diff options
Diffstat (limited to 'flake.nix')
| -rw-r--r-- | flake.nix | 80 |
1 files changed, 65 insertions, 15 deletions
| @@ -29,13 +29,13 @@ | |||
| 29 | type = "github"; | 29 | type = "github"; |
| 30 | owner = "NixOS"; | 30 | owner = "NixOS"; |
| 31 | repo = "nixpkgs"; | 31 | repo = "nixpkgs"; |
| 32 | ref = "24.05"; | 32 | ref = "25.05"; |
| 33 | }; | 33 | }; |
| 34 | nixpkgs-eostre = { | 34 | nixpkgs-eostre = { |
| 35 | type = "github"; | 35 | type = "github"; |
| 36 | owner = "NixOS"; | 36 | owner = "NixOS"; |
| 37 | repo = "nixpkgs"; | 37 | repo = "nixpkgs"; |
| 38 | ref = "23.11"; | 38 | ref = "25.05"; |
| 39 | }; | 39 | }; |
| 40 | home-manager = { | 40 | home-manager = { |
| 41 | type = "github"; | 41 | type = "github"; |
| @@ -53,7 +53,7 @@ | |||
| 53 | type = "github"; | 53 | type = "github"; |
| 54 | owner = "gkleen"; | 54 | owner = "gkleen"; |
| 55 | repo = "home-manager"; | 55 | repo = "home-manager"; |
| 56 | ref = "nixos-late-start-23.11"; | 56 | ref = "nixos-late-start-25.05"; |
| 57 | inputs = { | 57 | inputs = { |
| 58 | nixpkgs.follows = "nixpkgs-eostre"; | 58 | nixpkgs.follows = "nixpkgs-eostre"; |
| 59 | }; | 59 | }; |
| @@ -125,25 +125,43 @@ | |||
| 125 | nixpkgs.follows = "nixpkgs"; | 125 | nixpkgs.follows = "nixpkgs"; |
| 126 | }; | 126 | }; |
| 127 | }; | 127 | }; |
| 128 | pyproject-nix = { | ||
| 129 | url = "github:pyproject-nix/pyproject.nix"; | ||
| 130 | inputs.nixpkgs.follows = "nixpkgs"; | ||
| 131 | }; | ||
| 132 | uv2nix = { | ||
| 133 | url = "github:pyproject-nix/uv2nix"; | ||
| 134 | inputs.pyproject-nix.follows = "pyproject-nix"; | ||
| 135 | inputs.nixpkgs.follows = "nixpkgs"; | ||
| 136 | }; | ||
| 137 | pyproject-build-systems = { | ||
| 138 | url = "github:pyproject-nix/build-system-pkgs"; | ||
| 139 | inputs.pyproject-nix.follows = "pyproject-nix"; | ||
| 140 | inputs.uv2nix.follows = "uv2nix"; | ||
| 141 | inputs.nixpkgs.follows = "nixpkgs"; | ||
| 142 | }; | ||
| 128 | 143 | ||
| 129 | ca-util = { | 144 | ca-util = { |
| 130 | type = "gitlab"; | 145 | type = "gitlab"; |
| 131 | owner = "gkleen"; | 146 | owner = "gkleen"; |
| 132 | repo = "ca"; | 147 | repo = "ca"; |
| 133 | ref = "v3.1.3"; | 148 | ref = "v3.1.5"; |
| 134 | inputs = { | 149 | inputs = { |
| 150 | pyproject-nix.follows = "pyproject-nix"; | ||
| 151 | uv2nix.follows = "uv2nix"; | ||
| 135 | nixpkgs.follows = "nixpkgs"; | 152 | nixpkgs.follows = "nixpkgs"; |
| 136 | poetry2nix.follows = "poetry2nix"; | ||
| 137 | }; | 153 | }; |
| 138 | }; | 154 | }; |
| 139 | backup-utils = { | 155 | backup-utils = { |
| 140 | type = "gitlab"; | 156 | type = "gitlab"; |
| 141 | owner = "gkleen"; | 157 | owner = "gkleen"; |
| 142 | repo = "backup-utils"; | 158 | repo = "backup-utils"; |
| 143 | ref = "v0.1.6"; | 159 | ref = "v0.1.7"; |
| 144 | inputs = { | 160 | inputs = { |
| 145 | nixpkgs.follows = "nixpkgs"; | 161 | nixpkgs.follows = "nixpkgs"; |
| 146 | poetry2nix.follows = "poetry2nix"; | 162 | pyproject-nix.follows = "pyproject-nix"; |
| 163 | uv2nix.follows = "uv2nix"; | ||
| 164 | pyproject-build-systems.follows = "pyproject-build-systems"; | ||
| 147 | }; | 165 | }; |
| 148 | }; | 166 | }; |
| 149 | prometheus-borg-exporter = { | 167 | prometheus-borg-exporter = { |
