{ inputs = { secrets = { url = "git+ssh://gitea@git.ingolf-wagner.de/palo/nixos-secrets.git?ref=main"; flake = false; }; nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable"; nixpkgs.url = "github:nixos/nixpkgs/nixos-23.05"; nixpkgs-legacy_2211.url = "github:nixos/nixpkgs/nixos-22.11"; nixpkgs-legacy_2205.url = "github:nixos/nixpkgs/nixos-22.05"; nixpkgs-legacy_2105.url = "github:nixos/nixpkgs/nixos-21.05"; nixos-hardware.url = "github:nixos/nixos-hardware"; home-manager = { url = "github:nix-community/home-manager/release-23.05"; inputs.nixpkgs.follows = "nixpkgs"; }; polygon-art = { url = "git+https://git.ingolf-wagner.de/palo/polygon-art.git"; }; sops-nix.url = "github:Mic92/sops-nix"; emacs-overlay = { url = "github:nix-community/emacs-overlay"; flake = false; }; doom-emacs-nix = { url = "github:nix-community/nix-doom-emacs"; inputs.nixpkgs.follows = "nixpkgs"; #inputs.emacs-overlay.follows = "emacs-overlay"; }; home-manager-utils = { url = "github:mrvandalo/home-manager-utils"; inputs.home-manager.follows = "home-manager"; }; nixpkgs-fmt = { url = "github:nix-community/nixpkgs-fmt"; inputs.nixpkgs.follows = "nixpkgs"; }; grocy-scanner = { url = "github:mrVanDalo/grocy-scanner"; inputs.nixpkgs.follows = "nixpkgs"; }; permown = { url = "github:mrVanDalo/module.permown"; #url = "git+file:///home/palo/dev/nixos/permown"; inputs.nixpkgs.follows = "nixpkgs"; }; private_assets = { #url = "git+file:///home/palo/dev/nixos/nixos-private-assets"; url = "git+ssh://gitea@git.ingolf-wagner.de/palo/nixos-private-assets.git?ref=main"; flake = true; }; retiolum = { url = "github:Mic92/retiolum"; #url = "git+file:///home/palo/dev/nixos/retiolum"; }; landingpage = { #url = "git+file:///home/palo/dev/landingpage"; url = "github:mrVanDalo/landingpage"; }; kmonad = { url = "github:kmonad/kmonad?dir=nix"; inputs.nixpkgs.follows = "nixpkgs"; }; disko = { url = "github:nix-community/disko"; inputs.nixpkgs.follows = "nixpkgs"; }; dns = { url = "github:kirelagin/dns.nix"; inputs.nixpkgs.follows = "nixpkgs"; }; nixinate.url = "github:matthewcroughan/nixinate"; stylix.url = "github:danth/stylix"; }; outputs = { self , disko , dns , stylix , doom-emacs-nix , emacs-overlay , grocy-scanner , home-manager , home-manager-utils , kmonad , landingpage , nixinate , nixos-hardware , nixpkgs , nixpkgs-fmt , nixpkgs-legacy_2105 , nixpkgs-legacy_2205 , nixpkgs-legacy_2211 , nixpkgs-unstable , permown , polygon-art , private_assets , retiolum , secrets , sops-nix }: let system = "x86_64-linux"; pkgs = nixpkgs.legacyPackages.${system}; inherit (nixpkgs) lib; meta = rec { system = "x86_64-linux"; pkgs = import nixpkgs { inherit system; config.allowUnfree = true; config.permittedInsecurePackages = [ "python-2.7.18.6" ]; overlays = [ (_self: _super: { unstable = import nixpkgs-unstable { inherit system; config.allowUnfree = true; }; legacy_2211 = import nixpkgs-legacy_2211 { inherit system; }; legacy_2205 = import nixpkgs-legacy_2205 { inherit system; }; legacy_2105 = nixpkgs-legacy_2105 { inherit system; }; polygon-art = polygon-art.packages.${system}; landingpage = landingpage.packages.${system}.plain; trilium-server = nixpkgs-unstable.legacyPackages.${system}.trilium-server; kmonad = kmonad.packages.