dotfiles/flake.nix

346 lines
9.9 KiB
Nix
Raw Normal View History

2021-05-30 20:41:33 +01:00
{
description = "NixOS configuration with flakes";
2023-08-13 17:00:41 +01:00
outputs = {
alejandra,
2024-01-15 14:15:15 +00:00
cryptpad,
darwin,
disko,
endless-sky,
2023-08-13 17:00:41 +01:00
flake-compat,
flake-utils,
helix,
2023-08-13 17:00:41 +01:00
home-manager,
nil,
2023-12-18 21:02:29 +00:00
nix-ld,
nixos-hardware,
2023-08-13 17:00:41 +01:00
nixpkgs-master,
nixpkgs-nixos-unstable,
nixpkgs-rust-analyzer,
2023-08-13 17:00:41 +01:00
nixpkgs-stable,
nur,
self,
2023-08-13 17:00:41 +01:00
sops,
veracrypt,
2023-08-13 17:00:41 +01:00
} @ inputs: let
mkServer = pkgs: system: hostname:
pkgs.lib.nixosSystem {
inherit system;
modules = [
(./. + "/nixos/boxes/${hostname}")
(import ./nixos/server-common.nix)
sops.nixosModules.sops
disko.nixosModules.disko
2024-01-15 14:15:15 +00:00
({pkgs, ...}: {
nixpkgs.overlays = [inputs.cryptpad.overlays.default];
})
inputs.cryptpad.nixosModules.cryptpad
2023-08-13 17:00:41 +01:00
];
specialArgs = {inherit inputs system;};
};
mkRaspi = pkgs: hostname:
pkgs.lib.nixosSystem {
system = "aarch64-linux";
modules = [
(./. + "/nixos/boxes/${hostname}")
sops.nixosModules.sops
];
specialArgs = {inherit inputs;};
};
mkKiosk = pkgs: system: hostname:
pkgs.lib.nixosSystem {
inherit system;
modules = [
(./. + "/nixos/boxes/${hostname}")
(import ./nixos/common.nix)
sops.nixosModules.sops
2021-05-31 09:15:44 +01:00
2023-08-13 17:00:41 +01:00
home-manager.nixosModules.home-manager
{
home-manager.useGlobalPkgs = true;
home-manager.useUserPackages = true;
home-manager.users.cyryl = {
imports = [./nixos/home-manager ./nixos/home-manager/linux.nix];
_module.args.inputs = inputs;
_module.args.system = system;
2022-03-08 00:17:06 +00:00
};
2023-08-13 17:00:41 +01:00
}
];
specialArgs = {
inherit inputs system;
nixpkgs-nixos-stable-and-unfree = import nixpkgs-stable {
inherit system;
config = {allowUnfree = true;};
};
nixpkgs-nixos-unstable-and-unfree = import nixpkgs-nixos-unstable {
inherit system;
config = {allowUnfree = true;};
2022-12-19 09:09:08 +00:00
};
};
2023-08-13 17:00:41 +01:00
};
mkWorkstation = pkgs: system: hostname:
pkgs.lib.nixosSystem {
inherit system;
modules = [
(./. + "/nixos/boxes/${hostname}")
(import ./nixos/email-accounts.nix)
(import ./nixos/common.nix)
sops.nixosModules.sops
disko.nixosModules.disko
2023-12-18 21:02:29 +00:00
nix-ld.nixosModules.nix-ld
{programs.nix-ld.dev.enable = true;}
2023-08-13 17:00:41 +01:00
home-manager.nixosModules.home-manager
{
home-manager.useGlobalPkgs = true;
home-manager.useUserPackages = true;
home-manager.users.cyryl = {
imports = [./nixos/home-manager ./nixos/home-manager/linux.nix];
_module.args.inputs = inputs;
_module.args.system = system;
};
2023-08-13 17:00:41 +01:00
}
];
specialArgs = {
inherit inputs system;
nixpkgs-nixos-stable-and-unfree = import nixpkgs-stable {
inherit system;
config = {allowUnfree = true;};
};
2023-11-11 10:58:49 +00:00
nixpkgs-nixos-unstable = import nixpkgs-nixos-unstable {
inherit system;
};
2023-08-13 17:00:41 +01:00
nixpkgs-nixos-unstable-and-unfree = import nixpkgs-nixos-unstable {
inherit system;
config = {allowUnfree = true;};
2022-02-20 15:57:58 +00:00
};
nixpkgs-veracrypt = import veracrypt {
inherit system;
config = {allowUnfree = true;};
};
2021-12-04 09:20:11 +00:00
};
2022-10-29 21:22:35 +01:00
};
2023-08-13 17:00:41 +01:00
mkShell = packageSet: system: let
