-
Notifications
You must be signed in to change notification settings - Fork 43
Expand file tree
/
Copy pathflake.nix
More file actions
82 lines (66 loc) · 3.23 KB
/
flake.nix
File metadata and controls
82 lines (66 loc) · 3.23 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
{
description = "nix system configurations";
nixConfig = {
extra-substituters = [
# "https://cache.kclj.io/kclejeune"
"https://kclejeune.cachix.org"
"https://cache.garnix.io"
"https://install.determinate.systems"
"https://noctalia.cachix.org"
];
extra-trusted-public-keys = [
# "kclejeune:u0sa4anVXC4bKlzEsijdSlLyWVaEkApu6KWyDbbJMkk="
"kclejeune.cachix.org-1:fOCrECygdFZKbMxHClhiTS6oowOkJ/I/dh9q9b1I4ko="
"cache.garnix.io:CTFPyKSLcx5RMJKfLo5EEPUObbA78b0YQ2DTCJXqr9g="
"cache.flakehub.com-3:hJuILl5sVK4iKm86JzgdXW12Y2Hwd5G07qKtHTOcDCM="
"noctalia.cachix.org-1:pCOR47nnMEo5thcxNDtzWpOxNFQsBRglJzxWPp3dkU4="
];
};
inputs = {
determinate.url = "https://flakehub.com/f/DeterminateSystems/determinate/3";
stable.url = "github:nixos/nixpkgs/nixos-25.11";
unstable.url = "github:nixos/nixpkgs/nixpkgs-unstable";
nixos-unstable.url = "github:nixos/nixpkgs/nixos-unstable";
nixos-hardware.url = "github:nixos/nixos-hardware";
nixpkgs.follows = "unstable";
# NOTE: Don't override ANY inputs for attic - it requires specific versions
# with compatible C++ bindings. nixpkgs-unstable has nix 2.31+ which has
# breaking API changes (nix::openStore, nix::settings removed).
attic.url = "github:kclejeune/attic?ref=kcl/worker-impl";
nh.url = "github:nix-community/nh";
nh.inputs.nixpkgs.follows = "unstable";
flake-compat.url = "github:nix-community/flake-compat";
flake-parts.url = "github:hercules-ci/flake-parts";
import-tree.url = "github:vic/import-tree";
treefmt-nix.url = "github:numtide/treefmt-nix";
treefmt-nix.inputs.nixpkgs.follows = "nixpkgs";
git-hooks.url = "github:cachix/git-hooks.nix";
git-hooks.inputs.nixpkgs.follows = "nixpkgs";
git-hooks.inputs.flake-compat.follows = "flake-compat";
nixGL.url = "github:nix-community/nixGL";
nixGL.inputs.nixpkgs.follows = "nixpkgs";
darwin.url = "github:lnl7/nix-darwin";
darwin.inputs.nixpkgs.follows = "nixpkgs";
home-manager.url = "github:nix-community/home-manager";
home-manager.inputs.nixpkgs.follows = "nixpkgs";
nix-index-database.url = "github:Mic92/nix-index-database";
nix-index-database.inputs.nixpkgs.follows = "nixpkgs";
sops-nix.url = "github:Mic92/sops-nix";
sops-nix.inputs.nixpkgs.follows = "nixpkgs";
disko.url = "github:nix-community/disko";
disko.inputs.nixpkgs.follows = "nixpkgs";
# Noctalia Wayland desktop shell (bar, notifications, launcher, lock,
# idle, OSD, wallpaper, night-light). Tracks nixos-unstable since it
# depends on the latest Quickshell.
#
# Pinned to our fork's `kcl/restart-auth-support` branch for the
# `lockScreen.restartAuth` IPC handler used by `lock-before-sleep`'s
# ExecStop in modules/nixos/hyprland.nix — required so pam_fprintd's
# stale Verify session (post-USB-resume) gets restarted and fingerprint
# scanning works on the first try after suspend. Revert to upstream
# once the change is merged.
noctalia.url = "github:kclejeune/noctalia-shell/kcl/restart-auth-support";
noctalia.inputs.nixpkgs.follows = "nixos-unstable";
};
outputs = inputs: inputs.flake-parts.lib.mkFlake { inherit inputs; } (inputs.import-tree ./modules);
}