about summary refs log tree commit diff
diff options
context:
space:
mode:
authorAzat Bahawi <azat@bahawi.net>2024-04-09 10:04:57 +0300
committerAzat Bahawi <azat@bahawi.net>2024-04-09 10:04:57 +0300
commit493fb0d2d7acbfee929d0525ae95a1f36cdf43a9 (patch)
tree0dc184ad983e13403d4a1c6643512bb4f49bffda
parent2024-04-01 (diff)
2024-04-09
-rw-r--r--.editorconfig38
-rw-r--r--.prettierignore2
-rw-r--r--.typos.toml7
-rw-r--r--Taskfile.dist.yml2
-rw-r--r--checks.nix26
-rw-r--r--darwinConfigurations/mairon/default.nix53
-rw-r--r--flake.lock78
-rw-r--r--flake.nix20
-rw-r--r--modules/common/common/nix.nix6
-rw-r--r--modules/nixos/common/users.nix10
-rw-r--r--nixosConfigurations/default.nix28
11 files changed, 150 insertions, 120 deletions
diff --git a/.editorconfig b/.editorconfig
new file mode 100644
index 0000000..322d04f
--- /dev/null
+++ b/.editorconfig
@@ -0,0 +1,38 @@
+root=true
+
+[*]
+charset=utf-8
+end_of_line=lf
+indent_size=2
+indent_style=space
+insert_final_newline=true
+max_line_length=80
+trim_trailing_whitespace=true
+
+[*.nix]
+indent_size=2
+indent_style=space
+
+[*.py]
+indent_size=4
+indent_style=space
+
+[*.{json,jsn}]
+indent_size=2
+indent_style=space
+
+[*.{lisp,cl,rkt,scm,el}]
+indent_size=2
+indent_style=space
+
+[*.{sh,bash}]
+indent_size=2
+indent_style=space
+
+[*.{toml,tml}]
+indent_size=2
+indent_style=space
+
+[*.{yaml,yml}]
+indent_size=2
+indent_style=space
diff --git a/.prettierignore b/.prettierignore
new file mode 100644
index 0000000..427ec30
--- /dev/null
+++ b/.prettierignore
@@ -0,0 +1,2 @@
+*.json
+/flake.lock
diff --git a/.typos.toml b/.typos.toml
deleted file mode 100644
index d82a6e2..0000000
--- a/.typos.toml
+++ /dev/null
@@ -1,7 +0,0 @@
-[default.extend-identifiers]
-gud = "gud"
-iterm2 = "iterm2"
-openpgp4fpr= "openpgp4fpr"
-
-[files]
-extend-exclude = ["**/hidden.nix", "secrets/*"]
diff --git a/Taskfile.dist.yml b/Taskfile.dist.yml
index e0e8240..18c2c86 100644
--- a/Taskfile.dist.yml
+++ b/Taskfile.dist.yml
@@ -1,5 +1,5 @@
 ---
-version: '3'
+version: "3"
 
 tasks:
   update-firefox-addons:
diff --git a/checks.nix b/checks.nix
index f9949e3..1bb454c 100644
--- a/checks.nix
+++ b/checks.nix
@@ -1,5 +1,4 @@
 { inputs, system }:
-with inputs.nixpkgs.lib;
 let
   pkgs = inputs.self.legacyPackages.${system};
 in
@@ -14,24 +13,6 @@ in
         enable = true;
         package = pkgs.nixfmt;
       };
-      deadnix = {
-        enable = true;
-        settings.edit = true;
-      };
-      editorconfig-checker.enable = true;
-      prettier = {
-        enable = true;
-        types_or = mkForce [ "css" ];
-      };
-      shellcheck.enable = true;
-      shfmt.enable = true;
-      statix.enable = true;
-      typos = {
-        enable = true;
-        types = [ "text" ];
-        pass_filenames = false;
-      };
-      yamllint.enable = true;
       promtool = {
         enable = true;
         name = "promtool";
@@ -39,6 +20,13 @@ in
         entry = "${pkgs.prometheus.cli}/bin/promtool check rules";
         files = "(?x)^(modules/nixos/monitoring/rules/.*\.yaml)$";
       };
+      deadnix.enable = true;
+      editorconfig-checker.enable = true;
+      prettier.enable = true;
+      shellcheck.enable = true;
+      shfmt.enable = true;
+      statix.enable = true;
+      yamllint.enable = true;
     };
   };
 }
diff --git a/darwinConfigurations/mairon/default.nix b/darwinConfigurations/mairon/default.nix
index b9e7474..a004d1d 100644
--- a/darwinConfigurations/mairon/default.nix
+++ b/darwinConfigurations/mairon/default.nix
@@ -8,35 +8,42 @@ with lib;
 {
   nixfiles.modules.zathura.enable = mkForce false;
 
