rewrite inputs

This commit is contained in:
Andreas Zweili 2022-02-16 22:19:13 +01:00
parent ce42f3e0f2
commit 9081f84152
19 changed files with 86 additions and 86 deletions

View File

@ -12,6 +12,10 @@
url = "github:nix-community/home-manager/release-21.11"; url = "github:nix-community/home-manager/release-21.11";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
custom = {
system = "x86_64-linux";
username = "andreas";
};
}; };
outputs = outputs =
@ -20,19 +24,18 @@
, nixpkgs-unstable , nixpkgs-unstable
, nixos-hardware , nixos-hardware
, home-manager , home-manager
, custom
}: }:
let let
system = "x86_64-linux";
username = "andreas";
overlay-unstable = final: prev: { overlay-unstable = final: prev: {
unstable = import nixpkgs-unstable { unstable = import nixpkgs-unstable {
system = "x86_64-linux"; system = custom.system;
config.allowUnfree = true; config.allowUnfree = true;
}; };
}; };
pkgs = import nixpkgs { pkgs = import nixpkgs {
inherit system; inherit custom.system;
config = { config = {
allowUnfree = true; allowUnfree = true;
}; };
@ -41,8 +44,8 @@
]; ];
}; };
mkComputer = configurationNix: homeManagerRole: extraModules: nixpkgs.lib.nixosSystem { mkComputer = configurationNix: homeManagerRole: extraModules: nixpkgs.lib.nixosSystem {
inherit system pkgs; inherit custom.system pkgs;
specialArgs = { inherit self nixpkgs system inputs username; }; specialArgs = { inherit inputs username; };
modules = ( modules = (
[ [
# System configuration for this host # System configuration for this host
@ -55,8 +58,8 @@
{ {
home-manager.useGlobalPkgs = true; home-manager.useGlobalPkgs = true;
home-manager.useUserPackages = true; home-manager.useUserPackages = true;
home-manager.users.${username}.imports = [ home-manager.users.${custom.username}.imports = [
(import homeManagerRole { inherit pkgs username; }) (import homeManagerRole { inherit pkgs inputs; })
]; ];
} }
] ++ extraModules ] ++ extraModules
@ -107,140 +110,140 @@
]; ];
proxy = mkComputer proxy = mkComputer
(mkVM (mkVM
{ hostname = "proxy"; ip = "10.7.89.100"; inherit self; }) { hostname = "proxy"; ip = "10.7.89.100"; inherit inputs; })
./home-manager/headless.nix ./home-manager/headless.nix
[ [
./modules/haproxy ./modules/haproxy
]; ];
nixos-management = mkComputer nixos-management = mkComputer
(mkVM (mkVM
{ hostname = "nixos-management"; ip = "10.7.89.150"; inherit self; }) { hostname = "nixos-management"; ip = "10.7.89.150"; inherit inputs; })
./home-manager/headless.nix ./home-manager/headless.nix
[ [
./modules/code-server ./modules/code-server
./modules/docker ./modules/docker
(import ./modules/restic-server-client { (import ./modules/restic-server-client {
inherit self username; time = "21:30"; inherit inputs username; time = "21:30";
}) })
]; ];
heimdall = mkComputer heimdall = mkComputer
(mkVM (mkVM
{ hostname = "heimdall"; ip = "10.7.89.121"; inherit self; }) { hostname = "heimdall"; ip = "10.7.89.121"; inherit inputs; })
./home-manager/headless.nix ./home-manager/headless.nix
[ [
./modules/docker ./modules/docker
(import ./modules/restic-server-client { (import ./modules/restic-server-client {
inherit self username; time = "22:00"; inherit inputs; time = "22:00";
}) })
]; ];
grav = mkComputer grav = mkComputer
(mkVM (mkVM
{ hostname = "grav"; ip = "10.7.89.102"; inherit self; }) { hostname = "grav"; ip = "10.7.89.102"; inherit inputs; })
./home-manager/headless.nix ./home-manager/headless.nix
[ [
./modules/docker ./modules/docker
(import ./modules/restic-server-client { (import ./modules/restic-server-client {
inherit self username; time = "22:30"; inherit inputs; time = "22:30";
}) })
]; ];
ttrss = mkComputer ttrss = mkComputer
(mkVM (mkVM
{ hostname = "ttrss"; ip = "10.7.89.115"; inherit self; }) { hostname = "ttrss"; ip = "10.7.89.115"; inherit inputs; })
