snowfield/flake.nix
2023-06-10 19:28:42 +02:00

249 lines
8 KiB
Nix

{
description = "A flake for my personnal configurations";
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-23.05";
home-manager = {
url = "github:nix-community/home-manager/release-23.05";
inputs.nixpkgs.follows = "unstable";
};
homepage = {
url = "github:JulienMalka/homepage";
flake = false;
};
unstable = {
url = "github:NixOS/nixpkgs/nixos-unstable";
};
flake-utils.url = "github:numtide/flake-utils";
deploy-rs = {
url = "github:serokell/deploy-rs";
inputs.nixpkgs.follows = "unstable";
inputs.utils.follows = "flake-utils";
};
sops-nix = {
url = "github:Mic92/sops-nix";
inputs.nixpkgs.follows = "unstable";
inputs.nixpkgs-stable.follows = "nixpkgs";
};
simple-nixos-mailserver = {
url = "gitlab:simple-nixos-mailserver/nixos-mailserver/nixos-22.11";
inputs.nixpkgs.follows = "unstable";
inputs.nixpkgs-22_11.follows = "nixpkgs";
inputs.utils.follows = "flake-utils";
};
linkal = {
url = "github:JulienMalka/Linkal/main";
inputs.flake-utils.follows = "flake-utils";
inputs.nixpkgs.follows = "nixpkgs";
};
nixos-apple-silicon = {
url = "github:tpwrules/nixos-apple-silicon/";
};
hyprland = {
url = "github:hyprwm/Hyprland";
};
hyprpaper = {
url = "github:hyprwm/hyprpaper";
};
attic = {
url = "github:zhaofengli/attic";
inputs.nixpkgs.follows = "unstable";
inputs.nixpkgs-stable.follows = "nixpkgs";
inputs.flake-utils.follows = "flake-utils";
};
nil = {
url = "github:oxalica/nil";
inputs.flake-utils.follows = "flake-utils";
inputs.nixpkgs.follows = "unstable";
};
nix-index-database =
{
url = "github:Mic92/nix-index-database";
inputs.nixpkgs.follows = "nixpkgs";
};
nix-rfc-92.url = "github:obsidiansystems/nix/dynamic-drvs";
};
outputs = { self, nixpkgs, deploy-rs, ... }@inputs:
let
lib = nixpkgs.lib.extend (import ./lib inputs);
machines_plats = lib.mapAttrsToList (name: value: value.arch) lib.luj.machines;
nixpkgs_plats = builtins.listToAttrs (builtins.map
(plat: {
name = plat;
value = import nixpkgs { system = plat; };
})
machines_plats);
in
rec {
nixosModules = builtins.listToAttrs (map
(x: {
name = x;
value = import (./modules + "/${x}");
})
(builtins.attrNames (builtins.readDir ./modules)));
nixosConfigurations = builtins.mapAttrs
(name: value: (lib.mkMachine {
host = name;
host-config = value;
modules = self.nixosModules;
nixpkgs = lib.luj.machines.${name}.nixpkgs_version;
system = lib.luj.machines.${name}.arch;
home-manager = lib.luj.machines.${name}.hm_version;
}))
(lib.importConfig ./machines);
deploy.nodes.lambda = {
hostname = "lambda.luj";
profiles.system = {
sshUser = "root";
sshOpts = [ "-p" "45" ];
remoteBuild = true;
fastConnection = true;
path = deploy-rs.lib.aarch64-linux.activate.nixos self.nixosConfigurations.lambda;
};
};
deploy.nodes.lisa = {
hostname = "lisa.julienmalka.me";
profiles.system = {
sshUser = "root";
sshOpts = [ "-p" "45" ];
fastConnection = true;
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.lisa;
magicRollback = false;
};
};
deploy.nodes.bin-cache = {
hostname = "100.100.45.22";
profiles.system = {
sshUser = "root";
sshOpts = [ "-p" "45" ];
fastConnection = true;
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.bin-cache;
};
};
deploy.nodes.core-security = {