${system}.kmonad; #deploy-rs = deploy-rs.packages.${system}.deploy-rs; }) (import ./nixos/pkgs) ]; }; specialArgs = { inherit private_assets; assets = ./nixos/assets; }; }; # todo : why redefine it? nixosSystem = args: (lib.makeOverridable lib.nixosSystem) (lib.recursiveUpdate args { modules = args.modules ++ [ { config.nixpkgs.pkgs = lib.mkDefault args.pkgs; config.nixpkgs.localSystem = lib.mkDefault args.pkgs.stdenv.hostPlatform; } ]; }); nixosConfigurationSetup = { name , host ? "${name}.private" , modules }: nixosSystem { inherit (meta) system specialArgs pkgs; modules = modules ++ defaultModules ++ [ { _module.args.nixinate = { host = "${name}.private"; sshUser = "root"; buildOn = "remote"; # valid args are "local" or "remote" substituteOnTarget = false; # if buildOn is "local" then it will substitute on the target, "-s" hermetic = false; }; } { imports = [ ./nixos/machines/${name}/configuration.nix (sopsModule name) ]; } ]; }; defaultModules = [ { # todo : find out what this is? # make flake inputs accessiable in NixOS _module.args.self = self; _module.args.inputs = self.inputs; } ({ pkgs, lib, ... }: { # todo : check if this is still needed nix = { # no channesl needed this way nixPath = [ "nixpkgs=${pkgs.path}" ]; # make flakes available package = pkgs.nixUnstable; extraOptions = '' experimental-features = nix-command flakes ''; }; }) { nix.settings.substituters = [ "https://cache.nixos.org/" ]; } { boot.tmp.useTmpfs = lib.mkDefault true; environment.systemPackages = [ nixpkgs-fmt.defaultPackage.${system} ]; imports = [ permown.nixosModules.permown disko.nixosModules.disko kmonad.nixosModules.default grocy-scanner.nixosModule ]; } ]; homeManagerModules = { config, ... }: { imports = [ home-manager.nixosModules.home-manager stylix.nixosModules.stylix ]; stylix.image = ./nixos/assets/wallpaper.png; home-manager.useGlobalPkgs = true; home-manager.useUserPackages = true; home-manager.users.root = { home.stateVersion = "22.11"; imports = [ home-manager-utils.hmModule ]; }; home-manager.users.mainUser = { home.stateVersion = "22.11"; imports = [ doom-emacs-nix.hmModule home-manager-utils.hmModule ]; }; }; sopsModule = name: { lib, ... }: { imports = [ sops-nix.nixosModules.sops ]; sops.defaultSopsFile = lib.mkForce "${secrets}/secrets/${name}.yaml"; }; in { devShells.${system}.default = pkgs.mkShell { buildInputs = [ nixpkgs-fmt.defaultPackage.${system} ]; }; apps = nixinate.nixinate.x86_64-linux self; packages = with nixpkgs.lib; { ${system} = let vms = mapAttrs' (host: sys: { name = "vm-${host}"; value = sys.config.system.build.vm; }) self.nixosConfigurations; sds = mapAttrs' (host: sys: { name = "sd-${host}"; value = sys.config.system.build.sdImage; }) (filterAttrs (n: hasAttrByPath [ "config" "system" "build" "sdImage" ]) self.nixosConfigurations); in vms // sds; }; nixosConfigurations = { cream = nixosConfigurationSetup { name = "cream"; modules = [ nixos-hardware.nixosModules.framework-12th-gen-intel retiolum.nixosModules.retiolum private_assets.nixosModules.jobrad homeManagerModules ]; }; chungus = nixosConfigurationSetup { name = "chungus"; modules = [ #retiolum.nixosModules.retiolum #private_assets.nixosModules.jobrad homeManagerModules ]; }; }; }; }