my dotfiles
Find a file
2024-11-24 11:17:18 +07:00
home libolm: ignore deprecation 2024-11-24 11:14:23 +07:00
pkgs update inputs 2024-11-19 10:38:18 +07:00
system Revert "server: enable matrix-sliding-sync" 2024-11-24 11:17:18 +07:00
.gitignore add Radxa Rock 5A; update inputs 2023-10-08 04:41:50 +07:00
COPYING COPYING: properly write out 0BSD 2023-10-19 19:30:48 +07:00
default.nix bpi-r3: more work on booting 2023-06-11 18:02:38 +07:00
extra-builtins.nix flake/secrets: move from /etc/nixos/private to /secrets/nixos 2023-12-25 04:18:03 +07:00
flake.lock update inputs 2024-11-19 10:38:18 +07:00
flake.nix update inputs 2024-11-19 10:38:18 +07:00
lib.nix massive cleanup 2023-12-18 08:48:49 +07:00
nixos-rebuild.py misc fixes 2024-11-01 01:26:11 +07:00
overlays.nix update inputs 2024-01-30 19:39:14 +07:00
private.nix.sample server/certspotter: check tbs instead of pubkey 2023-10-26 02:02:48 +07:00
push.sh update inputs 2024-05-03 16:56:29 +07:00
README.md store secrets separate from this flake 2023-05-26 00:46:38 +07:00
update.sh change update script for ci branch 2024-11-18 22:23:39 +07:00

My Nix config

Home-manager config and modules are in ./home, NixOS config and modules are in ./system.

Secrets are fetched using a nix plugin at evaluation time to avoid using --impure. I plan to implement a more robust secrets system later though.

To install, simply run nixos-rebuild switch --flake . --option extra-builtins-file $(pwd)/extra-builtins.nix and home-manager switch --flake . --option extra-builtins-file $(pwd)/extra-builtins.nix, since this repo relies on build-time decryption of secrets using a Nix plugin (to be fair you won't be able to use it since you don't have the secrets, such as initial root password). If you don't have nix-plugins though, you can put the secrets in plaintext to /etc/nixos/private and add --impure flag to bootstrap the config.