-  hm.home.packages = with pkgs; [
-    cocoapods
-    ruby
-  ];
+  hm = {
+    home.packages = with pkgs; [
+      cocoapods
+      ruby
+    ];
+
+    programs.bash.initExtra = mkAfter ''
+      if [ -f "$HOME/.orbstack/shell/init.bash" ]; then
+        source "$HOME/.orbstack/shell/init.bash"
+      fi
+    '';
+  };
 
   homebrew = {
     taps = [ { name = "kreuzwerker/homebrew-taps"; } ];
     brews = [
-      { name = "carthage"; }
-      { name = "go@1.21"; }
-      { name = "m1-terraform-provider-helper"; } # kreuzwerker/homebrew-taps
-      { name = "podman"; }
-      { name = "sourcery"; }
-      { name = "xcbeautify"; }
-      { name = "xcodegen"; }
-      { name = "xcodes"; }
+      {name = "carthage";}
+      {name = "go@1.22";}
+      {name = "m1-terraform-provider-helper";} # kreuzwerker/homebrew-taps
+      {name = "sourcery";}
+      {name = "xcbeautify";}
+      {name = "xcodegen";}
+      {name = "xcodes";}
     ];
     casks = [
-      { name = "burp-suite"; }
-      { name = "docker"; }
-      { name = "jetbrains-toolbox"; }
-      { name = "krita"; }
-      { name = "obs"; }
-      { name = "openlens"; }
-      { name = "podman-desktop"; }
-      { name = "shadowsocksx-ng"; }
-      { name = "vial"; }
-      { name = "vnc-viewer"; }
-      { name = "wireshark"; }
+      {name = "burp-suite";}
+      {name = "jetbrains-toolbox";}
+      {name = "krita";}
+      {name = "obs";}
+      {name = "openlens";}
+      {name = "orbstack";}
+      {name = "podman-desktop";}
+      {name = "shadowsocksx-ng";}
+      {name = "vial";}
+      {name = "vnc-viewer";}
+      {name = "wireshark";}
     ];
   };
 
