forked from nix-community/NixOS-WSL
-
Notifications
You must be signed in to change notification settings - Fork 0
/
flake.nix
128 lines (113 loc) · 3.85 KB
/
flake.nix
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
{
description = "NixOS WSL";
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.05";
flake-utils.url = "github:numtide/flake-utils";
flake-compat = {
url = "github:edolstra/flake-compat";
flake = false;
};
};
outputs = inputs@{ self, nixpkgs, flake-utils, ... }:
with nixpkgs.lib;
{
nixosModules.wsl = {
imports = [
./modules
(_: {
wsl.version.rev = mkIf (self ? rev) self.rev;
})
];
};
nixosModules.default = self.nixosModules.wsl;
nixosConfigurations =
let
config = { legacy ? false }: { config, lib, pkgs, ... }: {
wsl.enable = true;
wsl.nativeSystemd = lib.mkIf legacy false;
programs.bash.loginShellInit = "nixos-wsl-welcome";
# When the config is built from a flake, the NIX_PATH entry of nixpkgs is set to its flake version.
# Per default the resulting systems aren't flake-enabled, so rebuilds would fail.
# Note: This does not affect the module being imported into your own flake.
nixpkgs.flake.source = lib.mkForce null;
systemd.tmpfiles.rules =
let
channels = pkgs.runCommand "default-channels" { } ''
mkdir -p $out
ln -s ${pkgs.path} $out/nixos
ln -s ${./.} $out/nixos-wsl
'';
in
[
"L /nix/var/nix/profiles/per-user/root/channels-1-link - - - - ${channels}"
"L /nix/var/nix/profiles/per-user/root/channels - - - - channels-1-link"
];
system.stateVersion = config.system.nixos.release;
};
in
rec {
default = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
self.nixosModules.default
(config { })
];
};
aarch64 = nixpkgs.lib.nixosSystem {
system = "aarch64-linux";
modules = [
self.nixosModules.default
(config { })
];
};
modern = nixpkgs.lib.warn "nixosConfigurations.modern has been renamed to nixosConfigurations.default" default;
legacy = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
self.nixosModules.default
(config { legacy = true; })
];
};
};
} //
flake-utils.lib.eachSystem
[ "x86_64-linux" "aarch64-linux" ]
(system:
let
pkgs = import nixpkgs { inherit system; };
in
{
checks =
let
args = { inherit inputs; };
in
{
dotnet-format = pkgs.callPackage ./checks/dotnet-format.nix args;
nixpkgs-fmt = pkgs.callPackage ./checks/nixpkgs-fmt.nix args;
shfmt = pkgs.callPackage ./checks/shfmt.nix args;
rustfmt = pkgs.callPackage ./checks/rustfmt.nix args;
side-effects = pkgs.callPackage ./checks/side-effects.nix args;
username = pkgs.callPackage ./checks/username.nix args;
test-native-utils = self.packages.${system}.utils;
};
packages = {
utils = pkgs.callPackage ./utils { };
staticUtils = pkgs.pkgsStatic.callPackage ./utils { };
docs = pkgs.callPackage ./docs { };
};
devShells.default = pkgs.mkShell {
RUST_SRC_PATH = "${pkgs.rust.packages.stable.rustPlatform.rustLibSrc}";
nativeBuildInputs = with pkgs; [
cargo
clippy
mdbook
nixpkgs-fmt
powershell
rustc
rustfmt
shfmt
];
};
}
);
}