138 lines
4.5 KiB
Nix
138 lines
4.5 KiB
Nix
{
|
|
description = "NixOS configuration of our builders";
|
|
|
|
nixConfig.extra-substituters = [
|
|
"https://nix-community.cachix.org"
|
|
"https://nixpkgs-update.cachix.org"
|
|
];
|
|
nixConfig.extra-trusted-public-keys = [
|
|
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
|
|
"nixpkgs-update.cachix.org-1:6y6Z2JdoL3APdu6/+Iy8eZX2ajf09e4EE9SnxSML1W8="
|
|
];
|
|
|
|
inputs = {
|
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable-small";
|
|
flake-parts.url = "github:hercules-ci/flake-parts";
|
|
flake-parts.inputs.nixpkgs-lib.follows = "nixpkgs";
|
|
sops-nix.url = "github:Mic92/sops-nix";
|
|
sops-nix.inputs.nixpkgs.follows = "nixpkgs";
|
|
sops-nix.inputs.nixpkgs-stable.follows = "";
|
|
srvos.url = "github:numtide/srvos";
|
|
# actually not used when using the modules but than nothing ever will try to fetch this nixpkgs variant
|
|
srvos.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
nixpkgs-update.url = "github:ryantm/nixpkgs-update";
|
|
nixpkgs-update.inputs.mmdoc.follows = "";
|
|
nixpkgs-update-github-releases.url = "github:ryantm/nixpkgs-update-github-releases";
|
|
nixpkgs-update-github-releases.flake = false;
|
|
|
|
nur-update.url = "github:nix-community/nur-update";
|
|
nur-update.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
disko.url = "github:nix-community/disko";
|
|
disko.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
hercules-ci-effects.url = "github:hercules-ci/hercules-ci-effects";
|
|
hercules-ci-effects.inputs.flake-parts.follows = "flake-parts";
|
|
hercules-ci-effects.inputs.hercules-ci-agent.follows = "";
|
|
hercules-ci-effects.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
treefmt-nix.url = "github:numtide/treefmt-nix";
|
|
treefmt-nix.inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
|
|
outputs = inputs @ { flake-parts, self, ... }:
|
|
flake-parts.lib.mkFlake
|
|
{ inherit inputs; }
|
|
{
|
|
systems = [ "x86_64-linux" "aarch64-linux" "x86_64-darwin" "aarch64-darwin" ];
|
|
|
|
herculesCI = { lib, ... }: {
|
|
ciSystems = [ "x86_64-linux" "aarch64-linux" ];
|
|
|
|
onPush.default.outputs = {
|
|
checks = lib.mkForce self.outputs.checks.x86_64-linux;
|
|
};
|
|
};
|
|
|
|
imports = [
|
|
inputs.hercules-ci-effects.flakeModule
|
|
inputs.treefmt-nix.flakeModule
|
|
./effect.nix
|
|
./shell.nix
|
|
];
|
|
|
|
hercules-ci.github-pages.branch = "master";
|
|
|
|
perSystem = { config, pkgs, ... }: {
|
|
treefmt.imports = [ ./treefmt.nix ];
|
|
|
|
packages.pages = pkgs.runCommand "pages"
|
|
{
|
|
buildInputs = [ pkgs.python3.pkgs.mkdocs-material ];
|
|
} ''
|
|
cp -r ${pkgs.lib.cleanSource ./.}/* .
|
|
mkdocs build --strict --site-dir $out
|
|
'';
|
|
|
|
hercules-ci.github-pages.settings.contents = config.packages.pages;
|
|
};
|
|
|
|
flake.nixosConfigurations =
|
|
let
|
|
inherit (inputs.nixpkgs.lib) nixosSystem;
|
|
common = [
|
|
{ _module.args.inputs = inputs; }
|
|
{ srvos.flake = inputs.self; }
|
|
inputs.sops-nix.nixosModules.sops
|
|
inputs.srvos.nixosModules.server
|
|
|
|
inputs.srvos.nixosModules.mixins-telegraf
|
|
{ networking.firewall.allowedTCPPorts = [ 9273 ]; }
|
|
];
|
|
in
|
|
{
|
|
build01 = nixosSystem {
|
|
system = "x86_64-linux";
|
|
modules =
|
|
common
|
|
++ [
|
|
./build01/configuration.nix
|
|
inputs.srvos.nixosModules.hardware-hetzner-online-amd
|
|
];
|
|
};
|
|
|
|
build02 = nixosSystem {
|
|
system = "x86_64-linux";
|
|
modules =
|
|
common
|
|
++ [
|
|
./build02/configuration.nix
|
|
inputs.srvos.nixosModules.mixins-nginx
|
|
inputs.srvos.nixosModules.hardware-hetzner-online-amd
|
|
];
|
|
};
|
|
|
|
build03 = nixosSystem {
|
|
system = "x86_64-linux";
|
|
modules =
|
|
common
|
|
++ [
|
|
./build03/configuration.nix
|
|
inputs.srvos.nixosModules.mixins-nginx
|
|
inputs.srvos.nixosModules.hardware-hetzner-online-amd
|
|
];
|
|
};
|
|
|
|
build04 = nixosSystem {
|
|
system = "aarch64-linux";
|
|
modules =
|
|
common
|
|
++ [
|
|
./build04/configuration.nix
|
|
inputs.disko.nixosModules.disko
|
|
];
|
|
};
|
|
};
|
|
};
|
|
}
|