my dotfiles
Find a file
2023-08-28 00:46:51 +07:00
home server: add scanservjs, nixmsi: refix boot 2023-08-24 18:32:47 +07:00
pkgs server: add scanservjs, nixmsi: refix boot 2023-08-24 18:32:47 +07:00
system server: add keycloak 2023-08-28 00:46:51 +07:00
.gitignore gitignore: add /result 2023-06-24 13:19:00 +07:00
COPYING add system76 scheduler+other system config changes 2023-01-24 15:42:51 +07:00
default.nix bpi-r3: more work on booting 2023-06-11 18:02:38 +07:00
extra-builtins.nix update inputs 2023-08-16 00:59:50 +07:00
flake.lock update inputs 2023-08-16 05:10:49 +07:00
flake.nix server: add scanservjs, nixmsi: refix boot 2023-08-24 18:32:47 +07:00
overlays.nix update inputs; bpi-r3: build kernel from source 2023-06-11 21:48:35 +07:00
private.nix.sample don't put private files to store by default 2023-05-26 01:38:17 +07:00
push.sh store secrets separate from this flake 2023-05-26 00:46:38 +07:00
README.md store secrets separate from this flake 2023-05-26 00:46:38 +07:00
update.sh store secrets separate from this flake 2023-05-26 00:46:38 +07:00

My Nix config

Home-manager config and modules are in ./home, NixOS config and modules are in ./system.

Secrets are fetched using a nix plugin at evaluation time to avoid using --impure. I plan to implement a more robust secrets system later though.

To install, simply run nixos-rebuild switch --flake . --option extra-builtins-file $(pwd)/extra-builtins.nix and home-manager switch --flake . --option extra-builtins-file $(pwd)/extra-builtins.nix, since this repo relies on build-time decryption of secrets using a Nix plugin (to be fair you won't be able to use it since you don't have the secrets, such as initial root password). If you don't have nix-plugins though, you can put the secrets in plaintext to /etc/nixos/private and add --impure flag to bootstrap the config.