diff --git a/.github/CODEOWNERS b/.github/CODEOWNERS new file mode 100644 index 0000000..53913e2 --- /dev/null +++ b/.github/CODEOWNERS @@ -0,0 +1,2 @@ +# Me, myself and I! +* @jokiller230 diff --git a/.github/assets/anything-but-windows.gif b/.github/assets/anything-but-windows.gif new file mode 100644 index 0000000..cf08271 Binary files /dev/null and b/.github/assets/anything-but-windows.gif differ diff --git a/.github/assets/code-with-zed.webp b/.github/assets/code-with-zed.webp new file mode 100644 index 0000000..89c8120 Binary files /dev/null and b/.github/assets/code-with-zed.webp differ diff --git a/.github/assets/i-love-reproducing-nix-btw.gif b/.github/assets/i-love-reproducing-nix-btw.gif new file mode 100644 index 0000000..3b921f0 Binary files /dev/null and b/.github/assets/i-love-reproducing-nix-btw.gif differ diff --git a/.github/assets/powered-by-nixos.gif b/.github/assets/powered-by-nixos.gif new file mode 100644 index 0000000..f293610 Binary files /dev/null and b/.github/assets/powered-by-nixos.gif differ diff --git a/assets/puzzlevision.png b/.github/assets/puzzlevision.png similarity index 100% rename from assets/puzzlevision.png rename to .github/assets/puzzlevision.png diff --git a/.github/workflows/deadnix.yml b/.github/workflows/deadnix.yml new file mode 100644 index 0000000..d80f744 --- /dev/null +++ b/.github/workflows/deadnix.yml @@ -0,0 +1,20 @@ +name: "Nix: check for unused code" + +on: + pull_request: + push: + paths: + - "**.nix" + - ".github/workflows/deadnix.yml" + +jobs: + deadnix: + name: Run deadnix + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v4 + - uses: cachix/install-nix-action@v25 + - uses: cachix/cachix-action@v14 + with: + name: deadnix + - uses: phucleeuwu/deadnix-action@v1 diff --git a/.github/workflows/validate.yml b/.github/workflows/validate.yml new file mode 100644 index 0000000..9fdb6e6 --- /dev/null +++ b/.github/workflows/validate.yml @@ -0,0 +1,30 @@ +name: "Nix: validate flake" + +on: + workflow_dispatch: + push: + paths: + - "**.nix" + - "**.lock" + - ".github/workflows/**.yml" + +jobs: + check-flake: + name: Validate x86_64-linux + runs-on: ubuntu-latest + + steps: + - name: Checkout + uses: actions/checkout@v4 + with: + ref: ${{ github.ref_name }} + persist-credentials: false + + - name: Install Nix + uses: DeterminateSystems/nix-installer-action@main + with: + extra-conf: | + experimental-features = flakes nix-command recursive-nix pipe-operator + + - name: Validate Flake + run: nix flake check diff --git a/README.md b/README.md index 90e679b..47a59a0 100644 --- a/README.md +++ b/README.md @@ -1,9 +1,16 @@
-
+

✨ Puzzlevision ✨

Non-stop entertainment! The wackiest NixOS configuration to-date.

