forked from CCCHH/nix-infra
300 lines
9.3 KiB
Nix
300 lines
9.3 KiB
Nix
{
|
|
description = "CCCHH Nix Infrastructure";
|
|
|
|
inputs = {
|
|
# Use the NixOS small channels for nixpkgs.
|
|
# https://nixos.org/manual/nixos/stable/#sec-upgrading
|
|
# https://github.com/NixOS/nixpkgs
|
|
nixpkgs.url = "github:nixos/nixpkgs/nixos-24.05-small";
|
|
nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable-small";
|
|
|
|
# Add nixos-generators as an input.
|
|
# See here: https://github.com/nix-community/nixos-generators#using-in-a-flake
|
|
nixos-generators = {
|
|
url = "github:nix-community/nixos-generators";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
|
|
# Add sops-nix as an input for secret management.
|
|
# See here: https://github.com/Mic92/sops-nix?tab=readme-ov-file#flakes-current-recommendation
|
|
sops-nix = {
|
|
url = "github:Mic92/sops-nix";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
};
|
|
|
|
outputs = { self, nixpkgs, nixpkgs-unstable, nixos-generators, sops-nix, ... }:
|
|
let
|
|
system = "x86_64-linux";
|
|
# Shairport Sync 4.3.1 (with nqptp 1.2.4) with metadata, MQTT and AirPlay 2 support.
|
|
shairportSync431ExtendedNixpkgsUnstableOverlay = final: prev: {
|
|
shairport-sync = (prev.shairport-sync.override { enableMetadata = true; enableAirplay2 = true; }).overrideAttrs (finalAttr: previousAttr: {
|
|
# See: https://github.com/mikebrady/shairport-sync/blob/e78a88b64adfe7b5f88fd6faedf55c57445bb240/CONFIGURATION%20FLAGS.md
|
|
configureFlags = previousAttr.configureFlags ++ [ "--with-mqtt-client" ];
|
|
buildInputs = previousAttr.buildInputs ++ [ final.mosquitto ];
|
|
# Use specific Shairport Sync and nqptp versions, since with those the
|
|
# following error doesn't happen:
|
|
# fatal error: The nqptp service on this system, which is required for
|
|
# Shairport Sync to operate, does not seem to be initialised.
|
|
#
|
|
# Also use a more recent dev version to fix Pipewire stuttering issue.
|
|
# See:
|
|
# https://github.com/mikebrady/shairport-sync/issues/1736
|
|
# https://github.com/mikebrady/shairport-sync/blob/a65ec2d7f1f380bbae196d7f8f1cd6a88ef5777b/RELEASENOTES-DEVELOPMENT.md#version-432-dev-51-g98679bbb
|
|
src = final.fetchFromGitHub {
|
|
owner = "mikebrady";
|
|
repo = finalAttr.pname;
|
|
rev = "98679bbb54f5aaeda859e34aa28425647b8d179e";
|
|
hash = "sha256-k0kcgtWk2xlG34lP0ryEaqdskYMNM68YnIRLwFR3jaY=";
|
|
};
|
|
});
|
|
nqptp = prev.nqptp.overrideAttrs (finalAttr: previousAttr: {
|
|
# See Shairport Sync version note.
|
|
src = final.fetchFromGitHub {
|
|
owner = "mikebrady";
|
|
repo = finalAttr.pname;
|
|
rev = "1.2.4";
|
|
hash = "sha256-roTNcr3v2kzE6vQ5plAVtlw1+2yJplltOYsGGibtoZo=";
|
|
};
