blob: 8d078c3c838edd49a22799fd4a374b1fc5af5847 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
|
{
description = "getchoo's nix expressions";
nixConfig = {
extra-substituters = [ "https://getchoo.cachix.org" ];
extra-trusted-public-keys = [ "getchoo.cachix.org-1:ftdbAUJVNaFonM0obRGgR5+nUmdLMM+AOvDOSx0z5tE=" ];
};
inputs.nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
outputs =
{
self,
nixpkgs,
}:
let
inherit (nixpkgs) lib;
# Support all systems exported by Nixpkgs
systems = lib.systems.flakeExposed;
# But separate our primarily supported systems
tier1Systems = with lib.platforms; lib.intersectLists (aarch64 ++ aarch64) (darwin ++ linux);
forAllSystems = lib.genAttrs systems;
forTier1Systems = lib.genAttrs tier1Systems;
nixpkgsFor = nixpkgs.legacyPackages;
in
{
checks = forTier1Systems (
system:
let
pkgs = nixpkgsFor.${system};
mkCheck =
name: deps: script:
pkgs.runCommand name { nativeBuildInputs = deps; } script;
in
{
deadnix = mkCheck "check-deadnix" [ pkgs.deadnix ] "deadnix --fail ${self}";
nixfmt = mkCheck "check-nixfmt" [ pkgs.nixfmt-rfc-style ] "nixfmt --check ${self}";
statix = mkCheck "check-statix" [ pkgs.statix ] "statix check ${self}";
}
);
packages = forAllSystems (
system:
let
pkgs = nixpkgsFor.${system};
isAvailable = lib.meta.availableOn { inherit system; };
pkgs' = lib.filterAttrs (lib.const isAvailable) (import ./default.nix { inherit pkgs; });
in
pkgs' // { default = pkgs'.treefetch or pkgs.emptyFile; }
);
formatter = forTier1Systems (system: nixpkgsFor.${system}.nixfmt-rfc-style);
templates =
let
toTemplate = name: description: {
path = ./templates + "/${name}";
inherit description;
};
in
lib.mapAttrs toTemplate {
standard = "Minimal boilerplate for my Flakes";
nixos = "Minimal boilerplate for a Flake-based NixOS configuration";
};
};
}
|