nix-dotfiles/flake.nix
2025-11-07 16:15:27 +01:00

432 lines
16 KiB
Nix

{
description = "bertof's system configuration";
inputs = {
flake-compat.url = "https://flakehub.com/f/edolstra/flake-compat/1.tar.gz";
nixpkgs-s.url = "github:NixOS/nixpkgs/release-25.05";
nixpkgs-u.url = "github:NixOS/nixpkgs/nixos-unstable";
nixpkgs.follows = "nixpkgs-u";
home-manager = { url = "github:nix-community/home-manager/release-24.11"; inputs.nixpkgs.follows = "nixpkgs-s"; };
home-manager-u = { url = "github:nix-community/home-manager"; inputs = { nixpkgs.follows = "nixpkgs-u"; }; };
# agenix.url = "github:ryantm/agenix";
ragenix = { url = "github:yaxitech/ragenix"; inputs.nixpkgs.follows = "nixpkgs"; };
nix-rice = {
url = "github:bertof/nix-rice/modules";
inputs.nixpkgs.follows = "nixpkgs";
};
nixos-generators = { url = "github:nix-community/nixos-generators"; inputs.nixpkgs.follows = "nixpkgs"; };
nixos-hardware.url = "github:NixOS/nixos-hardware";
nix-index-database.url = "github:nix-community/nix-index-database";
nix-index-database.inputs.nixpkgs.follows = "nixpkgs-u";
systems.url = "github:nix-systems/default";
flake-parts.url = "github:hercules-ci/flake-parts";
git-hooks = {
url = "github:cachix/git-hooks.nix";
inputs.nixpkgs.follows = "nixpkgs";
};
# agenix-shell.url = "github:aciceri/agenix-shell"; # TODO
# agenix-rekey.url = "github:oddlama/agenix-rekey"; # TODO
# emanote.url = "github:srid/emanote";
};
outputs = { self, ... }@inputs:
let
nix-config = {
allowUnfree = true;
extraOptions = "experimental-features = nix-command flakes";
permittedInsecurePackages = [ ];
};
in
inputs.flake-parts.lib.mkFlake { inherit inputs; } {
systems = import inputs.systems;
imports = [ inputs.git-hooks.flakeModule ];
perSystem = { config, pkgs, system, ... }: {
_module.args.pkgs = import inputs.nixpkgs {
inherit system;
config = nix-config;
overlays = [
inputs.self.overlays.packages
inputs.self.overlays.overrides
];
};
pre-commit.settings.hooks = {
deadnix.enable = true;
nixpkgs-fmt.enable = true;
statix.enable = true;
};
devShells.default = pkgs.mkShellNoCC {
shellHook = ''
${config.pre-commit.installationScript}
LOCAL_KEY = "/etc/nix/key";
'';
};
formatter = pkgs.nixpkgs-fmt;
packages = {
inherit
(pkgs)
goose-cli
keyboard-switch
wl-clipedit
wl-lockscreen
wl-update-background
;
# Installer ISO
install-iso = inputs.nixos-generators.nixosGenerate {
inherit system;
modules = [ self.nixosModules.installerModules ];
format = "install-iso";
};
# RAW base image
raw-base-image = inputs.nixos-generators.nixosGenerate {
inherit system;
modules = [ self.nixosModules.installerModules ];
format = "raw-efi";
};
# VMDK base image
vmdk-base-image = inputs.nixos-generators.nixosGenerate {
system = "x86_64-linux";
modules = [ self.nixosModules.installerModules ];
format = "vmware";
};
# Aarch64 base image
aarch64-base-image = inputs.nixos-generators.nixosGenerate {
system = "aarch64-linux";
modules = [ self.nixosModules.installerModules ];
format = "sd-aarch64";
};
# Installer DigitalOcean
do-image = inputs.nixos-generators.nixosGenerate {
inherit system;
modules = [ self.nixosModules.installerModules ];
format = "do";
};
};
};
flake = {
overlays = {
default = inputs.self.overlays.packages;
packages = self: _super: {
keyboard-switch = self.callPackage ./pkgs/keyboard-switch { };
wl-clipedit = self.callPackage ./pkgs/wl-clipedit { };
wl-lockscreen = self.callPackage ./pkgs/wl-lockscreen { };
wl-update-background = self.callPackage ./pkgs/wl-update-background { };
};
overrides = _self: super: {
google-chrome = super.google-chrome.override { commandLineArgs = [ "--password-store=gnome" "--force-dark-mode" ]; };
brave = super.brave.override { commandLineArgs = "--ozone-platform=wayland --enable-features=UseOzonePlatform,WebRTCPipeWireCapturer"; };
smartir-zha = super.home-assistant-custom-components.smartir.overrideAttrs (_attr: rec {
version = "04ac27e";