pkgs = packageSet.legacyPackages.${system};
in
pkgs.mkShell {
packages = with pkgs; [
inputs.alejandra.defaultPackage.${system}
cacert
git
git-lfs
nixpkgs-fmt
openssh
openssl
pkg-config
statix
];
2023-01-24 21:36:42 +00:00
};
2023-08-13 17:00:41 +01:00
in {
devShells = {
"x86_64-darwin".default = mkShell nixpkgs-stable "x86_64-darwin";
"x86_64-linux".default = mkShell nixpkgs-stable "x86_64-linux";
};
darwinConfigurations = {
"FORM3-CYRYLPLOTN" = darwin.lib.darwinSystem rec {
system = "x86_64-darwin";
modules = [
(./. + "/nixos/boxes/form3")
home-manager.darwinModules.home-manager
{
home-manager.useGlobalPkgs = true;
home-manager.useUserPackages = true;
home-manager.users.cyryl = {
imports = [./nixos/home-manager];
_module.args.inputs = inputs;
_module.args.system = system;
};
}
];
};
};
2022-03-10 12:21:27 +00:00
2023-08-13 17:00:41 +01:00
nixosConfigurations = {
2024-03-16 08:57:55 +00:00
foryog = mkWorkstation nixpkgs-nixos-unstable "x86_64-linux" "foryog";
2023-08-13 17:00:41 +01:00
thinky = mkWorkstation nixpkgs-stable "x86_64-linux" "thinky";
bolty = mkServer nixpkgs-stable "x86_64-linux" "bolty";
vpsfree1 = mkServer nixpkgs-stable "x86_64-linux" "vpsfree1";
2024-01-01 13:43:58 +00:00
cupsnet = mkServer nixpkgs-stable "aarch64-linux" "cupsnet";
2023-08-13 17:00:41 +01:00
mb1 = mkServer nixpkgs-stable "x86_64-linux" "mb1";
homescreen = mkRaspi nixpkgs-stable "homescreen";
2021-12-04 10:43:02 +00:00
2023-08-13 17:00:41 +01:00
bootstrap = nixpkgs-stable.lib.nixosSystem rec {
system = "x86_64-linux";
modules = [(./. + "/nixos/boxes/bootstrap") sops.nixosModules.sops];
specialArgs = {
inherit inputs system;
nixpkgs-nixos-unstable-and-unfree = import nixpkgs-nixos-unstable {
inherit system;
config = {allowUnfree = true;};
2022-03-02 22:46:45 +00:00
};
2021-12-04 09:20:11 +00:00
};
2023-08-13 17:00:41 +01:00
};
# nix build .#nixosConfigurations.raspiimage.config.system.build.sdImage
# sudo dd if=result/sd-image/nixos-sd-image-21.11.20211201.a640d83-aarch64-linux.img of=/dev/sda bs=4M conv=fsync status=progress
# make sure to update eeprom https://nixos.wiki/wiki/NixOS_on_ARM/Raspberry_Pi_4#Board-specific_installation_notes
raspiimage = nixpkgs-stable.lib.nixosSystem {
system = "aarch64-linux";
modules = [
(import
"${inputs.nixpkgs-stable}/nixos/modules/installer/sd-card/sd-image-aarch64-installer.nix")
{
environment.systemPackages = with nixpkgs-nixos-unstable.legacyPackages."aarch64-linux"; [
neovim
htop
btop
atop
];
2022-08-04 09:55:56 +01:00
2023-08-13 17:00:41 +01:00
networking.networkmanager.enable = false;
hardware.enableRedistributableFirmware = true;
networking.wireless.enable = true;
2022-08-04 09:55:56 +01:00
2023-08-13 17:00:41 +01:00
services.openssh = {
enable = true;
permitRootLogin =
nixpkgs-stable.lib.mkForce "prohibit-password";
passwordAuthentication = false;
};
2022-08-04 09:55:56 +01:00
2023-08-13 17:00:41 +01:00
services.xserver = {
enable = true;
displayManager.lightdm.enable = true;
desktopManager.gnome.enable = true;
libinput.enable = true;
};
2022-08-04 09:55:56 +01:00
2023-08-13 17:00:41 +01:00
users.extraUsers.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEo4R+6J3h6Ix3xWpOMdU7Es1/YxFchHw0c+kcCOJxFb cyryl@foureighty"
];
sdImage.compressImage = false;
console.earlySetup = true;
}
];
specialArgs = {inherit inputs;};
2021-06-26 19:12:31 +01:00
};
2021-05-31 09:15:44 +01:00
};
2023-08-13 17:00:41 +01:00
};