./home-manager/headless.nix ./home-manager/headless.nix
[ [
./modules/docker ./modules/docker
(import ./modules/restic-server-client { (import ./modules/restic-server-client {
inherit self username; time = "23:00"; inherit inputs; time = "23:00";
}) })
]; ];
rss-bridge = mkComputer rss-bridge = mkComputer
(mkVM (mkVM
{ hostname = "rss-bridge"; ip = "10.7.89.111"; inherit self; }) { hostname = "rss-bridge"; ip = "10.7.89.111"; inherit inputs; })
./home-manager/headless.nix ./home-manager/headless.nix
[ [
./modules/docker ./modules/docker
(import ./modules/restic-server-client { (import ./modules/restic-server-client {
inherit self username; time = "23:30"; inherit inputs; time = "23:30";
}) })
]; ];
git = mkComputer git = mkComputer
(mkVM (mkVM
{ hostname = "git"; ip = "10.7.89.109"; inherit self; }) { hostname = "git"; ip = "10.7.89.109"; inherit inputs; })
./home-manager/headless.nix ./home-manager/headless.nix
[ [
./modules/docker ./modules/docker
(import ./modules/restic-server-client { (import ./modules/restic-server-client {
inherit self username; time = "03:00"; inherit inputs; time = "03:00";
}) })
]; ];
plex = mkComputer plex = mkComputer
(mkVM (mkVM
{ hostname = "plex"; ip = "10.7.89.112"; inherit self; }) { hostname = "plex"; ip = "10.7.89.112"; inherit inputs; })
./home-manager/headless.nix ./home-manager/headless.nix
[ [
./modules/docker ./modules/docker
./modules/media-share ./modules/media-share
./modules/plex ./modules/plex
(import ./modules/restic-server-client { (import ./modules/restic-server-client {
inherit self username; time = "03:30"; inherit inputs; time = "03:30";
}) })
]; ];
nextcloud = mkComputer nextcloud = mkComputer
(mkVM (mkVM
{ hostname = "nextcloud"; ip = "10.7.89.103"; inherit self; }) { hostname = "nextcloud"; ip = "10.7.89.103"; inherit inputs; })
./home-manager/headless.nix ./home-manager/headless.nix
[ [
./modules/docker ./modules/docker
(import ./modules/restic-server-client { (import ./modules/restic-server-client {
inherit self username; time = "04:00"; inherit inputs; time = "04:00";
}) })
]; ];
mail = mkComputer mail = mkComputer
(mkVM (mkVM
{ hostname = "mail"; ip = "10.7.89.123"; inherit self; }) { hostname = "mail"; ip = "10.7.89.123"; inherit inputs; })
./home-manager/headless.nix ./home-manager/headless.nix
[ [
./modules/docker ./modules/docker
(import ./modules/restic-server-client { (import ./modules/restic-server-client {
inherit self username; time = "04:30"; inherit inputs; time = "04:30";
}) })
]; ];
pihole = mkComputer pihole = mkComputer
(mkVM (mkVM
{ hostname = "pihole"; ip = "10.7.89.2"; inherit self; }) { hostname = "pihole"; ip = "10.7.89.2"; inherit inputs; })
./home-manager/headless.nix ./home-manager/headless.nix
[ [
./modules/docker ./modules/docker
./modules/pihole ./modules/pihole
(import ./modules/restic-server-client { (import ./modules/restic-server-client {
inherit self username; time = "05:00"; inherit inputs; time = "05:00";
}) })
./modules/unbound ./modules/unbound
]; ];
restic-server = mkComputer restic-server = mkComputer
(mkVM (mkVM
{ hostname = "restic-server"; ip = "10.7.89.30"; inherit self; }) { hostname = "restic-server"; ip = "10.7.89.30"; inherit inputs; })
./home-manager/headless.nix ./home-manager/headless.nix
[ [
./modules/restic-server ./modules/restic-server
]; ];
}; };
homeConfigurations = { homeConfigurations = {
"${username}@co-ws-con4" = home-manager.lib.homeManagerConfiguration { "${custom.username}@co-ws-con4" = home-manager.lib.homeManagerConfiguration {
configuration = import ./home-manager/work-wsl.nix; configuration = import ./home-manager/work-wsl.nix;
inherit system username; inherit inputs;
homeDirectory = "/home/${username}"; homeDirectory = "/home/${custom.username}";
extraSpecialArgs = { extraSpecialArgs = {
inherit self system username; inherit inputs;
}; };
}; };
}; };