diff --git a/flake.lock b/flake.lock
index 6767bd5..7483e81 100644
--- a/flake.lock
+++ b/flake.lock
@@ -16,11 +16,11 @@
         ]
       },
       "locked": {
-        "lastModified": 1707830867,
-        "narHash": "sha256-PAdwm5QqdlwIqGrfzzvzZubM+FXtilekQ/FA0cI49/o=",
+        "lastModified": 1712079060,
+        "narHash": "sha256-/JdiT9t+zzjChc5qQiF+jhrVhRt8figYH29rZO7pFe4=",
         "owner": "ryantm",
         "repo": "agenix",
-        "rev": "8cb01a0e717311680e0cbca06a76cbceba6f3ed6",
+        "rev": "1381a759b205dff7a6818733118d02253340fd5e",
         "type": "github"
       },
       "original": {
@@ -42,11 +42,11 @@
         ]
       },
       "locked": {
-        "lastModified": 1711312305,
-        "narHash": "sha256-n2I6qw6Lzcn2LqgDynUgWHd6i7fKMVos0JysmxW8xVU=",
+        "lastModified": 1712050237,
+        "narHash": "sha256-O4yrTNgnlx+WNS9Ha++veExncRmkX83mkywumjtPw3U=",
         "owner": "pinpox",
         "repo": "alertmanager-ntfy",
-        "rev": "fca24b84f276ef4b40e261cc32187d4e9b996191",
+        "rev": "c669b8701235d779fa7277008ccb617fc3d94538",
         "type": "github"
       },
       "original": {
@@ -420,11 +420,11 @@
         ]
       },
       "locked": {
-        "lastModified": 1711625603,
-        "narHash": "sha256-W+9dfqA9bqUIBV5u7jaIARAzMe3kTq/Hp2SpSVXKRQw=",
+        "lastModified": 1712462372,
+        "narHash": "sha256-WA3bbBWhd3o1wAgyHZNypjb/LG4oq+IWxFq8ey8yNPU=",
         "owner": "nix-community",
         "repo": "home-manager",
-        "rev": "c0ef0dab55611c676ad7539bf4e41b3ec6fa87d2",
+        "rev": "a561ad6ab38578c812cc9af3b04f2cc60ebf48c9",
         "type": "github"
       },
       "original": {
@@ -488,11 +488,11 @@
         ]
       },
       "locked": {
-        "lastModified": 1711761232,
-        "narHash": "sha256-3Lv+rfgD2uTMGe2fu3lojPxlspRrkA+RQCHdAPoO0sc=",
+        "lastModified": 1712539101,
+        "narHash": "sha256-SWWhUvpljUYEYSGvCArN90k0KXpzYybNCxVzzce2dys=",
         "owner": "Infinidoge",
         "repo": "nix-minecraft",
-        "rev": "02437b1efb9aac284c03692f8c3336a1e886446b",
+        "rev": "74add7a6ba3874d9896088cf120fb3e1551ede79",
         "type": "github"
       },
       "original": {
@@ -508,11 +508,11 @@
         ]
       },
       "locked": {
-        "lastModified": 1711249705,
-        "narHash": "sha256-h/NQECj6mIzF4XR6AQoSpkCnwqAM+ol4+qOdYi2ykmQ=",
+        "lastModified": 1712459390,
+        "narHash": "sha256-e12bNDottaGoBgd0AdH/bQvk854xunlWAdZwr/oHO1c=",
         "owner": "nix-community",
         "repo": "nix-index-database",
-        "rev": "34519f3bb678a5abbddf7b200ac5347263ee781b",
+        "rev": "4676d72d872459e1e3a248d049609f110c570e9a",
         "type": "github"
       },
       "original": {
@@ -523,11 +523,11 @@
     },
     "nixos-hardware": {
       "locked": {
-        "lastModified": 1711352745,
-        "narHash": "sha256-luvqik+i3HTvCbXQZgB6uggvEcxI9uae0nmrgtXJ17U=",
+        "lastModified": 1712566108,
+        "narHash": "sha256-c9nT2ZODGqobISP41kUwCQ84Srwg7a/1TmPFQuol2/8=",
         "owner": "NixOS",
         "repo": "nixos-hardware",
-        "rev": "9a763a7acc4cfbb8603bb0231fec3eda864f81c0",
+        "rev": "1e3b3a35b7083f4152f5a516798cf9b21e686465",
         "type": "github"
       },
       "original": {
@@ -538,11 +538,11 @@
     },
     "nixpkgs": {
       "locked": {
-        "lastModified": 1711715736,
-        "narHash": "sha256-9slQ609YqT9bT/MNX9+5k5jltL9zgpn36DpFB7TkttM=",
+        "lastModified": 1712573573,
+        "narHash": "sha256-xxon7WwNm4/EadMKg1eF40/5s0O78nXUy2ILZt6vT7E=",
         "owner": "NixOS",