| @@ -172,7 +190,7 @@ | |||
| 172 | type = "github"; | 190 | type = "github"; |
| 173 | owner = "gkleen"; | 191 | owner = "gkleen"; |
| 174 | repo = "Waybar"; | 192 | repo = "Waybar"; |
| 175 | ref = "feat/privacy-ignore"; | 193 | ref = "feat/niri-urgency"; |
| 176 | inputs = { | 194 | inputs = { |
| 177 | nixpkgs.follows = "nixpkgs"; | 195 | nixpkgs.follows = "nixpkgs"; |
| 178 | flake-compat.follows = "flake-compat"; | 196 | flake-compat.follows = "flake-compat"; |
| @@ -189,6 +207,32 @@ | |||
| 189 | owner = "sodiboo"; | 207 | owner = "sodiboo"; |
| 190 | repo = "niri-flake"; | 208 | repo = "niri-flake"; |
| 191 | ref = "main"; | 209 | ref = "main"; |
| 210 | inputs = { | ||
| 211 | nixpkgs.follows = "nixpkgs"; | ||
| 212 | niri-unstable = { | ||
| 213 | type = "github"; | ||
| 214 | owner = "gkleen"; | ||
| 215 | repo = "niri"; | ||
| 216 | ref = "fix/locked-monitor-control"; | ||
| 217 | }; | ||
| 218 | }; | ||
| 219 | }; | ||
| 220 | nix-monitored = { | ||
| 221 | type = "github"; | ||
| 222 | owner = "ners"; | ||
| 223 | repo = "nix-monitored"; | ||
| 224 | ref = "master"; | ||
| 225 | inputs = { | ||
| 226 | nixpkgs.follows = "nixpkgs"; | ||
| 227 | }; | ||
| 228 | }; | ||
| 229 | lanzaboote = { | ||
| 230 | type = "github"; | ||
| 231 | owner = "nix-community"; | ||
| 232 | repo = "lanzaboote"; | ||
| 233 | ref = "v0.4.2"; | ||
| 234 | |||
| 235 | inputs.nixpkgs.follows = "nixpkgs"; | ||
| 192 | }; | 236 | }; |
| 193 | }; | 237 | }; |
| 194 | 238 | ||
| @@ -275,9 +319,10 @@ | |||
| 275 | mkAccountModule = dir: path: accountName: | 319 | mkAccountModule = dir: path: accountName: |
| 276 | let | 320 | let |
| 277 | userName = accountUserName accountName; | 321 | userName = accountUserName accountName; |
| 322 | hostName = accountHostName accountName; | ||
| 278 | in overrideModule | 323 | in overrideModule |
| 279 | (import (dir + "/${path}")) | 324 | (import (dir + "/${path}")) |
| 280 | (inputs: inputs // { inherit userName; }) | 325 | (inputs: inputs // { inherit userName hostName; }) |
| 281 | (outputs: { _file = dir + "/${path}"; } | 326 | (outputs: { _file = dir + "/${path}"; } |
| 282 | // outputs | 327 | // outputs |
| 283 | // { imports = [self.nixosModules.users.${userName} or ({...}: { imports = defaultUserProfiles userName; })] ++ (outputs.imports or []); }); | 328 | // { imports = [self.nixosModules.users.${userName} or ({...}: { imports = defaultUserProfiles userName; })] ++ (outputs.imports or []); }); |
| @@ -293,7 +338,7 @@ | |||
| 293 | forAllUsers = genAttrs (unique (map accountUserName (attrNames self.nixosModules.accounts))); | 338 | forAllUsers = genAttrs (unique (map accountUserName (attrNames self.nixosModules.accounts))); |
| 294 | 339 | ||
| 295 | activateNixosConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (mapAttrs' (hostName: nixosConfig: nameValuePair "${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${nixosConfig.config.system.build.toplevel}/bin/switch-to-configuration"; } else null)) self.nixosConfigurations)); | 340 | activateNixosConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (mapAttrs' (hostName: nixosConfig: nameValuePair "${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${nixosConfig.config.system.build.toplevel}/bin/switch-to-configuration"; } else null)) self.nixosConfigurations)); |