+
+ + + + +
+
## 🚧 State of development All the basic functionality of v2 should be working correctly, including: @@ -14,9 +21,13 @@ All the basic functionality of v2 should be working correctly, including: - Creating users in your systems through ${self.namespace}.users, automatically maps home-manager configurations from the `homes` directory to their corresponding users. -Nonetheless, one should still consider this implementation experimental, -once I start using this on my laptop, -I'll aim for production grade stability. +Since I am actively using this configuration on my main workstation, things are evolving quickly, +leftover issues are actively being resolved and the list of modules is ever-growing. +Nonetheless, one should still consider this implementation experimental. + +My next goal is to setup an attic binary cache, +with a build/release workflow that runs in regular intervals. +(similar to isabelroses's workflow setup) ## 🚀 Deployment To deploy a system run the following command in your terminal of choice. @@ -66,6 +77,27 @@ Lastly, when adding new systems, make sure to update any required secret files w nix-shell -p sops --run "sops updatekeys secrets/example.yaml" ``` +## 👷 CI/CD coverage +Currently, this repository houses 2 workflows, which are executed when pushing to the v2 branch. + +#### ↪️ `Nix: check for unused code` +This workflow can be found in `.github/workflows/deadnix.yml`, +and should be pretty self-explanatory. + +Here's what it does: +1. Checks out current branch +2. Finds any unused variables/imports etc... +3. Creates a new commit, instantly removing any unused code + +#### ↪️ `Nix: validate flake` +This workflow can be found in `.github/workflows/validate.yml`. +It simply validates a flake using `nix flake check`. + +To be specific, it does the following: +1. Checks out current branch +2. Installs nix with some experimental features (flakes, nix-command, recursive-nix, pipe-operator) +3. Runs `nix flake check` on the codebase + ## 📝 Goals and improvements The main goals of this rewritten flake are: diff --git a/flake.lock b/flake.lock index 76fd099..21c0b0a 100644 --- a/flake.lock +++ b/flake.lock @@ -7,11 +7,11 @@ ] }, "locked": { - "lastModified": 1746650299, - "narHash": "sha256-4+pxk1KcSH8ww3tgN808nNJ3E7Q8gNWI+U0sesW7mBQ=", + "lastModified": 1747519437, + "narHash": "sha256-uv9Wv59d+mckS2CkorOF484wp2G5TNGijdoBZ5RkAk0=", "owner": "catppuccin", "repo": "nix", - "rev": "f746600f15b69df05c84e3037749a3be5b1276d1", + "rev": "3ba714046ee32373e88166e6e9474d6ae6a5b734", "type": "github" }, "original": { @@ -22,11 +22,11 @@ }, "easy-hosts": { "locked": { - "lastModified": 1743693165, - "narHash": "sha256-BAYno/4P0hq3aaqfVLbDmv8pgvzJWcN+4L8jK8SzaMo=", + "lastModified": 1747174689, + "narHash": "sha256-WEA2HdjC90GLf5VpMLpvOF3/uSSq6AV4DQ4ezLFspc0=", "owner": "tgirlcloud", "repo": "easy-hosts", - "rev": "611cc21942feb55c6a38410dfe8eee3fb5f08c8d", + "rev": "e1210563fc527221e12544ce55cd954acf94e7ed", "type": "github" }, "original": { @@ -35,6 +35,20 @@ "type": "github" } }, + "flake-compat": { + "locked": { + "lastModified": 1733328505, + "narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=", + "rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec", + "revCount": 