44 lines
No EOL
2.4 KiB
Markdown
44 lines
No EOL
2.4 KiB
Markdown
# NixOS Configuration Repository
|
|
Repo for nix configuration files
|
|
---
|
|
# Information
|
|
* Home Manager Documentation - [Link](https://nix-community.github.io/home-manager/index.html)
|
|
* Home Manager Options Search - [Link](https://mipmip.github.io/home-manager-option-search/)
|
|
* NixOS Documentation - Stable - [Link](https://nixos.org/manual/nixos/stable/)
|
|
* NixOS Packages / Options Search - [Link](https://search.nixos.org/)
|
|
* Nix User Repository (NUR) Search - [Link](https://nur.nix-community.org/)
|
|
* Tons of good examples here - [Link](https://github.com/Mic92/dotfiles/blob/main/nixos/modules/)
|
|
|
|
---
|
|
# Theming
|
|
* To change system-wide themes, you need to change the following:
|
|
1. `desktops/gnome.nix` - Change the imports at the bottom.
|
|
2. `users/albert/gnome-dconf.nix` - Change the theme variants in the following:
|
|
* `org/gnome/shell/extensions/nightthemeswitcher/gtk-variants`
|
|
* `org/gnome/shell/extensions/nightthemeswitcher/icon-variants`
|
|
* `org/gnome/shell/extensions/nightthemeswitcher/shell-variants`
|
|
3. `common/dotfiles/neovim.nix` - Change the following:
|
|
* `plugins = with pkgs.vimPlugins` - Add your theme under "Themes"
|
|
* `extraConfig` - Change the `colorscheme` section
|
|
|
|
# GPG Keys
|
|
1. Import your GPG key `albert.key`
|
|
2. Add it to your GPG Keyring via `gpg --import albert.key`
|
|
3. Mark it as ultimately trusted via `gpg --edit-key albert@sysctl.io`, then type `trust`, then `5`
|
|
4. Repeat this step for all users who need a GPG key assigned
|
|
|
|
# SOPS Secrets
|
|
1. To edit a file: cd to `/path/to/nix-files/` and run:
|
|
* `nix-shell -p sops --run "sops secrets/secret_file.yml`
|
|
* New shell alias: `sops secrets/secret_file.yml`
|
|
2. Ensure your GPG keys are set up.
|
|
|
|
# Lanzaboote / SecureBoot
|
|
* Instructions here - [Link](https://git.sysctl.io/Mirrors/lanzaboote/src/branch/master/docs/QUICK_START.md)
|
|
1. Create your keys: `sbctl create-keys`
|
|
2. Verify your machine is ready for SecureBoot: `sbctl verify` - Everything except `*-bzImage.efi` are signed
|
|
3. Enter Secureboot Setup mode in your EFI Settings on the motherboard (F10)
|
|
* Security -> SecureBoot -> Set to Enabled and "Reset to Setup Mode" and exit
|
|
4. Enroll the keys: `sbctl enroll-keys --microsoft`
|
|
* If you wish, you acan select --tpm-eventlog, but checksums will change later (ie, at a kernel rebuild)
|
|
5. Reboot and verify you are activated: `bootctl status` |