src = super.fetchFromGitHub {
owner = "bertof";
repo = "SmartIR";
rev = "6f8cac1";
hash = "sha256-5Ulb3z46bfIzztHTMNg/Vc26ru9K40242AsW37TLE18=";
};
code = super.fetchurl {
url = "https://gist.githubusercontent.com/bertof/d2a4af6243300b9ba05638af9a29fa6d/raw/6dbb21db986db15f69bb3040585419a270693289/50.json";
sha256 = "sha256-9564yMudzY8Z9RzvLqJxuV4k6PLBVJdph71BOz6OXRc=";
};
patcher = super.fetchurl {
url = "https://gist.githubusercontent.com/svyatogor/7839d00303998a9fa37eb48494dd680f/raw/66cba20e653f84aab0b9a31ea5b9ca497d038d8a/broadlink_to_tuya.py";
sha256 = "0m5fbfvsq8sxm0ghs8al8b6z4vfycqkr90qb10w9c4ryag2flnsh";
};
postPatch = ''
${super.python312}/bin/python3 ${patcher} codes/climate/1946.json > codes/climate/50.json
# sed 's/Broadlink/MQTT/' codes/climate/1946.json > codes/climate/50.json
# cp ${code} codes/climate/50.json
'';
});
# can be removed when https://github.com/NixOS/nixpkgs/pull/389711 is merged
libfprint = super.libfprint.overrideAttrs (oldAttrs: {
buildInputs = oldAttrs.buildInputs ++ [ super.nss ];
});
goose-cli = super.goose-cli.overrideAttrs (oldAttrs: rec {
version = "1.12.0";
name = "${oldAttrs.pname}-${version}";
src = oldAttrs.src.override {
tag = "v${version}";
hash = "sha256-L4bk5gU1rDNEiborsjmGdHOA457zbvw2MDs57+/54Nw=";
};
cargoDeps = super.rustPlatform.fetchCargoVendor {
inherit src name;
hash = "sha256-+Jd00vNrQYC+B7MoiyM5V/rjM1RwYxQPEywJpUAoSNw=";
};
checkFlags = oldAttrs.checkFlags or [ ];
});
};
};
nixosModules = {
basic = {
nixpkgs = { config = nix-config; overlays = [ inputs.self.overlays.packages inputs.self.overlays.overrides ]; };
nix = {
inherit (nix-config) extraOptions;
registry = {
stable = { from = { id = "stable"; type = "indirect"; }; flake = inputs.nixpkgs; };
unstable = { from = { id = "unstable"; type = "indirect"; }; flake = inputs.nixpkgs-u; };
};
};
};
# Home manager configuration
homeManagerUModules = {
imports = [ inputs.home-manager-u.nixosModules.default ];
home-manager = {
useGlobalPkgs = true;
useUserPackages = true;
extraSpecialArgs = { stable = inputs.nixpkgs; unstable = inputs.nixpkgs-u; };
};
};
commonModules = {
imports = [
# Nix configuration
self.nixosModules.basic
# Nix rice
inputs.nix-rice.modules.default
./nixos/rice.nix
# (R)Agenix configuration
inputs.ragenix.nixosModules.default
# inputs.agenix.nixosModules.default
# Users
# { services.userborn.enable = true; }
self.nixosModules.bertof
# Some basic defaults
./nixos/basics
# Home manager
self.nixosModules.homeManagerUModules
];
};
mainModules = {
imports = [
self.nixosModules.commonModules
inputs.nix-index-database.nixosModules.nix-index
./nixos/pro_audio.nix
./nixos/kdeconnect.nix
./nixos/opentabletdriver.nix
self.nixosModules.bertof-rclone
./nixos/hyprland.nix
];
home-manager.users.bertof.imports = [ ./hm/hyprland.nix ];
services.earlyoom.enable = true;
};
server = {
imports = [
self.nixosModules.commonModules
./nixos/server
];
};
installerModules = { imports = [ self.nixosModules.commonModules ./nixos/installer.nix ]; };
bertof = { imports = [ ./nixos/users/bertof.nix ]; };
bertof-rclone = {
imports = [ self.nixosModules.bertof ];
age.secrets.rclone_bertof = { file = ./secrets/rclone_bertof.age; owner = "bertof"; };
home-manager.users.bertof.imports = [ ./hm/rclone-mount-bertof.nix ];
};
tiziano = { imports = [ ./nixos/users/tiziano.nix ]; };
tiziano-rclone = {
imports = [ self.nixosModules.tiziano ];
age.secrets.rclone_tiziano = { file = ./secrets/rclone_tiziano.age; owner = "tiziano"; };
home-manager.users.tiziano.imports = [ ./hm/rclone-mount-tiziano.nix ];
};
};
nixosConfigurations = {
thor = inputs.nixpkgs-u.lib.nixosSystem {
system = "x86_64-linux";
modules = [
inputs.nixos-hardware.nixosModules.common-cpu-amd
inputs.nixos-hardware.nixosModules.common-pc-ssd
self.nixosModules.mainModules
./instances/thor/hardware-configuration.nix
./instances/thor/configuration.nix
./nixos/steam.nix
