my dotfiles
Find a file
2023-07-28 21:56:34 +07:00
home nvfetcher: override nix version 2023-07-28 14:04:06 +07:00
pkgs update inputs 2023-07-12 20:48:20 +07:00
system server/home/metrics: listen on 127.0.0.1 only 2023-07-28 21:56:34 +07:00
.gitignore gitignore: add /result 2023-06-24 13:19:00 +07:00
COPYING add system76 scheduler+other system config changes 2023-01-24 15:42:51 +07:00
default.nix bpi-r3: more work on booting 2023-06-11 18:02:38 +07:00
extra-builtins.nix don't put private files to store by default 2023-05-26 01:38:17 +07:00
flake.lock server/home: init; router/unbound: fix avahi resolver 2023-07-28 09:59:47 +07:00
flake.nix fix ci (?) 2023-07-28 12:16:03 +07:00
overlays.nix update inputs; bpi-r3: build kernel from source 2023-06-11 21:48:35 +07:00
private.nix.sample don't put private files to store by default 2023-05-26 01:38:17 +07:00
push.sh store secrets separate from this flake 2023-05-26 00:46:38 +07:00
README.md store secrets separate from this flake 2023-05-26 00:46:38 +07:00
update.sh store secrets separate from this flake 2023-05-26 00:46:38 +07:00

My Nix config

Home-manager config and modules are in ./home, NixOS config and modules are in ./system.

Secrets are fetched using a nix plugin at evaluation time to avoid using --impure. I plan to implement a more robust secrets system later though.

To install, simply run nixos-rebuild switch --flake . --option extra-builtins-file $(pwd)/extra-builtins.nix and home-manager switch --flake . --option extra-builtins-file $(pwd)/extra-builtins.nix, since this repo relies on build-time decryption of secrets using a Nix plugin (to be fair you won't be able to use it since you don't have the secrets, such as initial root password). If you don't have nix-plugins though, you can put the secrets in plaintext to /etc/nixos/private and add --impure flag to bootstrap the config.