69, + "type": "tarball", + "url": "https://api.flakehub.com/f/pinned/edolstra/flake-compat/1.1.0/01948eb7-9cba-704f-bbf3-3fa956735b52/source.tar.gz" + }, + "original": { + "type": "tarball", + "url": "https://flakehub.com/f/edolstra/flake-compat/1.tar.gz" + } + }, "flake-parts": { "inputs": { "nixpkgs-lib": [ @@ -62,11 +76,11 @@ ] }, "locked": { - "lastModified": 1746727295, - "narHash": "sha256-0364XVBdfEA8rWfqEPvsgBqGFfq5r9LAo9CS9tvT7tg=", + "lastModified": 1747955385, + "narHash": "sha256-AKoBFaEGN02tGvBlkwVIDOGXouHvrTTfOUcvBDGxkxQ=", "owner": "nix-community", "repo": "home-manager", - "rev": "a51598236f23c89e59ee77eb8e0614358b0e896c", + "rev": "a868570581f0dbdef7e33c8c9bb34b735dfcbacf", "type": "github" }, "original": { @@ -75,13 +89,71 @@ "type": "github" } }, + "home-manager_2": { + "inputs": { + "nixpkgs": [ + "youtube-music", + "nixpkgs" + ] + }, + "locked": { + "lastModified": 1747439237, + "narHash": "sha256-5rCGrnkglKKj4cav1U3HC+SIUNJh08pqOK4spQv9RjA=", + "owner": "nix-community", + "repo": "home-manager", + "rev": "ae755329092c87369b9e9a1510a8cf1ce2b1c708", + "type": "github" + }, + "original": { + "owner": "nix-community", + "repo": "home-manager", + "type": "github" + } + }, + "nixcord": { + "inputs": { + "flake-compat": "flake-compat", + "nixpkgs": "nixpkgs", + "systems": "systems", + "treefmt-nix": "treefmt-nix" + }, + "locked": { + "lastModified": 1747878048, + "narHash": "sha256-kAR4Ox+vShPzsUar/1rHarRgUBPpm7hxwi7sIffNYa4=", + "owner": "kaylorben", + "repo": "nixcord", + "rev": "5f737debf65b8409392604098a7489d997746450", + "type": "github" + }, + "original": { + "owner": "kaylorben", + "repo": "nixcord", + "type": "github" + } + }, "nixpkgs": { "locked": { - "lastModified": 1746461020, - "narHash": "sha256-7+pG1I9jvxNlmln4YgnlW4o+w0TZX24k688mibiFDUE=", + "lastModified": 1744868846, + "narHash": "sha256-5RJTdUHDmj12Qsv7XOhuospjAjATNiTMElplWnJE9Hs=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "3730d8a308f94996a9ba7c7138ede69c1b9ac4ae", + "rev": "ebe4301cbd8f81c4f8d3244b3632338bbeb6d49c", + "type": "github" + }, + "original": { + "owner": "NixOS", + "ref": "nixpkgs-unstable", + "repo": "nixpkgs", + "type": "github" + } + }, + "nixpkgs_2": { + "locked": { + "lastModified": 1747744144, + "narHash": "sha256-W7lqHp0qZiENCDwUZ5EX/lNhxjMdNapFnbErcbnP11Q=", + "owner": "NixOS", + "repo": "nixpkgs", + "rev": "2795c506fe8fb7b03c36ccb51f75b6df0ab2553f", "type": "github" }, "original": { @@ -91,7 +163,7 @@ "type": "github" } }, - "nixpkgs_2": { + "nixpkgs_3": { "locked": { "lastModified": 1744868846, "narHash": "sha256-5RJTdUHDmj12Qsv7XOhuospjAjATNiTMElplWnJE9Hs=", @@ -113,20 +185,22 @@ "easy-hosts": "easy-hosts", "flake-parts": "flake-parts", "home-manager": "home-manager", - "nixpkgs": "nixpkgs", - "sops-nix": "sops-nix" + "nixcord": "nixcord", + "nixpkgs": "nixpkgs_2", + "sops-nix": "sops-nix", + "youtube-music": "youtube-music" } }, "sops-nix": { "inputs": { - "nixpkgs": "nixpkgs_2" + "nixpkgs": "nixpkgs_3" }, "locked": { - "lastModified": 1746485181, - "narHash": "sha256-PxrrSFLaC7YuItShxmYbMgSuFFuwxBB+qsl9BZUnRvg=", + "lastModified": 1747603214, + "narHash": "sha256-lAblXm0VwifYCJ/ILPXJwlz0qNY07DDYdLD+9H+Wc8o=", "owner": "Mic92", "repo": "sops-nix", - "rev": "e93ee1d900ad264d65e9701a5c6f895683433386", + "rev": "8d215e1c981be3aa37e47aeabd4e61bb069548fd", "type": "github" }, "original": { @@ -134,6 +208,62 @@ "repo": "sops-nix", "type": "github" } + }, + "systems": { + "locked": { + "lastModified": 1681028828, + "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=", + "owner": "nix-systems", + "repo": "default", + "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e", + "type": "github" + }, + "original": { + "id": "systems", + "type": "indirect" + } + }, + "treefmt-nix": { + "inputs": { + "nixpkgs": [ + "nixcord", + "nixpkgs" + ] + }, + "locked": { + "lastModified": 1744961264, + "narHash": "sha256-aRmUh0AMwcbdjJHnytg1e5h5ECcaWtIFQa6d9gI85AI=", + "owner": "numtide", + "repo": "treefmt-nix", + "rev": "8d404a69efe76146368885110f29a2ca3700bee6", + "type": "github" + }, + "original": { + "owner": "numtide", + "repo": "treefmt-nix", + "type": "github" + } + }, + "youtube-music": { + "inputs": { + "home-manager": "home-manager_2", + "nixpkgs": [ + "nixpkgs" + ] + }, + "locked": { + "lastModified": 1747498370, + "narHash": "sha256-mJ7fLdL/A4cWHMm0n3/dcQ72Ijm+uTu/snl8iqgtbtc=", + "owner": "h-banii", + "repo": "youtube-music-nix", + "rev": "410071c47bb39a5abb672cd5c1a59bc5f853d908", + "type": "github" + }, + "original": { + "owner": "h-banii", + "repo": "youtube-music-nix", + "type": "github" + } } }, "root": "root", diff --git a/flake.nix b/flake.nix index 2933e6e..9ec7a9f 100644 --- a/flake.nix +++ b/flake.nix @@ -35,6 +35,15 @@ url = "github:catppuccin/nix"; inputs.nixpkgs.follows = "nixpkgs"; }; + + nixcord = { + url = "github:kaylorben/nixcord"; + }; + + youtube-music = { + url = "github:h-banii/youtube-music-nix"; + inputs.nixpkgs.follows = "nixpkgs"; + }; }; outputs = {flake-parts, ...} @ inputs: diff --git a/homes/x86_64-linux/jo/apps/discord/default.nix b/homes/x86_64-linux/jo/apps/discord/default.nix new file mode 100644 index 0000000..dfa7e9a --- /dev/null +++ b/homes/x86_64-linux/jo/apps/discord/default.nix @@ -0,0 +1,53 @@ +{ + lib, + config, + ... +}: let + inherit (lib) mkIf; +in { + # Enable arRPC for discord Rich Presence stuffs + services.arrpc.enable = true; + + programs.nixcord = { + enable = true; + vesktop.enable = true; + discord.enable = false; + + config = { + useQuickCss = true; + themeLinks = [ + (mkIf config.catppuccin.enable "https://catppuccin.github.io/discord/dist/catppuccin-${config.catppuccin.flavor}-${config.catppuccin.accent}.theme.css") + ]; + + frameless = true; + plugins = { + betterFolders = { + enable = true; + closeAllFolders = true; + closeAllHomeButton = true; + closeOthers = true; + }; + + fakeNitro = { + enable = true; + enableStickerBypass = false; + enableEmojiBypass = false; + }; + + betterSettings.enable = true; + betterUploadButton.enable = true; + blurNSFW.enable = true; + clearURLs.enable = true; + callTimer.enable = true; + consoleJanitor.enable = true; + copyEmojiMarkdown.enable = true; + userMessagesPronouns.enable = true; + reviewDB.enable = true; + + # Vesktop exclusive + webRichPresence.enable = true; + webScreenShareFixes.enable = true; + }; + }; + }; +} diff --git a/homes/x86_64-linux/jo/apps/youtube-music/catppuccin-frappe.css b/homes/x86_64-linux/jo/apps/youtube-music/catppuccin-frappe.css new file mode 100644 index 0000000..3d0d60d --- /dev/null +++ b/homes/x86_64-linux/jo/apps/youtube-music/catppuccin-frappe.css @@ -0,0 +1,6 @@ +/* frappe */ +@import url("https://youtubemusic.catppuccin.com/src/frappe.css"); + +html:not(.style-scope) { + --ctp-accent: var(--ctp-blue) !important; +} diff --git a/homes/x86_64-linux/jo/apps/youtube-music/catppuccin-latte.css b/homes/x86_64-linux/jo/apps/youtube-music/catppuccin-latte.css new file mode 100644 index 0000000..af971c8 --- /dev/null +++ b/homes/x86_64-linux/jo/apps/youtube-music/catppuccin-latte.css @@ -0,0 +1,6 @@ +/* latte */ +@import url("https://youtubemusic.catppuccin.com/src/latte.css"); + +html:not(.style-scope) { + --ctp-accent: var(--ctp-blue) !important; +} diff --git a/homes/x86_64-linux/jo/apps/youtube-music/catppuccin-macchiato.css b/homes/x86_64-linux/jo/apps/youtube-music/catppuccin-macchiato.css new file mode 100644 index 0000000..6979eab --- /dev/null +++ b/homes/x86_64-linux/jo/apps/youtube-music/catppuccin-macchiato.css @@ -0,0 +1,6 @@ +/* macchiato */ +@import url("https://youtubemusic.catppuccin.com/src/macchiato.css"); + +html:not(.style-scope) { + --ctp-accent: var(--ctp-blue) !important; +} diff --git a/homes/x86_64-linux/jo/apps/youtube-music/catppuccin-mocha.css b/homes/x86_64-linux/jo/apps/youtube-music/catppuccin-mocha.css new file mode 100644 index 0000000..b95c627 --- /dev/null +++ b/homes/x86_64-linux/jo/apps/youtube-music/catppuccin-mocha.css @@ -0,0 +1,6 @@ +/* mocha */ +@import url("https://youtubemusic.catppuccin.com/src/mocha.css"); + +html:not(.style-scope) { + --ctp-accent: var(--ctp-blue) !important; +} diff --git a/homes/x86_64-linux/jo/apps/youtube-music/default.nix b/homes/x86_64-linux/jo/apps/youtube-music/default.nix new file mode 100644 index 0000000..0778d00 --- /dev/null +++ b/homes/x86_64-linux/jo/apps/youtube-music/default.nix @@ -0,0 +1,29 @@ +{ + lib, + config, + osConfig, + namespace, + ... +}: let + inherit (lib) mkIf; +in { + programs.youtube-music = { + enable = true; + options = { + tray = true; + trayClickPlayPause = true; + resumeOnStart = false; + + themes = [ + (mkIf config.catppuccin.enable ./catppuccin-${config.catppuccin.flavor}.css) + ]; + + language = osConfig.${namespace}.system.locale.keymap; + autoUpdates = false; + }; + + plugins = { + discord.enabled = true; + }; + }; +} diff --git a/homes/x86_64-linux/jo/default.nix b/homes/x86_64-linux/jo/default.nix index 677b278..a8ba242 100644 --- a/homes/x86_64-linux/jo/default.nix +++ b/homes/x86_64-linux/jo/default.nix @@ -3,8 +3,14 @@ config, ... }: { + imports = [ + ./apps/discord + ./apps/youtube-music + ]; + puzzlevision = { themes.catppuccin.enable = true; + apps.zed.enable = true; }; sops.secrets.wakatime-cfg = { @@ -15,8 +21,6 @@ home.packages = with pkgs; [ ## GENERAL - youtube-music - discord ghostty teams-for-linux enpass @@ -26,8 +30,6 @@ ungoogled-chromium ## EDITORS - nano - zed-editor apostrophe jetbrains.phpstorm arduino-ide diff --git a/homes/x86_64-linux/jo/secrets/wakatime.cfg b/homes/x86_64-linux/jo/secrets/wakatime.cfg index bf69df7..a7c2224 100644 --- a/homes/x86_64-linux/jo/secrets/wakatime.cfg +++ b/homes/x86_64-linux/jo/secrets/wakatime.cfg @@ -1,18 +1,18 @@ { - "data": "ENC[AES256_GCM,data:NaNu0ytz8Ji7WJ4gDinY2Tsny+MzgG9vV/7xnZY/dQzB0jMHBxIRAcrzH1A+aqsANeeZPD0XGXC2qIpYUlMKBcfMxkqmlj7XnpvDiXQ9RciCNp8l1xs0wvoxjYghbD8nsL57UQ==,iv:qa1SPnWCShIiz7l4EW6tCT2gJO0qNNcDk05F5hS8H7U=,tag:zArwz8R3/uegsO1ShLjfwg==,type:str]", + "data": "ENC[AES256_GCM,data:UAADE/aH98MYyfxL3ZkZ06lHHTRmmRVuOhiqEyF6DP35sGTC7Mpqe++MTYBDFrD4Rraeao9T2tcu3sL22p9SW9jF7Y2L1YZ9zKKUyP2y+G8PN25GqXWaNwJQG/hxcKs8km448g==,iv:SkyBC+VkwccprAomhXUzdmSQuBDfFn22MKJwjV9ZSzo=,tag:m/uUcl9r3GW3QYCajoAhYw==,type:str]", "sops": { "age": [ { "recipient": "age1qcjcwh9tq8pzf2yr7m3hm2n3n3y5rlc30fpkr0eytju9w57ucgcsgcy79d", - "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBJS0EySk4wMGVzaUtOZWlN\nUE15SXNVOUtqUDQxV29tNGpBRkdLek5icWg0Cnd5b1FmT3VQTTBDdEtCYzQxNVdk\nWVpQMFpmTXpOcFFlMG5MQjFLTXZRUGsKLS0tIHBvakR1Q0dYdkRqVTJtLzRORzBP\nNU55UEtWUXhBdGN0M0lMQktaVmhSK00KA93LFut6jiYtlndm9Oq0ferFPT4IlBQ1\nDmnD4hWz7NLimWED7RiJ2lSO9IRgQBhLHeiLums/ZPxjFGnnO6sicg==\n-----END AGE ENCRYPTED FILE-----\n" + "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSA5VmtTRHo4NWVuU2tiZTc5\nWUVyeU54ZmtZbi9uUWNablIxSm9aZ3hadjBnCmNiVlBXS2lEbE00VFl6QVRlQk92\nMFI0TVBMVDZiQXg3VzZTaVNEd2RROTQKLS0tIEg3aGwvWXgvVldGTjZFaS95dEVP\nUmZHaGFaNndDRWY5cXBJeGY4TVVqbTgKeFTClhSmX5IQ5+7DXk4HEwTAv4uB/HCl\nVeoKUNaTHme60hWE/J12B2PvxtRa+f6diDMFg11mQkPOZwyEcQWMpg==\n-----END AGE ENCRYPTED FILE-----\n" }, { "recipient": "age1ajkq0lalyc75tjhdtpx2yshw5y3wt85fwjy24luf69rvpavg33vqw6c3tc", - "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBSTHh4eExqN1lmUWhOd0tF\ndzVUYXpWblVlem5QcndUQVRRSnZsS0dNK3lVCnpJQUVyRDRiNTFyb3RnSFZnQW9D\nV2sxRlZDcE1yQjI5Yzk3Tmh2ZkdxZ00KLS0tIGlKYUVnZXZtYTJPNEhEVEVhVlI4\na1hGbjJ3VDE0WDZKd0FGYUZzZUp5SEkKp043TYYglP+SWD7IdK/rnSJ4jfqvpGSY\njIDWMZmFTIcPoeVSQrxi7PD9Cd4Q56lhPhCYZR4czk5EdeIEWS9Z6w==\n-----END AGE ENCRYPTED FILE-----\n" + "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBnK1NtOE9tZ0poRjdkOTBi\nbWFQbGovY1VvRDN4clJmRGdTSHlzQk5JSmtrCitSc3hnb21CMVVuclZ2YndIOWRk\naDduM3VadDBaWFRDRElZSWlUaXdUZGMKLS0tIEJOUEFoS3ZJQWtkNGFQNk1CdGxI\nSmRFQ25TSXY1S0FHQmhUbWNsT1Z2c2sKBTV2WEW+HynmrrPza8gsIQAK2V3HhYfJ\nrG6rjnzMONd+0Q6Z0KBqgoMfCTjWE9CBnm78DL16u9pRH3CwhpKabg==\n-----END AGE ENCRYPTED FILE-----\n" } ], - "lastmodified": "2025-05-21T22:54:54Z", - "mac": "ENC[AES256_GCM,data:vYmgUvgyQ1i+gih/6YMWX1vqkWzcAn8zgNspICF6KxTYE08i61LGJSaM2R5rh2r/xWY9zKYv8EKH2GSVyJ+hGgSsS0qY8BOKetKMHZEWuWtWSbjO/iKPlmqZXxmPPiPlYUXjlfXB1rzi7RXwDzwVpD1nQTuiK8t2rYJjGgH0kRM=,iv:EEepXDQ/1zy1sO8eXl5LXTHI5OUPFca6WwuYTkHuyEs=,tag:MHA262l7qa8Ngy0tuggPpw==,type:str]", + "lastmodified": "2025-05-22T18:30:26Z", + "mac": "ENC[AES256_GCM,data:/aZOXw2xgQ8UZG5TIWXwHZjlofa08WM2XpPhXUbf2qrx0yyhEyZrtibalCIDdUGgzaZjt8b+qrZqgNE9o+HCUNVX9fU9yCXRL1kpksz9e6HV4S+KIrdHnEFtuRt7r8nP29BotLYoP9KKbA57lL5SYJgPINHq11CAiQLU6A8W8YI=,iv:0zvQe2wRd/qKjrqinc9kgP8RSl47xxD0LofREiK8XOc=,tag:eWhtD/X3CPHTlEZPgp0cjA==,type:str]", "unencrypted_suffix": "_unencrypted", "version": "3.10.2" } diff --git a/modules/home/app/zed/default.nix b/modules/home/apps/zed/default.nix similarity index 83% rename from modules/home/app/zed/default.nix rename to modules/home/apps/zed/default.nix index df8f0fd..9ebbebd 100644 --- a/modules/home/app/zed/default.nix +++ b/modules/home/apps/zed/default.nix @@ -40,6 +40,16 @@ in { copilot = false; }; + formatter = { + external = { + command = "alejandra"; + arguments = ["--quiet"]; + language = ["nix"]; + }; + }; + + format_on_save = "on"; + ### Language