diff options
Diffstat (limited to 'flake.nix')
-rw-r--r-- | flake.nix | 75 |
1 files changed, 60 insertions, 15 deletions
@@ -29,13 +29,13 @@ | |||
29 | type = "github"; | 29 | type = "github"; |
30 | owner = "NixOS"; | 30 | owner = "NixOS"; |
31 | repo = "nixpkgs"; | 31 | repo = "nixpkgs"; |
32 | ref = "24.05"; | 32 | ref = "25.05"; |
33 | }; | 33 | }; |
34 | nixpkgs-eostre = { | 34 | nixpkgs-eostre = { |
35 | type = "github"; | 35 | type = "github"; |
36 | owner = "NixOS"; | 36 | owner = "NixOS"; |
37 | repo = "nixpkgs"; | 37 | repo = "nixpkgs"; |
38 | ref = "23.11"; | 38 | ref = "25.05"; |
39 | }; | 39 | }; |
40 | home-manager = { | 40 | home-manager = { |
41 | type = "github"; | 41 | type = "github"; |
@@ -53,7 +53,7 @@ | |||
53 | type = "github"; | 53 | type = "github"; |
54 | owner = "gkleen"; | 54 | owner = "gkleen"; |
55 | repo = "home-manager"; | 55 | repo = "home-manager"; |
56 | ref = "nixos-late-start-23.11"; | 56 | ref = "nixos-late-start-25.05"; |
57 | inputs = { | 57 | inputs = { |
58 | nixpkgs.follows = "nixpkgs-eostre"; | 58 | nixpkgs.follows = "nixpkgs-eostre"; |
59 | }; | 59 | }; |
@@ -125,25 +125,43 @@ | |||
125 | nixpkgs.follows = "nixpkgs"; | 125 | nixpkgs.follows = "nixpkgs"; |
126 | }; | 126 | }; |
127 | }; | 127 | }; |
128 | pyproject-nix = { | ||
129 | url = "github:pyproject-nix/pyproject.nix"; | ||
130 | inputs.nixpkgs.follows = "nixpkgs"; | ||
131 | }; | ||
132 | uv2nix = { | ||
133 | url = "github:pyproject-nix/uv2nix"; | ||
134 | inputs.pyproject-nix.follows = "pyproject-nix"; | ||
135 | inputs.nixpkgs.follows = "nixpkgs"; | ||
136 | }; | ||
137 | pyproject-build-systems = { | ||
138 | url = "github:pyproject-nix/build-system-pkgs"; | ||
139 | inputs.pyproject-nix.follows = "pyproject-nix"; | ||
140 | inputs.uv2nix.follows = "uv2nix"; | ||
141 | inputs.nixpkgs.follows = "nixpkgs"; | ||
142 | }; | ||
128 | 143 | ||
129 | ca-util = { | 144 | ca-util = { |
130 | type = "gitlab"; | 145 | type = "gitlab"; |
131 | owner = "gkleen"; | 146 | owner = "gkleen"; |
132 | repo = "ca"; | 147 | repo = "ca"; |
133 | ref = "v3.1.3"; | 148 | ref = "v3.1.5"; |
134 | inputs = { | 149 | inputs = { |
150 | pyproject-nix.follows = "pyproject-nix"; | ||
151 | uv2nix.follows = "uv2nix"; | ||
135 | nixpkgs.follows = "nixpkgs"; | 152 | nixpkgs.follows = "nixpkgs"; |
136 | poetry2nix.follows = "poetry2nix"; | ||
137 | }; | 153 | }; |
138 | }; | 154 | }; |
139 | backup-utils = { | 155 | backup-utils = { |
140 | type = "gitlab"; | 156 | type = "gitlab"; |
141 | owner = "gkleen"; | 157 | owner = "gkleen"; |
142 | repo = "backup-utils"; | 158 | repo = "backup-utils"; |
143 | ref = "v0.1.6"; | 159 | ref = "v0.1.7"; |
144 | inputs = { | 160 | inputs = { |
145 | nixpkgs.follows = "nixpkgs"; | 161 | nixpkgs.follows = "nixpkgs"; |
146 | poetry2nix.follows = "poetry2nix"; | 162 | pyproject-nix.follows = "pyproject-nix"; |
163 | uv2nix.follows = "uv2nix"; | ||
164 | pyproject-build-systems.follows = "pyproject-build-systems"; | ||
147 | }; | 165 | }; |
148 | }; | 166 | }; |
149 | prometheus-borg-exporter = { | 167 | prometheus-borg-exporter = { |
@@ -172,7 +190,7 @@ | |||
172 | type = "github"; | 190 | type = "github"; |
173 | owner = "gkleen"; | 191 | owner = "gkleen"; |
174 | repo = "Waybar"; | 192 | repo = "Waybar"; |
175 | ref = "feat/privacy-ignore"; | 193 | ref = "feat/niri-urgency"; |
176 | inputs = { | 194 | inputs = { |
177 | nixpkgs.follows = "nixpkgs"; | 195 | nixpkgs.follows = "nixpkgs"; |
178 | flake-compat.follows = "flake-compat"; | 196 | flake-compat.follows = "flake-compat"; |
@@ -189,6 +207,27 @@ | |||
189 | owner = "sodiboo"; | 207 | owner = "sodiboo"; |
190 | repo = "niri-flake"; | 208 | repo = "niri-flake"; |
191 | ref = "main"; | 209 | ref = "main"; |
210 | inputs = { | ||
211 | nixpkgs.follows = "nixpkgs"; | ||
212 | # niri-unstable.url = "github:gkleen/niri"; | ||
213 | }; | ||
214 | }; | ||
215 | nix-monitored = { | ||
216 | type = "github"; | ||
217 | owner = "ners"; | ||
218 | repo = "nix-monitored"; | ||
219 | ref = "master"; | ||
220 | inputs = { | ||
221 | nixpkgs.follows = "nixpkgs"; | ||
222 | }; | ||
223 | }; | ||
224 | lanzaboote = { | ||
225 | type = "github"; | ||
226 | owner = "nix-community"; | ||
