1
0
Fork 0
dotfiles/system/flakes/sail.nix

58 lines
1.2 KiB
Nix
Raw Normal View History

2023-05-12 17:39:09 +02:00
{ nixpkgs, deploy-rs, home-manager, agenix, inputs, ... }:
2022-07-30 18:19:49 +02:00
2022-07-30 21:38:01 +02:00
let
default-system = "x86_64-linux";
2023-04-05 13:16:47 +02:00
overlay-attic = inputs.attic.overlays.default;
2023-05-12 17:39:09 +02:00
overlay-deploy-rs = _: _: { inherit (deploy-rs.packages.${default-system}) deploy-rs; };
2022-07-31 20:48:49 +02:00
overlay-nifoc = inputs.nifoc-overlay.overlay;
2022-07-30 21:38:01 +02:00
nixpkgsConfig = {
overlays = [
2023-04-05 13:16:47 +02:00
overlay-attic
2023-05-12 17:39:09 +02:00
overlay-deploy-rs
2022-07-31 20:48:49 +02:00
overlay-nifoc
2022-07-30 21:38:01 +02:00
];
config = {
allowUnfree = true;
allowBroken = true;
2023-05-20 13:35:13 +02:00
permittedInsecurePackages = [
"openssl-1.1.1t"
];
2022-07-30 21:38:01 +02:00
};
};
in
2023-05-12 17:39:09 +02:00
rec {
2022-08-01 22:39:14 +02:00
system = nixpkgs.lib.nixosSystem {
system = default-system;
2022-07-30 18:19:49 +02:00
modules = [
../hosts/sail.nix
2022-07-31 20:48:49 +02:00
2022-07-31 20:55:17 +02:00
home-manager.nixosModules.home-manager
2023-01-02 00:30:54 +01:00
2023-04-14 10:23:54 +02:00
agenix.nixosModules.default
2023-02-05 17:51:04 +01:00
2022-07-31 20:48:49 +02:00
{
nixpkgs = nixpkgsConfig;
2022-07-31 21:01:10 +02:00
nix.nixPath = [ "nixpkgs=${nixpkgs}" ];
2023-04-23 01:21:04 +02:00
nix.registry.nixpkgs.flake = nixpkgs;
2022-07-31 20:48:49 +02:00
home-manager.useGlobalPkgs = true;
home-manager.useUserPackages = true;
home-manager.users.daniel = import ../../home/hosts/sail.nix;
}
2022-07-30 18:19:49 +02:00
];
};
2023-05-12 17:39:09 +02:00
deployment = {
2023-05-14 12:55:56 +02:00
hostname = "sail";
2023-05-12 17:39:09 +02:00
sshUser = "root";
remoteBuild = true;
profiles.system = {
path = deploy-rs.lib.${default-system}.activate.nixos system;
};
};
2022-07-30 18:19:49 +02:00
}