specific configurations languages = { ### Nix language @@ -47,17 +57,6 @@ in { language_servers = ["nixd" "!nil"]; }; }; - - ### LSP configurations - lsp = { - nixd = { - initialization_options = { - formatting = { - command = ["alejandra" "--quiet" "--"]; - }; - }; - }; - }; }; extraPackages = with pkgs; [nixd]; diff --git a/modules/home/desktop/gnome/default.nix b/modules/home/desktop/gnome/default.nix index 734425d..aa5eeae 100644 --- a/modules/home/desktop/gnome/default.nix +++ b/modules/home/desktop/gnome/default.nix @@ -44,7 +44,7 @@ in { enable-blur = mkOpt bool false "Whether to enable blur-my-shell application blur."; }; }; - wallpaper = mkOpt str (builtins.toString ../wallpapers/catppuccin/mountain_tower_sunset.jpg) "Specify the path of your prefered Gnome wallpaper."; + wallpaper = mkOpt str (builtins.toString ../wallpapers/catppuccin/howard-chen-mao-mao-forest-campsite.jpg) "Specify the path of your prefered Gnome wallpaper."; }; config = mkIf osConfig.${namespace}.desktop.gnome.enable { diff --git a/modules/home/desktop/wallpapers/catppuccin/howard-chen-mao-mao-forest-campsite.jpg b/modules/home/desktop/wallpapers/catppuccin/howard-chen-mao-mao-forest-campsite.jpg new file mode 100644 index 0000000..8804982 Binary files /dev/null and b/modules/home/desktop/wallpapers/catppuccin/howard-chen-mao-mao-forest-campsite.jpg differ diff --git a/modules/nixos/archetypes/workstation/default.nix b/modules/nixos/archetypes/workstation/default.nix index e2556b3..5f5b07d 100644 --- a/modules/nixos/archetypes/workstation/default.nix +++ b/modules/nixos/archetypes/workstation/default.nix @@ -1,6 +1,7 @@ { lib, self, + pkgs, config, ... }: let @@ -33,6 +34,7 @@ in { nix = { enable = true; use-lix = true; + use-nixld = true; }; }; @@ -43,6 +45,10 @@ in { desktop.gnome.enable = true; }; + environment.systemPackages = with pkgs; [ + nano + ]; + time.timeZone = mkDefault "Europe/Berlin"; }; } diff --git a/modules/nixos/desktop/gnome/default.nix b/modules/nixos/desktop/gnome/default.nix index d403db9..0cac5cf 100644 --- a/modules/nixos/desktop/gnome/default.nix +++ b/modules/nixos/desktop/gnome/default.nix @@ -29,6 +29,7 @@ in { gnome-console gnome-terminal gnome-music + totem # Gnome videos hitori # Sudoku game gnome-contacts gnome-initial-setup @@ -39,7 +40,8 @@ in { services.gnome.gnome-keyring.enable = true; environment.systemPackages = with pkgs; [ - gnome-tweaks + refine + showtime resources ]; }; diff --git a/modules/nixos/system/fonts/default.nix b/modules/nixos/system/fonts/default.nix index 43f9966..256cfa5 100644 --- a/modules/nixos/system/fonts/default.nix +++ b/modules/nixos/system/fonts/default.nix @@ -14,7 +14,22 @@ in { enable = mkEnableOption "system font management"; fonts = mkOption { type = listOf package; - default = with pkgs; [noto-fonts noto-fonts-cjk-sans noto-fonts-cjk-serif noto-fonts-emoji nerd-fonts.bigblue-terminal nerd-fonts.zed-mono monocraft]; + default = with pkgs; [ + corefonts + + noto-fonts + noto-fonts-cjk-sans + noto-fonts-cjk-serif + + inter + + nerd-fonts.zed-mono + monocraft + + noto-fonts-emoji + material-icons + material-design-icons + ]; example = [noto-fonts noto-fonts-emoji]; description = "Install additional font packages"; }; diff --git a/modules/nixos/users/default.nix