Compare commits

..

9 commits

Author SHA1 Message Date
Youwen Wu
d22c85c810
Update README.md 2024-10-30 01:26:54 -07:00
Youwen Wu
60999c4eb4
Update README.md 2024-10-30 01:26:02 -07:00
606536479f
fix links 2024-10-30 01:15:36 -07:00
f1f4207dc3
docs: add yapping to readme 2024-10-30 01:14:15 -07:00
b553a10f62
chore: add marksman to devshell 2024-10-30 00:32:32 -07:00
b08da0e32d
docs: add new wakatime badge 2024-10-30 00:31:05 -07:00
5df2c73f9b
fix: use shell alias for fastfetch to avoid quirks 2024-10-29 23:39:02 -07:00
0531b0acc6
chore: add new fastfetch configuration to callisto 2024-10-29 23:30:20 -07:00
e0938e10aa
flake.lock: Update
Flake lock file updates:

• Updated input 'homebrew-cask':
    'github:homebrew/homebrew-cask/2161a3b0bec1f4bc5cfeb02faab53928a4b7b081' (2024-10-29)
  → 'github:homebrew/homebrew-cask/857189fae2aec190d61cbe74202f3f0c54689f3b' (2024-10-30)
• Updated input 'homebrew-core':
    'github:homebrew/homebrew-core/8b13a3bac20e74dd828d4ec498c5b3b4d2fe3d14' (2024-10-29)
  → 'github:homebrew/homebrew-core/75c0a69cda3c0551977a54acd678b2c2d4b680cf' (2024-10-30)
• Updated input 'spicetify':
    'github:Gerg-L/spicetify-nix/446351c37e053a0098aa19d8c61448bbcfd8f0cc' (2024-10-29)
  → 'github:Gerg-L/spicetify-nix/1c482c8baffd494119b7f61735d35c62a0a22244' (2024-10-30)
• Updated input 'viminal':
    'git+https://code.youwen.dev/youwen5/viminal2?ref=refs/heads/main&rev=25b63a02346342ea2525eb0ff9b06cd4d5bfd35e' (2024-10-30)
  → 'git+https://code.youwen.dev/youwen5/viminal2?ref=refs/heads/main&rev=8e15fc1902e5078bb1c1f6f89fa0ddefb91f7b3d' (2024-10-30)
2024-10-29 23:06:11 -07:00
7 changed files with 161 additions and 54 deletions

