linux" "aarch64-linux" ] (system:
let
pkgs = import nixpkgs {
inherit system;
config = nixpkgsConfig;
};
in rec {
formatter = pkgs.nixfmt;
packages = { deconz = pkgs.qt5.callPackage ./pkgs/deconz { }; };
apps = { deconz = flake-utils.lib.mkApp { drv = packages.deconz; }; };
devShells.default =
pkgs.mkShell { inherit (checks.pre-commit) shellHook; };
checks = deploy-rs.lib.${system}.deployChecks self.deploy // {
pre-commit = pre-commit-hooks.lib.${system}.run {
src = ./.;
hooks = {
nixfmt.enable = true;
shellcheck.enable = true;
};
};
};
});
}