hostname = "core-security.luj";
profiles.system = {
sshUser = "root";
sshOpts = [ "-p" "45" ];
fastConnection = true;
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.core-security;
};
};
deploy.nodes.tower = {
hostname = "tower.julienmalka.me";
profiles.system = {
sshUser = "root";
sshOpts = [ "-p" "45" ];
magicRollback = false;
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.tower;
};
};
packages = builtins.listToAttrs
(builtins.map
(plat: {
name = plat;
value =
(lib.filterAttrs (name: value: (!lib.hasAttrByPath [ "meta" "platforms" ] value) || builtins.elem plat value.meta.platforms)
(builtins.listToAttrs (builtins.map
(e: {
name = e;
value = nixpkgs_plats.${plat}.callPackage (./packages + "/${e}") { };
})
(builtins.attrNames (builtins.readDir ./packages)))));
})
machines_plats);
lol = import ./lol.nix nixpkgs_plats.x86_64-linux nixosConfigurations.lisa.config.system.build.toplevel.drvPath;
machines =
let tld = "luj";
in {
lisa = {
inherit tld;
ipv4 = { public = "212.129.40.11"; vpn = "100.100.45.12"; };
ipv6 = { public = "2a01:e0a:5f9:9681:5880:c9ff:fe9f:3dfb"; vpn = "fd7a:115c:a1e0::c"; };
};
lambda = {
inherit tld;
ipv4 = { public = "141.145.197.219"; vpn = "100.100.45.13"; };
ipv6 = { vpn = "fd7a:115c:a1e0::d"; };
};
tower = {
inherit tld;
ipv4 = { public = "78.194.168.230"; local = "192.168.0.103"; vpn = "100.100.45.9"; };
ipv6 = { public = "2a01:e34:ec2a:8e60:8ec7:b5d2:f663:a67a"; vpn = "fd7a:115c:a1e0::9"; };
};
core-security = {
inherit tld;
subdomains = [ "ca.luj" ];
ipv4 = { public = "78.194.168.230"; local = "192.168.0.175"; vpn = "100.100.45.14"; };
ipv6 = { public = "2a01:e34:ec2a:8e60:cc40:3ca:a541:4ca7"; vpn = "fd7a:115c:a1e0::e"; };
};
nuage = {
inherit tld;
subdomains = [ "nuage.malka.family" ];
ipv4 = { public = "78.194.168.230"; local = "192.168.0.101"; };
ipv6 = { public = "2a01:e34:ec2a:8e60:4ab8:c3d0:a0fe:525f"; };
};
pve1 = {
inherit tld;
ipv4 = { public = "78.194.168.230"; local = "192.168.1.1"; vpn = "192.168.45.3"; };
ipv6 = { public = "2a01:e34:ec2a:8e60:d250:99ff:fefa:b62"; vpn = "fd7a:115c:a1e0::3"; };
};
pve2 = {
inherit tld;
ipv4 = { public = "78.194.168.230"; local = "192.168.1.2"; vpn = "192.168.45.15"; };
ipv6 = { public = "2a01:e34:ec2a:8e60:aaa1:59ff:fec7:1d6"; vpn = "fd7a:115c:a1e0::f"; };
};
pve3 = {
inherit tld;
ipv4 = { public = "78.194.168.230"; local = "192.168.1.3"; vpn = "192.168.45.16"; };
ipv6 = { public = "2a01:e34:ec2a:8e60:aaa1:59ff:fec1:aa10"; vpn = "fd7a:115c:a1e0::10"; };
};
pve4 = {
inherit tld;
ipv4 = { public = "78.194.168.230"; local = "192.168.1.4"; vpn = "192.168.45.17"; };
ipv6 = { public = "2a01:e34:ec2a:8e60:d250:99ff:fefa:b76"; vpn = "fd7a:115c:a1e0::11"; };
};
};
hydraJobs = {
machines.tower = self.nixosConfigurations.tower.config.system.build.toplevel;
machines.lisa = self.nixosConfigurations.lisa.config.system.build.toplevel;
machines.macintosh = self.nixosConfigurations.macintosh.config.system.build.toplevel;
machines.lambda = self.nixosConfigurations.lambda.config.system.build.toplevel;
machines.bin-cache = self.nixosConfigurations.bin-cache.config.system.build.toplevel;
packages.x86_64-linux = packages.x86_64-linux;
packages.aarch64-linux = packages.aarch64-linux;
};
};
}