|
|
# Custom install phase to avoid setcap.
|
|
# See:
|
|
# https://github.com/mikebrady/nqptp/blob/1.2.4/Makefile.am#L23
|
|
installPhase = ''
|
|
mkdir -p $out/bin
|
|
cp nqptp $out/bin/
|
|
'';
|
|
});
|
|
};
|
|
pkgs-unstable = nixpkgs-unstable.legacyPackages."x86_64-linux";
|
|
in
|
|
{
|
|
nixosConfigurations = {
|
|
audio-hauptraum-kueche = nixpkgs-unstable.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
{ nixpkgs.overlays = [ shairportSync431ExtendedNixpkgsUnstableOverlay ]; }
|
|
./config/hosts/audio-hauptraum-kueche
|
|
];
|
|
};
|
|
|
|
audio-hauptraum-tafel = nixpkgs-unstable.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
{ nixpkgs.overlays = [ shairportSync431ExtendedNixpkgsUnstableOverlay ]; }
|
|
./config/hosts/audio-hauptraum-tafel
|
|
];
|
|
};
|
|
|
|
esphome = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
./config/hosts/esphome
|
|
];
|
|
};
|
|
|
|
public-reverse-proxy = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
./config/hosts/public-reverse-proxy
|
|
];
|
|
};
|
|
|
|
netbox = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
sops-nix.nixosModules.sops
|
|
./config/extra/prometheus-exporter.nix
|
|
./config/hosts/netbox
|
|
];
|
|
};
|
|
|
|
matrix = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
sops-nix.nixosModules.sops
|
|
./config/extra/prometheus-exporter.nix
|
|
./config/hosts/matrix
|
|
];
|
|
};
|
|
|
|
public-web-static = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
sops-nix.nixosModules.sops
|
|
./config/extra/prometheus-exporter.nix
|
|
./config/hosts/public-web-static
|
|
];
|
|
};
|
|
|
|
git = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
sops-nix.nixosModules.sops
|
|
./config/extra/prometheus-exporter.nix
|
|
./config/hosts/git
|
|
];
|
|
};
|
|
|
|
forgejo-actions-runner = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
sops-nix.nixosModules.sops
|
|
./config/extra/prometheus-exporter.nix
|
|
./config/hosts/forgejo-actions-runner
|
|
];
|
|
};
|
|
|
|
ptouch-print-server = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
./config/hosts/ptouch-print-server
|
|
];
|
|
};
|
|
|
|
eh22-wiki = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
./config/extra/prometheus-exporter.nix
|
|
./config/hosts/eh22-wiki
|
|
];
|
|
};
|
|
|
|
nix-box-june = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
./config/extra/prometheus-exporter.nix
|
|
./config/hosts/nix-box-june
|
|
];
|
|
};
|
|
|
|
yate = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
./config/hosts/yate
|
|
];
|
|
};
|
|
|
|
mqtt = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
./config/hosts/mqtt
|
|
];
|
|
};
|
|
|
|
mjolnir = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
sops-nix.nixosModules.sops
|
|
./config/extra/prometheus-exporter.nix
|
|
./config/hosts/mjolnir
|
|
];
|
|
};
|
|
|
|
woodpecker = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
sops-nix.nixosModules.sops
|
|
./config/extra/prometheus-exporter.nix
|
|
./config/hosts/woodpecker
|
|
];
|
|
specialArgs = {
|
|
inherit pkgs-unstable;
|
|
};
|
|
};
|
|
|
|
status = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
sops-nix.nixosModules.sops
|
|
./config/hosts/status
|
|
];
|
|
};
|
|
|
|
penpot = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
sops-nix.nixosModules.sops
|
|
./config/extra/prometheus-exporter.nix
|
|
./config/hosts/penpot
|
|
];
|
|
};
|
|
|
|
hydra = nixpkgs.lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./config/common
|
|
./config/proxmox-vm
|
|
./config/extra/prometheus-exporter.nix
|
|
./config/hosts/hydra
|
|
];
|
|
};
|
|
};
|
|
|
|
packages.x86_64-linux = {
|
|
proxmox-nixos-template = nixos-generators.nixosGenerate {
|
|
system = "x86_64-linux";
|
|
modules = [
|
|
./config/nixos-generators/proxmox.nix
|
|
./config/common
|
|
./config/proxmox-vm
|
|
];
|
|
format = "proxmox";
|
|
};
|
|
|
|
proxmox-chaosknoten-nixos-template = nixos-generators.nixosGenerate {
|
|
system = "x86_64-linux";
|
|
modules = [
|
|
./config/nixos-generators/proxmox-chaosknoten.nix
|
|
./config/proxmox-chaosknoten-additional-initial-config.nix
|
|
./config/common
|
|
./config/proxmox-vm
|
|
];
|
|
format = "proxmox";
|
|
};
|
|
};
|
|
|
|
formatter.x86_64-linux = nixpkgs.legacyPackages.x86_64-linux.nixpkgs-fmt;
|
|
|
|
hydraJobs = {
|
|
inherit (self) packages;
|
|
nixosConfigurations = builtins.mapAttrs (name: value: value.config.system.build.toplevel) self.nixosConfigurations;
|
|
};
|
|
};
|
|
}
|