180
README.md
View file

@ -4,50 +4,158 @@ This is a repository that implements liminalOS, my personal Linux distribution
based on [NixOS](https://nixos.org/). based on [NixOS](https://nixos.org/).
Time wasted writing Nix code: Time wasted writing Nix code:
![](https://wakatime.com/badge/user/018dc5b8-ba5a-4572-a38a-b526d1b28240/project/c59b3d5e-0c9c-4bd5-a752-e75522ab0cdc.svg) ![](https://wakatime.com/badge/user/018dc5b8-ba5a-4572-a38a-b526d1b28240/project/c59b3d5e-0c9c-4bd5-a752-e75522ab0cdc.svg) + [![wakatime](https://wakatime.com/badge/user/018dc5b8-ba5a-4572-a38a-b526d1b28240/project/de5e82f8-8a09-42cb-ae45-9c80f2ab5a41.svg)](https://wakatime.com/badge/user/018dc5b8-ba5a-4572-a38a-b526d1b28240/project/de5e82f8-8a09-42cb-ae45-9c80f2ab5a41)
These are essentially just my NixOS configuration files. I use flakes,
home-manager, `agenix`, all the buzzwords. But it sounds cool to have your own
OS! (and NixOS is essentially a purpose-built language and ecosystem to allow
you to build your own immutable operating system anyways.)
Many have written at length about the virtues of NixOS and _declarative
configuration_ and _immutability_ and such. I doubt what I have to say is
particularly novel, but I'll leave a few thoughts about Nix and NixOS and why
they do things better anyways. In particular, instead of immediately evangelizing about the virtues of Nix, I'll first motivate the reasons for why I chose a tool with exactly its properties, based on my use case (but not to worry, the evangelizing will come later).
Essentially: allow me to introduce you to the
origins of [NixOS God
Complex](https://www.reddit.com/r/NixOS/comments/kauf1m/dealing_with_post_nixflake_god_complex/).
If you would like advice on whether or not to use NixOS:
<details> <summary>see <a
href="https://github.com/hlissner/dotfiles">hlissner's</a> breakdown,
reproduced below:</summary> Should I use NixOS?
Short answer: no.
Long answer: no really. Don't.
Long long answer: I'm not kidding. Don't.
Unsigned long long answer: Alright alright. Here's why not:
Its learning curve is steep. You will trial and error your way to
enlightenment, if you survive the frustration long enough. NixOS is unlike
other Linux distros. Your issues will be unique and difficult to google. A
decent grasp of Linux and your chosen services is a must, if only to
distinguish Nix(OS) issues from Linux (or upstream) issues -- as well as to
debug them or report them to the correct authority (and coherently). If words
like "declarative", "generational", and "immutable" don't put your sexuality in
jeopardy, you're considering NixOS for the wrong reasons. The overhead of
managing a NixOS config will rarely pay for itself with 3 systems or fewer
(perhaps another distro with nix on top would suit you better?). Official
documentation for Nix(OS) is vast, but shallow. Unofficial resources and
example configs are sparse and tend toward too simple or too complex (and most
are outdated). Case in point: this repo. The Nix language is obtuse and its
toolchain is not intuitive. Your experience will be infinitely worse if
functional languages are alien to you, however, learning Nix is a must to do
even a fraction of what makes NixOS worth the trouble. If you need somebody
else to tell you whether or not you need NixOS, you don't need NixOS.
</details>
<hr />
<!-- prettier-ignore --> <!-- prettier-ignore -->
> **lim·i·nal** > **lim·i·nal**
> 1. between or belonging to two different places, states, etc. > 1. between or belonging to two different places, states, etc.
The goal of liminalOS is to allow my computing environment to exist in different The goal of liminalOS is to allow my computing environment to exist in
places (computers) at the same time, without the minor disparities, issues, and different computers at the same time, and to be absolutely unbreakable while
inconsistencies that arise from traditional approaches such as scripting. This doing so. Let's talk about existing in multiple computers first, or otherwise
works exceptionally well, demonstrated by the fact that I have the exact same known as some form of "settings sync". To the typical user, stuck in the
environment across three separate machines, spanning two completely different _imperative world_, this sounds unrealistic at worst, and janky at best.
CPU architectures. Generally, people encounter environment or settings syncing in two ways: either
the entire service is ran in the cloud, so it's really the _same_ environment
accessed from multiple places, or it's some often half baked opaque solution
involving you making an account and sending all your settings to a sync server
(see: Mozilla Firefox).
Traditionally, we expect to configure each of our computers separately. We have The more technically minded may instead opt to create a "dotfiles" repository,
a general idea of the programs, settings, and minor tweaks that we like to make holding their vast corpus of meticulously crafted configuration files. These
on every computer, but we have to manually set all of these up. Many Unix repos often come with a janky `install.sh` that does its best to throw all the
hackers have thus created sprawling installation scripts to manage their various files into the correct place. This usually works the first time, but trying to
systems so they can be deployed in a predictable manner each time. Of course, keep the installed dotfiles in sync with a central repository is a whole other
scripts are still heavily dependent on environment and prone to breakage. When problem.
they inevitably break, the system is left in a malformed state, where some setup
actions have been taken and others have not, and it is up to the system
administrator to fix the failing script and ensure the system is set up
properly. Also, updating existing machines and rolling back to previous states
is a separate, even more difficult issue to solve with this approach.
In essence, the primary failure of setup scripts is that they are _imperative_ - But these solutions are generally used for singular services or applications.
they must specify precisely _how_ to set up the system, down to minute details, Keeping an entire _system_ synced up across computers down to the minute
