-
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathflake.nix
122 lines (108 loc) · 3.48 KB
/
flake.nix
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
{
description = "NixOS configuration for affecting servers";
# NixOS 24.11
inputs.nixpkgs.url = "github:nixos/nixpkgs/nixos-24.11";
inputs.nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable";
# Home Manager
inputs.home-manager.url = "github:nix-community/home-manager/release-24.11";
inputs.home-manager.inputs.nixpkgs.follows = "nixpkgs";
# Nix User Repository
inputs.nur.url = "github:nix-community/NUR";
# Nix Index Database
inputs.nix-index-database.url = "github:Mic92/nix-index-database";
inputs.nix-index-database.inputs.nixpkgs.follows = "nixpkgs";
# Disko
inputs.disko.url = "github:nix-community/disko";
inputs.disko.inputs.nixpkgs.follows = "nixpkgs";
# NixOS config deployer
inputs.deploy-rs.url = "github:serokell/deploy-rs";
inputs.deploy-rs.inputs.nixpkgs.follows = "nixpkgs";
outputs = inputs:
with inputs; let
# If theres secrets in the secrets.json file
# secrets = builtins.fromJSON (builtins.readFile "${self}/secrets.json");
nixpkgsWithOverlays = with inputs; rec {
config = {
allowUnfree = true;
permittedInsecurePackages = [
];
};
overlays = [
nur.overlay
(_final: prev: {
# this allows us to reference pkgs.unstable
unstable = import nixpkgs-unstable {
inherit (prev) system;
inherit config;
};
})
];
};
configurationDefaults = args: {
nixpkgs = nixpkgsWithOverlays;
home-manager.useGlobalPkgs = true;
home-manager.useUserPackages = true;
home-manager.backupFileExtension = "hm-backup";
home-manager.extraSpecialArgs = args;
};
argDefaults = {
inherit inputs self nix-index-database;
channels = {
inherit nixpkgs nixpkgs-unstable;
};
};
mkNixosConfiguration =
{ system ? "x86_64-linux"
, hostname
, username
, args ? { }
, modules
,
}:
let
specialArgs = argDefaults // { inherit hostname username; } // args;
in
nixpkgs.lib.nixosSystem {
inherit system specialArgs;
modules =
[
(configurationDefaults specialArgs)
home-manager.nixosModules.home-manager
]
++ modules;
};
in
{
formatter.x86_64-linux = nixpkgs.legacyPackages.x86_64-linux.nixpkgs-fmt;
formatter.aarch64-linux = nixpkgs.legacyPackages.x86_64-linux.nixpkgs-fmt;
formatter.aarch64-darwin = nixpkgs.legacyPackages.x86_64-linux.nixpkgs-fmt;
nixosConfigurations.robot = mkNixosConfiguration {
hostname = "robot";
system = "aarch64-linux";
username = "sakhib";
modules = [
# ./amd.nix
disko.nixosModules.disko
./robot.nix
./linux.nix
];
};
deploy = {
sshUser = "sakhib";
user = "sakhib";
autoRollback = false;
magicRollback = false;
remoteBuild = true;
nodes = {
robot = {
hostname = "65.109.74.214";
profiles.system = {
path = deploy-rs.lib.aarch64-linux.activate.nixos self.nixosConfigurations.robot;
};
};
};
};
# This is highly advised, and will prevent many possible mistakes
checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib;
};
}