{ description = "0x76's infrastructure"; # For minecraft use: # * https://github.com/Infinidoge/nix-minecraft inputs = { nixpkgs.url = "nixpkgs/nixos-unstable"; nixpkgs_stable.url = "nixpkgs/nixos-23.05"; flake-utils-plus.url = "github:gytis-ivaskevicius/flake-utils-plus/v1.4.0"; nur.url = "github:nix-community/NUR"; colmena.url = "github:zhaofengli/colmena"; deploy.url = "github:serokell/deploy-rs"; vault-secrets.url = "github:serokell/vault-secrets"; microvm.url = "github:astro/microvm.nix"; home-manager.url = "github:nix-community/home-manager"; home-manager.inputs.nixpkgs.follows = "nixpkgs"; riff.url = "github:DeterminateSystems/riff"; webcord.url = "github:fufexan/webcord-flake"; comma.url = "github:nix-community/comma"; mailserver.url = "gitlab:simple-nixos-mailserver/nixos-mailserver"; mailserver.inputs.nixpkgs.follows = "nixpkgs"; nixvim.url = "github:pta2002/nixvim"; nixos-generators.url = "github:nix-community/nixos-generators"; nixos-generators.inputs.nixpkgs.follows = "nixpkgs"; nixos-hardware.url = "github:nixos/nixos-hardware"; lanzaboote = { url = "github:nix-community/lanzaboote"; # Optional but recommended to limit the size of your system closure. inputs.nixpkgs.follows = "nixpkgs"; }; vault-unseal.url = "git+https://git.0x76.dev/v/vault-unseal.git"; gnome-autounlock-keyring.url = "git+https://git.0x76.dev/v/gnome-autounlock-keyring.git"; attic.url = "github:zhaofengli/attic"; # Website(s) essentials.url = "github:jdonszelmann/essentials"; }; outputs = { self, nixpkgs, nixpkgs_stable, flake-utils-plus, nur, attic , deploy, home-manager, gnome-autounlock-keyring, lanzaboote, ... }@inputs: let # fast-repl = pkgs.writeShellScriptBin "fast-repl" '' # source /etc/set-environment # nix repl --file "${./.}/repl.nix" $@ # ''; pkgs = self.pkgs.x86_64-linux.nixpkgs; in flake-utils-plus.lib.mkFlake { # `self` and `inputs` arguments are required inherit self inputs; # Supported systems, used for packages, apps, devShell and multiple other definitions. Defaults to `flake-utils.lib.defaultSystems`. supportedSystems = [ "x86_64-linux" ]; # Channels config channelsConfig = { allowUnfree = true; }; sharedOverlays = [ (import ./pkgs) nur.overlay ]; # host defaults hostDefaults = { system = "x86_64-linux"; modules = [ home-manager.nixosModules.home-manager gnome-autounlock-keyring.nixosModules.default ./common ]; specialArgs = { inherit inputs; }; }; # hosts hosts = { "bastion.olympus" = { modules = [ ./common/generic-vm.nix ./hosts/olympus/bastion ]; }; aoife = { modules = [ lanzaboote.nixosModules.lanzaboote ./hosts/thalassa/aoife ]; }; }; # deploy-rs deploy = { user = "root"; nodes = { "bastion.olympus" = { hostname = "olympus.0x76.dev"; fastConnection = true; remoteBuild = true; profiles = { system = { path = deploy.lib.x86_64-linux.activate.nixos self.nixosConfigurations."bastion.olympus"; }; }; }; aoife = { remoteBuild = true; fastConnection = true; hostname = "localhost"; profiles.system.path = deploy.lib.x86_64-linux.activate.nixos self.nixosConfigurations.aoife; }; }; }; # Outputs outputsBuilder = channels: { devShells.default = channels.nixpkgs.mkShell { name = "devShell"; VAULT_ADDR = "http://vault.olympus:8200/"; packages = with pkgs; [ attic.packages.${pkgs.system}.attic # apply-local deploy.packages.${system}.deploy-rs deadnix statix # nixfmt # nixpkgs-fmt nixUnstable # nil vault yamllint jq # (vault-push-approle-envs self { }) # (vault-push-approles self { }) # fast-repl fup-repl ]; }; }; # Checks checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy.lib; }; }