config/flake.nix

247 lines
9.0 KiB
Nix
Raw Normal View History

2023-02-25 04:39:30 +01:00
{
description = "pbsds' system/home flake";
2023-02-25 04:39:30 +01:00
2023-03-19 04:23:38 +01:00
inputs = {
2023-06-11 11:14:01 +02:00
nixpkgs.url = "github:NixOS/nixpkgs/nixos-23.05";
2023-03-19 04:23:38 +01:00
unstable.url = "github:NixOS/nixpkgs/nixos-unstable";
2023-10-14 18:30:34 +02:00
# https://github.com/nix-community/home-manager
2023-06-11 11:14:01 +02:00
home-manager.url = "github:nix-community/home-manager/release-23.05";
2023-03-19 04:23:38 +01:00
home-manager.inputs.nixpkgs.follows = "nixpkgs";
2023-10-14 18:30:34 +02:00
# https://github.com/NixOS/nixos-hardware
2023-03-19 04:23:38 +01:00
nixos-hardware.url = "github:NixOS/nixos-hardware";
2023-02-25 04:39:30 +01:00
2023-10-14 18:30:34 +02:00
# https://github.com/wamserma/flake-programs-sqlite
2023-09-28 01:58:08 +02:00
flake-programs-sqlite.url = "github:wamserma/flake-programs-sqlite";
flake-programs-sqlite.inputs.nixpkgs.follows = "nixpkgs";
2023-10-14 18:30:34 +02:00
# https://github.com/nix-community/nixos-generators
nixos-generators.url = "github:nix-community/nixos-generators";
nixos-generators.inputs.nixpkgs.follows = "nixpkgs";
# https://github.com/Mic92/sops-nix
sops-nix.url = "github:Mic92/sops-nix";
sops-nix.inputs.nixpkgs.follows = "nixpkgs";
2023-10-15 00:43:59 +02:00
/** /
2023-10-14 18:30:34 +02:00
matrix-next.url = "github:dali99/nixos-matrix-modules"; # see https://git.pvv.ntnu.no/Drift/pvv-nixos-config/src/main/flake.nix
2023-06-29 02:43:56 +02:00
#https://github.com/considerate/nixos-odroidhc4
#https://cyberchaos.dev/cyberchaoscreatures/musl-nixos/
#https://github.com/numtide/system-manager
2023-10-14 18:30:34 +02:00
nix-vscode-extensions.url = "github:nix-community/nix-vscode-extensions"
2023-07-02 09:19:35 +02:00
#https://github.com/numtide/nixpkgs-unfree # has a cache
2023-07-04 16:32:09 +02:00
#https://github.com/matthewbauer/nixiosk
2023-10-14 18:30:34 +02:00
inputs.pre-commit-hooks.url = "github:cachix/pre-commit-hooks.nix";
2023-02-25 04:39:30 +01:00
2023-06-18 05:10:08 +02:00
# used to host old docs
2023-10-14 18:30:34 +02:00
nixpkgs-22.url = "github:NixOS/nixpkgs/nixos-22.11";
nixpkgs-21.url = "github:NixOS/nixpkgs/nixos-21.11";
nixpkgs-20.url = "github:NixOS/nixpkgs/nixos-20.09";
nixpkgs-19.url = "github:NixOS/nixpkgs/nixos-19.09";
nixpkgs-19.flake = false; # Earlier versions are not flake-pure
/**/
2023-06-18 05:10:08 +02:00
2023-03-19 04:23:38 +01:00
pbsds-papers.url = "git+ssh://git@github.com/pbsds/papers.git";
};
2023-07-05 17:30:17 +02:00
nixConfig.extra-substituters = [
"https://cuda-maintainers.cachix.org"
"https://nix-community.cachix.org"
"https://nixos-rocm.cachix.org"
"https://nixpkgs-unfree.cachix.org"
"https://numtide.cachix.org"
];
nixConfig.extra-trusted-public-keys = [
"cuda-maintainers.cachix.org-1:0dq3bujKpuEPMCX6U4WylrUDZ9JyUG0VpVZa7CNfq5E="
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
"nixos-rocm.cachix.org-1:VEpsf7pRIijjd8csKjFNBGzkBqOmw8H9PRmgAq14LnE="
"nixpkgs-unfree.cachix.org-1:hqvoInulhbV4nJ9yJOEr+4wxhDV4xq2d1DK7S6Nj6rs="
"numtide.cachix.org-1:2ps1kLBUWjxIneOy1Ik6cQjb41X0iXVXeHigGmycPPE="
];
2023-03-04 00:09:57 +01:00
outputs = {
self,
nixpkgs,
unstable,
nixos-hardware,
2023-10-14 18:30:34 +02:00
nixos-generators,
2023-03-04 00:09:57 +01:00
home-manager,
2023-10-15 00:43:59 +02:00
sops-nix,
#flake-programs-sqlite,
2023-03-04 00:09:57 +01:00
...
