rec { description = "felschr's NixOS configuration"; nixConfig = { extra-substituters = [ "https://nix-community.cachix.org" "https://wurzelpfropf.cachix.org" # ragenix "https://felschr.cachix.org" ]; extra-trusted-public-keys = [ "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" "wurzelpfropf.cachix.org-1:ilZwK5a6wJqVr7Fyrzp4blIEkGK+LJT0QrpWr1qBNq0=" "felschr.cachix.org-1:raomy5XA2tsVkBoG6wo70ARIn+V24IXhWaSe3QZo12A=" ]; }; inputs = { nixpkgs.url = "https://flakehub.com/f/NixOS/nixpkgs/0.2311.tar.gz"; nixpkgs-unstable.url = "https://flakehub.com/f/NixOS/nixpkgs/0.1.tar.gz"; nixos-hardware.url = "https://flakehub.com/f/NixOS/nixos-hardware/0.1.tar.gz"; fh = { url = "https://flakehub.com/f/DeterminateSystems/fh/0.1.tar.gz"; inputs.nixpkgs.follows = "nixpkgs"; }; flake-parts = { url = "github:hercules-ci/flake-parts"; inputs.nixpkgs-lib.follows = "nixpkgs"; }; flake-utils.url = "https://flakehub.com/f/numtide/flake-utils/0.1.tar.gz"; home-manager = { url = "https://flakehub.com/f/nix-community/home-manager/0.2311.tar.gz"; inputs.nixpkgs.follows = "nixpkgs"; }; firefox-addons = { url = "gitlab:rycee/nur-expressions?dir=pkgs/firefox-addons"; inputs.nixpkgs.follows = "nixpkgs"; }; arkenfox-userjs = { url = "github:arkenfox/user.js"; flake = false; }; agenix = { url = "github:yaxitech/ragenix"; inputs.nixpkgs.follows = "nixpkgs"; inputs.flake-utils.follows = "flake-utils"; }; deploy-rs = { url = "github:serokell/deploy-rs"; inputs.nixpkgs.follows = "nixpkgs"; inputs.utils.follows = "flake-utils"; }; pre-commit-hooks = { url = "github:cachix/pre-commit-hooks.nix"; inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs-stable.follows = "nixpkgs"; inputs.flake-utils.follows = "flake-utils"; }; matrix-appservices = { url = "gitlab:coffeetables/nix-matrix-appservices"; inputs.nixpkgs.follows = "nixpkgs"; }; nvim-kitty-navigator = { url = "github:hermitmaster/nvim-kitty-navigator"; flake = false; }; }; outputs = { self, nixpkgs, nixpkgs-unstable, ... }@inputs: inputs.flake-parts.lib.mkFlake { inherit inputs; } { systems = [ "x86_64-linux" "aarch64-linux" ]; imports = [ ./pkgs/flake-module.nix ./lib/flake-module.nix ./overlays.nix ]; flake = { inherit nixConfig; nixosModules = { flakeDefaults = import ./modules/flakeDefaults.nix; systemdNotify = import ./modules/systemdNotify.nix; inadyn = import ./modules/inadyn.nix; }; homeManagerModules = { git = import ./home/modules/git.nix; firefox = import ./home/modules/firefox/firefox.nix; tor-browser = import ./home/modules/firefox/tor-browser.nix; mullvad-browser = import ./home/modules/firefox/mullvad-browser.nix; }; nixosConfigurations = { home-pc = nixpkgs.lib.nixosSystem { system = "x86_64-linux"; modules = [ nixpkgs.nixosModules.notDetected inputs.nixos-hardware.nixosModules.common-pc inputs.nixos-hardware.nixosModules.common-pc-ssd inputs.nixos-hardware.nixosModules.common-cpu-amd-pstate inputs.nixos-hardware.nixosModules.common-gpu-amd (self.lib.createSystem "home-pc" { hardwareConfig = ./hardware/home-pc.nix; config = ./hosts/home-pc.nix; }) self.lib.createMediaGroup (self.lib.createUser "felschr" { user.extraGroups = [ "wheel" "audio" "disk" "libvirtd" "qemu-libvirtd" "media" ]; modules = [ self.homeManagerModules.git ]; config = ./home/felschr.nix; usesContainers = true; }) ({ pkgs, ... }: { environment.systemPackages = [ inputs.deploy-rs.defaultPackage.x86_64-linux ]; }) ]; specialArgs = { inherit inputs; }; }; pilot1 = nixpkgs.lib.nixosSystem { system = "x86_64-linux"; modules = [ nixpkgs.nixosModules.notDetected inputs.nixos-hardware.nixosModules.common-pc inputs.nixos-hardware.nixosModules.common-pc-ssd inputs.nixos-hardware.nixosModules.common-cpu-intel inputs.nixos-hardware.nixosModules.common-gpu-intel (self.lib.createSystem "pilot1" { hardwareConfig = ./hardware/pilot1.nix; config = ./hosts/work-pc.nix; }) (self.lib.createUser "felschr" { user.extraGroups = [ "wheel" "audio" "disk" ]; modules = [ self.homeManagerModules.git ]; config = ./home/felschr-work.nix; usesContainers = true; }) ]; specialArgs = { inherit inputs; }; }; home-server = nixpkgs.lib.nixosSystem { system = "x86_64-linux"; modules = [ nixpkgs.nixosModules.notDetected inputs.nixos-hardware.nixosModules.common-pc inputs.nixos-hardware.nixosModules.common-pc-ssd inputs.nixos-hardware.nixosModules.common-cpu-intel-kaby-lake inputs.nixos-hardware.nixosModules.common-gpu-intel inputs.matrix-appservices.nixosModule (self.lib.createSystem "home-server" { hardwareConfig = ./hardware/lattepanda.nix; config = ./hosts/home-server.nix; }) self.lib.createMediaGroup (self.lib.createUser "felschr" { user = { extraGroups = [ "wheel" "audio" "disk" "media" ]; openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP751vlJUnB7Pfe1KNr6weWkx/rkP4J3lTYpAekHdOgV" ]; }; modules = [ self.homeManagerModules.git ]; config = ./home/felschr-server.nix; }) ]; specialArgs = { inherit inputs; }; }; }; deploy.nodes.home-server = { hostname = "192.168.1.102"; profiles.system = { sshUser = "felschr"; sshOpts = [ "-t" ]; user = "root"; path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.home-server; magicRollback = false; # otherwise password prompt won't work }; }; }; perSystem = { system, config, pkgs, ... }: { _module.args.pkgs = import nixpkgs { inherit system; config.allowUnfree = true; }; devShells.default = pkgs.mkShell { inherit (config.checks.pre-commit) shellHook; }; checks = inputs.deploy-rs.lib.${system}.deployChecks self.deploy // { pre-commit = inputs.pre-commit-hooks.lib.${system}.run { src = ./.; hooks = { nixfmt.enable = true; shellcheck.enable = true; }; }; }; formatter = pkgs.nixfmt; }; }; }