nixos-config/flake.nix
2023-01-26 02:30:17 +03:00

252 lines
8.6 KiB
Nix

{
description = "System configuration";
inputs = {
flake-utils-plus.url = "github:alukardbf/flake-utils-plus";
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
nixpkgs-stable.url = "github:nixos/nixpkgs/nixos-21.05";
nixpkgs-master.url = "github:nixos/nixpkgs/master";
nixpkgs-wayland = {
url = "github:nix-community/nixpkgs-wayland";
inputs.nixpkgs.follows = "nixpkgs";
};
nix.url = "github:nixos/nix";
flake-compat = {
url = "github:edolstra/flake-compat";
flake = false;
};
flake-registry = {
url = "github:nixos/flake-registry";
flake = false;
};
home-manager = {
url = "github:nix-community/home-manager";
inputs.nixpkgs.follows = "nixpkgs";
};
impermanence.url = "github:AtaraxiaSjel/impermanence";
arkenfox-userjs = {
url = "github:arkenfox/user.js";
flake = false;
};
base16.url = "github:alukardbf/base16-nix";
base16-tokyonight-scheme = {
url = "github:alukardbf/base16-tokyonight-scheme";
flake = false;
};
deploy-rs = {
url = "github:serokell/deploy-rs";
inputs.nixpkgs.follows = "nixpkgs";
};
hyprland = {
url = "github:hyprwm/Hyprland";
# inputs.nixpkgs.follows = "nixpkgs";
};
hyprpaper = {
url = "github:hyprwm/hyprpaper";
inputs.nixpkgs.follows = "nixpkgs";
};
nix-alien = {
url = "github:thiagokokada/nix-alien";
inputs.nixpkgs.follows = "nixpkgs";
};
nix-direnv.url = "github:nix-community/nix-direnv";
nix-vscode-marketplace.url = "github:nix-community/nix-vscode-extensions";
nixos-generators = {
url = "github:nix-community/nixos-generators";
inputs.nixpkgs.follows = "nixpkgs";
};
nur.url = "github:nix-community/NUR";
qbittorrent-ee = {
url = "github:c0re100/qBittorrent-Enhanced-Edition";
flake = false;
};
rnix-lsp = {
url = "github:nix-community/rnix-lsp";
inputs.nixpkgs.follows = "nixpkgs";
};
rycee = {
url = "gitlab:rycee/nur-expressions";
flake = false;
};
simple-nixos-mailserver = {
url = "gitlab:simple-nixos-mailserver/nixos-mailserver";
inputs.nixpkgs.follows = "nixpkgs";
};
vscode-server-fixup = {
url = "github:MatthewCash/nixos-vscode-server";
inputs.nixpkgs.follows = "nixpkgs";
};
webcord = {
url = "github:fufexan/webcord-flake";
# inputs.nixpkgs.follows = "nixpkgs";
};
zsh-autosuggestions = {
url = "github:zsh-users/zsh-autosuggestions";
flake = false;
};
zsh-nix-shell = {
url = "github:chisui/zsh-nix-shell";
flake = false;
};
zsh-you-should-use = {
url = "github:MichaelAquilina/zsh-you-should-use";
flake = false;
};
};
outputs = { self, nixpkgs, nixos-generators, flake-utils-plus, deploy-rs, ... }@inputs:
let
findModules = dir:
builtins.concatLists (builtins.attrValues (builtins.mapAttrs
(name: type:
if type == "regular" then
[{
name = builtins.elemAt (builtins.match "(.*)\\.nix" name) 0;
value = dir + "/${name}";
}]
else if (builtins.readDir (dir + "/${name}"))
? "default.nix" then [{
inherit name;
value = dir + "/${name}";
}] else
findModules (dir + "/${name}"))
(builtins.readDir dir)));
patchesPath = map (x: ./patches + "/${x}");
in flake-utils-plus.lib.mkFlake rec {
inherit self inputs;
supportedSystems = [ "x86_64-linux" ];
sharedPatches = patchesPath [ "mullvad-exclude-containers.patch" "mullvad.patch" "gitea-208605.patch" ];
channelsConfig = { allowUnfree = true; };
channels.unstable.input = nixpkgs;
channels.unstable.patches = patchesPath [ ] ++ sharedPatches;
channels.unstable-zfs.input = nixpkgs;
channels.unstable-zfs.patches = patchesPath [ "zen-kernels.patch" ] ++ sharedPatches;
hostDefaults.system = "x86_64-linux";
hostDefaults.channelName = "unstable";
hosts = with nixpkgs.lib; let
hostnames = builtins.attrNames (builtins.readDir ./machines);
mkHost = name: {