whereas in a _declarative_ approach, the user can simply specify what the system configurations and applications seems incredibly unwieldy, through our usual
_should look like_, and abstractions take care of the _how_. This is what NixOS conception of how we interact with our operating systems.
does, and it gives you remote syncing, versioning (via `git`), and rollbacks
_for free_. The more obsessive system tweakers might try a dotfile manager like `chezmoi`
or GNU Stow. I have not tried these so I make no judgements on their utility for their intended purpose,
but generally these solutions miss a key feature: they provide the
configuration, but don't install the software. But the software and the
configuration are fundamentally tied together; these are not concerns to be
separated. If the software is installed, it almost always needs to be
configured anyways. If the configuration exists, the software should be
installed. These solutions may work well for managing configuration, but they have the same issue as before: you also need to install the software you're configuring!
So, *nix hackers reach for things like [Ansible](https://www.ansible.com/), that
promise automatic configuration of entire systems. Though Ansible was designed
to deploy cloud servers quickly through the Infrastructure-as-Code approach,
some people opt to use it for deploying their systems quickly as well. I have
not tried it, but from what I've heard, it works fine for simple deployment but
gets quite unwieldy for more complex purposes (especially for personal systems,
which aren't expected to be as ephemeral as servers).
If you agree with the premises I've laid out up to this point, you might come
to the conclusion that I've made: to solve this issue, we need a solution that
does _all of it_. A unified tool for deploying software and managing systems.
And it must necessarily be declarative and reproducible, because that is the only way to sanely manage a system. Imagine working on a programming project where recompiling with the same source code would non-deterministically produce different results based on the environment!
Well, [Nix](https://nixos.org/) is the _purely functional_ package manager
(i.e. declarative, reproducible), and NixOS is a Linux distribution that is
managed entirely by Nix. Essentially, Nix provides a solution to the problem of
_software deployment_, and in fact was purpose built to do so in Eelco
Dolstra's seminal [PhD
thesis](https://edolstra.github.io/pubs/phd-thesis.pdf). NixOS is a system that
takes the power of Nix and applies it to declaratively configure an _entire
Linux system_. All of the software can be specified precisely using the Nix
expression language, a purely functional DSL used by Nix. And alongside the
software, it also configures it, effectively acting as a dotfile manager.
Indeed, many core NixOS services and a wide range of programs can be set up
through _NixOS modules_, where the program is installed and configured in the
same place. (and many programs like `fzf`, `btop`, etc have similar
corresponding `home-manager` modules).
NixOS is also _immutable_, which means that the system cannot be modified after
it is built from the Nix files that declare it. How do you make changes to the
system then? Obviously, we just create a new system where the changed programs
and files are included, and the old ones are removed. But they are not deleted
from the hard drive, they still exist in the _Nix store_. So, the system can
provide precise atomic rollbacks between each "generation" of itself. Broke
your GRUB configuration so your system won't boot? Messed up your kernel
settings? Just select an older working generation from the boot menu and you
instantly have a working system again. You never worry about breaking things
during either routine or massive system updates.
And because the system is fully declarative, and modifying the system is done
only through modifying its Nix configuration files, you can version and sync
them up with Git. This solves the problem of keeping system environments in
sync; now, you truly only have to keep one repository of all your configuration
in sync, and all the software installation and deployment is handled for you by
a system designed precisely for that purpose.
This makes it possible for me to share common configuration between a multitude
of entirely distinct machines, including an `x86_64` desktop, an `x86_64`
laptop, an Apple Silicon Macbook running NixOS `aarch64` using [Asahi
Linux](https://asahilinux.org/), and the same Macbook running macOS with
`nix-darwin`, sharing `home-manager` configuration with NixOS. Specific
configuration necessary to adjust hardware-specific details between each
machines are isolated to the [hosts](./hosts) directory.
This works exceptionally well, evidenced by the fact that I have (almost) the
exact same environment across three separate machines, spanning two entirely
distinct CPU architectures.
In essence, the primary failure of deployment scripts, Ansible and the like is
that they are _imperative_ - they must specify precisely _how_ to set up the
system, down to minute details, whereas in a _declarative_ approach, the user
can simply specify what the system _should look like_, and abstractions take
care of the _how_. This is what NixOS does, and it gives you remote syncing,
versioning (via `git`), and rollbacks _for free_.
NixOS provides the key tools for reliably deploying systems - namely, a _purely
functional_ package manager that's reproducible by default and the necessary
abstractions needed for a declarative system configuration. liminalOS is my set
of opinionated NixOS and `home-manager` modules that aim to set up a computing
environment _independent of the host_. This makes it possible for me to share
common configuration between a multitude of entirely distinct machines,
including an `x86_64` desktop, an `x86_64` laptop, an Apple Silicon Macbook
running NixOS `aarch64` using [Asahi Linux](https://asahilinux.org/), and the
same Macbook running macOS with `nix-darwin`, sharing `home-manager`
configuration with NixOS. Specific configuration necessary to adjust
hardware-specific details between each machines are isolated to the
[hosts](./hosts) directory.
## Installation guide ## Installation guide

