{ inputs = { nixpkgs = { url = "github:nixos/nixpkgs/nixos-unstable"; }; deploy-rs = { url = "github:serokell/deploy-rs"; inputs.nixpkgs.follows = "nixpkgs"; }; utils = { url = "github:numtide/flake-utils"; }; sops-nix = { url = "github:Mic92/sops-nix"; inputs.nixpkgs.follows = "nixpkgs"; }; }; outputs = { self, nixpkgs, deploy-rs, utils, sops-nix, ... }@inputs: { nixosConfigurations = { "fsn1-1.mirror.lewd.wtf" = nixpkgs.lib.nixosSystem { system = "x86_64-linux"; specialArgs = { inherit inputs self; }; modules = [ sops-nix.nixosModules.sops ./default.nix ./hosts/fsn1-1.mirror.lewd.wtf/configuration.nix ./deployments/mirror/default.nix ]; }; "master.mirror.lewd.wtf" = nixpkgs.lib.nixosSystem { system = "x86_64-linux"; specialArgs = { inherit inputs self; }; modules = [ sops-nix.nixosModules.sops ./default.nix ./hosts/master.mirror.lewd.wtf/configuration.nix ]; }; "nyx.lewd.wtf" = nixpkgs.lib.nixosSystem { system = "x86_64-linux"; specialArgs = { inherit inputs self; }; modules = [ sops-nix.nixosModules.sops ./default.nix ./hosts/nyx.lewd.wtf/configuration.nix ]; }; "aztul.elmosco.lewd.wtf" = nixpkgs.lib.nixosSystem { system = "x86_64-linux"; specialArgs = { inherit inputs self; }; modules = [ sops-nix.nixosModules.sops ./default.nix ./hosts/seedbox/aztul/configuration.nix ]; }; "kitty.elmosco.lewd.wtf" = nixpkgs.lib.nixosSystem { system = "x86_64-linux"; specialArgs = { inherit inputs self; }; modules = [ sops-nix.nixosModules.sops ./default.nix ./hosts/seedbox/kitty/configuration.nix ]; }; "kinda.sus.lol" = nixpkgs.lib.nixosSystem { system = "x86_64-linux"; specialArgs = { inherit inputs self; }; modules = [ sops-nix.nixosModules.sops ./default.nix ./hosts/kinda.sus.lol/configuration.nix ]; }; }; deploy.nodes = { "fsn1-1.mirror.lewd.wtf" = { sshOpts = [ "-p" "222" "-o" "StrictHostKeyChecking=no" ]; hostname = "fsn1-1.mirror.lewd.wtf"; fastConnection = true; profiles.system = { sshUser = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations."fsn1-1.mirror.lewd.wtf"; user = "root"; }; }; "master.mirror.lewd.wtf" = { sshOpts = [ "-p" "222" "-o" "StrictHostKeyChecking=no" ]; hostname = "master.mirror.lewd.wtf"; fastConnection = true; profiles.system = { sshUser = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations."master.mirror.lewd.wtf"; user = "root"; }; }; "nyx.lewd.wtf" = { sshOpts = [ "-p" "222" "-o" "StrictHostKeyChecking=no" ]; hostname = "192.168.0.10"; fastConnection = true; profiles.system = { sshUser = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations."nyx.lewd.wtf"; user = "root"; }; }; "aztul.elmosco.lewd.wtf" = { sshOpts = [ "-p" "22111" "-o" "StrictHostKeyChecking=no" ]; hostname = "aztul.elmosco.lewd.wtf"; fastConnection = true; profiles.system = { sshUser = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations."aztul.elmosco.lewd.wtf"; user = "root"; }; }; "kitty.elmosco.lewd.wtf" = { sshOpts = [ "-p" "22105" "-o" "StrictHostKeyChecking=no" ]; hostname = "kitty.elmosco.lewd.wtf"; fastConnection = true; profiles.system = { sshUser = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations."kitty.elmosco.lewd.wtf"; user = "root"; }; }; "kinda.sus.lol" = { sshOpts = [ "-p" "22201" "-o" "StrictHostKeyChecking=no" ]; hostname = "kinda.sus.lol"; fastConnection = true; profiles.system = { sshUser = "root"; path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations."kinda.sus.lol"; user = "root"; }; }; }; checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib; } // utils.lib.eachDefaultSystem (system: let pkgs = nixpkgs.legacyPackages.${system}; in { devShells.default = pkgs.mkShell { buildInputs = with pkgs; [ deploy-rs.defaultPackage.${system} apacheHttpd nixpkgs-fmt ]; }; } ); }