{
  description = "System configuration";

  inputs = {
    flake-parts.url = "github:hercules-ci/flake-parts";
    nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
    nixpkgs-master.url = "github:nixos/nixpkgs/master";
    nixpkgs-stable.url = "github:nixos/nixpkgs/nixos-24.11";
    flake-registry = {
      url = "github:nixos/flake-registry";
      flake = false;
    };
    home-manager = {
      url = "github:nix-community/home-manager";
      inputs.nixpkgs.follows = "nixpkgs";
    };
    impermanence.url = "github:nix-community/impermanence";
    lix-module = {
      url = "https://git.lix.systems/lix-project/nixos-module/archive/2.91.1-2.tar.gz";
      inputs.nixpkgs.follows = "nixpkgs";
    };
    aagl = {
      url = "github:ezKEa/aagl-gtk-on-nix";
      inputs.nixpkgs.follows = "nixpkgs";
    };
    # ataraxiasjel-nur.url = "/home/ataraxia/projects/nur";
    ataraxiasjel-nur.url = "github:AtaraxiaSjel/nur";
    attic.url = "github:zhaofengli/attic";
    base16.url = "github:AtaraxiaSjel/base16-nix";
    base16-tokyonight-scheme = {
      url = "github:AtaraxiaSjel/base16-tokyonight-scheme";
      flake = false;
    };
    cassowary = {
      url = "github:AtaraxiaSjel/cassowary";
      inputs.nixpkgs.follows = "nixpkgs";
    };
    catppuccin.url = "github:catppuccin/nix";
    catppuccin-vsc.url = "github:catppuccin/vscode";
    deploy-rs.url = "github:serokell/deploy-rs";
    disko = {
      url = "github:nix-community/disko";
      inputs.nixpkgs.follows = "nixpkgs";
    };
    hyprland = {
      url = "github:hyprwm/Hyprland";
      # url = "git+https://github.com/hyprwm/Hyprland?submodules=1";
      # inputs.nixpkgs.follows ="nixpkgs";
    };
    mms.url = "github:mkaito/nixos-modded-minecraft-servers";
    nix-alien = {
      url = "github:thiagokokada/nix-alien";
      inputs.nixpkgs.follows = "nixpkgs";
    };
    nix-direnv.url = "github:nix-community/nix-direnv";
    nix-fast-build = {
      url = "github:Mic92/nix-fast-build";
      inputs.nixpkgs.follows = "nixpkgs";
    };
    nix-vscode-marketplace = {
      url = "github:nix-community/nix-vscode-extensions";
      inputs.nixpkgs.follows = "nixpkgs";
    };
    nixos-generators = {
      url = "github:nix-community/nixos-generators";
      inputs.nixpkgs.follows = "nixpkgs";
    };
    prismlauncher.url = "github:AtaraxiaSjel/PrismLauncher/develop";
    sops-nix = {
      url = "github:Mic92/sops-nix";
      inputs.nixpkgs.follows = "nixpkgs";
    };
    srvos = {
      url = "github:nix-community/srvos";
      inputs.nixpkgs.follows = "nixpkgs";
    };

    chaotic.url = "github:chaotic-cx/nyx/nyxpkgs-unstable";
  };

  outputs = inputs: inputs.flake-parts.lib.mkFlake { inherit inputs; } (
    { self, inputs, withSystem, ... }:
      let
        findModules = dir:
          builtins.concatLists (
            builtins.attrValues (
              builtins.mapAttrs (name: type:
                if type == "regular" then [
                  {
                    name = builtins.elemAt (builtins.match "(.*)\\.nix" name) 0;
                    value = dir + "/${name}";
                  }
                ] else if (builtins.readDir (dir + "/${name}")) ? "default.nix" then [
                  {
                    inherit name;
                    value = dir + "/${name}";
                  }
                ]
                else findModules (dir + "/${name}")
              ) (builtins.readDir dir)
            )
          );

        # Patch nixpkgs
        nixpkgs-patched = n: p:
          (import n { system = "x86_64-linux"; }).pkgs.applyPatches {
            name = if n ? shortRev then "nixpkgs-patched-${n.shortRev}" else "nixpkgs-patched";
            src = n;
            patches = p;
          };
        # Get nixosSystem func from patched nixpkgs
        nixosSystem = n: import (n + "/nixos/lib/eval-config.nix");
        # Make host config
        mkHost = name: nixosSystem: self-nixpkgs:
          nixosSystem {
            system = builtins.readFile (./machines + "/${name}/system");
            modules = builtins.attrValues self.customModules ++ [
              (import (./machines + "/${name}"))
              { device = name; mainuser = "ataraxia"; }
              { nixpkgs.config.allowUnfree = true; }
              { sops.age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ]; }
              inputs.sops-nix.nixosModules.sops
              inputs.lix-module.nixosModules.default
            ];
            specialArgs = { inherit self inputs self-nixpkgs; secretsDir = ./secrets; };
          };

