blob: 7bb62bd33480b638ff82a11932b291a5288976f8 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
|
{
description = "getchoo's nix expressions";
nixConfig = {
extra-substituters = [ "https://getchoo.cachix.org" ];
extra-trusted-public-keys = [ "getchoo.cachix.org-1:ftdbAUJVNaFonM0obRGgR5+nUmdLMM+AOvDOSx0z5tE=" ];
};
inputs.nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
outputs =
{
self,
nixpkgs,
}:
let
inherit (nixpkgs) lib;
# Support all systems exported by Nixpkgs
systems = lib.systems.flakeExposed;
# But separate our primarily supported systems
tier1Systems = with lib.platforms; lib.intersectLists (aarch64 ++ aarch64) (darwin ++ linux);
forAllSystems = lib.genAttrs systems;
forTier1Systems = lib.genAttrs tier1Systems;
nixpkgsFor = nixpkgs.legacyPackages;
mkModule =
{
name,
type,
imports,
...
}@args:
{
_file = "${self.outPath}/flake.nix#${type}Modules.${name}";
inherit imports;
}
// lib.removeAttrs args [
"name"
"type"
];
in
{
checks = forTier1Systems (
system:
let
pkgs = nixpkgsFor.${system};
mkCheck =
name: deps: script:
pkgs.runCommand name { nativeBuildInputs = deps; } script;
in
{
deadnix = mkCheck "check-deadnix" [ pkgs.deadnix ] "deadnix --fail ${self}";
nixfmt = mkCheck "check-nixfmt" [ pkgs.nixfmt-rfc-style ] "nixfmt --check ${self}";
statix = mkCheck "check-statix" [ pkgs.statix ] "statix check ${self}";
}
);
packages = forAllSystems (
system:
let
pkgs = nixpkgsFor.${system};
isAvailable = lib.meta.availableOn { inherit system; };
pkgs' = lib.filterAttrs (lib.const isAvailable) (import ./default.nix { inherit pkgs; });
in
pkgs' // { default = pkgs'.treefetch or pkgs.emptyFile; }
);
flakeModules = {
checks = mkModule {
name = "checks";
type = "flake";
imports = [ ./modules/flake/checks.nix ];
key = "${self.outPath}/flake.nix#flakeModules.checks";
_class = "flake";
};
configs = mkModule {
name = "configs";
type = "flake";
imports = [ ./modules/flake/configs.nix ];
key = "${self.outPath}/flake.nix#flakeModules.configs";
_class = "flake";
};
};
homeModules = {
riff = mkModule {
name = "riff";
type = "home";
imports = [ ./modules/home/riff.nix ];
};
};
formatter = forTier1Systems (system: nixpkgsFor.${system}.nixfmt-rfc-style);
templates =
let
toTemplate = name: description: {
path = ./templates + "/${name}";
inherit description;
};
in
lib.mapAttrs toTemplate {
standard = "Minimal boilerplate for my Flakes";
nixos = "Minimal boilerplate for a Flake-based NixOS configuration";
};
};
}
|