{ description = "My deploy-rs config for logos"; inputs = { agenix.url = "github:ryantm/agenix"; deploy-rs.url = "github:serokell/deploy-rs"; home-manager.url = "github:nix-community/home-manager"; nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable"; utils.url = "github:numtide/flake-utils"; vscode-server = { url = "github:msteen/nixos-vscode-server"; inputs.nixpkgs.follows = "nixpkgs"; }; emacs-overlay = { url = "github:nix-community/emacs-overlay"; inputs.nixpkgs.follows = "nixpkgs"; }; wsl = { url = "github:nix-community/NixOS-WSL"; inputs.nixpkgs.follows = "nixpkgs"; inputs.flake-utils.follows = "utils"; }; # my apps printerfacts = { url = "git+https://tulpa.dev/cadey/printerfacts.git?ref=main"; inputs.nixpkgs.follows = "nixpkgs"; inputs.flake-utils.follows = "utils"; }; mara = { url = "git+https://tulpa.dev/Xe/mara.git?ref=main"; inputs.nixpkgs.follows = "nixpkgs"; inputs.utils.follows = "utils"; }; rhea = { url = "github:Xe/rhea"; inputs.nixpkgs.follows = "nixpkgs"; }; waifud = { url = "github:Xe/waifud"; inputs.nixpkgs.follows = "nixpkgs"; inputs.utils.follows = "utils"; }; x = { url = "github:Xe/x"; inputs.nixpkgs.follows = "nixpkgs"; inputs.utils.follows = "utils"; }; xesite = { url = "github:Xe/site"; inputs.nixpkgs.follows = "nixpkgs"; inputs.flake-utils.follows = "utils"; }; }; outputs = { self, nixpkgs, deploy-rs, home-manager, agenix, printerfacts, mara , rhea, waifud, emacs-overlay, wsl, x, xesite, vscode-server, ... }: let pkgs = nixpkgs.legacyPackages."x86_64-linux"; mkSystem = extraModules: nixpkgs.lib.nixosSystem rec { system = "x86_64-linux"; modules = [ agenix.nixosModules.age home-manager.nixosModules.home-manager vscode-server.nixosModule ({ config, ... }: { system.configurationRevision = self.sourceInfo.rev; services.getty.greetingLine = "<<< Welcome to NixOS ${config.system.nixos.label} @ ${self.sourceInfo.rev} - \\l >>>"; home-manager.useGlobalPkgs = true; home-manager.useUserPackages = true; nixpkgs.overlays = [ emacs-overlay.overlay (import ./overlays/tree-sitter-typescript.nix) (import ./overlays/weechat.nix) ]; services.vscode-server.enable = true; }) ./common printerfacts.nixosModules.${system}.printerfacts mara.nixosModules.${system}.bot rhea.nixosModule.${system} x.nixosModules.default #xesite.nixosModules.default ] ++ extraModules; }; in { devShells.x86_64-linux.default = pkgs.mkShell { buildInputs = [ deploy-rs.packages.x86_64-linux.deploy-rs agenix.packages.x86_64-linux.agenix ]; }; nixosModules = { microcode = import ./common/microcode.nix; home-manager = import ./common/home-manager; workVM = ({ pkgs, config, ... }: { home-manager.useGlobalPkgs = true; home-manager.useUserPackages = true; nixpkgs.overlays = [ emacs-overlay.overlay ]; nix.package = pkgs.nixVersions.stable; nix.extraOptions = '' experimental-features = nix-command flakes ''; security.pam.loginLimits = [{ domain = "*"; type = "soft"; item = "nofile"; value = "unlimited"; }]; services.journald.extraConfig = '' SystemMaxUse=100M MaxFileSec=7day ''; services.resolved = { enable = true; dnssec = "false"; }; users.groups.xe = { }; users.users.xe = { extraGroups = [ "wheel" "docker" "audio" "plugdev" "libvirtd" "adbusers" "dialout" "within" ]; shell = pkgs.fish; isNormalUser = true; group = "xe"; }; boot.binfmt.emulatedSystems = [ "wasm32-wasi" ]; environment.systemPackages = with pkgs; [ mosh flyctl ]; virtualisation.docker.enable = true; services.tailscale.enable = true; home-manager.users.xe = { lib, ... }: let name = "Xe Iaso"; email = "xe@tailscale.com"; commitTemplate = pkgs.writeTextFile { name = "xe-commit-template"; text = '' Signed-off-by: ${name} <${email}> ''; }; in { imports = [ ./common/home-manager ]; within = { emacs.enable = true; fish.enable = true; neofetch.enable = true; vim.enable = true; tmux.enable = true; }; services.lorri.enable = true; services.emacs.enable = lib.mkForce false; programs.direnv.enable = true; programs.direnv.nix-direnv.enable = true; programs.git = { package = pkgs.gitAndTools.gitFull; enable = true; userName = name; userEmail = email; ignores = [ "*~" "*.swp" "*.