./nixos/ollama.nix
./nixos/ollama-ui.nix
./nixos/garage.nix
self.nixosModules.bertof-rclone
{
home-manager.users.bertof.imports = [
inputs.nix-index-database.homeModules.nix-index
./instances/thor/hm.nix
];
}
];
};
sif = inputs.nixpkgs-u.lib.nixosSystem {
system = "x86_64-linux";
modules = [
inputs.nixos-hardware.nixosModules.common-cpu-intel-cpu-only
inputs.nixos-hardware.nixosModules.common-gpu-intel-comet-lake
inputs.nixos-hardware.nixosModules.common-pc-ssd
self.nixosModules.mainModules
./instances/sif/hardware-configuration.nix
./instances/sif/configuration.nix
./nixos/steam.nix
./nixos/ollama.nix
./nixos/ollama-ui.nix
./nixos/garage.nix
{
home-manager.users.bertof.imports = [
inputs.nix-index-database.homeModules.nix-index
./instances/sif/hm.nix
];
}
];
};
odin = inputs.nixpkgs-u.lib.nixosSystem {
system = "x86_64-linux";
modules = [
inputs.nixos-hardware.nixosModules.common-cpu-intel
inputs.nixos-hardware.nixosModules.common-pc-laptop
inputs.nixos-hardware.nixosModules.common-pc-laptop-ssd
self.nixosModules.server
./instances/odin/hardware-configuration.nix
./instances/odin/configuration.nix
./nixos/ip_forwarding.nix
./nixos/steam.nix
./nixos/garage.nix
self.nixosModules.bertof-rclone
self.nixosModules.tiziano-rclone
{
home-manager.users.bertof = import ./instances/odin/hm.nix;
home-manager.users.tiziano = import ./instances/odin/hm_tiziano.nix;
}
];
};
heimdall = inputs.nixpkgs-u.lib.nixosSystem {
system = "x86_64-linux";
modules = [
inputs.nixos-hardware.nixosModules.common-cpu-amd
inputs.nixos-hardware.nixosModules.common-gpu-amd
inputs.nixos-hardware.nixosModules.common-pc-ssd
self.nixosModules.server
./instances/heimdall/hardware-configuration.nix
./instances/heimdall/configuration.nix
./nixos/ip_forwarding.nix
./nixos/torrentbox.nix
./nixos/minio_server.nix
./nixos/nextcloud.nix
./nixos/immich.nix
./nixos/forgejo.nix
./nixos/garage.nix
./nixos/ollama.nix
self.nixosModules.bertof-rclone
self.nixosModules.tiziano
{
home-manager.users.bertof = import ./instances/heimdall/hm.nix;
age.secrets = {
heimdall-gitlab-runner-nix.file = ./secrets/heimdall-gitlab-runner-nix.age;
heimdall-gitlab-runner-docker-images.file = ./secrets/heimdall-gitlab-runner-docker-images.age;
heimdall-gitlab-runner-default.file = ./secrets/heimdall-gitlab-runner-default.age;
};
}
];
};
# freya = inputs.nixpkgs.lib.nixosSystem {
# system = "aarch64-linux";
# modules = [
# inputs.nixos-hardware.nixosModules.raspberry-pi-4
# ({ lib, ... }: { boot.supportedFilesystems = lib.mkForce [ "btrfs" "reiserfs" "vfat" "f2fs" "xfs" "ntfs" "cifs" ]; })
# self.nixosModules.server
# ./instances/freya/hardware-configuration.nix
# ./instances/freya/configuration.nix
# ./nixos/torrentbox.nix
# ./nixos/minio_server.nix
# # ./nixos/ntfy.nix
# self.nixosModules.tiziano
# { home-manager.users.bertof = import ./instances/freya/hm.nix; }
# ];
# };
baldur = inputs.nixpkgs-u.lib.nixosSystem {
system = "x86_64-linux";
modules = [
inputs.nixos-hardware.nixosModules.common-cpu-intel
inputs.nixos-hardware.nixosModules.common-pc-ssd
self.nixosModules.server
./instances/baldur/hardware-configuration.nix
./instances/baldur/configuration.nix
./nixos/ip_forwarding.nix
./nixos/garage.nix
./nixos/vaultwarden.nix
./nixos/uptime-kuma.nix
self.nixosModules.tiziano
{
home-manager.users.bertof = import ./instances/baldur/hm.nix;
home-manager.users.tiziano = import ./instances/baldur/hm_tiziano.nix;
}
];
};
# loki = inputs.nixpkgs.lib.nixosSystem {
# system = "x86_64-linux";
# modules = [
# inputs.nixos-hardware.nixosModules.common-cpu-intel
# inputs.nixos-hardware.nixosModules.common-pc-ssd
# self.nixosModules.server
# ./instances/loki/hardware-configuration.nix
# ./instances/loki/configuration.nix
# self.nixosModules.tiziano
# {
# home-manager.users.bertof = import ./instances/odin/hm.nix;
# home-manager.users.tiziano = import ./instances/odin/hm_tiziano.nix;
# }
# ];
# };
};
};
};
}