View file

@ -373,11 +373,11 @@
"homebrew-cask": { "homebrew-cask": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1730231459, "lastModified": 1730268348,
"narHash": "sha256-JnnBOpPcbmotjquS7wOSg9d6r99V7bSauKT5/yT/wqQ=", "narHash": "sha256-72vcVXNB46wH8ufhJaIaZPihFa331YONX48AXK7Sj+o=",
"owner": "homebrew", "owner": "homebrew",
"repo": "homebrew-cask", "repo": "homebrew-cask",
"rev": "2161a3b0bec1f4bc5cfeb02faab53928a4b7b081", "rev": "857189fae2aec190d61cbe74202f3f0c54689f3b",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -389,11 +389,11 @@
"homebrew-core": { "homebrew-core": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1730231441, "lastModified": 1730265505,
"narHash": "sha256-NuAGKWjNzIfjn8mRhXYlmY4PZgn1ZbrFfHWPMwM0pV8=", "narHash": "sha256-DDaTJa3085JxdzLyD2xKWBWDPiltBOcmUUXQBgipGuQ=",
"owner": "homebrew", "owner": "homebrew",
"repo": "homebrew-core", "repo": "homebrew-core",
"rev": "8b13a3bac20e74dd828d4ec498c5b3b4d2fe3d14", "rev": "75c0a69cda3c0551977a54acd678b2c2d4b680cf",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -755,11 +755,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1730175473, "lastModified": 1730261837,
"narHash": "sha256-JASnF3cFrQ1k6KsitR2yylpeWdPNb2xJeIaMeipe3BA=", "narHash": "sha256-syeN2dLFxJ9bhsG1YnwWpwMgCttBY1S60KUrqLIrmMo=",
"owner": "Gerg-L", "owner": "Gerg-L",
"repo": "spicetify-nix", "repo": "spicetify-nix",
"rev": "446351c37e053a0098aa19d8c61448bbcfd8f0cc", "rev": "1c482c8baffd494119b7f61735d35c62a0a22244",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -860,11 +860,11 @@
"plugins-typst-preview": "plugins-typst-preview" "plugins-typst-preview": "plugins-typst-preview"
}, },
"locked": { "locked": {
"lastModified": 1730257706, "lastModified": 1730268319,
"narHash": "sha256-+xyqOXiDT+k10Hsi2U4AvLMwka25nQrUYThz14A/HgM=", "narHash": "sha256-2cQhQi6+KcadTzc0Kx56Y/Hn3PoHAGVEkqKo+uXQsZU=",
"ref": "refs/heads/main", "ref": "refs/heads/main",
"rev": "25b63a02346342ea2525eb0ff9b06cd4d5bfd35e", "rev": "8e15fc1902e5078bb1c1f6f89fa0ddefb91f7b3d",
"revCount": 41, "revCount": 42,
"type": "git", "type": "git",
"url": "https://code.youwen.dev/youwen5/viminal2" "url": "https://code.youwen.dev/youwen5/viminal2"
}, },

View file

@ -137,6 +137,7 @@
nixfmt-rfc-style nixfmt-rfc-style
prettierd prettierd
taplo taplo
marksman
] ]
++ [ ++ [
inputs.viminal.packages.${system}.default inputs.viminal.packages.${system}.default

View file

@ -31,6 +31,7 @@
../../users/youwen/common ../../users/youwen/common
../../users/youwen/linux/laptop ../../users/youwen/linux/laptop
../../users/youwen/linux/packages/aarch-64 ../../users/youwen/linux/packages/aarch-64
../../users/youwen/common/fastfetch
./home-manager-extras ./home-manager-extras
catppuccin.homeManagerModules.catppuccin catppuccin.homeManagerModules.catppuccin
]; ];

View file

@ -1,4 +1,4 @@
{ pkgs, ... }: { pkgs, ... }:
{ {
home.file.".config/neofetch/config.conf".source = ./neofetch-asahi.conf; # home.file.".config/neofetch/config.conf".source = ./neofetch-asahi.conf;
} }

View file

@ -101,6 +101,7 @@ in
enable = true; enable = true;
shellAliases = { shellAliases = {
ls = "eza -l --icons=auto"; ls = "eza -l --icons=auto";
neofetch = "${pkgs.fastfetch}/bin/fastfetch";
}; };
# shellInit = '' # shellInit = ''
# oh-my-posh disable notice # oh-my-posh disable notice

View file

@ -5,8 +5,4 @@
programs.fastfetch = { programs.fastfetch = {
enable = true; enable = true;
}; };
home.packages = [
(pkgs.writeShellScriptBin "neofetch" "${pkgs.fastfetch}/bin/fastfetch")
];
} }