View File

@ -1,8 +1,8 @@
{ username, ... }: { inputs, ... }:
{ {
# Home Manager needs a bit of information about you and the # Home Manager needs a bit of information about you and the
# paths it should manage. # paths it should manage.
home.username = username; home.username = inputs.custom.username;
home.homeDirectory = "/home/${username}"; home.homeDirectory = "/home/${inputs.custom.username}";
programs.home-manager.enable = true; programs.home-manager.enable = true;
} }

View File

@ -1,7 +1,7 @@
{ pkgs, username, ... }: { inputs, pkgs, ... }:
{ {
imports = [ imports = [
(import ./common { inherit username; }) (import ./common { inherit inputs; })
./software/work-desktop ./software/work-desktop
./software/autorandr ./software/autorandr
./software/calibre ./software/calibre

View File

@ -1,7 +1,7 @@
{ pkgs, username, ... }: { inputs, pkgs, ... }:
{ {
imports = [ imports = [
(import ./common { inherit username; }) (import ./common { inherit inputs; })
./software/git ./software/git
./software/vim ./software/vim
]; ];

View File

@ -1,4 +1,4 @@
{ pkgs, username, ... }: { pkgs, ... }:
{ {
home.packages = with pkgs; [ home.packages = with pkgs; [
vagrant vagrant

View File

@ -1,4 +1,4 @@
{ self, pkgs, username, ... }: { inputs, pkgs, ... }:
{ {
imports = [ imports = [
./common ./common
@ -14,7 +14,7 @@
enable = true; enable = true;
bashrcExtra = '' bashrcExtra = ''
. ~/.nixos/home-manager/configs/bash/work_wsl_bashrc . ~/.nixos/home-manager/configs/bash/work_wsl_bashrc
. /home/${username}/.nix-profile/etc/profile.d/nix.sh . /home/${inputs.custom.username}/.nix-profile/etc/profile.d/nix.sh
''; '';
}; };
} }

View File

@ -1,8 +1,8 @@
{ pkgs, username, ... }: { inputs, pkgs, ... }:
{ {
services.code-server = { services.code-server = {
enable = true; enable = true;
user = username; user = inputs.custom.username;
host = "0.0.0.0"; host = "0.0.0.0";
auth = "none"; auth = "none";
extraPackages = with pkgs; extraPackages = with pkgs;
@ -14,7 +14,7 @@
git git
]; ];
extraEnvironment = { extraEnvironment = {
HOME = "/home/${username}"; HOME = "/home/${inputs.custom.username}";
}; };
}; };
networking.firewall.allowedTCPPorts = [ 4444 ]; networking.firewall.allowedTCPPorts = [ 4444 ];

