panacea/flake.nix

48 lines
1.1 KiB
Nix
Raw Normal View History

2021-08-08 20:56:16 +02:00
{
description = "System configuration for panacea";
2021-11-24 23:42:09 +01:00
nixConfig = {
extra-substituters =
2021-12-07 10:53:24 +01:00
"https://cachix.cachix.org https://nix-community.cachix.org";
extra-trusted-public-keys = ''
cachix.cachix.org-1:eWNHQldwUO7G2VkjpnjDbWwy4KQ/HNxht7H4SSoMckM=
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs='';
2021-11-24 23:42:09 +01:00
};
2021-08-08 20:56:16 +02:00
inputs = {
nixpkgs.url = "nixpkgs/nixos-unstable";
2022-07-12 14:54:19 +02:00
agenix = {
url = "github:ryantm/agenix";
inputs.nixpkgs.follows = "nixpkgs";
};
2022-01-21 00:31:34 +01:00
openconnect-sso = {
url = "github:vlaci/openconnect-sso";
flake = false;
};
2022-01-29 13:28:28 +01:00
cyrus-sasl-xoauth2 = {
url = "github:robn/sasl2-oauth";
flake = false;
};
2021-08-08 20:56:16 +02:00
};
outputs = { self, nixpkgs, agenix, ... }@inputs:
let
system = "x86_64-linux";
pkgs = import pkgs {
inherit system;
config.allowUnfree = true;
};
lib = nixpkgs.lib;
2021-10-17 20:56:51 +02:00
in {
nixosConfigurations.panacea = lib.nixosSystem {
inherit system;
modules = [ (import ./configuration.nix) agenix.nixosModules.age ];
specialArgs = { inherit inputs; };
2021-08-10 14:19:36 +02:00
};
2021-10-17 20:56:51 +02:00
};
2021-08-08 20:56:16 +02:00
}