2021-08-08 20:56:16 +02:00
|
|
|
{
|
|
|
|
description = "System configuration for panacea";
|
|
|
|
|
2021-11-24 23:42:09 +01:00
|
|
|
nixConfig = {
|
|
|
|
extra-substituters =
|
2021-12-07 10:53:24 +01:00
|
|
|
"https://cachix.cachix.org https://nix-community.cachix.org";
|
|
|
|
extra-trusted-public-keys = ''
|
|
|
|
cachix.cachix.org-1:eWNHQldwUO7G2VkjpnjDbWwy4KQ/HNxht7H4SSoMckM=
|
|
|
|
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs='';
|
2021-11-24 23:42:09 +01:00
|
|
|
};
|
|
|
|
|
2021-08-08 20:56:16 +02:00
|
|
|
inputs = {
|
|
|
|
nixpkgs.url = "nixpkgs/nixos-unstable";
|
2022-07-12 14:54:19 +02:00
|
|
|
agenix = {
|
|
|
|
url = "github:ryantm/agenix";
|
|
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
};
|
2022-01-21 00:31:34 +01:00
|
|
|
openconnect-sso = {
|
|
|
|
url = "github:vlaci/openconnect-sso";
|
|
|
|
flake = false;
|
|
|
|
};
|
2022-01-29 13:28:28 +01:00
|
|
|
cyrus-sasl-xoauth2 = {
|
|
|
|
url = "github:robn/sasl2-oauth";
|
|
|
|
flake = false;
|
|
|
|
};
|
2021-08-08 20:56:16 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
outputs = { self, nixpkgs, agenix, ... }@inputs:
|
|
|
|
let
|
|
|
|
system = "x86_64-linux";
|
|
|
|
|
2022-08-16 13:11:43 +02:00
|
|
|
pkgs = import pkgs { inherit system; };
|
2021-08-08 20:56:16 +02:00
|
|
|
|
|
|
|
lib = nixpkgs.lib;
|
|
|
|
|
2021-10-17 20:56:51 +02:00
|
|
|
in {
|
|
|
|
nixosConfigurations.panacea = lib.nixosSystem {
|
|
|
|
inherit system;
|
|
|
|
modules = [ (import ./configuration.nix) agenix.nixosModules.age ];
|
|
|
|
specialArgs = { inherit inputs; };
|
2021-08-10 14:19:36 +02:00
|
|
|
};
|
2021-10-17 20:56:51 +02:00
|
|
|
|
|
|
|
};
|
2021-08-08 20:56:16 +02:00
|
|
|
}
|