My NixOS configs.
Find a file
2024-09-10 21:57:34 -04:00
home-manager Finalize whatever 2024-09-10 15:42:37 -04:00
nixos Fix a fuckup 2024-09-10 21:43:17 -04:00
overlays Whatever changes idk i just wanna pull on my server 2024-08-29 14:15:26 -04:00
pkgs Add personalized Half-Life nix-derivation 2024-08-27 14:08:39 -04:00
.gitattributes Change a lot, mostly adding 3 Minecraft servers and Velocity 2024-08-30 01:17:50 -04:00
flake.lock Add photoprism properly 2024-09-10 14:45:28 -04:00
flake.nix Add Lenovo laptop 2024-09-08 21:45:54 -04:00
LICENSE Initial commit 2024-07-30 08:49:49 -04:00
local.key.asc Please. 2024-08-25 00:07:41 -04:00
preview.png Finally switch to flakes. 2024-08-24 22:16:51 -04:00
README.md Add some basic documentation 2024-09-10 21:57:34 -04:00
secrets.nix Touchups 2024-09-10 21:39:17 -04:00

My Nix files, now organized in a flake.

Thanks for taking a look at my Nix* configs! While this is primarily organized for my use only, you may find each individual service file or user config to be a good starting point, or something to take and adapt into your own config.

Installation

Installing any of my flakes onto a system should be done after any initial install. I would opt to do a minimal install, but this is up to you. After installing NixOS, backup your hardware-config.nix file, so you can adapt it to fit the format of nixos/hardware/machines, then adjusting the other referenced files in the flake.nix file to reference your specific computer.

An initial install will have to be ran as nixos-rebuild switch --flake /etc/nixos/.#HOSTNAME, where HOSTNAME is a hostname defined in your flake. You may also have to enable "experimental" features with a flag, such as nix-command and flakes. Home-Manager is handled separately, despite being in the same folder. A rebuild of a user's home would have to be done with home-manager switch --flake /etc/nixos. This will pull the config as defined in the flake as USER@HOSTNAME, where USER is the user running the home-manager command.

My config heavily references a gnupg-protected secrets file. These will have to be adapted and rewritten if anyone is to use my config for themselves.

For my use, to unlock secrets, use this command: gpg --pinentry-mode loopback --decrypt local.key.asc | git-crypt unlock -

Made with love ❤️

image