eve-psr-nix0/flake.nix

127 lines
3.6 KiB
Nix
Raw Normal View History

2023-06-01 14:39:07 -05:00
{
inputs = {
nixpkgs.url = "nixpkgs/nixos-unstable";
agenix = {
url = "github:ryantm/agenix";
inputs.nixpkgs.follows = "nixpkgs";
inputs.darwin.follows = "";
};
};
outputs = { self, nixpkgs, agenix, ... }@attrs:
let
containerDef = import ./containers.nix;
serviceContainers = containerDef.containers;
pkgs = import nixpkgs { inherit system; };
system = "x86_64-linux";
in {
devShell.x86_64-linux = pkgs.mkShell {
buildInputs = [
agenix.packages.x86_64-linux.default
(pkgs.nixos { }).nixos-rebuild
pkgs.terraform
];
shellHook = ''
alias deploy="nixos-rebuild switch --target-host root@matri.cx --build-host root@matri.cx --flake .#eve-psr-nix0"
'';
};
formatter.x86_64-linux = nixpkgs.legacyPackages.x86_64-linux.nixfmt;
nixosConfigurations = {
eve-psr-nix0 = nixpkgs.lib.nixosSystem {
inherit system;
specialArgs = attrs;
modules = [
({ modulesPath, ... }: {
imports = [ agenix.nixosModules.default ./hardware-configuration.nix ];
nix = {
buildMachines = [ ];
distributedBuilds = false;
settings.experimental-features = [ "nix-command" "flakes" ];
};
boot = {
loader.systemd-boot.enable = true;
loader.efi.canTouchEfiVariables = true;
};
time.timeZone = "America/Chicago";
networking = {
hostName = "eve-psr-nix0";
firewall = {
allowedTCPPorts = [ 22 80 443 3034 ];
allowedUDPPorts = [ 22 80 443 ];
};
};
environment.systemPackages = with pkgs; [ git pciutils vim wget ];
2023-06-01 14:39:07 -05:00
2023-06-21 19:33:22 -05:00
services = {
openssh = {
enable = true;
};
2023-06-21 19:33:22 -05:00
hydra = {
enable = true;
hydraURL = "https://hydra.matri.cx";
listenHost = "192.168.0.130";
port = 3034;
extraConfig = ''
using_frontend_proxy = 1
base_uri = "https://hydra.matri.cx"
'';
2023-06-21 19:33:22 -05:00
useSubstitutes = true;
notificationSender = "hydra@matri.cx";
buildMachinesFiles = [ ];
2023-06-21 19:33:22 -05:00
};
};
virtualisation = {
oci-containers = {
backend = "podman";
containers = serviceContainers;
};
};
security.sudo.wheelNeedsPassword = false;
users = {
users = {
sezycei = {
isNormalUser = true;
initialPassword = "bootMaster";
extraGroups = [ "wheel" ];
packages = with pkgs; [ byobu tmux stack ];
};
torrent = {
isNormalUser = true;
initialPassword = "torrentUserTemp";
};
};
};
age.secrets.keys.file = ./secrets/keys.age;
#sops = {
# age = { sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ]; };
# defaultSopsFile = ./secrets/keys.yaml;
# secrets = {
# hostname = { };
# };
#};
system.stateVersion = "22.11";
})
];
};
2023-06-01 14:39:07 -05:00
};
};
}