aboutsummaryrefslogtreecommitdiff
path: root/flake.nix
diff options
context:
space:
mode:
authortdback <tyler@tdback.net>2025-01-05 12:38:26 -0500
committertdback <tyler@tdback.net>2025-01-05 12:38:26 -0500
commit21a405e977754d31215244cbd4be5eb928732e69 (patch)
tree6eaf61860bb000e745ac3f1662181f41923aa061 /flake.nix
parentff80e2841c2ccbaa0df325269b8a89076da6ce43 (diff)
update server hostnames
Diffstat (limited to 'flake.nix')
-rw-r--r--flake.nix142
1 files changed, 79 insertions, 63 deletions
diff --git a/flake.nix b/flake.nix
index 9040957..bcef212 100644
--- a/flake.nix
+++ b/flake.nix
@@ -12,67 +12,83 @@
};
};
- outputs = { ... }@inputs:
- let
- helpers = import ./modules { inherit inputs; };
- inherit (helpers) mergeSets mkSystem;
- in
- {
- nixosConfigurations = mergeSets [
- (mkSystem "woodpecker" inputs.nixpkgs [
- {
- type = "profiles";
- modules = [ "common" "fstrim" "libvirtd" "nvidia" "pipewire" "security" "steam" "wireshark" "x11" ];
- }
- ])
- (mkSystem "sparrow" inputs.nixpkgs [
- {
- type = "profiles";
- modules = [ "common" "pipewire" "security" "vpn" "x11" ];
- }
- ])
- (mkSystem "raindog" inputs.nixpkgs [
- {
- type = "profiles";
- modules = [ "common" "security" "upgrade" ];
- }
- { type = "scripts"; modules = [ "motd" "pushover" ]; }
- { type = "services"; modules = [ "blocky" "searx" "ssh" ]; }
- ])
- (mkSystem "oasis" inputs.nixpkgs [
- {
- type = "profiles";
- modules = [ "common" "podman" "security" "upgrade" "wireguard" "zfs" ];
- }
- { type = "scripts"; modules = [ "motd" "pushover" "zquota" ]; }
- {
- type = "services";
- modules = [ "cgit" "proxy" "sftpgo" "ssh" ];
- }
- ])
- (mkSystem "hive" inputs.nixpkgs [
- {
- type = "profiles";
- modules = [ "common" "security" "upgrade" "wireguard" ];
- }
- { type = "scripts"; modules = [ "motd" "pushover" ]; }
- {
- type = "services";
- modules = [ "fediverse" "proxy" "ssh" "web" ];
- }
- ])
- (mkSystem "eden" inputs.nixpkgs [
- {
- type = "containers";
- modules = [ "freshrss" "jellyfin" "lubelogger" "pinchflat" "vaultwarden" "watchtower" ];
- }
- {
- type = "profiles";
- modules = [ "common" "podman" "security" "share" "upgrade" "wireguard" "zfs" ];
- }
- { type = "scripts"; modules = [ "motd" "pushover" "zquota" ]; }
- { type = "services"; modules = [ "immich" "proxy" "ssh" ]; }
- ])
- ];
- };
+ outputs = { ... } @ inputs: let
+ helpers = import ./modules { inherit inputs; };
+ inherit (helpers) mergeSets mkSystem;
+ in {
+ nixosConfigurations = mergeSets [
+ (mkSystem "woodpecker" inputs.nixpkgs [
+ {
+ type = "profiles";
+ modules = [ "common" "fstrim" "libvirtd" "nvidia" "pipewire" "security" "steam" "wireshark" "x11" ];
+ }
+ ])
+ (mkSystem "sparrow" inputs.nixpkgs [
+ {
+ type = "profiles";
+ modules = [ "common" "pipewire" "security" "vpn" "x11" ];
+ }
+ ])
+ (mkSystem "frigg" inputs.nixpkgs [
+ {
+ type = "profiles";
+ modules = [ "common" "podman" "security" "upgrade" "wireguard" "zfs" ];
+ }
+ {
+ type = "scripts";
+ modules = [ "motd" "pushover" "zquota" ];
+ }
+ {
+ type = "services";
+ modules = [ "cgit" "proxy" "sftpgo" "ssh" ];
+ }
+ ])
+ (mkSystem "heimdall" inputs.nixpkgs [
+ {
+ type = "profiles";
+ modules = [ "common" "security" "upgrade" ];
+ }
+ {
+ type = "scripts";
+ modules = [ "motd" "pushover" ];
+ }
+ {
+ type = "services";
+ modules = [ "blocky" "searx" "ssh" ];
+ }
+ ])
+ (mkSystem "odin" inputs.nixpkgs [
+ {
+ type = "containers";
+ modules = [ "freshrss" "jellyfin" "lubelogger" "pinchflat" "vaultwarden" "watchtower" ];
+ }
+ {
+ type = "profiles";
+ modules = [ "common" "podman" "security" "share" "upgrade" "wireguard" "zfs" ];
+ }
+ {
+ type = "scripts";
+ modules = [ "motd" "pushover" "zquota" ];
+ }
+ {
+ type = "services";
+ modules = [ "immich" "proxy" "ssh" ];
+ }
+ ])
+ (mkSystem "thor" inputs.nixpkgs [
+ {
+ type = "profiles";
+ modules = [ "common" "security" "upgrade" "wireguard" ];
+ }
+ {
+ type = "scripts";
+ modules = [ "motd" "pushover"];
+ }
+ {
+ type = "services";
+ modules = [ "fediverse" "proxy" "ssh" "web" ];
+ }
+ ])
+ ];
+ };
}