170 lines
5.2 KiB
Nix
170 lines
5.2 KiB
Nix
|
{
|
||
|
inputs = {
|
||
|
nixpkgs = { url = "github:nixos/nixpkgs/nixos-unstable"; };
|
||
|
deploy-rs = { url = "github:serokell/deploy-rs"; inputs.nixpkgs.follows = "nixpkgs"; };
|
||
|
utils = { url = "github:numtide/flake-utils"; };
|
||
|
sops-nix = { url = "github:Mic92/sops-nix"; inputs.nixpkgs.follows = "nixpkgs"; };
|
||
|
};
|
||
|
|
||
|
outputs = { self, nixpkgs, deploy-rs, utils, sops-nix, ... }@inputs:
|
||
|
{
|
||
|
nixosConfigurations = {
|
||
|
"fsn1-1.mirror.lewd.wtf" = nixpkgs.lib.nixosSystem {
|
||
|
system = "x86_64-linux";
|
||
|
specialArgs = { inherit inputs self; };
|
||
|
modules = [
|
||
|
sops-nix.nixosModules.sops
|
||
|
./default.nix
|
||
|
./hosts/fsn1-1.mirror.lewd.wtf/configuration.nix
|
||
|
./deployments/mirror/default.nix
|
||
|
];
|
||
|
};
|
||
|
|
||
|
"master.mirror.lewd.wtf" = nixpkgs.lib.nixosSystem {
|
||
|
system = "x86_64-linux";
|
||
|
specialArgs = { inherit inputs self; };
|
||
|
modules = [
|
||
|
sops-nix.nixosModules.sops
|
||
|
./default.nix
|
||
|
./hosts/master.mirror.lewd.wtf/configuration.nix
|
||
|
];
|
||
|
};
|
||
|
|
||
|
"nyx.lewd.wtf" = nixpkgs.lib.nixosSystem {
|
||
|
system = "x86_64-linux";
|
||
|
specialArgs = { inherit inputs self; };
|
||
|
modules = [
|
||
|
sops-nix.nixosModules.sops
|
||
|
./default.nix
|
||
|
./hosts/nyx.lewd.wtf/configuration.nix
|
||
|
];
|
||
|
};
|
||
|
|
||
|
"aztul.elmosco.lewd.wtf" = nixpkgs.lib.nixosSystem {
|
||
|
system = "x86_64-linux";
|
||
|
specialArgs = { inherit inputs self; };
|
||
|
modules = [
|
||
|
sops-nix.nixosModules.sops
|
||
|
./default.nix
|
||
|
./hosts/seedbox/aztul/configuration.nix
|
||
|
];
|
||
|
};
|
||
|
|
||
|
"kitty.elmosco.lewd.wtf" = nixpkgs.lib.nixosSystem {
|
||
|
system = "x86_64-linux";
|
||
|
specialArgs = { inherit inputs self; };
|
||
|
modules = [
|
||
|
sops-nix.nixosModules.sops
|
||
|
./default.nix
|
||
|
./hosts/seedbox/kitty/configuration.nix
|
||
|
];
|
||
|
};
|
||
|
|
||
|
"kinda.sus.lol" = nixpkgs.lib.nixosSystem {
|
||
|
system = "x86_64-linux";
|
||
|
specialArgs = { inherit inputs self; };
|
||
|
modules = [
|
||
|
sops-nix.nixosModules.sops
|
||
|
./default.nix
|
||
|
./hosts/kinda.sus.lol/configuration.nix
|
||
|
];
|
||
|
};
|
||
|
};
|
||
|
|
||
|
deploy.nodes = {
|
||
|
"fsn1-1.mirror.lewd.wtf" = {
|
||
|
sshOpts = [ "-p" "222" "-o" "StrictHostKeyChecking=no" ];
|
||
|
hostname = "fsn1-1.mirror.lewd.wtf";
|
||
|
fastConnection = true;
|
||
|
|
||
|
profiles.system = {
|
||
|
sshUser = "root";
|
||
|
path =
|
||
|
deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations."fsn1-1.mirror.lewd.wtf";
|
||
|
user = "root";
|
||
|
};
|
||
|
};
|
||
|
|
||
|
"master.mirror.lewd.wtf" = {
|
||
|
sshOpts = [ "-p" "222" "-o" "StrictHostKeyChecking=no" ];
|
||
|
hostname = "master.mirror.lewd.wtf";
|
||
|
fastConnection = true;
|
||
|
|
||
|
profiles.system = {
|
||
|
sshUser = "root";
|
||
|
path =
|
||
|
deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations."master.mirror.lewd.wtf";
|
||
|
user = "root";
|
||
|
};
|
||
|
};
|
||
|
|
||
|
"nyx.lewd.wtf" = {
|
||
|
sshOpts = [ "-p" "222" "-o" "StrictHostKeyChecking=no" ];
|
||
|
hostname = "192.168.0.10";
|
||
|
fastConnection = true;
|
||
|
|
||
|
profiles.system = {
|
||
|
sshUser = "root";
|
||
|
path =
|
||
|
deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations."nyx.lewd.wtf";
|
||
|
user = "root";
|
||
|
};
|
||
|
};
|
||
|
|
||
|
"aztul.elmosco.lewd.wtf" = {
|
||
|
sshOpts = [ "-p" "22111" "-o" "StrictHostKeyChecking=no" ];
|
||
|
hostname = "aztul.elmosco.lewd.wtf";
|
||
|
fastConnection = true;
|
||
|
|
||
|
profiles.system = {
|
||
|
sshUser = "root";
|
||
|
path =
|
||
|
deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations."aztul.elmosco.lewd.wtf";
|
||
|
user = "root";
|
||
|
};
|
||
|
};
|
||
|
|
||
|
"kitty.elmosco.lewd.wtf" = {
|
||
|
sshOpts = [ "-p" "22105" "-o" "StrictHostKeyChecking=no" ];
|
||
|
hostname = "kitty.elmosco.lewd.wtf";
|
||
|
fastConnection = true;
|
||
|
|
||
|
profiles.system = {
|
||
|
sshUser = "root";
|
||
|
path =
|
||
|
deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations."kitty.elmosco.lewd.wtf";
|
||
|
user = "root";
|
||
|
};
|
||
|
};
|
||
|
|
||
|
"kinda.sus.lol" = {
|
||
|
sshOpts = [ "-p" "22201" "-o" "StrictHostKeyChecking=no" ];
|
||
|
hostname = "kinda.sus.lol";
|
||
|
fastConnection = true;
|
||
|
|
||
|
profiles.system = {
|
||
|
sshUser = "root";
|
||
|
path =
|
||
|
deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations."kinda.sus.lol";
|
||
|
user = "root";
|
||
|
};
|
||
|
};
|
||
|
};
|
||
|
|
||
|
checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib;
|
||
|
} // utils.lib.eachDefaultSystem (system:
|
||
|
let
|
||
|
pkgs = nixpkgs.legacyPackages.${system};
|
||
|
in
|
||
|
{
|
||
|
devShells.default = pkgs.mkShell {
|
||
|
buildInputs = with pkgs; [
|
||
|
deploy-rs.defaultPackage.${system}
|
||
|
apacheHttpd
|
||
|
nixpkgs-fmt
|
||
|
];
|
||
|
};
|
||
|
}
|
||
|
);
|
||
|
}
|