| 296 | startVMs = forAllSystems (system: pkgs: mapAttrs' (hostName: nixosConfig: nameValuePair "run-${hostName}-vm" { type = "app"; program = "${nixosConfig.config.system.build.vm}/bin/run-${hostName}-vm"; }) (nixImport rec { dir = ./hosts; _import = mkNixosConfiguration [ { config.virtualisation.host.pkgs = pkgs; } ] dir; })); | 341 | # startVMs = forAllSystems (system: pkgs: mapAttrs' (hostName: nixosConfig: nameValuePair "run-${hostName}-vm" { type = "app"; program = "${nixosConfig.config.system.build.vm}/bin/run-${hostName}-vm"; }) (nixImport rec { dir = ./hosts; _import = mkNixosConfiguration [ { config.virtualisation.host.pkgs = pkgs; } ] dir; })); |
| 297 | activateHomeManagerConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (listToAttrs (concatLists (mapAttrsToList (hostName: nixosConfig: mapAttrsToList (userName: userCfg: nameValuePair "${userName}@${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${userCfg.home.activationPackage}/activate"; } else null)) nixosConfig.config.home-manager.users) self.nixosConfigurations)))); | 342 | activateHomeManagerConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (listToAttrs (concatLists (mapAttrsToList (hostName: nixosConfig: mapAttrsToList (userName: userCfg: nameValuePair "${userName}@${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${userCfg.home.activationPackage}/activate"; } else null)) nixosConfig.config.home-manager.users) self.nixosConfigurations)))); |
| 298 | installerShells = system: pkgs: mapAttrs (installerName: config: pkgs.callPackage ./installer/shell.nix { | 343 | installerShells = system: pkgs: mapAttrs (installerName: config: pkgs.callPackage ./installer/shell.nix { |
| 299 | inherit system installerName config; | 344 | inherit system installerName config; |
| @@ -330,18 +375,23 @@ | |||
| 330 | nixosConfigurations = installerNixosConfigurations // nixImport rec { dir = ./hosts; _import = mkNixosConfiguration [] dir; }; | 375 | nixosConfigurations = installerNixosConfigurations // nixImport rec { dir = ./hosts; _import = mkNixosConfiguration [] dir; }; |
| 331 | 376 | ||
| 332 | homeModules = nixImport rec { dir = ./home-modules; }; | 377 | homeModules = nixImport rec { dir = ./home-modules; }; |
| 333 | homeConfigurations = listToAttrs (concatLists (mapAttrsToList (hostname: nixosConfig: mapAttrsToList (username: configuration: nameValuePair "${username}@${hostname}" { inherit (configuration.home) activationPackage; inherit (configuration) home-files; }) nixosConfig.config.home-manager.users) self.nixosConfigurations)); | 378 | homeConfigurations = listToAttrs (concatLists (mapAttrsToList (hostname: nixosConfig: mapAttrsToList (username: nameValuePair "${username}@${hostname}") nixosConfig.config.home-manager.users) self.nixosConfigurations)); |
| 334 | 379 | ||
| 335 | overlays = mapAttrs (_name: path: mkOverlay path) overlayPaths; | 380 | overlays = mapAttrs (_name: path: mkOverlay path) overlayPaths; |
| 336 | 381 | ||
| 337 | packages = forAllSystems (system: systemPkgs: nixImport rec { dir = ./tools; _import = _path: name: import "${toString dir}/${name}" ({ inherit system; } // inputs); }); | 382 | packages = forAllSystems (system: systemPkgs: nixImport rec { dir = ./tools; _import = name: _base: import (dir + "/${name}") ({ inherit system; } // inputs); }); |
