148 lines
4.2 KiB
Nix
148 lines
4.2 KiB
Nix
{
|
|
description = "Modular NixOS Configuration with Hyprland";
|
|
|
|
inputs = {
|
|
nixpkgs.url = "nixpkgs/nixos-unstable";
|
|
|
|
nix-cachyos-kernel = {
|
|
url = "github:xddxdd/nix-cachyos-kernel";
|
|
};
|
|
|
|
nix-flatpak = {
|
|
url = "github:gmodena/nix-flatpak/?ref=latest";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
|
|
sops-nix = {
|
|
url = "github:Mic92/sops-nix";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
|
|
noctalia = {
|
|
url = "github:noctalia-dev/noctalia-shell";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
|
|
steam-config-nix = {
|
|
url = "github:different-name/steam-config-nix";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
|
|
home-manager = {
|
|
url = "github:nix-community/home-manager";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
|
|
prismlauncher = {
|
|
url = "github:PrismLauncher/PrismLauncher";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
|
|
opencode-flake = {
|
|
url = "github:AodhanHayter/opencode-flake";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
|
|
nix-bwrapper = {
|
|
url = "github:Naxdy/nix-bwrapper";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
|
|
lanzaboote = {
|
|
url = "github:nix-community/lanzaboote";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
|
|
niri = {
|
|
url = "github:YaLTeR/niri";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
|
|
impermanence = {
|
|
url = "github:nix-community/impermanence";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
|
|
catppuccin.url = "github:catppuccin/nix";
|
|
};
|
|
|
|
outputs =
|
|
{
|
|
self,
|
|
nixpkgs,
|
|
home-manager,
|
|
noctalia,
|
|
nix-flatpak,
|
|
lanzaboote,
|
|
niri,
|
|
...
|
|
}@inputs:
|
|
{
|
|
# Expose reusable NixOS modules for others to import
|
|
nixosModules = {
|
|
security = import ./modules/system/security.nix;
|
|
kernelHardening = import ./modules/system/kernel-hardening.nix;
|
|
secureBoot = import ./modules/system/secure-boot.nix;
|
|
dnsOverTls = import ./modules/system/dns-over-tls.nix;
|
|
cloudflareFirewall = import ./modules/system/cloudflare-firewall.nix;
|
|
caddyCloudflare = import ./modules/system/caddy-cloudflare.nix;
|
|
podman = import ./modules/system/podman.nix;
|
|
browserVpn = import ./modules/system/browser-vpn.nix;
|
|
default = import ./modules;
|
|
};
|
|
|
|
# Expose reusable Home Manager modules
|
|
homeManagerModules = {
|
|
hyprlandCatppuccin = import ./modules/home/hyprland-catppuccin.nix;
|
|
gluetunUser = import ./modules/home/gluetun-user.nix;
|
|
qbittorrentVpn = import ./modules/home/qbittorrent-vpn.nix;
|
|
browserContainerUpdate = import ./modules/home/browser-container-update.nix;
|
|
protonCachyosUpdater = import ./modules/home/proton-cachyos-updater.nix;
|
|
default = import ./modules/home;
|
|
};
|
|
|
|
nixosConfigurations.nixos = nixpkgs.lib.nixosSystem {
|
|
system = "x86_64-linux";
|
|
specialArgs = { inherit inputs; };
|
|
modules = [
|
|
./configuration.nix
|
|
./modules # Import all system modules
|
|
inputs.sops-nix.nixosModules.sops
|
|
home-manager.nixosModules.home-manager
|
|
inputs.catppuccin.nixosModules.catppuccin
|
|
{
|
|
home-manager = {
|
|
extraSpecialArgs = { inherit inputs; };
|
|
useGlobalPkgs = true;
|
|
useUserPackages = true;
|
|
backupFileExtension = "backup";
|
|
users.ashie = import ./home.nix;
|
|
};
|
|
}
|
|
./modules/system/impermanence.nix
|
|
];
|
|
};
|
|
|
|
nixosConfigurations.impermanence = nixpkgs.lib.nixosSystem {
|
|
system = "x86_64-linux";
|
|
specialArgs = { inherit inputs; };
|
|
modules = [
|
|
./configuration.nix
|
|
./modules
|
|
inputs.sops-nix.nixosModules.sops
|
|
home-manager.nixosModules.home-manager
|
|
inputs.catppuccin.nixosModules.catppuccin
|
|
{
|
|
home-manager = {
|
|
extraSpecialArgs = { inherit inputs; };
|
|
useGlobalPkgs = true;
|
|
useUserPackages = true;
|
|
backupFileExtension = "backup";
|
|
users.ashie = import ./home.nix;
|
|
};
|
|
}
|
|
./modules/system/impermanence.nix
|
|
];
|
|
};
|
|
};
|
|
}
|