1
Fork 0
satellite/flake.nix

202 lines
6.5 KiB
Nix
Raw Normal View History

2021-11-21 14:33:20 +01:00
{
2022-12-28 13:27:18 +01:00
description = "Satellite";
2021-11-21 14:52:49 +01:00
2023-05-28 02:00:10 +02:00
# {{{ Inputs
2021-11-21 14:52:49 +01:00
inputs = {
2024-04-01 05:57:56 +02:00
# {{{ Nixpkgs instances
2023-12-10 12:55:54 +01:00
nixpkgs.url = "github:nixos/nixpkgs/nixos-23.11";
nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable";
2023-12-10 23:48:46 +01:00
# }}}
# {{{ Additional package repositories
nixos-hardware.url = "github:NixOS/nixos-hardware/master";
# Firefox addons
firefox-addons.url = "git+https://gitlab.com/rycee/nur-expressions?dir=pkgs/firefox-addons";
firefox-addons.inputs.nixpkgs.follows = "nixpkgs";
2023-12-10 23:48:46 +01:00
# }}}
# {{{ Nix-related tooling
2024-04-01 05:57:56 +02:00
# {{{ Storage
2023-01-10 02:38:06 +01:00
impermanence.url = "github:nix-community/impermanence";
2023-12-10 23:48:46 +01:00
# Declarative partitioning
disko.url = "github:nix-community/disko";
disko.inputs.nixpkgs.follows = "nixpkgs";
# }}}
2023-05-24 03:17:09 +02:00
2023-12-10 23:48:46 +01:00
home-manager.url = "github:nix-community/home-manager/release-23.11";
home-manager.inputs.nixpkgs.follows = "nixpkgs";
2023-05-31 04:53:44 +02:00
2023-12-10 23:48:46 +01:00
nix-index-database.url = "github:Mic92/nix-index-database";
nix-index-database.inputs.nixpkgs.follows = "nixpkgs";
2023-06-15 20:08:20 +02:00
2024-01-31 20:03:00 +01:00
sops-nix.url = "github:Mic92/sops-nix";
sops-nix.inputs.nixpkgs.follows = "nixpkgs";
2023-12-21 16:21:14 +01:00
korora.url = "github:adisbladis/korora";
2024-07-06 19:32:14 +02:00
nixos-dns.url = "github:Janik-Haag/nixos-dns";
nixos-dns.inputs.nixpkgs.follows = "nixpkgs";
2023-12-10 23:48:46 +01:00
# }}}
# {{{ Standalone software
# {{{ Nightly versions of things
neovim-nightly-overlay.url = "github:nix-community/neovim-nightly-overlay";
neovim-nightly-overlay.inputs.nixpkgs.follows = "nixpkgs";
# }}}
2023-09-04 04:58:39 +02:00
# {{{ Self management
# Smos
2024-04-01 05:57:56 +02:00
smos.url = "github:NorfairKing/smos";
smos.inputs.nixpkgs.url = "github:NixOS/nixpkgs/b8dd8be3c790215716e7c12b247f45ca525867e2";
# REASON: smos fails to build this way
# smos.inputs.nixpkgs.follows = "nixpkgs";
2023-09-04 04:58:39 +02:00
# smos.inputs.home-manager.follows = "home-manager";
# Intray
2024-02-10 04:29:57 +01:00
intray.url = "github:NorfairKing/intray";
intray.inputs.nixpkgs.url = "github:NixOS/nixpkgs/cf28ee258fd5f9a52de6b9865cdb93a1f96d09b7";
2024-02-02 04:06:32 +01:00
# intray.inputs.home-manager.follows = "home-manager";
2023-09-04 04:58:39 +02:00
# }}}
2024-04-01 05:57:56 +02:00
2023-12-10 23:48:46 +01:00
anyrun.url = "github:Kirottu/anyrun";
anyrun.inputs.nixpkgs.follows = "nixpkgs";
2024-05-28 02:39:42 +02:00
miros.url = "github:prescientmoon/miros";
2024-04-16 23:25:20 +02:00
miros.inputs.nixpkgs.follows = "nixpkgs";
2023-12-10 23:48:46 +01:00
# Spotify client with theming support
spicetify-nix.url = "github:the-argus/spicetify-nix";
spicetify-nix.inputs.nixpkgs.follows = "nixpkgs";
# }}}
# {{{ Theming
2024-04-29 14:24:28 +02:00
darkmatter-grub-theme.url = gitlab:VandalByte/darkmatter-grub-theme;
darkmatter-grub-theme.inputs.nixpkgs.follows = "nixpkgs";
2023-12-10 23:48:46 +01:00
2024-04-01 05:57:56 +02:00
stylix.url = "github:danth/stylix/a33d88cf8f75446f166f2ff4f810a389feed2d56";
# stylix.inputs.nixpkgs.follows = "nixpkgs";
# stylix.inputs.home-manager.follows = "home-manager";
2023-12-10 23:48:46 +01:00
2024-04-29 15:50:59 +02:00
base16-schemes.url = "github:tinted-theming/schemes";
base16-schemes.flake = false;
2023-12-10 23:48:46 +01:00
# }}}
2022-12-28 13:27:18 +01:00
};
2023-05-28 02:00:10 +02:00
# }}}
2022-12-28 13:27:18 +01:00
outputs = { self, nixpkgs, home-manager, ... }@inputs:
let
2024-04-01 05:57:56 +02:00
# {{{ Common helpers
2022-12-28 13:27:18 +01:00
inherit (self) outputs;
forAllSystems = nixpkgs.lib.genAttrs [
2023-08-13 04:15:32 +02:00