2023-03-01 03:20:31 +01:00
} @ inputs:
2023-02-25 04:39:30 +01:00
let
2023-07-03 01:34:00 +02:00
flake = inputs: system: nixpkgs.lib.mapAttrs (name: flake: {
# TODO filter non-flake inputs
2023-07-03 01:34:00 +02:00
nixos = flake.nixosModules
or null;
pkgs = flake.packages.${system}
or flake.legacyPackages.${system}
or null;
2023-07-03 01:34:00 +02:00
lib = flake.lib.${system}
or flake.lib
or null;
}) inputs;
2023-07-03 01:34:00 +02:00
forSystems = systems: f: nixpkgs.lib.genAttrs systems (system: f rec {
2023-06-20 01:36:49 +02:00
inherit system;
pkgs = nixpkgs.legacyPackages.${system};
lib = nixpkgs.legacyPackages.${system}.lib;
2023-07-03 01:34:00 +02:00
flakes = flake inputs system;
2023-06-20 01:36:49 +02:00
});
2023-07-03 01:34:00 +02:00
forAllSystems = forSystems [
"x86_64-linux"
"aarch64-linux"
#"riscv64-linux"
];
2023-03-09 07:03:15 +01:00
2023-10-14 18:30:34 +02:00
mkModule = hostname: domain: system: modules: ({ lib, ... }: {
#TODO: fix infinite recursion:
/** /
_module.args = lib.mkFinal {
inherit inputs;
flakes = flake inputs system;
};
/**/
2023-10-15 00:43:59 +02:00
imports = [
./base.nix
"${self}/hosts/${hostname}"
sops-nix.nixosModules.sops
2023-10-15 03:37:29 +02:00
home-manager.nixosModule
2023-10-15 00:43:59 +02:00
] ++ modules;
#++ flake-programs-sqlite.nixosModules.programs-sqlite; # TODO: make work
2023-12-03 20:53:16 +01:00
sops = {
defaultSopsFile = lib.mkIf (builtins.pathExists ./secrets/${hostname}.yaml)
./secrets/${hostname}.yaml;
2023-10-15 00:43:59 +02:00
age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
age.keyFile = "/var/lib/sops-nix/key.txt";
age.generateKey = true;
};
2023-10-14 18:30:34 +02:00
2023-10-15 03:37:29 +02:00
home-manager.useGlobalPkgs = true; # go brrr, reuse overrides
home-manager.extraSpecialArgs = {
inherit inputs;
flakes = flake inputs system;
};
2023-12-03 20:54:20 +01:00
home-manager.sharedModules = [
sops-nix.homeManagerModules.sops
];
2023-10-15 03:37:29 +02:00
2023-10-14 18:30:34 +02:00
# still needed even if using networkd
networking.hostName = hostname;
networking.domain = domain;
networking.search = [ domain ];
nixpkgs.overlays = [
(final: prev: {
#unstable = unstable.legacyPackages.${final.system};
unstable = import unstable { inherit system; config.allowUnfree = true; }; # TODO: inherit nixos config from stable
})
];
# This makes commandline tools like 'nix run nixpkgs#hello'
# and 'nix-shell -p hello' use the same channel as system was built with
nix.registry.nixpkgs.flake = inputs.nixpkgs;
nix.registry.nixpkgs-unstable.flake = inputs.unstable;
#nix.registry.nixpkgs-unstable.flake.url = "github:NixOS/nixpkgs/nixos-unstable";
nix.nixPath = [
"nixpkgs=${inputs.nixpkgs}"
"nixpkgs-unstable=${inputs.unstable}"
#"nixpkgs-unstable=github:NixOS/nixpkgs/nixos-unstable"
];
});
2023-06-24 20:23:38 +02:00
mkConfig = hostname: domain: system: modules: nixpkgs.lib.nixosSystem {
2023-02-25 04:39:30 +01:00
inherit system;
2023-06-20 01:39:19 +02:00
specialArgs = {
inherit inputs;
2023-07-03 01:34:00 +02:00
flakes = flake inputs system;
2023-06-20 01:39:19 +02:00
};
2023-10-14 18:30:34 +02:00
modules = [ (mkModule hostname domain system modules) ];
};