         "repo": "nixpkgs",
-        "rev": "807c549feabce7eddbf259dbdcec9e0600a0660d",
+        "rev": "0d28066770464d19d637f6e8e42e8688420b6ac6",
         "type": "github"
       },
       "original": {
@@ -554,11 +554,11 @@
     },
     "nixpkgs-master": {
       "locked": {
-        "lastModified": 1711793261,
-        "narHash": "sha256-v1KGar+L1wB0nFum4AheIfxuSy/QWGshp5InteL/qz4=",
+        "lastModified": 1712612676,
+        "narHash": "sha256-ccfthr2twjsERX5gd1MEp7YOvyGdkCFhJ+/2ICDDKMw=",
         "owner": "NixOS",
         "repo": "nixpkgs",
-        "rev": "e3863ee018a4cb24252a444d509b627453615231",
+        "rev": "0b3487168462acfd2b0a8b4433d08f3182e68bf5",
         "type": "github"
       },
       "original": {
@@ -570,11 +570,11 @@
     },
     "nixpkgs-stable": {
       "locked": {
-        "lastModified": 1711793301,
-        "narHash": "sha256-xheP3IPzzORdwwzr7Y+2n6fzjVgmenObvqjg/hPCwYk=",
+        "lastModified": 1712608516,
+        "narHash": "sha256-Ypvy1sEKH8AmcjZpT4l+nvbEJtgFZpyudRQBYQeif+g=",
         "owner": "NixOS",
         "repo": "nixpkgs",
-        "rev": "86d71a6e6d36f3ef8e0998ff881584a16a794afb",
+        "rev": "d7329da4b1cd24f4383455071346f4f81b7becba",
         "type": "github"
       },
       "original": {
@@ -587,11 +587,11 @@
     "nmap-vulners": {
       "flake": false,
       "locked": {
-        "lastModified": 1671189750,
-        "narHash": "sha256-WUAAWmwiW0uSTGdBE1rxrbSSWBRhzAMrtcyP4mmwkQ8=",
+        "lastModified": 1712145195,
+        "narHash": "sha256-bV7L/Ba/3sQF/2x7Pz78TgappLTaPfyAfCOzAQR2IUc=",
         "owner": "vulnersCom",
         "repo": "nmap-vulners",
-        "rev": "4899a73532f2d166ba229f6c1e8a4046023623da",
+        "rev": "b913758f029b570e67c6def343b838dda1c9e7e4",
         "type": "github"
       },
       "original": {
@@ -635,11 +635,11 @@
         ]
       },
       "locked": {
-        "lastModified": 1711760932,
-        "narHash": "sha256-DqUTQ2iAAqSDwMhKBqvi24v0Oc7pD3LCK/0FCG//TdA=",
+        "lastModified": 1712579741,
+        "narHash": "sha256-igpsH+pa6yFwYOdah3cFciCk8gw+ytniG9quf5f/q84=",
         "owner": "cachix",
         "repo": "pre-commit-hooks.nix",
-        "rev": "c11e43aed6f17336c25cd120eac886b96c455731",
+        "rev": "70f504012f0a132ac33e56988e1028d88a48855c",
         "type": "github"
       },
       "original": {
@@ -701,11 +701,11 @@
         ]
       },
       "locked": {
-        "lastModified": 1711784035,
-        "narHash": "sha256-NWKh+TEakGWO/Zdr97Gi0HpLpooMge0ksBMDM4jOAzE=",
+        "lastModified": 1712154372,
+        "narHash": "sha256-2HFQm/gpmxtMokn6pInHlTlU7mBONLb3Y1aN8SlY0tc=",
         "owner": "danth",
         "repo": "stylix",
-        "rev": "bad1af63ff330b397b87fc243d479701417740da",
+        "rev": "f9b9bc7c8e69942cd2583a3309f86fc5260f1275",
         "type": "github"
       },
       "original": {
@@ -742,11 +742,11 @@
         ]
       },
       "locked": {
-        "lastModified": 1711761168,
-        "narHash": "sha256-w7GgKhBcrg1B72Ymb24rDeAoHsNwZdF8OghR4VxGYHk=",
+        "lastModified": 1712580452,
+        "narHash": "sha256-X1LjMY8wpnflD2nq7GuYxTichyWR9qxw8eGmzyEW4h8=",
         "owner": "nix-community",
         "repo": "nix-vscode-extensions",
-        "rev": "5fae7231f16bd5467660c50e7d6a3732559443a0",
+        "rev": "5041ca76d6c80d057673e5202fa4167f81202391",
         "type": "github"
       },
       "original": {
diff --git a/flake.nix b/flake.nix
index 018bd45..e6666d9 100644
--- a/flake.nix
+++ b/flake.nix
@@ -155,15 +155,17 @@
         program = "${self.packages.${system}.default}/bin/nixfiles";
       };
 
