1
0
Fork 0
dotfiles/system/flakes/tanker.nix

67 lines
1.4 KiB
Nix
Raw Normal View History

2023-09-24 13:23:03 +02:00
{ nixpkgs, disko, deploy-rs, home-manager, agenix, attic, inputs, ... }:
2023-04-04 14:35:49 +02:00
let
default-system = "x86_64-linux";
2023-09-24 13:23:03 +02:00
# overlay-master = _: _: { pkgs-master = import inputs.nixpkgs-master { system = default-system; }; };
2023-09-17 00:53:55 +02:00
overlay-deploy-rs = _: _: { inherit (inputs.deploy-rs.packages.${default-system}) deploy-rs; };
2023-04-04 14:35:49 +02:00
overlay-nifoc = inputs.nifoc-overlay.overlay;
nixpkgsConfig = {
overlays = [
2023-09-24 13:23:03 +02:00
# overlay-master
2023-09-17 00:53:55 +02:00
overlay-deploy-rs
2023-04-04 14:35:49 +02:00
overlay-nifoc
];
config = {
allowUnfree = true;
allowBroken = true;
2023-05-20 13:35:13 +02:00
permittedInsecurePackages = [
"openssl-1.1.1t"
];
2023-04-04 14:35:49 +02:00
};
};
in
2023-05-12 17:39:09 +02:00
rec {
2023-04-04 14:35:49 +02:00
system = nixpkgs.lib.nixosSystem {
system = default-system;
2023-04-04 14:35:49 +02:00
modules = [
disko.nixosModules.disko
../hosts/tanker.nix
2023-04-04 14:35:49 +02:00
home-manager.nixosModules.home-manager
2023-04-14 10:23:54 +02:00
agenix.nixosModules.default
2023-04-04 14:35:49 +02:00
2023-04-04 17:20:09 +02:00
attic.nixosModules.atticd
2023-04-04 14:35:49 +02:00
{
nixpkgs = nixpkgsConfig;
nix.nixPath = [ "nixpkgs=${nixpkgs}" ];
2023-04-23 01:21:04 +02:00
nix.registry.nixpkgs.flake = nixpkgs;
2023-09-17 00:53:55 +02:00
home-manager = {
useGlobalPkgs = true;
useUserPackages = true;
users.daniel = import ../../home/hosts/tanker.nix;
};
2023-04-04 14:35:49 +02:00
}
];
};
2023-05-12 17:39:09 +02:00
deployment = {
2023-07-04 19:38:57 +02:00
hostname = "tanker";
2023-05-12 17:39:09 +02:00
sshUser = "root";
remoteBuild = true;
2023-06-01 21:35:47 +02:00
autoRollback = false;
magicRollback = false;
2023-05-12 17:39:09 +02:00
profiles.system = {
path = deploy-rs.lib.${default-system}.activate.nixos system;
};
};
2023-04-04 14:35:49 +02:00
}