View File

@ -1,7 +1,7 @@
{ self, nixpkgs, pkgs, username, ... }: { inputs, pkgs, ... }:
{ {
imports = [ imports = [
"${self}/modules/cli" "${inputs.self}/modules/cli"
]; ];
# Use the systemd-boot EFI boot loader. # Use the systemd-boot EFI boot loader.
@ -49,7 +49,7 @@
# Disable the root user # Disable the root user
users.users.root.hashedPassword = "!"; users.users.root.hashedPassword = "!";
# Define a user account. Don't forget to set a password with passwd. # Define a user account. Don't forget to set a password with passwd.
users.users.${username} = { users.users.${inputs.custom.username} = {
isNormalUser = true; isNormalUser = true;
initialPassword = "password"; initialPassword = "password";
extraGroups = [ extraGroups = [
@ -67,13 +67,10 @@
nixpkgs.config.allowUnfree = true; nixpkgs.config.allowUnfree = true;
nix = { nix = {
nixPath = [ "nixpkgs=${nixpkgs}" ]; nixPath = [ "nixpkgs=${inputs.nixpkgs}" ];
registry.nixpkgs = { registry = {
from = { nixpkgs.flake = inputs.nixpkgs;
id = "nixpkgs"; nix-config.flake = inputs.self;
type = "indirect";
};
flake = nixpkgs;
}; };
autoOptimiseStore = true; autoOptimiseStore = true;
@ -121,7 +118,7 @@
# this value at the release version of the first install of this system. # this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option # Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html). # (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = import "${self}/version.nix"; system.stateVersion = import "${inputs.self}/version.nix";
} }

View File

@ -1,4 +1,4 @@
{ pkgs, username, ... }: { inputs, pkgs, ... }:
{ {
networking = { networking = {
networkmanager.enable = true; networkmanager.enable = true;
@ -59,7 +59,7 @@
terminator terminator
]; ];
environment.shellAliases = { environment.shellAliases = {
management-server = "mosh ${username}@10.7.89.150 tmux a"; management-server = "mosh ${inputs.custom.username}@10.7.89.150 tmux a";
}; };
} }

View File

@ -1,11 +1,11 @@
{ pkgs, username, ... }: { inputs, pkgs, ... }:
{ {
virtualisation.docker = virtualisation.docker =
{ {
enable = true; enable = true;
autoPrune.enable = true; autoPrune.enable = true;
}; };
users.users.${username}.extraGroups = [ "docker" ]; users.users.${inputs.custom.username}.extraGroups = [ "docker" ];
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
docker-compose docker-compose
lazydocker lazydocker

View File

@ -1,4 +1,4 @@
{ pkgs, username, ... }: { inputs, pkgs, ... }:
{ {
programs.droidcam.enable = true; programs.droidcam.enable = true;
# required for USB connection # required for USB connection
@ -6,7 +6,7 @@
environment.shellAliases = { environment.shellAliases = {
webcam = "droidcam-cli -size=1920x1080 ios 4747"; webcam = "droidcam-cli -size=1920x1080 ios 4747";
}; };
home-manager.users.${username} = { home-manager.users.${inputs.custom.username} = {
xdg.desktopEntries = { xdg.desktopEntries = {
droidcam = { droidcam = {
name = "Droidcam"; name = "Droidcam";

View File

@ -1,10 +1,10 @@
{ pkgs, username, ... }: { inputs, pkgs, ... }:
{ {
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
gnome.eog gnome.eog
]; ];
home-manager.users.${username} = { home-manager.users.${inputs.custom.username} = {
xdg.mimeApps = { xdg.mimeApps = {
enable = true; enable = true;
associations.added = { associations.added = {

View File

@ -1,7 +1,7 @@
{ pkgs, username, ... }: { inputs, pkgs, ... }:
{ {
services.espanso.enable = true; services.espanso.enable = true;
home-manager.users.${username} = { home-manager.users.${inputs.custom.username} = {
xdg.configFile.espanso = { xdg.configFile.espanso = {
target = "espanso/default.yml"; target = "espanso/default.yml";
onChange = "systemctl --user restart espanso"; onChange = "systemctl --user restart espanso";

