1
0
Fork 0
NixOS configuration files for Aires. https://aires.fyi/blog/my-nixos-configuration/
Find a file
2024-11-08 20:04:11 -05:00
.vscode General: save workspace settings for Codium 2024-08-04 15:11:50 -04:00
bin Bin: minor tweak to NOS 2024-10-29 10:28:47 -04:00
hosts Hevana: switch from Oink to DDClient 2024-11-08 20:04:11 -05:00
modules ZSH: revert back to oh-my-zsh 2024-11-08 09:38:25 -05:00
packages chore: cleanup old and/or unused stuff 2024-10-25 19:53:50 -04:00
.gitattributes Revert "Git: fix git-crypt path in .gitattributes" 2024-10-05 15:52:30 -04:00
.gitignore Initial public commit! 2024-02-29 09:53:34 -05:00
flake.lock flake.lock: Update 2024-11-07 16:58:26 -05:00
flake.nix General: switch back to main nixos-hardware branch 2024-11-05 13:10:51 -05:00
README.md Khanda: build packages locally because I'm a silly lil guy who can't figure out how to automate --build-host without SSH throwing a fit 2024-10-18 11:30:57 -04:00

NixOS Configuration

A full set of configuration files managed via NixOS. This project is an unofficial extension of the Auxolotl system template.

Warning

DO NOT DOWNLOAD AND RUN nixos-rebuild ON THIS REPOSITORY! These are my personal configuration files. I invite you to look through them, modify them, and take inspiration from them, but if you run nixos-rebuild, it will completely overwrite your current system!

Using this repo

Note on secrets management

Secrets are managed using git-crypt. To unlock the repo, use git-crypt unlock [path to key file]. git-crypt will transparently encrypt/decrypt files stored in modules/secrets going forward, but you'll need this key file on all hosts that are using secrets.

Note

This is a poor man's secret management solution. If you use this, your secrets will be world-readable in the /nix/store/.

First-time installation

When installing on a brand new system, partition the main drive into two partitions: a /boot partition, and a LUKS partition. Then, run bin/format-drives.sh --root [root partition] --luks [luks partition] (the script will request sudo privileges):

./bin/format-drives.sh --boot /dev/nvme0n1p1 --luks /dev/nvme0n1p2 

Next, set up the host's config under in the hosts folder by copying configuration.nix.template and hardware-configuration.nix.template into a new folder. Running format-drives.sh also generates a hardware-configuration.nix file you can use.

Then, add the host to flake.nix under the nixosConfigurations section.

Finally, run the NixOS installer, replacing host with your actual hostname:

sudo nixos-install --verbose --root /mnt --flake .#host --no-root-password

Tip

This config installs a nixos-rebuild wrapper called nos (NixOS Operations Script) that handles pulling and pushing changes to your configuration repository via git. For more info, run nixos-operations-script --help.

Running updates

To update a system, run nixos-operations-script (or just nos). To commit updates back to the repo, use nos --update. Do not run this script as root - it will automatically request sudo permissions as needed.

Automatic updates

To enable automatic updates for a host, set aux.system.services.autoUpgrade = true;. You can configure the autoUpgrade module with additional settings, e.g.:

aux.system.services.autoUpgrade = {
  enable = true;
  configDir = config.secrets.nixConfigFolder;
  onCalendar = "daily";
  user = config.users.users.aires.name;
};

Automatic updates work by running nos. There's an additional pushUpdates option that, when enabled, updates the flake.lock file and pushes it back up to the Git repository. Only one host needs to do this (in this case, it's Hevana, but you can safely enable it on multiple hosts as long as they use the same repository and update at different times.

Manually updating

Run nos to update the system. Use the --update flag to update flake.lock as part of the process. For the first build, you'll need to specify the path to your flake.nix file and the hostname using nos --hostname my_hostname --flake /path/to/flake.nix.

After the first build, you can omit the hostname and path:

nos

This is the equivalent of running:

cd [flake dir]
git pull
nix flake update --commit-lock-file
git push
sudo nixos-rebuild switch --flake .

There are a few different actions for handling the update:

  • switch replaces the running system immediately.
  • boot switches to the new generation during the next reboot.
  • build creates and caches the update without applying it.
  • test creates the generation and switches to it, but doesn't add it to the bootloader.

Using Remote builds

Nix can create builds for or on remote systems, and transfer them via SSH.

Generating a build on a remote system

You can run a build on a remote server by using --build-host:

nixos-rebuild build --flake . --build-host [remote hostname]
Pushing a build to a remote system

Conversely, you can run a build on the local host, then push it to a remote system.

NIX_SSHOPTS="-o RequestTTY=force" nixos-rebuild --target-host user@example.com --use-remote-sudo switch

Testing without modifying the system

If you want to test without doing a whole build, or without modifying the current system, there are a couple additional tools to try.

Dry builds

To quickly validate your configuration, create a dry build. This analyzes your configuration to determine whether it'll actually build:

nixos-rebuild dry-build --flake .

Virtual machines

You can also build a virtual machine image to preview changes. The first command builds the VM, and the second runs it:

nixos-rebuild build-vm --flake .
./result/bin/run-nixos-vm

Note

Running the VM also creates a .qcow2 file for data persistence. Remove this file after a while, otherwise data might persist between builds and muck things up.

About this repository

Layout

This config uses a custom templating system built off of the Auxolotl system templates.

  • Flakes are the entrypoint, via flake.nix. This is where Flake inputs and Flake-specific options get defined.
  • Hosts are defined in the hosts folder.
  • Modules are defined in modules. All of these files are automatically imported (except home-manager modules). You simply enable the ones you want to use, and disable the ones you don't. For example, to install Flatpak support, set aux.system.ui.flatpak.enable = true;.
    • After adding a new module, make sure to git add it before running nixos-rebuild.
  • Home-manager configs live in the users/ folders.

Features

This Nix config features:

  • Flakes
  • Home Manager
  • Automatic daily updates
  • AMD, Intel, and Raspberry Pi (ARM64) hardware configurations
  • Support for various GUIs and desktop environments including Gnome, KDE, XFCE, and Hyprland
  • Boot splash screens via Plymouth
  • Secure Boot support via Lanzaboote
  • Disk encryption via LUKS with TPM auto-unlocking
  • Custom packages and systemd services
  • Flatpaks
  • Default ZSH shell using Oh My ZSH
  • Secrets (in a janky hacky kinda way)