{ description = "Fudo Host Configuration"; inputs = { nixpkgs.url = "nixpkgs/nixos-23.11"; fudo-home = { url = "git+https://git.fudo.org/fudo-nix/home.git"; # url = "path:/state/fudo-home"; inputs.nixpkgs.follows = "nixpkgs"; }; # This MUST be a clean git repo, because we use the timestamp. fudo-entities = { url = "git+https://git.fudo.org/fudo-nix/entities.git"; inputs.nixpkgs.follows = "nixpkgs"; }; fudo-lib = { url = "git+https://git.fudo.org/fudo-nix/lib.git"; }; fudo-pkgs = { url = "git+https://git.fudo.org/fudo-nix/pkgs.git"; }; fudo-secrets.url = "path:/secrets"; chute = { url = "git+https://git.fudo.org/chute/chute.git?ref=stable"; inputs.nixpkgs.follows = "nixpkgs"; }; chuteUnstable = { url = "git+https://git.fudo.org/chute/chute.git?ref=master"; inputs.nixpkgs.follows = "nixpkgs"; }; pricebot = { url = "git+https://git.fudo.org/fudo-public/pricebot.git"; inputs.nixpkgs.follows = "nixpkgs"; }; nixpkgsUnstable.url = "nixpkgs/nixos-unstable"; wallfly = { url = "git+https://git.fudo.org/fudo-public/wallfly.git"; inputs.nixpkgs.follows = "nixpkgs"; }; objectifier = { url = "git+https://git.fudo.org/fudo-public/objectifier.git"; inputs.nixpkgs.follows = "nixpkgs"; }; nexus = { url = "git+https://git.fudo.org/fudo-public/nexus.git"; inputs.nixpkgs.follows = "nixpkgs"; }; suanni = { url = "git+https://git.fudo.org/fudo-public/suanni.git"; inputs.nixpkgs.follows = "nixpkgs"; }; snooper = { url = "git+https://git.fudo.org/fudo-public/snooper.git"; inputs.nixpkgs.follows = "nixpkgs"; }; tattler = { url = "git+https://git.fudo.org/fudo-public/tattler.git"; inputs.nixpkgs.follows = "nixpkgs"; }; arion = { url = "github:hercules-ci/arion"; inputs.nixpkgs.follows = "nixpkgs"; }; lemmy-docker = { url = "git+https://git.fudo.org/fudo-public/lemmy-docker.git"; inputs = { nixpkgs.follows = "nixpkgs"; arion.follows = "arion"; }; }; tesla-mate-container = { url = "git+https://git.fudo.org/fudo-public/tesla-mate-container.git"; inputs = { nixpkgs.follows = "nixpkgs"; arion.follows = "arion"; }; }; mastodon-container = { url = "git+https://git.fudo.org/fudo-public/mastodon-container.git"; inputs = { nixpkgs.follows = "nixpkgs"; arion.follows = "arion"; }; }; authentik-container = { url = "git+https://git.fudo.org/fudo-nix/authentik-container.git"; inputs = { nixpkgs.follows = "nixpkgs"; arion.follows = "arion"; }; }; nextcloud-container = { url = "git+https://git.fudo.org/fudo-public/nextcloud-container.git"; inputs = { nixpkgs.follows = "nixpkgs"; arion.follows = "arion"; }; }; matrix-module = { url = "git+https://git.fudo.org/fudo-public/matrix-module.git"; inputs.nixpkgs.follows = "nixpkgs"; }; mail-server = { url = "git+https://git.fudo.org/fudo-public/mail-server.git"; inputs.nixpkgs.follows = "nixpkgs"; }; authoritative-dns = { url = "git+https://git.fudo.org/fudo-public/authoritative-dns.git"; inputs.nixpkgs.follows = "nixpkgs"; }; frigate-container = { url = "git+https://git.fudo.org/fudo-public/frigate-container.git"; inputs.nixpkgs.follows = "nixpkgs"; }; grafana-module = { url = "git+https://git.fudo.org/fudo-public/grafana-module.git"; inputs.nixpkgs.follows = "nixpkgs"; }; textfiles = { url = "git+https://git.informis.land/informis/textfiles.git"; flake = false; }; }; outputs = { self, nixpkgs, fudo-home, fudo-lib, fudo-entities, fudo-pkgs , fudo-secrets, chute, chuteUnstable, nixpkgsUnstable, pricebot, wallfly , objectifier, nexus, suanni, snooper, tattler, lemmy-docker , tesla-mate-container, mastodon-container, authentik-container , nextcloud-container, textfiles, matrix-module, mail-server , authoritative-dns, frigate-container, grafana-module, ... }@inputs: with nixpkgs.lib; let fudo-nixos-hosts = filterAttrs (hostname: hostOpts: hostOpts.nixos-system) fudo-entities.entities.hosts; fudo-networks = fudo-entities.entities.networks; unstable-for = arch: import nixpkgsUnstable { system = arch; config.allowUnfree = true; }; pkgs-for = arch: let unstable = unstable-for arch; in import nixpkgs { system = arch; config = { allowUnfree = true; permittedInsecurePackages = [ # Necessary for Kerberos "openssl-1.1.1w" "python3.10-requests-2.28.2" "python3.10-cryptography-40.0.1" "gitea-1.19.4" ]; }; overlays = [ fudo-lib.overlays.default fudo-pkgs.overlays.default fudo-secrets.overlays.default fudo-entities.overlays.default self.overlays.fudoHostConfig (final: prev: { chute = chute.packages.${arch}.chute; chuteUnstable = chuteUnstable.packages.${arch}.chute; }) (final: prev: { pkgsUnstable = unstable; }) (final: prev: { signal-desktop = unstable.signal-desktop; factorio-experimental = unstable.factorio-experimental; factorio-headless-experimental = unstable.factorio-headless-experimental; }) (final: prev: { inherit textfiles; }) ]; }; latest-modified-timestamp = head (sort (a: b: a > b) (map (input: toInt input.lastModifiedDate) (filter (input: hasAttr "lastModifiedDate" input) (attrValues inputs)))); concat-timestamp = timestamp: toInt (substring 0 10 (toString timestamp)); mkFudoHostConfig = hostname: hostOpts: let config-dir = ./config; build-timestamp = concat-timestamp latest-modified-timestamp; in { config, ... }: { imports = [ fudo-home.nixosModules.default fudo-secrets.nixosModules.default fudo-lib.nixosModules.default fudo-entities.nixosModule pricebot.nixosModules.default wallfly.nixosModule objectifier.nixosModules.default suanni.nixosModules.default snooper.nixosModules.default tattler.nixosModules.default lemmy-docker.nixosModules.default tesla-mate-container.nixosModules.default mastodon-container.nixosModules.default authentik-container.nixosModules.default nextcloud-container.nixosModules.default matrix-module.nixosModules.default mail-server.nixosModules.default authoritative-dns.nixosModules.default frigate-container.nixosModules.default grafana-module.nixosModules.default nexus.nixosModules.nexus-client nexus.nixosModules.nexus-server nexus.nixosModules.nexus-powerdns ./config (config-dir + "/hardware/${hostname}.nix") (config-dir + "/host-config/${hostname}.nix") (config-dir + "/profile-config/${hostOpts.profile}.nix") (config-dir + "/domain-config/${hostOpts.domain}.nix") (config-dir + "/site-config/${hostOpts.site}.nix") ]; config = let pkgs = pkgs-for hostOpts.arch; in { instance = let build-seed = builtins.readFile config.fudo.secrets.files.build-seed; in { inherit hostname build-timestamp build-seed; }; environment.etc.nixos-live.source = ./.; nix = { registry = { nixpkgs.flake = nixpkgs; fudo-nixos.flake = self; fudo-entities.flake = fudo-entities; fudo-lib.flake = fudo-lib; fudo-pkgs.flake = fudo-pkgs; }; nixPath = let lib = nixpkgs.lib; in lib.mkDefault (lib.mkBefore [ "nixpkgs=${nixpkgs}" ]); }; nixpkgs.pkgs = pkgs; }; }; mkFudoNixOsSystem = hostname: hostOpts: let system = hostOpts.arch; in nixosSystem { inherit system; modules = [ (mkFudoHostConfig hostname hostOpts) ]; }; mkFudoNixopsHostConfig = hostname: hostOpts: let zone-hosts = fudo-entities.entities.zones.${hostOpts.domain}.hosts; in { imports = [ (mkFudoHostConfig hostname hostOpts) (_: { config.deployment.targetHost = zone-hosts.${hostname}.ipv4-address; }) ]; }; in { nixosConfigurations = mapAttrs mkFudoNixOsSystem fudo-nixos-hosts; nixopsHostConfigurations = mapAttrs mkFudoNixopsHostConfig fudo-nixos-hosts; lib = { inherit mkFudoHostConfig mkFudoNixOsSystem mkFudoNixopsHostConfig; }; overlays = rec { default = fudoHostConfig; fudoHostConfig = (final: prev: { lib = prev.lib // self.lib; moduleRegistry = { authoritativeDns = authoritative-dns.nixosModules.default; }; }); }; }; }