80 lines
2.2 KiB
Nix
80 lines
2.2 KiB
Nix
{
|
|
description = "NixOS flake";
|
|
|
|
inputs = {
|
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
|
|
sops-nix = {
|
|
url = "github:Mic92/sops-nix";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
microvm = {
|
|
url = "github:microvm-nix/microvm.nix";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
disko = {
|
|
url = "github:nix-community/disko/latest";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
impermanence.url = "github:nix-community/impermanence";
|
|
neovim-nightly-overlay.url = "github:nix-community/neovim-nightly-overlay";
|
|
home-manager = {
|
|
url = "github:nix-community/home-manager";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
nur.url = "github:nix-community/NUR";
|
|
niri-branch = {
|
|
url = "github:argosnothing/niri/hidden-workspaces";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
};
|
|
|
|
outputs =
|
|
inputs@{ nixpkgs, ... }:
|
|
let
|
|
hostname = "amelia";
|
|
system = "x86_64-linux";
|
|
pkgs = import nixpkgs {
|
|
inherit system;
|
|
config.allowUnfree = true;
|
|
overlays = [ inputs.neovim-nightly-overlay.overlays.default ];
|
|
};
|
|
in
|
|
{
|
|
nixosConfigurations."${hostname}" = nixpkgs.lib.nixosSystem {
|
|
inherit system pkgs;
|
|
specialArgs = {
|
|
# inherit quickshell;
|
|
hostname = hostname;
|
|
};
|
|
modules = [
|
|
./users.nix
|
|
./storage.nix
|
|
./configuration.nix
|
|
./impermanence.nix
|
|
./networking.nix
|
|
./packages.nix
|
|
./kernel
|
|
./home
|
|
inputs.sops-nix.nixosModules.sops
|
|
inputs.microvm.nixosModules.host
|
|
inputs.disko.nixosModules.disko
|
|
inputs.impermanence.nixosModules.impermanence
|
|
inputs.home-manager.nixosModules.home-manager
|
|
{
|
|
home-manager.useGlobalPkgs = true;
|
|
home-manager.useUserPackages = true;
|
|
home-manager.sharedModules = [
|
|
inputs.sops-nix.homeManagerModules.sops
|
|
];
|
|
nixpkgs.overlays = [
|
|
inputs.nur.overlays.default
|
|
(_: prev: {
|
|
niri = inputs.niri-branch.packages.${prev.system}.niri;
|
|
})
|
|
];
|
|
}
|
|
# ./networking/wireguard
|
|
];
|
|
};
|
|
};
|
|
}
|