aboutsummaryrefslogtreecommitdiff
path: root/flake.nix
blob: 1462d06ceac44b2bb7f9b297470eb2c92f3a286e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
{
  inputs = {
    nixpkgs.url = "github:nixos/nixpkgs/nixos-24.11";
    nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable";
    home-manager = {
      url = "github:nix-community/home-manager/release-24.11";
      inputs.nixpkgs.follows = "nixpkgs";
    };
    agenix = {
      url = "github:ryantm/agenix";
      inputs.nixpkgs.follows = "nixpkgs";
    };
    nixos-cosmic = {
      url = "github:lilyinstarlight/nixos-cosmic";
      inputs.nixpkgs.follows = "nixpkgs";
    };
  };

  outputs = { ... } @ inputs: let
    helpers = import ./modules { inherit inputs; };
    inherit (helpers) mergeSets mkSystem;
  in {
    nixosConfigurations = mergeSets [
      (mkSystem "woodpecker" inputs.nixpkgs [
        {
          type = "profiles";
          modules = [ "common" "cosmic" "fstrim" "libvirtd" "nvidia" "pipewire" "security" "steam" "wireshark" ];
        }
      ])
      (mkSystem "sparrow" inputs.nixpkgs [
        {
          type = "profiles";
          modules = [ "common" "cosmic" "pipewire" "security" "vpn" ];
        }
      ])
      (mkSystem "frigg" inputs.nixpkgs [
        {
          type = "profiles";
          modules = [ "common" "podman" "security" "upgrade" "wireguard" "zfs" ];
        }
        {
          type = "scripts";
          modules = [ "motd" "pushover" "zquota" ];
        }
        {
          type = "services";
          modules = [ "cgit" "proxy" "sftpgo" "ssh" ];
        }
      ])
      (mkSystem "heimdall" inputs.nixpkgs [
        {
          type = "profiles";
          modules = [ "common" "security" "upgrade" ];
        }
        {
          type = "scripts";
          modules = [ "motd" "pushover" ];
        }
        {
          type = "services";
          modules = [ "dns" "searx" "ssh" ];
        }
      ])
      (mkSystem "odin" inputs.nixpkgs [
        {
          type = "containers";
          modules = [ "freshrss" "jellyfin" "lubelogger" "pinchflat" "vaultwarden" "watchtower" ];
        }
        {
          type = "profiles";
          modules = [ "common" "podman" "security" "share" "upgrade" "wireguard" "zfs" ];
        }
        {
          type = "scripts";
          modules = [ "motd" "pushover" "zquota" ];
        }
        {
          type = "services";
          modules = [ "immich" "proxy" "ssh" ];
        }
      ])
      (mkSystem "thor" inputs.nixpkgs [
        {
          type = "profiles";
          modules = [ "common" "security" "upgrade" "wireguard" ];
        }
        {
          type = "scripts";
          modules = [ "motd" "pushover"];
        }
        {
          type = "services";
          modules = [ "fediverse" "proxy" "ssh" "web" ];
        }
      ])
    ];
  };
}