| 338 | 383 | ||
| 339 | # packages = mapAttrs (_name: filterAttrs (_name: isDerivation)) packages; | 384 | # packages = mapAttrs (_name: filterAttrs (_name: isDerivation)) packages; |
| 340 | # packages' = mapAttrs (_name: filterAttrs (_name: value: !(isDerivation value))) packages; | 385 | # packages' = mapAttrs (_name: filterAttrs (_name: value: !(isDerivation value))) packages; |
| 341 | 386 | ||
| 342 | legacyPackages = forAllSystems (system: systemPkgs: systemPkgs.override { overlays = attrValues self.overlays; }); | 387 | legacyPackages = forAllSystems (system: systemPkgs: systemPkgs.override { overlays = attrValues self.overlays; }); |
| 343 | 388 | ||
| 344 | apps = foldr recursiveUpdate {} [startVMs activateNixosConfigurations activateHomeManagerConfigurations]; | 389 | apps = foldr recursiveUpdate {} [ |
| 390 | #startVMs | ||
| 391 | activateNixosConfigurations activateHomeManagerConfigurations | ||
| 392 | ]; | ||
| 393 | |||
| 394 | lib = nixImport rec { dir = ./lib; _import = name: _base: import (dir + "/${name}") inputs; }; | ||
| 345 | 395 | ||
| 346 | devShells = forAllSystems (system: systemPkgs: { default = import ./shell.nix ({ inherit system; } // inputs); } // installerShells system systemPkgs); | 396 | devShells = forAllSystems (system: systemPkgs: { default = import ./shell.nix ({ inherit system; } // inputs); } // installerShells system systemPkgs); |
| 347 | 397 | ||
| @@ -366,10 +416,10 @@ | |||
| 366 | # path = activateHomeManager (self.nixosConfigurations.${hostname}.config.nixpkgs.system) usercfg.home; | 416 | # path = activateHomeManager (self.nixosConfigurations.${hostname}.config.nixpkgs.system) usercfg.home; |
| 367 | # }) self.nixosConfigurations.${hostname}.config.home-manager.users); | 417 | # }) self.nixosConfigurations.${hostname}.config.home-manager.users); |
| 368 | }) (nixImport { dir = ./hosts; _import = (_path: name: name); }); | 418 | }) (nixImport { dir = ./hosts; _import = (_path: name: name); }); |
| 369 | overrides = if pathExists ./deploy then nixImport { dir = ./deploy; _import = path: _name: import (./deploy + "/${path}") inputs; } else {}; | 419 | overrides = if pathExists ./deploy then nixImport rec { dir = ./deploy; _import = path: _name: import (dir + "/${path}") inputs; } else {}; |
| 370 | filterEnabled = attrs: mapAttrs (_n: v: filterAttrs (n: _v: n != "enabled") v) (filterAttrs (_n: v: v.enabled or true) attrs); | 420 | filterEnabled = attrs: mapAttrs (_n: v: filterAttrs (n: _v: n != "enabled") v) (filterAttrs (_n: v: v.enabled or true) attrs); |
| 371 | in mapAttrs (_n: v: if v ? "profiles" then v // { profiles = filterEnabled v.profiles; } else v) (filterEnabled (recursiveUpdate defaults overrides)); | 421 | in mapAttrs (_n: v: if v ? "profiles" then v // { profiles = filterEnabled v.profiles; } else v) (filterEnabled (recursiveUpdate defaults overrides)); |
| 372 | 422 | ||
| 373 | checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib; | 423 | # checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib; |
| 374 | }; | 424 | }; |
| 375 | } | 425 | } |