-      packages =
-        let
-          buildIsoImage = name: self.nixosConfigurations.${name}.config.system.build.isoImage;
-        in
-        {
-          default = self.legacyPackages.${system}.nixfiles;
-          iso-arm = buildIsoImage "iso-arm";
-          iso-x86 = buildIsoImage "iso-x86";
-        };
+      # NOTE Leave this commented out because otherthise `nix flake check`
+      # complains a lot.
+      # packages =
+      #   let
+      #     buildIsoImage = name: self.nixosConfigurations.${name}.config.system.build.isoImage;
+      #   in
+      #   {
+      #     default = self.legacyPackages.${system}.nixfiles;
+      #     iso-arm = buildIsoImage "iso-arm";
+      #     iso-x86 = buildIsoImage "iso-x86";
+      #   };
 
       legacyPackages = import nixpkgs {
         inherit system;
diff --git a/modules/common/common/nix.nix b/modules/common/common/nix.nix
index 6cc32d3..fdb0125 100644
--- a/modules/common/common/nix.nix
+++ b/modules/common/common/nix.nix
@@ -4,7 +4,6 @@
   lib,
   localUsername ? lib.my.username,
   pkgs,
-  pkgsPr,
   this,
   ...
 }:
@@ -37,10 +36,7 @@ with lib;
 
   nixpkgs.overlays = with inputs; [
     self.overlays.default
-    (_: _: {
-      inherit (pkgsPr 298756 "sha256-AxNXEDRb9yEde0sPEBRxfXSAu/ZL6/BlOzSj+aoOlHk=") qolibri;
-      inherit (pkgsPr 298346 "sha256-CSEUeivyTWxVskjWzDUal8KYthk7UYMOM4KdjZyhV3o=") dmalloc;
-    })
+    (_: _: { })
   ];
 
   nix =
diff --git a/modules/nixos/common/users.nix b/modules/nixos/common/users.nix
index eca9e1b..a92a38e 100644
--- a/modules/nixos/common/users.nix
+++ b/modules/nixos/common/users.nix
@@ -1,7 +1,11 @@
-{ lib, ... }:
+{
+  lib,
+  localUsername ? lib.my.username,
+  ...
+}:
 with lib;
 let
-  home = "/home/${my.username}";
+  home = "/home/${localUsername}";
 in
 {
   ark.directories = [ home ];
@@ -12,7 +16,7 @@ in
     users = {
       root.hashedPassword = "@HASHED_PASSWORD@";
 
-      ${my.username} = {
+      ${localUsername} = {
         isNormalUser = true;
         uid = 1000;
         description = my.fullname;
diff --git a/nixosConfigurations/default.nix b/nixosConfigurations/default.nix
index 1f0d78c..8ef5f33 100644
--- a/nixosConfigurations/default.nix
+++ b/nixosConfigurations/default.nix
@@ -25,18 +25,18 @@ let
       } // extraSpecialArgs;
     });
 
-  mkIso = system: {
-    this = {
-      hostname = "iso";
-      inherit system;
-      isHeadless = false;
-      isHeadful = false;
-    };
-    configuration = ./iso;
-    modules = [
-      "${inputs.nixpkgs}/nixos/modules/installer/cd-dvd/installation-cd-minimal-new-kernel.nix"
-    ];
-  };
+  # mkIso = system: {
+  #   this = {
+  #     hostname = "iso";
+  #     inherit system;
+  #     isHeadless = false;
+  #     isHeadful = false;
+  #   };
+  #   configuration = ./iso;
+  #   modules = [
+  #     "${inputs.nixpkgs}/nixos/modules/installer/cd-dvd/installation-cd-minimal-new-kernel.nix"
+  #   ];
+  # };
 
   mkTest = this: {
     modules = with inputs; [
@@ -47,8 +47,8 @@ let
   };
 in
 mapAttrs' mkConfiguration {
-  iso-arm = mkIso "aarch64-linux";
-  iso-x86 = mkIso "x86_64-linux";
+  # iso-arm = mkIso "aarch64-linux";
+  # iso-x86 = mkIso "x86_64-linux";
 
   test-headless = mkTest {
     hostname = "test-headless";

Consider giving Nix/NixOS a try! <3