nix/README.md
2023-07-12 15:08:57 +09:00

43 lines
No EOL
2.3 KiB
Markdown

# NixOS Configuration Repository
Repo for nix configuration files
---
# Information
* Home Manager Documentation - [Link](https://nix-community.github.io/home-manager/index.html)
* Home Manager Options Search - [Link](https://mipmip.github.io/home-manager-option-search/)
* NixOS Documentation - Stable - [Link](https://nixos.org/manual/nixos/stable/)
* NixOS Packages / Options Search - [Link](https://search.nixos.org/)
* Tons of good examples here - [Link](https://github.com/Mic92/dotfiles/blob/main/nixos/modules/)
---
# Theming
* To change system-wide themes, you need to change the following:
1. `desktops/gnome.nix` - Change the imports at the bottom.
2. `users/albert/gnome-dconf.nix` - Change the theme variants in the following:
* `org/gnome/shell/extensions/nightthemeswitcher/gtk-variants`
* `org/gnome/shell/extensions/nightthemeswitcher/icon-variants`
* `org/gnome/shell/extensions/nightthemeswitcher/shell-variants`
3. `common/dotfiles/neovim.nix` - Change the following:
* `plugins = with pkgs.vimPlugins` - Add your theme under "Themes"
* `extraConfig` - Change the `colorscheme` section
# GPG Keys
1. Import your GPG key `albert.key`
2. Add it to your GPG Keyring via `gpg --import albert.key`
3. Mark it as ultimately trusted via `gpg --edit-key albert@sysctl.io`, then type `trust`, then `5`
4. Repeat this step for all users who need a GPG key assigned
# SOPS Secrets
1. To edit a file: cd to `/path/to/nix-files/` and run:
* `nix-shell -p sops --run "sops secrets/secret_file.yml`
* New shell alias: `sops secrets/secret_file.yml`
2. Ensure your GPG keys are set up.
# Lanzaboote / SecureBoot
* Instructions here - [Link](https://git.sysctl.io/Mirrors/lanzaboote/src/branch/master/docs/QUICK_START.md)
1. Create your keys: `sbctl create-keys`
2. Verify your machine is ready for SecureBoot: `sbctl verify` - Everything except `*-bzImage.efi` are signed
3. Enter Secureboot Setup mode in your EFI Settings on the motherboard (F10)
* Security -> SecureBoot -> Set to Enabled and "Reset to Setup Mode" and exit
4. Enroll the keys: `sbctl enroll-keys --microsoft`
* If you wish, you acan select --tpm-eventlog, but checksums will change later (ie, at a kernel rebuild)
5. Reboot and verify you are activated: `bootctl status`