227 | repo = "lanzaboote"; | ||
228 | ref = "v0.4.2"; | ||
229 | |||
230 | inputs.nixpkgs.follows = "nixpkgs"; | ||
192 | }; | 231 | }; |
193 | }; | 232 | }; |
194 | 233 | ||
@@ -275,9 +314,10 @@ | |||
275 | mkAccountModule = dir: path: accountName: | 314 | mkAccountModule = dir: path: accountName: |
276 | let | 315 | let |
277 | userName = accountUserName accountName; | 316 | userName = accountUserName accountName; |
317 | hostName = accountHostName accountName; | ||
278 | in overrideModule | 318 | in overrideModule |
279 | (import (dir + "/${path}")) | 319 | (import (dir + "/${path}")) |
280 | (inputs: inputs // { inherit userName; }) | 320 | (inputs: inputs // { inherit userName hostName; }) |
281 | (outputs: { _file = dir + "/${path}"; } | 321 | (outputs: { _file = dir + "/${path}"; } |
282 | // outputs | 322 | // outputs |
283 | // { imports = [self.nixosModules.users.${userName} or ({...}: { imports = defaultUserProfiles userName; })] ++ (outputs.imports or []); }); | 323 | // { imports = [self.nixosModules.users.${userName} or ({...}: { imports = defaultUserProfiles userName; })] ++ (outputs.imports or []); }); |
@@ -293,7 +333,7 @@ | |||
293 | forAllUsers = genAttrs (unique (map accountUserName (attrNames self.nixosModules.accounts))); | 333 | forAllUsers = genAttrs (unique (map accountUserName (attrNames self.nixosModules.accounts))); |
294 | 334 | ||
295 | activateNixosConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (mapAttrs' (hostName: nixosConfig: nameValuePair "${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${nixosConfig.config.system.build.toplevel}/bin/switch-to-configuration"; } else null)) self.nixosConfigurations)); | 335 | activateNixosConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (mapAttrs' (hostName: nixosConfig: nameValuePair "${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${nixosConfig.config.system.build.toplevel}/bin/switch-to-configuration"; } else null)) self.nixosConfigurations)); |
296 | startVMs = forAllSystems (system: pkgs: mapAttrs' (hostName: nixosConfig: nameValuePair "run-${hostName}-vm" { type = "app"; program = "${nixosConfig.config.system.build.vm}/bin/run-${hostName}-vm"; }) (nixImport rec { dir = ./hosts; _import = mkNixosConfiguration [ { config.virtualisation.host.pkgs = pkgs; } ] dir; })); | 336 | # startVMs = forAllSystems (system: pkgs: mapAttrs' (hostName: nixosConfig: nameValuePair "run-${hostName}-vm" { type = "app"; program = "${nixosConfig.config.system.build.vm}/bin/run-${hostName}-vm"; }) (nixImport rec { dir = ./hosts; _import = mkNixosConfiguration [ { config.virtualisation.host.pkgs = pkgs; } ] dir; })); |
297 | activateHomeManagerConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (listToAttrs (concatLists (mapAttrsToList (hostName: nixosConfig: mapAttrsToList (userName: userCfg: nameValuePair "${userName}@${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${userCfg.home.activationPackage}/activate"; } else null)) nixosConfig.config.home-manager.users) self.nixosConfigurations)))); | 337 | activateHomeManagerConfigurations = forAllSystems (system: _pkgs: filterAttrs (_n: v: v != null) (listToAttrs (concatLists (mapAttrsToList (hostName: nixosConfig: mapAttrsToList (userName: userCfg: nameValuePair "${userName}@${hostName}-activate" (if system == nixosConfig.config.nixpkgs.system then { type = "app"; program = "${userCfg.home.activationPackage}/activate"; } else null)) nixosConfig.config.home-manager.users) self.nixosConfigurations)))); |
298 | installerShells = system: pkgs: mapAttrs (installerName: config: pkgs.callPackage ./installer/shell.nix { | 338 | installerShells = system: pkgs: mapAttrs (installerName: config: pkgs.callPackage ./installer/shell.nix { |
299 | inherit system installerName config; | 339 | inherit system installerName config; |
@@ -330,18 +370,23 @@ | |||
330 | nixosConfigurations = installerNixosConfigurations // nixImport rec { dir = ./hosts; _import = mkNixosConfiguration [] dir; }; | 370 | nixosConfigurations = installerNixosConfigurations // nixImport rec { dir = ./hosts; _import = mkNixosConfiguration [] dir; }; |
331 | 371 | ||