2021-05-30 20:41:33 +01:00
inputs = {
2022-07-03 18:50:30 +01:00
nixpkgs-master = {
type = "github";
owner = "NixOS";
repo = "nixpkgs";
ref = "master";
};
2021-06-01 14:30:39 +01:00
nixpkgs-nixos-unstable = {
2021-05-30 20:41:33 +01:00
type = "github";
2021-05-30 23:13:31 +01:00
owner = "NixOS";
repo = "nixpkgs";
ref = "nixos-unstable";
2021-05-30 20:41:33 +01:00
};
2021-05-31 09:15:44 +01:00
nixpkgs-stable = {
type = "github";
owner = "NixOS";
repo = "nixpkgs";
2023-11-30 21:22:10 +00:00
ref = "nixos-23.11";
2021-05-31 09:15:44 +01:00
};
2023-01-31 21:38:23 +00:00
nixpkgs-rust-analyzer = {
type = "github";
owner = "NixOS";
2023-01-31 21:38:23 +00:00
repo = "nixpkgs";
2023-11-30 10:00:47 +00:00
ref = "master";
2023-01-31 21:38:23 +00:00
};
2023-03-04 07:19:28 +00:00
endless-sky = {
type = "github";
owner = "NixOS";
repo = "nixpkgs";
ref = "2100c4926200b1ebbee032ad22113597195932f2";
};
veracrypt = {
type = "github";
owner = "NixOS";
repo = "nixpkgs";
ref = "2bbbf414fed6ab89cd971f5645da692dad6d9420";
};
2021-06-12 09:40:09 +01:00
nixos-hardware = {
type = "github";
owner = "NixOS";
2021-06-12 09:40:09 +01:00
repo = "nixos-hardware";
ref = "master";
2021-06-12 09:40:09 +01:00
};
2022-03-10 12:21:27 +00:00
darwin = {
url = "github:lnl7/nix-darwin/master";
inputs.nixpkgs.follows = "nixpkgs-stable";
};
2021-05-30 20:41:33 +01:00
home-manager = {
type = "github";
owner = "nix-community";
repo = "home-manager";
2024-03-16 08:57:55 +00:00
ref = "master";
inputs.nixpkgs.follows = "nixpkgs-nixos-unstable";
2021-05-30 20:41:33 +01:00
};
2021-05-30 23:13:31 +01:00
flake-utils = {
2021-05-30 20:41:33 +01:00
type = "github";
2021-05-30 23:13:31 +01:00
owner = "numtide";
repo = "flake-utils";
ref = "main";
2021-05-30 20:41:33 +01:00
};
nur = {
type = "github";
owner = "nix-community";
repo = "NUR";
ref = "master";
};
2022-10-01 13:37:46 +01:00
nil = {
type = "github";
owner = "oxalica";
repo = "nil";
2023-08-18 16:25:36 +01:00
ref = "main";
2022-10-01 13:37:46 +01:00
inputs.nixpkgs.follows = "nixpkgs-nixos-unstable";
inputs.flake-utils.follows = "flake-utils";
};
2023-12-18 21:02:29 +00:00
nix-ld = {
type = "github";
owner = "Mic92";
repo = "nix-ld";
ref = "main";
inputs.nixpkgs.follows = "nixpkgs-stable";
};
2022-12-07 23:52:15 +00:00
helix = {
type = "github";
owner = "helix-editor";
repo = "helix";
2023-08-26 20:42:12 +01:00
ref = "master";
2023-06-22 10:42:53 +01:00
inputs.nixpkgs.follows = "nixpkgs-stable";
2023-12-18 10:28:15 +00:00
inputs.flake-utils.follows = "flake-utils";
2022-12-07 23:52:15 +00:00
};
2021-10-30 11:10:19 +01:00
sops = {
type = "github";
owner = "Mic92";
repo = "sops-nix";
ref = "master";
2022-06-04 08:40:14 +01:00
inputs.nixpkgs.follows = "nixpkgs-stable";
2022-12-12 11:34:56 +00:00
inputs.nixpkgs-stable.follows = "nixpkgs-stable";
2021-10-30 11:10:19 +01:00
};
2022-12-19 09:09:08 +00:00
alejandra = {
2022-12-19 09:04:27 +00:00
type = "github";
owner = "kamadorueda";
repo = "alejandra";
ref = "main";
inputs.nixpkgs.follows = "nixpkgs-nixos-unstable";
};
2024-01-15 14:15:15 +00:00
cryptpad = {
url = "github:michaelshmitty/cryptpad-flake";
inputs = {
nixpkgs.follows = "nixpkgs-stable";
};
};
2023-04-01 10:17:50 +01:00
disko = {
url = "github:nix-community/disko";
inputs.nixpkgs.follows = "nixpkgs-stable";
};
2022-11-08 16:28:34 +00:00
flake-compat = {
url = "github:edolstra/flake-compat";
flake = false;
};
2021-05-30 20:41:33 +01:00
};
}