system = builtins.readFile (./machines + "/${name}/system");
modules = [ (import (./machines + "/${name}")) { device = name; mainuser = "alukard"; } ];
specialArgs = { inherit inputs; };
};
in (genAttrs hostnames mkHost) // {
AMD-Workstation = {
system = builtins.readFile (./machines/AMD-Workstation/system);
modules = [ (import (./machines/AMD-Workstation)) { device = "AMD-Workstation"; mainuser = "alukard"; } ];
specialArgs = { inherit inputs; };
channelName = "unstable-zfs";
};
Home-Hypervisor = {
system = builtins.readFile (./machines/Home-Hypervisor/system);
modules = [ (import (./machines/Home-Hypervisor)) { device = "Home-Hypervisor"; mainuser = "ataraxia"; } ];
specialArgs = { inherit inputs; };
};
};
outputsBuilder = channels: let
pkgs = channels.unstable;
pkgs-zfs = channels.unstable-zfs;
# FIXME: nixos-rebuild with --flake flag doesn't work with doas
rebuild = pkgs.writeShellScriptBin "rebuild" ''
if [[ -z $1 ]]; then
echo "Usage: $(basename $0) {switch|boot|test}"
elif [[ $1 = "iso" ]]; then
shift
nix build .#nixosConfigurations.Flakes-ISO.config.system.build.isoImage "$@"
else
# doas nix-shell -p git --run "nixos-rebuild --flake . $@"
\sudo nixos-rebuild --flake . $@
fi
'';
update-vscode = pkgs.writeShellScriptBin "update-vscode" ''
./scripts/vscode_update_extensions.sh > ./profiles/applications/vscode/extensions.nix
'';
upgrade = pkgs.writeShellScriptBin "upgrade" ''
cp flake.lock flake.lock.bak && nix flake update
if [[ "$1" == "zfs" ]]; then
./scripts/gen-patch-zen.sh
fi
'';
upgrade-hyprland = pkgs.writeShellScriptBin "upgrade-hyprland" ''
cp flake.lock flake.lock.bak
nix flake lock --update-input hyprland
'';
in {
devShells.default = channels.unstable.mkShell {
name = "aliases";
packages = with pkgs; [
rebuild update-vscode upgrade upgrade-hyprland
nixfmt nixpkgs-fmt statix vulnix deadnix
];
};
packages = {
Wayland-VM = nixos-generators.nixosGenerate {
system = builtins.readFile (./machines/Wayland-VM/system);
modules = [ (import (./machines/Wayland-VM)) { device = "Wayland-VM"; mainuser = "alukard"; } ];
specialArgs = { inherit inputs; };
format = "vm";
};
Hypervisor-VM = nixos-generators.nixosGenerate {
system = builtins.readFile (./machines/Hypervisor-VM/system);
modules = [ (import (./machines/Hypervisor-VM)) { device = "Hypervisor-VM"; mainuser = "alukard"; } ];
specialArgs = { inherit inputs; };
format = "vm";
};
Flakes-ISO = nixos-generators.nixosGenerate {
system = builtins.readFile (./machines/Flakes-ISO/system);
modules = [
(import (./machines/Flakes-ISO)) { device = "Flakes-ISO"; mainuser = "alukard"; }
];
specialArgs = { inherit inputs; };
format = "install-iso";
};
};
};
customModules = builtins.listToAttrs (findModules ./modules);
nixosProfiles = builtins.listToAttrs (findModules ./profiles);
nixosRoles = import ./roles;
deploy = {
user = "root";
sudo = "doas -u";
fastConnection = true;
sshOpts = [ "-A" ];
nodes.Hypervisor-VM = {
hostname = "192.168.122.63";
profiles = {
system = {
user = "root";
sshUser = "alukard";
path =
deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.Hypervisor-VM;
};
};
};
};
# deploy = {
# user = "root";
# nodes = (builtins.mapAttrs (name: machine:
# let activateable = name == "T420-Laptop" || name == "RasPi-Server";
# in {
# hostname = machine.config.networking.hostName;
# profiles.system = {
# user = if activateable then "root" else "alukard";
# path = with deploy-rs.lib.${machine.pkgs.system}.activate;
# if activateable then
# nixos machine
# else
# noop machine.config.system.build.toplevel;
# };
# }) self.nixosConfigurations);
# };
checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib;
};
}