Compare commits

..

No commits in common. "810c991f104544a47cd9622b9112bb8ceb5bc4be" and "c3354e36097ab3fc30f37614dbd2f0cb440bc4e2" have entirely different histories.

3 changed files with 15 additions and 28 deletions

View file

@ -25,18 +25,6 @@ liminalOS comes with the Nix package manager (nobody said you need a _unique_ pa
No.
## Hosts
The modules in liminalOS are designed to be utilized by a wide variety of machine configurations, including via nix-darwin on macOS. To that end, modules are organized by operating system (darwin vs. linux), architecture (x86_64 vs. aarch-64), and form factor (desktop vs laptop). Anything that is agnostic of these distinctions is considered a "common module" and allows configuration to be shared between the various host types. This generally includes core programs like CLI tools, the window manager, etc.
The [flake.nix](/flake.nix) currently contains configuration for three hosts:
| Hostname | Description |
| ---------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| "callisto" | a Macbook Pro M1 (2021) running under Asahi Linux. Imports the laptop module sets as well as the core NixOS module sets. |
| "demeter" | a custom desktop with an i7-13700KF and RTX 4080. Imports the desktop module, the core NixOS modules, and additionally the gaming module. |
| "phobos" | Macbook Pro M1 (2021) running macOS with nix-darwin. Imports the core home-manager module as well as some darwin-specific modules for window managers and the like. |
[^1]: also known as GNU/Linux, GNU+Linux, Freedesktop/systemd/musl/busybox Linux, Linux+friends, etc
[^2]: disclaimer: this is unfortunately not actually how the converse works. A => B does not necessarily imply B => A. I hope this satiates the rigor-hungry mathematicians reading.

View file

@ -24,11 +24,11 @@
},
"bleedingpkgs": {
"locked": {
"lastModified": 1723085441,
"narHash": "sha256-gtq9bsIClTM+r4+s4d1TTRmokSjHhbhPtXAB49gMmE8=",
"lastModified": 1722979953,
"narHash": "sha256-aFtHVx8WBrf6i3Rf+gYcilRuoimfmlzB9btc+br89R4=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "9819e5bee2aa652b2adff29e315c0bcb43bba253",
"rev": "9d938b4e45c9a6d04efc45405b3187fbfcff2f85",
"type": "github"
},
"original": {
@ -57,11 +57,11 @@
},
"catppuccin": {
"locked": {
"lastModified": 1722997334,
"narHash": "sha256-vE5FcKVQ3E0txJKt5w3vOlfcN1XoTAlxK9PnQ/CJavA=",
"lastModified": 1722661201,
"narHash": "sha256-2JX3S1hmmUhHuyGyGWnaM4xT0SiaDdVkNzmBrEowwK0=",
"owner": "catppuccin",
"repo": "nix",
"rev": "66f4ea170093b62f319f41cebd2337a51b225c5a",
"rev": "19a0f144f0204a12a89243363efb6a493b8cfc83",
"type": "github"
},
"original": {
@ -241,11 +241,11 @@
]
},
"locked": {
"lastModified": 1723015306,
"narHash": "sha256-jQnFEtH20/OsDPpx71ntZzGdRlpXhUENSQCGTjn//NA=",
"lastModified": 1722936497,
"narHash": "sha256-UBst8PkhY0kqTgdKiR8MtTBt4c1XmjJoOV11efjsC/o=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "b3d5ea65d88d67d4ec578ed11d4d2d51e3de525e",
"rev": "a6c743980e23f4cef6c2a377f9ffab506568413a",
"type": "github"
},
"original": {
@ -257,11 +257,11 @@
"homebrew-cask": {
"flake": false,
"locked": {
"lastModified": 1723075010,
"narHash": "sha256-fP/kUPFaGqXngYdt00AHMqtW9WfHnJs2AKn/k+eIOfE=",
"lastModified": 1722971030,
"narHash": "sha256-2jT5S3auqoeboqDMtUbO6lE+ExqHcc1+DPjrm23BF5k=",
"owner": "homebrew",
"repo": "homebrew-cask",
"rev": "2edb524ed461070a85275a57b83b13978874f0ac",
"rev": "98547c535bbd7d20a8cd085865e85618b0a5c371",
"type": "github"
},
"original": {
@ -273,11 +273,11 @@
"homebrew-core": {
"flake": false,
"locked": {
"lastModified": 1723084395,
"narHash": "sha256-pru1vXpfZvYuLLb+OBjzZz1SmMLQ3p1sFIyjOoyQ5tY=",
"lastModified": 1722978448,
"narHash": "sha256-FBgZpS+pCps74O/tzIc2T84rxFjGvAaqfhxAxu2ZwNI=",
"owner": "homebrew",
"repo": "homebrew-core",
"rev": "7d7313c13800df50d0c27c5fbf6d640134c88d34",
"rev": "4a8ab7d2dc9a544f5ec4c96f99a9adbea380f7e8",
"type": "github"
},
"original": {

View file

@ -2,5 +2,4 @@
services.openssh.enable = true;
# networking.firewall.allowedTCPPorts = [ ... ];
# networking.firewall.allowedUDPPorts = [ ... ];
networking.nameservers = [ "1.1.1.1" "1.0.0.1" ];
}