# "aarch64-linux" TODO: purescript doesn't work on this one
2022-12-28 13:27:18 +01:00
"x86_64-linux"
"aarch64-darwin"
"x86_64-darwin"
];
2023-01-10 02:38:06 +01:00
specialArgs = system: {
2023-01-10 02:38:06 +01:00
inherit inputs outputs;
2023-12-10 12:55:54 +01:00
upkgs = inputs.nixpkgs-unstable.legacyPackages.${system};
2023-01-10 02:38:06 +01:00
};
2023-05-28 02:00:10 +02:00
# }}}
2022-12-28 13:27:18 +01:00
in
{
2023-05-28 02:00:10 +02:00
# {{{ Packages
2024-04-01 05:57:56 +02:00
# Accessible through 'nix build', 'nix shell', etc
2024-07-06 19:32:14 +02:00
packages = forAllSystems
(system:
let
pkgs = nixpkgs.legacyPackages.${system};
upkgs = inputs.nixpkgs-unstable.legacyPackages.${system};
2024-07-08 03:06:27 +02:00
myPkgs = import ./pkgs { inherit pkgs upkgs; };
2024-07-06 19:32:14 +02:00
in
2024-07-08 03:06:27 +02:00
myPkgs // {
2024-07-06 19:32:14 +02:00
octodns = upkgs.octodns.withProviders
2024-07-08 03:06:27 +02:00
(ps: [ myPkgs.octodns-cloudflare ]);
} // (import ./dns/pkgs.nix) { inherit pkgs self system; }
2024-07-06 19:32:14 +02:00
);
2023-05-28 02:00:10 +02:00
# }}}
# {{{ Bootstrapping and other pinned devshells
2024-04-01 05:57:56 +02:00
# Accessible through 'nix develop'
2023-04-14 17:12:35 +02:00
devShells = forAllSystems
(system:
let
pkgs = nixpkgs.legacyPackages.${system};
args = { inherit pkgs; } // specialArgs system;
2023-04-14 17:12:35 +02:00
in
2023-12-10 23:53:19 +01:00
import ./devshells args);
2023-05-28 02:00:10 +02:00
# }}}
# {{{ Overlays and modules
2022-12-28 13:27:18 +01:00
# Custom packages and modifications, exported as overlays
overlays = import ./overlays;
2022-03-09 20:36:48 +01:00
2022-12-28 13:27:18 +01:00
# Reusable nixos modules
nixosModules = import ./modules/nixos // import ./modules/common;
2021-11-21 14:52:49 +01:00
2022-12-28 13:27:18 +01:00
# Reusable home-manager modules
homeManagerModules = import ./modules/home-manager // import ./modules/common;
2023-05-28 02:00:10 +02:00
# }}}
# {{{ Nixos
2022-12-28 13:27:18 +01:00
# NixOS configuration entrypoint
# Available through 'nixos-rebuild --flake .#...
2023-05-28 02:00:10 +02:00
nixosConfigurations =
2024-05-21 01:37:39 +02:00
let nixos = { system, hostname }: nixpkgs.lib.nixosSystem {
2023-08-19 21:13:34 +02:00
inherit system;
2023-08-13 04:15:32 +02:00
specialArgs = specialArgs system;
modules = [
home-manager.nixosModules.home-manager
{
2024-05-21 01:37:39 +02:00
home-manager.users.pilot = import ./home/${hostname}.nix;
home-manager.extraSpecialArgs = specialArgs system // { inherit hostname; };
2023-08-13 04:15:32 +02:00
home-manager.useUserPackages = true;
2023-08-19 21:13:34 +02:00
2023-08-13 04:15:32 +02:00
stylix.homeManagerIntegration.followSystem = false;
stylix.homeManagerIntegration.autoImport = false;
}
./hosts/nixos/${hostname}
];
};
2023-05-28 02:00:10 +02:00
in
{
tethys = nixos {
system = "x86_64-linux";
hostname = "tethys";
};
2023-05-28 05:24:36 +02:00
2023-07-17 18:40:39 +02:00
lapetus = nixos {
system = "x86_64-linux";
hostname = "lapetus";
};
2023-08-13 04:15:32 +02:00
# Disabled because `flake check` complains about filesystems and bootloader
# options not being set. This is not an issue in practice, as this config is
# supposed to be used inside a VM, but there's not much I can do about it.
# euporie = nixos {
# system = "x86_64-linux";
# hostname = "euporie";
# };
2023-05-28 02:00:10 +02:00
};
# }}}
2021-11-21 14:33:20 +01:00
};
# {{{ Caching and whatnot
2023-05-31 05:08:36 +02:00
# TODO: persist trusted substituters file
nixConfig = {
extra-substituters = [
2024-04-01 05:57:56 +02:00
"https://nix-community.cachix.org"
# "https://anyrun.cachix.org"
"https://smos.cachix.org"
"https://intray.cachix.org"
];
extra-trusted-public-keys = [
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
2024-04-01 05:57:56 +02:00
# "anyrun.cachix.org-1:pqBobmOjI7nKlsUMV25u9QHa9btJK65/C8vnO3p346s="
"smos.cachix.org-1:YOs/tLEliRoyhx7PnNw36cw2Zvbw5R0ASZaUlpUv+yM="
"intray.cachix.org-1:qD7I/NQLia2iy6cbzZvFuvn09iuL4AkTmHvjxrQlccQ="
];
};
# }}}
2021-11-21 14:33:20 +01:00
}