View File

@ -1,11 +1,11 @@
{ pkgs, username, ... }: { inputs, pkgs, ... }:
{ {
nix.extraOptions = '' nix.extraOptions = ''
keep-outputs = true keep-outputs = true
keep-derivations = true keep-derivations = true
''; '';
home-manager.users.${username} = { home-manager.users.${inputs.custom.username} = {
programs.direnv.enable = true; programs.direnv.enable = true;
programs.direnv.nix-direnv.enable = true; programs.direnv.nix-direnv.enable = true;
programs.direnv.nix-direnv.enableFlakes = true; programs.direnv.nix-direnv.enableFlakes = true;

View File

@ -1,13 +1,13 @@
{ self, time, username, ... }: { inputs, time, ... }:
{ {
services.restic.backups.${username} = { services.restic.backups.${inputs.custom.username} = {
user = "root"; user = "root";
repository = "rest:http://10.7.89.30:8000"; repository = "rest:http://10.7.89.30:8000";
timerConfig.OnCalendar = time; timerConfig.OnCalendar = time;
passwordFile = "/home/${username}/.nixos/secrets/passwords/restic.key"; passwordFile = "/home/${inputs.custom.username}/.nixos/secrets/passwords/restic.key";
paths = [ "/home/${username}/" ]; paths = [ "/home/${inputs.custom.username}/" ];
extraBackupArgs = [ extraBackupArgs = [
"--exclude-file=${self}/modules/restic/excludes.txt" "--exclude-file=${inputs.self}/modules/restic/excludes.txt"
]; ];
pruneOpts = [ pruneOpts = [
"--keep-hourly 24" "--keep-hourly 24"

View File

@ -1,4 +1,4 @@
{ pkgs, username, ... }: { inputs, pkgs, ... }:
let let
repository = "/mnt/restic-server"; repository = "/mnt/restic-server";
in in

View File

@ -1,20 +1,20 @@
{ self, pkgs, username, ... }: { inputs, pkgs, ... }:
{ {
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
restic restic
]; ];
services.restic.backups.${username} = { services.restic.backups.${inputs.custom.username} = {
user = username; user = username;
repository = "rest:http://10.7.89.30:8000"; repository = "rest:http://10.7.89.30:8000";
timerConfig = { timerConfig = {
OnCalendar = "hourly"; OnCalendar = "hourly";
RandomizedDelaySec = "15min"; RandomizedDelaySec = "15min";
}; };
passwordFile = "/home/${username}/.nixos/secrets/passwords/restic.key"; passwordFile = "/home/${inputs.custom.username}/.nixos/secrets/passwords/restic.key";
paths = [ "/home/${username}/" ]; paths = [ "/home/${inputs.custom.username}/" ];
extraBackupArgs = [ extraBackupArgs = [
"--exclude-file=${self}/modules/restic/excludes.txt" "--exclude-file=${inputs.self}/modules/restic/excludes.txt"
]; ];
}; };
} }

View File

@ -1,4 +1,4 @@
{ username, ... }: { inputs, ... }:
{ {
programs.steam.enable = true; programs.steam.enable = true;
hardware.steam-hardware.enable = true; hardware.steam-hardware.enable = true;
@ -6,7 +6,7 @@
allowedTCPPorts = [ 27036 ]; allowedTCPPorts = [ 27036 ];
allowedUDPPorts = [ 27031 ]; allowedUDPPorts = [ 27031 ];
}; };
home-manager.users.${username} = { home-manager.users.${inputs.custom.username} = {
home.file.".local/share/applications/steam.desktop".source = ./steam.desktop; home.file.".local/share/applications/steam.desktop".source = ./steam.desktop;
}; };
} }

View File

@ -1,8 +1,8 @@
{ self, hostname, ip, ... }: { inputs, hostname, ip, ... }:
{ {
imports = [ imports = [
(import "${self}/modules/mk-network" { inherit hostname ip; }) (import "${inputs.self}/modules/mk-network" { inherit hostname ip; })
(import "${self}/systems/minimal") (import "${inputs.self}/systems/minimal")
]; ];
boot.initrd.availableKernelModules = [ boot.initrd.availableKernelModules = [
"ata_piix" "ata_piix"