b/modules/nixos/users/default.nix index 9f900e7..64829f8 100644 --- a/modules/nixos/users/default.nix +++ b/modules/nixos/users/default.nix @@ -22,6 +22,7 @@ initialPassword = self.lib.mkOpt (types.nullOr types.str) null "Plaintext insecure initial user password, only recommended for testing."; password = self.lib.mkOpt (types.nullOr types.str) null "Plaintext insecure user password, only recommended for testing."; hashedPasswordFile = self.lib.mkOpt (types.nullOr types.str) null "Secure, hashed user password stored in a separate file, recommended for production."; + hashedPassword = self.lib.mkOpt (types.nullOr types.str) null "Secure, hashed password, stored in plaintext, fine to use."; extraGroups = self.lib.mkOpt (types.listOf types.str) [] "List of additional groups this user belongs to."; }; }; @@ -49,7 +50,7 @@ in { users.users = lib.mapAttrs (username: userConfig: mkIf userConfig.enable { name = username; - inherit (userConfig) isNormalUser isSystemUser initialPassword hashedPasswordFile password extraGroups; + inherit (userConfig) isNormalUser isSystemUser initialPassword hashedPasswordFile hashedPassword password extraGroups; }) cfg; @@ -68,7 +69,13 @@ in { mkIf (userConfig.enable && homeConfigExists username) ( {osConfig, ...}: { # Import user home configuration and general home modules - imports = [(getHomeConfigPath username) inputs.sops-nix.homeManagerModules.sops inputs.catppuccin.homeModules.default] ++ homeModules; + imports = [ + (getHomeConfigPath username) + inputs.sops-nix.homeManagerModules.sops + inputs.catppuccin.homeModules.default + inputs.nixcord.homeModules.nixcord + inputs.youtube-music.homeManagerModules.default + ] ++ homeModules; home.stateVersion = lib.mkDefault osConfig.system.stateVersion; } diff --git a/systems/x86_64-nixos/puzzlevision/default.nix b/systems/x86_64-nixos/puzzlevision/default.nix index fcad685..1203d1d 100644 --- a/systems/x86_64-nixos/puzzlevision/default.nix +++ b/systems/x86_64-nixos/puzzlevision/default.nix @@ -1,8 +1,4 @@ -{ - pkgs, - config, - ... -}: { +{pkgs, ...}: { imports = [ ./hardware.nix ]; @@ -12,15 +8,10 @@ sops.defaultSopsFile = ./secrets/users.yaml; sops.age.keyFile = "/var/lib/sops-nix/key.txt"; - # Todo: automate this import in users module! - # Require user password secrets for users - sops.secrets."users/jo/password_hash".neededForUsers = true; - puzzlevision = { users.jo = { enable = true; - #password = "4868320069443"; - hashedPasswordFile = config.sops.secrets."users/jo/password_hash".path; # For testing only, replace with sops secret before production use + hashedPassword = "$6$mvK9bT756Aok54Vt$vBRnT66Vb3HL0Y5rEMJlHvKkvzVQ.KUciInTmW3FCBFT00IuFMpz3q9RhXPLTLMRPho65bTg9hMnFPb84I774."; extraGroups = ["wheel"]; }; diff --git a/systems/x86_64-nixos/puzzlevision/hardware.nix b/systems/x86_64-nixos/puzzlevision/hardware.nix index 5cc295c..62a959f 100644 --- a/systems/x86_64-nixos/puzzlevision/hardware.nix +++ b/systems/x86_64-nixos/puzzlevision/hardware.nix @@ -1,7 +1,7 @@ # Do not modify this file! It was generated by ‘nixos-generate-config’ # and may be overwritten by future invocations. Please make changes # to /etc/nixos/configuration.nix instead. -{ config, lib, pkgs, modulesPath, ... }: +{ config, lib, modulesPath, ... }: { imports =