mkHosts = mk: with nixos-hardware.nixosModules; {
# TODO: move nixos-hardware imports to the nixos configs?
noximilien = mk "noximilien" "pbsds.net" "x86_64-linux" [ common-pc common-pc-ssd common-cpu-intel ];
2023-10-14 18:31:23 +02:00
brumlebasse = mk "brumlebasse" "pbsds.net" "x86_64-linux" [ common-pc common-pc-ssd common-cpu-amd ];
2023-10-14 18:30:34 +02:00
nord = mk "nord" "pbsds.net" "x86_64-linux" [ common-pc common-pc-ssd common-cpu-intel-cpu-only common-cpu-intel-sandy-bridge common-gpu-amd common-hidpi ];
sopp = mk "sopp" "pbsds.net" "x86_64-linux" [ common-pc common-pc-ssd common-cpu-intel common-gpu-nvidia-nonprime ];
bolle = mk "bolle" "pbsds.net" "x86_64-linux" [ common-pc common-pc-ssd common-cpu-intel ];
2023-10-25 19:57:12 +02:00
eple = mk "eple" "pbsds.net" "x86_64-linux" [ common-pc common-pc-ssd common-cpu-intel ];
2023-10-14 18:30:34 +02:00
garp = mk "garp" "pbsds.net" "x86_64-linux" [ common-pc common-pc-ssd common-cpu-intel ]; # TODO: common-gpu-nvidia-nonprime ];
#gomperud smattkuken skrytebiffen skalkesnerken balleby brumlebasse bingus skjrlaltatjlstad
#bergjlot snortheimsmoen ditlefsen skrukkerud podebusk zmaragd makrell alfnes blix urke eple hasselknippe pytte uddu imdorf rosenqvist
2023-02-25 04:39:30 +01:00
};
in {
2023-03-03 21:42:29 +01:00
inherit inputs;
2023-03-09 07:03:15 +01:00
2023-10-14 18:31:23 +02:00
packages = forAllSystems ({ pkgs, flakes, ... }: let
nm = nixos-hardware.nixosModules;
in {
2023-07-03 01:35:05 +02:00
mpv-webm = pkgs.callPackage ./pkgs/mpv-webm.nix {}; # TODO: https://github.com/NixOS/nixpkgs/pull/238659
nixos-rebuild-nom = with pkgs; writeScriptBin "nixos-rebuild" ''
exec ${nixos-rebuild}/bin/nixos-rebuild "$@" |& ${nix-output-monitor}/bin/nom
'';
2023-10-14 18:31:23 +02:00
# nixos-generators images
image-brumlebasse-openstack = nixos-generators.nixosGenerate {
system = "x86_64-linux";
specialArgs = { inherit inputs flakes; };
modules = [ (mkHosts mkModule).brumlebasse ];
format = "openstack";
};
2023-03-19 04:23:38 +01:00
});
2023-03-09 07:03:15 +01:00
2023-07-03 01:34:00 +02:00
lib = {
inherit flake forSystems;
2023-07-03 02:23:35 +02:00
} // forAllSystems ({ ... }: {
2023-07-03 01:34:00 +02:00
inherit flake forSystems;
});
2023-10-14 18:30:34 +02:00
nixosModules = mkHosts mkModule;
nixosConfigurations = mkHosts mkConfig;
2023-03-09 07:03:15 +01:00
2023-07-05 00:40:34 +02:00
homeConfigurations = forAllSystems ({ pkgs, flakes, ... }: let
2023-06-20 01:39:35 +02:00
mkHome = user: home: modules: home-manager.lib.homeManagerConfiguration {
inherit pkgs;
modules = modules ++ [{
home.username = user;
home.homeDirectory = home;
2023-12-03 20:54:20 +01:00
home-manager.sharedModules = [
sops-nix.homeManagerModules.sops
];
2023-06-20 01:39:35 +02:00
}];
2023-10-14 18:30:34 +02:00
extraSpecialArgs = {
inherit inputs flakes;
};
2023-03-09 09:31:53 +01:00
};
2023-03-19 04:23:38 +01:00
in {
2023-06-20 01:39:35 +02:00
pbsds = mkHome "pbsds" "/home/pbsds" [ ./users/pbsds/home ];
pbsds-gnome = mkHome "pbsds" "/home/pbsds" [ ./users/pbsds/home/gnome.nix ];
2023-02-25 04:39:30 +01:00
});
2023-03-09 07:03:15 +01:00
devShells = forAllSystems ({ pkgs, flakes, ... }: let
2023-07-05 17:30:17 +02:00
mkShell = packages: pkgs.mkShellNoCC { inherit packages; };
2023-06-24 19:11:49 +02:00
envrc-pkgs = [
2023-07-03 01:35:05 +02:00
flakes.self.pkgs.nixos-rebuild-nom
pkgs.home-manager
pkgs.nix-output-monitor
pkgs.cachix
2023-10-15 00:43:59 +02:00
pkgs.age
pkgs.sops
pkgs.ssh-to-age
2023-03-19 04:23:38 +01:00
];
2023-06-24 19:11:49 +02:00
in {
envrc-local = mkShell envrc-pkgs;
2023-07-03 02:23:35 +02:00
envrc-remote = mkShell (envrc-pkgs ++ [
flakes.unstable.pkgs.remote-exec # TODO: stable
pkgs.yq
pkgs.rsync
2023-06-24 19:11:49 +02:00
]);
remoteenv = mkShell [
2023-07-03 01:35:05 +02:00
flakes.self.pkgs.nixos-rebuild-nom
2023-10-15 00:43:59 +02:00
pkgs.age
pkgs.ssh-to-age
2023-03-19 04:23:38 +01:00
];
2023-02-26 21:28:44 +01:00
});
2023-03-09 07:03:15 +01:00
2023-02-25 04:39:30 +01:00
};
}