nixos/flake.nix
2026-02-20 20:59:09 +01:00

225 lines
6.6 KiB
Nix

{
description = "Modular NixOS Configuration with Hyprland";
nixConfig = {
extra-substituters = [ "https://attic.mildlyfunctional.gay/nixbsd" ];
extra-trusted-public-keys = [ "nixbsd:gwcQlsUONBLrrGCOdEboIAeFq9eLaDqfhfXmHZs1mgc=" ];
};
inputs = {
nixpkgs.url = "nixpkgs/nixos-unstable";
nix-cachyos-kernel = {
url = "github:xddxdd/nix-cachyos-kernel?shallow=1";
};
sops-nix = {
url = "github:Mic92/sops-nix?shallow=1";
inputs.nixpkgs.follows = "nixpkgs";
};
noctalia = {
url = "github:noctalia-dev/noctalia-shell?shallow=1";
inputs.nixpkgs.follows = "nixpkgs";
};
steam-config-nix = {
url = "github:different-name/steam-config-nix?shallow=1";
inputs.nixpkgs.follows = "nixpkgs";
};
home-manager = {
url = "github:nix-community/home-manager?shallow=1";
inputs.nixpkgs.follows = "nixpkgs";
};
prismlauncher = {
url = "github:PrismLauncher/PrismLauncher?shallow=1";
inputs.nixpkgs.follows = "nixpkgs";
};
nix-bwrapper = {
url = "github:Naxdy/nix-bwrapper?shallow=1";
inputs.nixpkgs.follows = "nixpkgs";
};
opencode-flake = {
url = "github:AodhanHayter/opencode-flake?shallow=1";
inputs.nixpkgs.follows = "nixpkgs";
};
lanzaboote = {
url = "github:nix-community/lanzaboote?shallow=1";
inputs.nixpkgs.follows = "nixpkgs";
};
niri = {
url = "github:YaLTeR/niri?shallow=1";
inputs.nixpkgs.follows = "nixpkgs";
};
mcp-nixos = {
url = "github:utensils/mcp-nixos?shallow=1";
inputs.nixpkgs.follows = "nixpkgs";
};
impermanence = {
url = "github:nix-community/impermanence?shallow=1";
inputs.nixpkgs.follows = "nixpkgs";
};
nixflix = {
url = "github:kiriwalawren/nixflix";
inputs.nixpkgs.follows = "nixpkgs";
};
catppuccin.url = "github:catppuccin/nix";
catppuccin-userstyles = {
url = "github:catppuccin/userstyles";
flake = false;
};
nixvim = {
url = "github:nix-community/nixvim?shallow=1";
inputs.nixpkgs.follows = "nixpkgs";
};
cosmic-manager = {
url = "github:HeitorAugustoLN/cosmic-manager";
inputs.nixpkgs.follows = "nixpkgs";
inputs.home-manager.follows = "home-manager";
};
nix-flatpak.url = "github:gmodena/nix-flatpak";
arkenfox = {
url = "github:dwarfmaster/arkenfox-nixos";
inputs.nixpkgs.follows = "nixpkgs";
};
firefox-addons = {
url = "gitlab:rycee/nur-expressions";
inputs.nixpkgs.follows = "nixpkgs";
};
nixbsd = {
url = "github:nixos-bsd/nixbsd";
inputs.nixpkgs.follows = "nixpkgs";
};
};
outputs =
{
self,
nixpkgs,
home-manager,
noctalia,
lanzaboote,
niri,
cosmic-manager,
nixflix,
arkenfox,
firefox-addons,
nixbsd,
...
}@inputs:
{
# Expose reusable NixOS modules for others to import
nixosModules = {
security = import ./modules/nixos/security.nix;
kernelHardening = import ./modules/nixos/kernel-hardening.nix;
secureBoot = import ./modules/nixos/secure-boot.nix;
dnsOverTls = import ./modules/nixos/dns-over-tls.nix;
cloudflareFirewall = import ./modules/nixos/cloudflare-firewall.nix;
podman = import ./modules/nixos/podman.nix;
browserVpn = import ./modules/nixos/browser-vpn.nix;
default = import ./modules;
};
# Expose reusable Home Manager modules
homeManagerModules = {
hyprlandCatppuccin = import ./modules/home-manager/hyprland-catppuccin.nix;
gluetunUser = import ./modules/home-manager/gluetun-user.nix;
qbittorrentVpn = import ./modules/home-manager/qbittorrent-vpn.nix;
browserContainerUpdate = import ./modules/home-manager/browser-container-update.nix;
protonCachyosUpdater = import ./modules/home-manager/proton-cachyos-updater.nix;
default = import ./modules/home-manager;
};
nixosConfigurations.nixbsd = nixbsd.lib.nixbsdSystem {
specialArgs = { inherit inputs; };
modules = [
./hosts/nixbsd/configuration.nix
];
};
nixosConfigurations.nixbsd-vm = nixbsd.lib.nixbsdSystem {
specialArgs = { inherit inputs; };
modules = [
./hosts/nixbsd/configuration.nix
({ config, ... }: {
# Enable VM variant
# This is already in configuration.nix but we can make it explicit here if we want.
})
];
};
nixosConfigurations.nixos = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
specialArgs = { inherit inputs; };
modules = [
./hosts/nixos/configuration.nix
./modules # Import all system modules
inputs.sops-nix.nixosModules.sops
inputs.nixflix.nixosModules.default
home-manager.nixosModules.home-manager
inputs.catppuccin.nixosModules.catppuccin
inputs.nixvim.nixosModules.nixvim
inputs.nix-flatpak.nixosModules.nix-flatpak
{
home-manager = {
extraSpecialArgs = { inherit inputs; };
sharedModules = [
inputs.cosmic-manager.homeManagerModules.cosmic-manager
inputs.arkenfox.homeManagerModules.arkenfox
];
useGlobalPkgs = true;
useUserPackages = true;
backupFileExtension = "backup";
users.ashie = import ./hosts/nixos/home.nix;
};
}
./modules/nixos/impermanence.nix
];
};
nixosConfigurations.impermanence = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
specialArgs = { inherit inputs; };
modules = [
./hosts/nixos/configuration.nix
./modules
inputs.sops-nix.nixosModules.sops
inputs.nixflix.nixosModules.default
home-manager.nixosModules.home-manager
inputs.catppuccin.nixosModules.catppuccin
inputs.nixvim.nixosModules.nixvim
{
home-manager = {
extraSpecialArgs = { inherit inputs; };
sharedModules = [
inputs.cosmic-manager.homeManagerModules.cosmic-manager
inputs.arkenfox.homeManagerModules.arkenfox
];
useGlobalPkgs = true;
useUserPackages = true;
backupFileExtension = "backup";
users.ashie = import ./hosts/nixos/home.nix;
};
}
./modules/nixos/impermanence.nix
];
};
};
}