blob: 9a85b95c1445c88bdd51877fd9e7ef59362aa41c (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
|
{
description = "testing nix flakes for server deployment";
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/release-22.05";
nixpkgs-unstable.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
home-manager.url = "github:nix-community/home-manager/release-22.05";
home-manager.inputs.nixpkgs.follows = "nixpkgs";
naersk.url = "github:nix-community/naersk";
naersk.inputs.nixpkgs.follows = "nixpkgs";
deploy-rs.url = "github:serokell/deploy-rs";
deploy-rs.inputs.nixpkgs.follows = "nixpkgs";
simple-nixos-mailserver.url = "gitlab:simple-nixos-mailserver/nixos-mailserver/master";
uplcg.url = "git+https://stuebinm.eu/git/uplcg?ref=main";
uplcg.flake = false;
tracktrain.url = "git+https://stuebinm.eu/git/tracktrain?rev=46a24c8a90d4e6e794a2c6ed79da94e02e2c7eab&ref=main";
tracktrain.flake = false;
blog.url = "path:/home/stuebinm/projects/blog?rev=61d09465b5285f4c5d5420cc9aa3f483072fb765";
blog.flake = false;
playground.url = "git+https://stuebinm.eu/git/playground";
playground.flake = false;
traveltext.url = "git+https://stuebinm.eu/git/traveltext?ref=main";
traveltext.flake = false;
sfz.url = "github:weihanglo/sfz";
sfz.flake = false;
almanac.url = "path:/home/stuebinm/clones/almanac";
almanac.flake = false;
feeds.url = "path:/home/stuebinm/nonpublic.nix";
feeds.flake = false;
gtfsBooks.url = "git+https://stuebinm.eu/git/gtfs-books?ref=main";
gtfsBooks.flake = false;
walint.url = "git+https://stuebinm.eu/git/walint?ref=playground";
walint.flake = false;
};
outputs = { self, nixpkgs, deploy-rs, ... }@inputs:
let
mkConfig = imports: config:
nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [ config ] ++ imports;
specialArgs = { inherit inputs; };
};
mkServer = mkConfig [ ./common/headless.nix ];
mkDesktop = mkConfig [ ./common/desktop.nix ];
deploy-vps = hostname: {
inherit hostname;
profiles.system = {
user = "root";
sshUser = "root";
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.${hostname};
};
};
in {
nixosConfigurations = {
chaski = mkServer ./chaski/configuration.nix;
flora = mkServer ./flora/configuration.nix;
abbenay = mkDesktop ./abbenay/configuration.nix;
cyberbox = mkDesktop ./cyberbox/configuration.nix;
surltesh-echer = mkDesktop ./surltesh-echer/configuration.nix;
};
deploy.nodes = {
chaski = deploy-vps "chaski";
flora = deploy-vps "flora";
};
checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib;
homeConfigurations =
let home = root: inputs.home-manager.lib.homeManagerConfiguration rec {
system = "x86_64-linux";
homeDirectory = "/home/stuebinm";
username = "stuebinm";
configuration.imports = [ root ];
stateVersion = "21.03";
extraSpecialArgs = { inherit inputs system; };
};
in {
stuebinm = home ./home/home.nix;
stuebinm-minimal = home ./home/home-minimal.nix;
};
home = self.homeConfigurations.stuebinm.activationPackage;
home-minimal = self.homeConfigurations.stuebinm-minimal.activationPackage;
};
}
|