        patchesPath = map (x: ./patches + "/${x}");
      in {
        imports = [ ];
        systems = [ "x86_64-linux" ];

        perSystem = { pkgs, self', ... }: {
          devShells.default = let
            rebuild = pkgs.writeShellScriptBin "rebuild" ''
              [[ -n "$1" ]] && doas nixos-rebuild --flake . $@
            '';
            upgrade = pkgs.writeShellScriptBin "upgrade" ''
              cp flake.lock flake.lock.bak && nix flake update
              [[ "$1" == "zfs" ]] && ./scripts/gen-patch-zen.sh
            '';
          in pkgs.mkShell {
            name = "aliases";
            packages = [
              rebuild upgrade
            ] ++ builtins.attrValues {
              inherit (pkgs) nixfmt-rfc-style statix deadnix git deploy-rs sops;
            };
          };

          packages = {
            Flakes-ISO = inputs.nixos-generators.nixosGenerate {
              system = "x86_64-linux";
              modules = [
                (import (./machines/Flakes-ISO))
                { device = "Flakes-ISO"; mainuser = "ataraxia"; }
                ./machines/AMD-Workstation/autoinstall.nix
                ./machines/Dell-Laptop/autoinstall.nix
                self.customModules.autoinstall
              ];
              specialArgs = { inherit inputs; };
              format = "install-iso";
            };
          };
        };

        flake = let
          unstable-nixpkgs = nixpkgs-patched inputs.nixpkgs unstable-patches;
          stable-nixpkgs = nixpkgs-patched inputs.nixpkgs-stable stable-patches;
          unstable-system = nixosSystem unstable-nixpkgs;
          stable-system = nixosSystem stable-nixpkgs;

          shared-patches = patchesPath [ ];
          unstable-patches = shared-patches ++ patchesPath [
            # "netbird-24.11.patch"
            "onlyoffice.patch"
            # "zen-kernels.patch"
          ];
          stable-patches = shared-patches ++ patchesPath [];
        in {
          customModules = builtins.listToAttrs (findModules ./modules);
          customProfiles = builtins.listToAttrs (findModules ./profiles);
          customRoles = import ./roles;
          secretsDir = ./secrets;
          inherit unstable-nixpkgs;

          nixosConfigurations = withSystem "x86_64-linux" ({ ... }:
            {
              AMD-Workstation = mkHost "AMD-Workstation" unstable-system unstable-nixpkgs;
              Dell-Laptop     = mkHost "Dell-Laptop"     unstable-system unstable-nixpkgs;
              Home-Hypervisor = mkHost "Home-Hypervisor" unstable-system unstable-nixpkgs;
              NixOS-RO-VPS    = mkHost "NixOS-RO-VPS"    stable-system   stable-nixpkgs;
              NixOS-FI-VPS    = mkHost "NixOS-FI-VPS"    unstable-system unstable-nixpkgs;
            }
          );

          packages.x86_64-linux = {
            NixOS-VM = inputs.nixos-generators.nixosGenerate {
              system = "x86_64-linux";
              modules = builtins.attrValues self.customModules ++ [
                (import (./machines/NixOS-VM))
                { device = "NixOS-VM"; mainuser = "ataraxia"; }
                { nixpkgs.config.allowUnfree = true; }
                inputs.sops-nix.nixosModules.sops
              ];
              specialArgs = {
                inherit self inputs;
                secrets = ./secrets;
                self-nixpkgs = unstable-nixpkgs;
              };
              nixosSystem = unstable-system;
              format = "vm";
            };
          };

          deploy.nodes = withSystem "x86_64-linux" ({ ... }:
            let
              pkgs = inputs.nixpkgs.legacyPackages.x86_64-linux;
              deployPkgs = import inputs.nixpkgs {
                system = "x86_64-linux";
                overlays = [
                  inputs.deploy-rs.overlay
                  (self: super: { deploy-rs = { inherit (pkgs) deploy-rs; lib = super.deploy-rs.lib; }; })
                ];
              };
              mkDeploy = name: conf: {
                profiles.system = {
                  sshUser = "deploy";
                  user = "root";
                  sudo = "doas -u";
                  fastConnection = true;
                  remoteBuild = false;
                  path = deployPkgs.deploy-rs.lib.activate.nixos self.nixosConfigurations.${name};
                };
              } // conf;
            in builtins.mapAttrs mkDeploy {
              Home-Hypervisor = { hostname = "10.10.10.10"; };
              Dell-Laptop = { hostname = "10.10.10.101"; };
              NixOS-VPS = { hostname = "45.135.180.193"; };
              NixOS-RO-VPS = { hostname = "45.134.48.174"; };
              NixOS-FI-VPS = { hostname = "104.164.54.197"; };
            }
          );

          checks = builtins.mapAttrs (system: deployLib:
            deployLib.deployChecks self.deploy
          ) inputs.deploy-rs.lib;
        };
      }
  );
}