#" ]; delta.enable = true; extraConfig = { commit.template = "${commitTemplate}"; core.editor = "vim"; color.ui = "auto"; credential.helper = "store --file ~/.git-credentials"; format.signoff = true; init.defaultBranch = "main"; protocol.keybase.allow = "always"; pull.rebase = "true"; push.default = "current"; }; }; }; }); }; nixosConfigurations = { # wsl xatci = nixpkgs.lib.nixosSystem rec { system = "x86_64-linux"; modules = [ home-manager.nixosModules.home-manager wsl.nixosModules.wsl ({ config, ... }: { home-manager.useGlobalPkgs = true; home-manager.useUserPackages = true; nixpkgs.overlays = [ emacs-overlay.overlay ]; networking.hostName = "xatci"; networking.nameservers = [ "100.100.100.100" ]; networking.search = [ "shark-harmonic.ts.net" ]; wsl = { enable = true; automountPath = "/mnt"; defaultUser = "cadey"; startMenuLaunchers = true; }; nix.package = pkgs.nixVersions.stable; nix.extraOptions = '' experimental-features = nix-command flakes ''; users.users.cadey = { extraGroups = [ "wheel" "docker" "audio" "plugdev" "libvirtd" "adbusers" "dialout" "within" ]; shell = pkgs.fish; }; environment.systemPackages = with pkgs; [ mosh flyctl ]; virtualisation.docker.enable = true; home-manager.users.cadey = { lib, ... }: let name = "Xe Iaso"; email = "me@xeiaso.net"; commitTemplate = pkgs.writeTextFile { name = "cadey-commit-template"; text = '' Signed-off-by: ${name} <${email}> ''; }; in { imports = [ ./common/home-manager ]; within = { emacs.enable = true; fish.enable = true; neofetch.enable = true; vim.enable = true; tmux.enable = true; }; services.emacs.enable = lib.mkForce false; programs.direnv.enable = true; programs.direnv.nix-direnv.enable = true; programs.git = { package = pkgs.gitAndTools.gitFull; enable = true; userName = name; userEmail = email; ignores = [ "*~" "*.swp" "*.#" ]; delta.enable = true; extraConfig = { commit.template = "${commitTemplate}"; core.editor = "vim"; color.ui = "auto"; credential.helper = "store --file ~/.git-credentials"; format.signoff = true; init.defaultBranch = "main"; protocol.keybase.allow = "always"; pull.rebase = "true"; push.default = "current"; }; }; }; }) ]; }; keitai = mkSystem [ ./hosts/keitai ./hardware/location/YOW ]; # avalon chrysalis = mkSystem [ ./hosts/chrysalis ./hardware/location/YOW ]; itsuki = mkSystem [ ./hosts/itsuki ./hardware/location/YOW ]; kos-mos = mkSystem [ ./hosts/kos-mos ./hardware/alrest ./hardware/location/YOW waifud.nixosModules.x86_64-linux.waifud-runner ]; logos = mkSystem [ ./hosts/logos ./hardware/alrest ./hardware/location/YOW waifud.nixosModules.x86_64-linux.waifud-runner ]; ontos = mkSystem [ ./hosts/ontos ./hardware/alrest ./hardware/location/YOW waifud.nixosModules.x86_64-linux.waifud-runner ]; pneuma = mkSystem [ ./hosts/pneuma ./hardware/alrest ./hardware/location/YOW waifud.nixosModules.x86_64-linux.waifud-runner ]; joker = mkSystem [ ./hosts/joker ./hardware/location/YYZ ]; # cloud akko = mkSystem [ ./hosts/akko ./hardware/location/YYZ ]; firgu = mkSystem [ ./hosts/firgu ./hardware/location/YYZ ]; }; deploy.nodes.akko = { hostname = "akko.within.website"; sshUser = "root"; profiles.system = { user = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.akko; }; }; deploy.nodes.firgu = { hostname = "149.248.59.1"; sshUser = "root"; profiles.system = { user = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.firgu; }; }; deploy.nodes.chrysalis = { hostname = "192.168.2.29"; sshUser = "root"; fastConnection = true; profiles.system = { user = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.chrysalis; }; }; deploy.nodes.itsuki = { hostname = "192.168.2.174"; sshUser = "root"; fastConnection = true; profiles.system = { user = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.itsuki; }; }; deploy.nodes.joker = { hostname = "192.168.2.138"; sshUser = "root"; fastConnection = true; profiles.system = { user = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.joker; }; }; deploy.nodes.logos = { hostname = "192.168.2.35"; sshUser = "root"; fastConnection = true; profiles.system = { user = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.logos; }; }; deploy.nodes.kos-mos = { hostname = "192.168.2.32"; sshUser = "root"; fastConnection = true; profiles.system = { user = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.kos-mos; }; }; deploy.nodes.ontos = { hostname = "192.168.2.34"; sshUser = "root"; fastConnection = true; profiles.system = { user = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.ontos; }; }; deploy.nodes.pneuma = { hostname = "192.168.2.33"; sshUser = "root"; fastConnection = true; profiles.system = { user = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.pneuma; }; }; # This is highly advised, and will prevent many possible mistakes checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib; }; }