self-hosting/flake.nix

140 lines
4.1 KiB
Nix
Raw Normal View History

{
2021-11-29 02:04:29 +01:00
inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixos-24.05";
2021-11-29 02:04:29 +01:00
nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable";
sops-nix.url = "github:Mic92/sops-nix";
sops-nix.inputs.nixpkgs.follows = "nixpkgs";
deploy-rs.url = "github:serokell/deploy-rs";
2024-09-20 03:55:11 +02:00
simple-nixos-mailserver.url = "gitlab:simple-nixos-mailserver/nixos-mailserver/nixos-24.05";
2023-10-12 02:59:56 +02:00
foundryvtt.url = "github:reckenrode/nix-foundryvtt";
2021-11-29 02:04:29 +01:00
};
2024-09-20 03:55:11 +02:00
outputs =
inputs@{
self,
nixpkgs,
nixpkgs-unstable,
deploy-rs,
sops-nix,
simple-nixos-mailserver,
foundryvtt,
}:
let
pkgs = nixpkgs.legacyPackages.x86_64-linux;
2021-11-29 02:04:29 +01:00
pkgs-unstable = nixpkgs-unstable.legacyPackages.x86_64-linux;
2024-09-20 03:55:11 +02:00
defaultModuleArgs =
{ pkgs, ... }:
{
_module.args.pkgs-unstable = import nixpkgs-unstable {
system = "x86_64-linux";
config.allowUnfreePredicate = pkg: builtins.elem (pkgs.lib.getName pkg) [ "minecraft-server" ];
};
2022-07-19 06:34:33 +02:00
};
2024-09-20 03:55:11 +02:00
in
{
2022-07-19 06:34:33 +02:00
devShells.x86_64-linux.default = pkgs.mkShell {
2024-09-20 03:55:11 +02:00
sopsPGPKeyDirs = [
"./keys/hosts"
"./keys/users"
];
2021-11-29 02:04:29 +01:00
2024-09-20 03:55:11 +02:00
nativeBuildInputs = [ (pkgs.callPackage sops-nix { }).sops-import-keys-hook ];
2021-11-29 02:04:29 +01:00
buildInputs = with pkgs-unstable; [
nixpkgs-fmt
2023-12-13 18:51:56 +01:00
opentofu
terraform-ls
sops
deploy-rs.packages."x86_64-linux".deploy-rs
];
};
nixosConfigurations = {
db1 = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
2024-09-20 03:55:11 +02:00
specialArgs = {
inherit nixpkgs;
};
2021-11-25 00:59:46 +01:00
modules = [
2021-11-29 02:04:29 +01:00
sops-nix.nixosModules.sops
2021-11-25 00:59:46 +01:00
./profiles/db.nix
2024-09-20 03:55:11 +02:00
{
2023-07-10 19:19:25 +02:00
sops.defaultSopsFile = ./secrets.enc.yml;
networking.hostName = "db1";
networking.domain = "banditlair.com";
nix.registry.nixpkgs.flake = nixpkgs;
2021-11-25 00:59:46 +01:00
2023-07-10 19:19:25 +02:00
system.stateVersion = "21.05";
2024-09-20 03:55:11 +02:00
}
];
};
backend1 = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
2024-09-20 03:55:11 +02:00
specialArgs = {
inherit nixpkgs;
};
2021-11-25 00:59:46 +01:00
modules = [
2024-09-20 03:55:11 +02:00
defaultModuleArgs
2021-11-29 02:04:29 +01:00
sops-nix.nixosModules.sops
2021-11-25 00:59:46 +01:00
./profiles/backend.nix
2024-09-20 03:55:11 +02:00
{
2023-07-10 19:19:25 +02:00
sops.defaultSopsFile = ./secrets.enc.yml;
networking.hostName = "backend1";
networking.domain = "banditlair.com";
nix.registry.nixpkgs.flake = nixpkgs;
2021-11-25 00:59:46 +01:00
2023-07-10 19:19:25 +02:00
system.stateVersion = "21.05";
2024-09-20 03:55:11 +02:00
}
2021-11-26 00:14:44 +01:00
];
};
storage1 = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
2024-09-20 03:55:11 +02:00
specialArgs = {
inherit nixpkgs inputs;
};
2021-11-26 00:14:44 +01:00
modules = [
2022-07-19 06:34:33 +02:00
defaultModuleArgs
2021-11-29 02:04:29 +01:00
sops-nix.nixosModules.sops
simple-nixos-mailserver.nixosModule
2023-10-12 02:59:56 +02:00
foundryvtt.nixosModules.foundryvtt
2021-11-26 00:14:44 +01:00
./profiles/storage.nix
2024-09-20 03:55:11 +02:00
{
2023-07-10 19:19:25 +02:00
sops.defaultSopsFile = ./secrets.enc.yml;
networking.hostName = "storage1";
networking.domain = "banditlair.com";
nix.registry.nixpkgs.flake = nixpkgs;
2021-11-26 00:14:44 +01:00
2023-07-10 19:19:25 +02:00
system.stateVersion = "21.05";
2024-09-20 03:55:11 +02:00
}
2021-07-15 17:09:32 +02:00
];
};
};
2021-09-02 16:11:58 +02:00
2024-09-20 03:55:11 +02:00
deploy.nodes =
let
createSystemProfile = configuration: {
user = "root";
sshUser = "root";
path = deploy-rs.lib.x86_64-linux.activate.nixos configuration;
};
in
{
db1 = {
hostname = "db1.banditlair.com";
profiles.system = createSystemProfile self.nixosConfigurations.db1;
};
backend1 = {
hostname = "backend1.banditlair.com";
profiles.system = createSystemProfile self.nixosConfigurations.backend1;
};
storage1 = {
hostname = "78.46.96.243";
profiles.system = createSystemProfile self.nixosConfigurations.storage1;
};
2023-07-10 19:19:25 +02:00
};
2024-09-20 03:55:11 +02:00
checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib;
};
}