snowfield/flake.nix
2023-06-06 19:36:11 +02:00

247 lines
7.8 KiB
Nix

{
description = "A flake for my personnal configurations";
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-22.11";
flake-utils.url = "github:numtide/flake-utils";
home-manager = {
url = "github:nix-community/home-manager/release-22.11";
inputs.nixpkgs.follows = "unstable";
};
home-manager-unstable = {
url = "github:nix-community/home-manager/75f4f362e1b5ebdc4076fcbdb4188b4fd736187c";
inputs.nixpkgs.follows = "unstable";
};
homepage = {
url = "github:JulienMalka/homepage";
flake = false;
};
unstable = {
url = "github:NixOS/nixpkgs/nixos-unstable";
};
deploy-rs = {
url = "github:serokell/deploy-rs";
inputs.utils.follows = "flake-utils";
inputs.nixpkgs.follows = "unstable";
};
sops-nix = {
url = "github:Mic92/sops-nix";
inputs.nixpkgs.follows = "unstable";
inputs.nixpkgs-stable.follows = "nixpkgs";
};
simple-nixos-mailserver = {
url = "gitlab:simple-nixos-mailserver/nixos-mailserver/nixos-22.11";
inputs.nixpkgs.follows = "unstable";
inputs.nixpkgs-22_11.follows = "nixpkgs";
inputs.utils.follows = "flake-utils";
};
linkal = {
url = "github:JulienMalka/Linkal/main";
inputs.flake-utils.follows = "flake-utils";
inputs.nixpkgs.follows = "nixpkgs";
};
nixos-apple-silicon = {
url = "github:tpwrules/nixos-apple-silicon/";
};
hyprland = {
url = "github:hyprwm/Hyprland";
};
hyprpaper = {
url = "github:hyprwm/hyprpaper";
};
attic = {
url = "github:zhaofengli/attic";
inputs.nixpkgs.follows = "unstable";
inputs.nixpkgs-stable.follows = "nixpkgs";
inputs.flake-utils.follows = "flake-utils";
};
nil = {
url = "github:oxalica/nil";
inputs.flake-utils.follows = "flake-utils";
inputs.nixpkgs.follows = "unstable";
};
nix-rfc-92.url = "github:obsidiansystems/nix/dynamic-drvs";
};
outputs = { self, nixpkgs, deploy-rs, ... }@inputs:
let
lib = nixpkgs.lib.extend (import ./lib inputs);
machines_plats = lib.mapAttrsToList (name: value: value.arch) lib.luj.machines;
nixpkgs_plats = builtins.listToAttrs (builtins.map
(plat: {
name = plat;
value = import nixpkgs { system = plat; };
})
machines_plats);
in
rec {
nixosModules = builtins.listToAttrs (map
(x: {
name = x;
value = import (./modules + "/${x}");
})
(builtins.attrNames (builtins.readDir ./modules)));
nixosConfigurations = builtins.mapAttrs
(name: value: (lib.mkMachine {
host = name;
host-config = value;
modules = self.nixosModules;
nixpkgs = lib.luj.machines.${name}.nixpkgs_version;
system = lib.luj.machines.${name}.arch;
home-manager = lib.luj.machines.${name}.hm_version;
}))
(lib.importConfig ./machines);
deploy.nodes.lambda = {
hostname = "lambda.julienmalka.me";
profiles.system = {
sshUser = "root";
sshOpts = [ "-p" "45" ];
remoteBuild = true;
fastConnection = true;
path = deploy-rs.lib.aarch64-linux.activate.nixos self.nixosConfigurations.lambda;
};
};
deploy.nodes.lisa = {
hostname = "lisa.julienmalka.me";
profiles.system = {
sshUser = "root";
sshOpts = [ "-p" "45" ];
fastConnection = true;
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.lisa;
magicRollback = false;
};
};
deploy.nodes.bin-cache = {
hostname = "100.100.45.22";
profiles.system = {
sshUser = "root";
sshOpts = [ "-p" "45" ];
fastConnection = true;
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.bin-cache;
};
};
deploy.nodes.core-security = {
hostname = "192.168.1.49";
profiles.system = {
sshUser = "root";
sshOpts = [ "-p" "45" ];
fastConnection = true;
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.core-security;
};
};
deploy.nodes.tower = {
hostname = "tower.julienmalka.me";
profiles.system = {
sshUser = "root";
sshOpts = [ "-p" "45" ];
magicRollback = false;
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.tower;
};
};
packages = builtins.listToAttrs
(builtins.map
(plat: {
name = plat;
value =
(lib.filterAttrs (name: value: (!lib.hasAttrByPath [ "meta" "platforms" ] value) || builtins.elem plat value.meta.platforms)
(builtins.listToAttrs (builtins.map
(e: {
name = e;
value = nixpkgs_plats.${plat}.callPackage (./packages + "/${e}") { };
})
(builtins.attrNames (builtins.readDir ./packages)))));
})
machines_plats);
lol = import ./lol.nix nixpkgs_plats.x86_64-linux nixosConfigurations.lisa.config.system.build.toplevel.drvPath;
dnsRecords = with nixpkgs.lib;
let
machineInfo = {
lisa = { vpn = "100.100.45.12"; public = "212.129.40.11"; };
lambda = { vpn = "100.100.45.13"; public = "141.145.197.219"; };
tower = { vpn = "100.100.45.9"; public = "78.192.168.230"; };
core-security = { vpn = "100.100.45.14"; public = "78.192.168.230"; };
};
splitSuffix = len: sep: string:
let l = splitString sep string;
in
[ (concatStringsSep sep (drop (length l - len) l)) (concatStringsSep sep (take (length l - len) l)) ];
isVPN = x: hasSuffix "luj" x || hasSuffix "kms" x || hasSuffix "saumon" x;
extractDomain = x:
if (isVPN x) then (splitSuffix 1 "." x) else
splitSuffix 2 "." x;
domainToRecord = machine: x:
if !(hasInfix "." x) then { } else
let
zone = head (extractDomain x);
subdomain = last (extractDomain x);
in
{
${zone} = {
TTL = 60 * 60;
NS = [ "@" ];
SOA = {
nameServer = "@";
adminEmail = "dns@saumon.network";
serial = 0;
};
} //
(if (subdomain == "") then {
A = with machineInfo.${machine};
(if isVPN x then [ vpn ] else [ public ]);
} else {
subdomains.${subdomain}.A = with machineInfo.${machine}; if isVPN x then [ vpn ] else [ public ];
});
};
getDomains = machine: with self.nixosConfigurations.${machine}.config; attrNames services.nginx.virtualHosts ++ optional services.tailscale.enable "${machine}.luj";
recursiveUpdateManyAttrs = foldl recursiveUpdate { };
in
recursiveUpdateManyAttrs (concatMap (machine: map (domainToRecord machine) (getDomains machine)) (attrNames machineInfo));
hydraJobs = {
machines.tower = self.nixosConfigurations.tower.config.system.build.toplevel;
machines.lisa = self.nixosConfigurations.lisa.config.system.build.toplevel;
machines.macintosh = self.nixosConfigurations.macintosh.config.system.build.toplevel;
machines.lambda = self.nixosConfigurations.lambda.config.system.build.toplevel;
machines.bin-cache = self.nixosConfigurations.bin-cache.config.system.build.toplevel;
packages.x86_64-linux = packages.x86_64-linux;
packages.aarch64-linux = packages.aarch64-linux;
};
};
}