Repo for nix configuration files
Find a file
2023-08-17 13:18:53 +09:00
desktops test 2023-08-17 13:18:53 +09:00
home-manager test 2023-08-17 10:50:09 +09:00
hosts test 2023-08-17 13:18:53 +09:00
keys Rename 2023-08-15 12:42:38 +09:00
modules fix 2023-08-15 16:30:50 +09:00
secrets update secrets 2023-08-15 13:15:14 +09:00
services test 2023-08-15 12:56:43 +09:00
software Add more hyprland configs and weechat / matrix support 2023-08-16 12:57:53 +09:00
users test 2023-08-15 18:58:33 +09:00
.sops.yaml test 2023-08-15 12:56:43 +09:00
configuration.nix test 2023-08-17 13:00:33 +09:00
flake.lock Test 2023-08-17 09:22:40 +09:00
flake.nix test 2023-08-16 21:13:41 +09:00
README.md test 2023-08-17 13:00:33 +09:00
shell.nix TEst 2023-08-15 12:35:57 +09:00

NixOS Configuration Repository

NOTE: These configs expect this repo to be cloned to /etc/nixos/git/

Repo for nix configuration files


To Do List

  • btrfs snapshots
  • regreet config / theming - Icons still broken for some reason
    • Possibly switch to tuigreet and gruv it
  • mako config / theming
  • waybar config / theming
  • hyprland config / theming
    • Try libinput-gestures for gesture control of Hyprland - Link
  • powerline config / theming
  • neofetch config / theming
  • kitty config / theming
  • weechat / weechat-matrix
  • rofi config / theming
  • nvidia drivers
  • WINE configurations
  • btop config / theming
  • swaylock config / theming
  • vscodium and user-config.js file?
  • Get function keys working (sound, brightness, etc)
  • rofi - bitwarden-cli / bitwarden-menu (Link)
  • Try and submit this as a nixpkg - Link
  • Possibly move away from powerline-go - I want something simpler
    • Staying with powerline-go, just editing the config in home-manager/bash.nix
  • Set up the fingerprint reader - Link
  • sublime music config / theming / integration - Link
  • hyprland
    • Try hyprctl
    • hyprbars - Link
    • libinput-gestures?
    • configure programs.light - keybinds in hyprland config
    • authentication agent (like polkit-kde-agent)

Information

Home Manager

  • Home Manager Documentation - Link
  • Home Manager Options Search - Link

NixOS

  • NixOS Documentation - Stable - Link
  • NixOS Packages / Options Search - Link
  • Nix User Repository (NUR) Search - Link
  • Tons of good examples here - Link
  • Track a Nixpkgs PR - Link
  • NixOS Flakes Intro Guide - Link

Theming

  • Neofetch Themes - Github - Link
  • Hyprland - Github - Link

Theming

  • To change system-wide themes, you need to change the following:

gnome

  1. desktops/gnome.nix - Change the imports at the bottom.
  2. users/albert/gnome-dconf.nix - Change the theme variants in the following:
    • org/gnome/shell/extensions/nightthemeswitcher/gtk-variants
    • org/gnome/shell/extensions/nightthemeswitcher/icon-variants
    • org/gnome/shell/extensions/nightthemeswitcher/shell-variants

neovim

  1. home-manager/neovim.nix - Change the following:
    • plugins = with pkgs.vimPlugins - Add your theme under "Themes"
    • extraConfig - Change the colorscheme and AirlineTheme sections

hyprland / waybar

  1. WIP

kitty

  1. home-manager/kitty.nix - Update the content of home.file.".config/kitty/theme.conf".text

Firefox

  1. home-manager/firefox.nix - Change the entry under "# Theming"

btop

  1. home-manager/btop.nix - Set color_theme

bash / powerline

  1. home-manager/bash.nix - Set theme in programs.powerline-go.settings

neofetch

  1. home-manager/neofetch.nix - Update the contents of home.file.".config/neofetch/config.conf".text

GPG Keys

  1. Import the user private key: gpg import gpg/users/albert/privkey.asc
  2. Mark it as trusted: gpg --edit-key albert@sysctl.io, then type trust, then 5
  3. On each new machine, run nix-shell -p ssh-to-pgp --run "ssh-to-pgp -i /etc/ssh/ssh_host_rsa_key -o HOSTNAME.asc"
    • This will output the identifier you add to .sops.yaml
    • Move HOSTNAME.asc to keys/hosts/ and upload to git and rename accordingly.

Secrets

  1. To edit a file: cd to /path/to/nix-files/ and run:
    • nix-shell -p sops --run "sops secrets/secret_file.yml"
    • New shell alias: sops secrets/secret_file.yml
  2. When you add a new machine, you must update the secrets files encryption.
    • Run sops-update secrets/secrets.yaml and commit the change.

Lanzaboote / SecureBoot

  • Instructions here - Link
  1. Create your keys: sbctl create-keys
  2. Verify your machine is ready for SecureBoot: sbctl verify - Everything except *-bzImage.efi are signed
  3. Enter Secureboot Setup mode in your EFI Settings on the motherboard (F10)
    • Security -> SecureBoot -> Set to Enabled and "Reset to Setup Mode" and exit
  4. Enroll the keys: sbctl enroll-keys --microsoft
    • If you wish, you acan select --tpm-eventlog, but checksums will change later (ie, at a kernel rebuild)
  5. Reboot and verify you are activated: bootctl status

Other