332 | homeModules = nixImport rec { dir = ./home-modules; }; | 372 | homeModules = nixImport rec { dir = ./home-modules; }; |
333 | homeConfigurations = listToAttrs (concatLists (mapAttrsToList (hostname: nixosConfig: mapAttrsToList (username: configuration: nameValuePair "${username}@${hostname}" { inherit (configuration.home) activationPackage; inherit (configuration) home-files; }) nixosConfig.config.home-manager.users) self.nixosConfigurations)); | 373 | homeConfigurations = listToAttrs (concatLists (mapAttrsToList (hostname: nixosConfig: mapAttrsToList (username: nameValuePair "${username}@${hostname}") nixosConfig.config.home-manager.users) self.nixosConfigurations)); |
334 | 374 | ||
335 | overlays = mapAttrs (_name: path: mkOverlay path) overlayPaths; | 375 | overlays = mapAttrs (_name: path: mkOverlay path) overlayPaths; |
336 | 376 | ||
337 | packages = forAllSystems (system: systemPkgs: nixImport rec { dir = ./tools; _import = _path: name: import "${toString dir}/${name}" ({ inherit system; } // inputs); }); | 377 | packages = forAllSystems (system: systemPkgs: nixImport rec { dir = ./tools; _import = name: _base: import (dir + "/${name}") ({ inherit system; } // inputs); }); |
338 | 378 | ||
339 | # packages = mapAttrs (_name: filterAttrs (_name: isDerivation)) packages; | 379 | # packages = mapAttrs (_name: filterAttrs (_name: isDerivation)) packages; |
340 | # packages' = mapAttrs (_name: filterAttrs (_name: value: !(isDerivation value))) packages; | 380 | # packages' = mapAttrs (_name: filterAttrs (_name: value: !(isDerivation value))) packages; |
341 | 381 | ||
342 | legacyPackages = forAllSystems (system: systemPkgs: systemPkgs.override { overlays = attrValues self.overlays; }); | 382 | legacyPackages = forAllSystems (system: systemPkgs: systemPkgs.override { overlays = attrValues self.overlays; }); |
343 | 383 | ||
344 | apps = foldr recursiveUpdate {} [startVMs activateNixosConfigurations activateHomeManagerConfigurations]; | 384 | apps = foldr recursiveUpdate {} [ |
385 | #startVMs | ||
386 | activateNixosConfigurations activateHomeManagerConfigurations | ||
387 | ]; | ||
388 | |||
389 | lib = nixImport rec { dir = ./lib; _import = name: _base: import (dir + "/${name}") inputs; }; | ||
345 | 390 | ||
346 | devShells = forAllSystems (system: systemPkgs: { default = import ./shell.nix ({ inherit system; } // inputs); } // installerShells system systemPkgs); | 391 | devShells = forAllSystems (system: systemPkgs: { default = import ./shell.nix ({ inherit system; } // inputs); } // installerShells system systemPkgs); |
347 | 392 | ||
@@ -366,10 +411,10 @@ | |||
366 | # path = activateHomeManager (self.nixosConfigurations.${hostname}.config.nixpkgs.system) usercfg.home; | 411 | # path = activateHomeManager (self.nixosConfigurations.${hostname}.config.nixpkgs.system) usercfg.home; |
367 | # }) self.nixosConfigurations.${hostname}.config.home-manager.users); | 412 | # }) self.nixosConfigurations.${hostname}.config.home-manager.users); |
368 | }) (nixImport { dir = ./hosts; _import = (_path: name: name); }); | 413 | }) (nixImport { dir = ./hosts; _import = (_path: name: name); }); |
369 | overrides = if pathExists ./deploy then nixImport { dir = ./deploy; _import = path: _name: import (./deploy + "/${path}") inputs; } else {}; | 414 | overrides = if pathExists ./deploy then nixImport rec { dir = ./deploy; _import = path: _name: import (dir + "/${path}") inputs; } else {}; |
370 | filterEnabled = attrs: mapAttrs (_n: v: filterAttrs (n: _v: n != "enabled") v) (filterAttrs (_n: v: v.enabled or true) attrs); | 415 | filterEnabled = attrs: mapAttrs (_n: v: filterAttrs (n: _v: n != "enabled") v) (filterAttrs (_n: v: v.enabled or true) attrs); |
371 | in mapAttrs (_n: v: if v ? "profiles" then v // { profiles = filterEnabled v.profiles; } else v) (filterEnabled (recursiveUpdate defaults overrides)); | 416 | in mapAttrs (_n: v: if v ? "profiles" then v // { profiles = filterEnabled v.profiles; } else v) (filterEnabled (recursiveUpdate defaults overrides)); |
372 | 417 | ||
373 | checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib; | 418 | # checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib; |
374 | }; | 419 | }; |
375 | } | 420 | } |