summaryrefslogtreecommitdiff
path: root/flake.nix
blob: 7bb62bd33480b638ff82a11932b291a5288976f8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
{
  description = "getchoo's nix expressions";

  nixConfig = {
    extra-substituters = [ "https://getchoo.cachix.org" ];
    extra-trusted-public-keys = [ "getchoo.cachix.org-1:ftdbAUJVNaFonM0obRGgR5+nUmdLMM+AOvDOSx0z5tE=" ];
  };

  inputs.nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";

  outputs =
    {
      self,
      nixpkgs,
    }:
    let
      inherit (nixpkgs) lib;

      # Support all systems exported by Nixpkgs
      systems = lib.systems.flakeExposed;
      # But separate our primarily supported systems
      tier1Systems = with lib.platforms; lib.intersectLists (aarch64 ++ aarch64) (darwin ++ linux);

      forAllSystems = lib.genAttrs systems;
      forTier1Systems = lib.genAttrs tier1Systems;
      nixpkgsFor = nixpkgs.legacyPackages;

      mkModule =
        {
          name,
          type,
          imports,
          ...
        }@args:
        {
          _file = "${self.outPath}/flake.nix#${type}Modules.${name}";
          inherit imports;
        }
        // lib.removeAttrs args [
          "name"
          "type"
        ];
    in
    {
      checks = forTier1Systems (
        system:
        let
          pkgs = nixpkgsFor.${system};

          mkCheck =
            name: deps: script:
            pkgs.runCommand name { nativeBuildInputs = deps; } script;
        in
        {
          deadnix = mkCheck "check-deadnix" [ pkgs.deadnix ] "deadnix --fail ${self}";
          nixfmt = mkCheck "check-nixfmt" [ pkgs.nixfmt-rfc-style ] "nixfmt --check ${self}";
          statix = mkCheck "check-statix" [ pkgs.statix ] "statix check ${self}";
        }
      );

      packages = forAllSystems (
        system:
        let
          pkgs = nixpkgsFor.${system};

          isAvailable = lib.meta.availableOn { inherit system; };
          pkgs' = lib.filterAttrs (lib.const isAvailable) (import ./default.nix { inherit pkgs; });
        in
        pkgs' // { default = pkgs'.treefetch or pkgs.emptyFile; }
      );

      flakeModules = {
        checks = mkModule {
          name = "checks";
          type = "flake";
          imports = [ ./modules/flake/checks.nix ];
          key = "${self.outPath}/flake.nix#flakeModules.checks";
          _class = "flake";
        };

        configs = mkModule {
          name = "configs";
          type = "flake";
          imports = [ ./modules/flake/configs.nix ];
          key = "${self.outPath}/flake.nix#flakeModules.configs";
          _class = "flake";
        };
      };

      homeModules = {
        riff = mkModule {
          name = "riff";
          type = "home";
          imports = [ ./modules/home/riff.nix ];
        };
      };

      formatter = forTier1Systems (system: nixpkgsFor.${system}.nixfmt-rfc-style);

      templates =
        let
          toTemplate = name: description: {
            path = ./templates + "/${name}";
            inherit description;
          };
        in
        lib.mapAttrs toTemplate {
          standard = "Minimal boilerplate for my Flakes";
          nixos = "Minimal boilerplate for a Flake-based NixOS configuration";
        };
    };
}