# NixOS Configuration Repository Repo for nix configuration files --- # Information * Home Manager Documentation - [Link](https://nix-community.github.io/home-manager/index.html) * Home Manager Options Search - [Link](https://mipmip.github.io/home-manager-option-search/) * NixOS Documentation - Stable - [Link](https://nixos.org/manual/nixos/stable/) * NixOS Packages / Options Search - [Link](https://search.nixos.org/) * Nix User Repository (NUR) Search - [Link](https://nur.nix-community.org/) * Tons of good examples here - [Link](https://github.com/Mic92/dotfiles/blob/main/nixos/modules/) --- # Theming * To change system-wide themes, you need to change the following: 1. `desktops/gnome.nix` - Change the imports at the bottom. 2. `users/albert/gnome-dconf.nix` - Change the theme variants in the following: * `org/gnome/shell/extensions/nightthemeswitcher/gtk-variants` * `org/gnome/shell/extensions/nightthemeswitcher/icon-variants` * `org/gnome/shell/extensions/nightthemeswitcher/shell-variants` 3. `common/dotfiles/neovim.nix` - Change the following: * `plugins = with pkgs.vimPlugins` - Add your theme under "Themes" * `extraConfig` - Change the `colorscheme` section # GPG Keys 1. Import your GPG key `albert.key` 2. Add it to your GPG Keyring via `gpg --import albert.key` 3. Mark it as ultimately trusted via `gpg --edit-key albert@sysctl.io`, then type `trust`, then `5` 4. Repeat this step for all users who need a GPG key assigned # SOPS Secrets 1. To edit a file: cd to `/path/to/nix-files/` and run: * `nix-shell -p sops --run "sops secrets/secret_file.yml` * New shell alias: `sops secrets/secret_file.yml` 2. Ensure your GPG keys are set up. # Lanzaboote / SecureBoot * Instructions here - [Link](https://git.sysctl.io/Mirrors/lanzaboote/src/branch/master/docs/QUICK_START.md) 1. Create your keys: `sbctl create-keys` 2. Verify your machine is ready for SecureBoot: `sbctl verify` - Everything except `*-bzImage.efi` are signed 3. Enter Secureboot Setup mode in your EFI Settings on the motherboard (F10) * Security -> SecureBoot -> Set to Enabled and "Reset to Setup Mode" and exit 4. Enroll the keys: `sbctl enroll-keys --microsoft` * If you wish, you acan select --tpm-eventlog, but checksums will change later (ie, at a kernel rebuild) 5. Reboot and verify you are activated: `bootctl status`