aboutsummaryrefslogtreecommitdiff
path: root/flake.nix
blob: 609f5ca24530469cc2420573322d21bfe5b06cb8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
{
  inputs = {
    nixpkgs.url = "github:nixos/nixpkgs/nixos-23.05";
    flake-parts.url = "github:hercules-ci/flake-parts";
    nixinate.url = "github:maxaudron/nixinate";

    secrets = {
      url = "git+ssh://git@gitlab.com/cocainefarm/k8s/secrets";
      flake = false;
    };
  };

  outputs = inputs@{ self, nixpkgs, flake-parts, nixinate, ... }:
    flake-parts.lib.mkFlake { inherit inputs; } {
      imports = [ nixinate.flakeModule ];
      flake =
        let
          system = "x86_64-linux";
          specialArgs = inputs // {
            nodes = self.nixosConfigurations;
          };
          mkSystem = modules: nixpkgs.lib.nixosSystem {
            inherit specialArgs system;
            modules = modules;
          };
        in
        {
          nixosModules = import ./modules;
          nixosConfigurations = with self.nixosModules; {
            test1 = mkSystem [ (import ./machines/test) common users vultr wireguard crypto kubernetes ];
            test2 = mkSystem [ (import ./machines/test2) common users vultr wireguard crypto kubernetes ];
            # vultr-image = mkSystem [ common users image vultr ];
            # nixbuilder = mkSystem [ (import ./machines/nixbuilder) common users gitlab {
            #   users.users = {
            #     nixbuilder = {
            #       isNormalUser = true;
            #       extraGroups = [ "wheel" "docker" ];
            #       openssh.authorizedKeys.keys = [
            #         "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGfuzswSmySvmTIiZpCKCEUpOXvETr8sTs49wX7US7yX nixbuilder"
            #       ];
            #     };
            #   };
            # } ];
          };
        };
      systems = [ "x86_64-linux" "x86_64-darwin" "aarch64-linux" "aarch64-darwin" ];
    };
}