my nix configurations (please roast me)
Find a file
2025-01-01 22:38:23 +03:00
assets iosevka-nerd + new zsh prompt 2024-03-03 21:39:15 +03:00
hosts feat(koi): docmost 2025-01-01 22:38:23 +03:00
lib chore(darwin): updated for latest nix-darwin 2024-11-27 14:22:31 +03:00
packages feat: added sftpgo to puffer 2024-01-09 08:34:03 +03:00
secrets feat(koi): docmost 2025-01-01 22:38:23 +03:00
services feat(koi): backups 2024-12-29 00:06:33 +03:00
ssh feat(koi): desu-deploy setup 2024-08-04 02:24:50 +03:00
users/teidesu chore: fuck .DS_Store 2024-12-27 19:45:35 +03:00
.gitignore chore: better unsafe secret handling 2024-05-12 12:43:51 +03:00
agenix-edit chore: --cat for agenix-edit 2024-06-15 07:16:24 +03:00
flake.lock chore(koi): bump linux + tweak cmdline 2024-12-10 08:50:11 +03:00
flake.nix chore: use nixos.tvix.store 2024-12-02 05:52:10 +03:00
LICENSE Create LICENSE 2024-01-30 12:19:43 +03:00
readme.md feat(koi): backups 2024-12-29 00:06:33 +03:00
switch chore(koi): bumped vaultwarden 2024-11-23 15:45:37 +03:00

nixos

ok hi this is my nixos config. it is pretty much a mess and the code sucks but welp

impure dependencies

note to self on what needs to be installed on the host manually:

common

  • /etc/ssh/agenix-key (darwin: ~/.ssh/agenix-key) - private key for secret decryption
  • ./secrets/unsafe.key - private key for unsafe secret decryption

"unsafe" secrets are only secret to the "outside" world (i.e. the git repo), but are decrypted at build-time and are available globally to the system. this is useful for things like server ips, since i don't want to expose them to everyone, but they are not really secret in the sense that they are not sensitive data.

koi:

  • /etc/iso/win11.iso - iso containing windows 11 installer (e.g. this: magnet) currently unused
  • /etc/vms/haos.img - qcow2 image for haos vm (can be downloaded from the official website, the KVM/Proxmox image).
  • /etc/vms/bnuuy.img - qcow2 image of an ubuntu cloud image (e.g. https://cloud-images.ubuntu.com/noble/current/noble-server-cloudimg-amd64.img)
  • /etc/secureboot/keys - secure boot keys, generated with sudo nix-shell -p sbctl --run "sbctl create-keys"
  • to enroll fde onto tpm: sudo systemd-cryptenroll /dev/nvme0n1p2 --tpm2-device=auto --tpm2-pcrs=0+2+7
  • rclone config (for backups): sudo nix-shell -p rclone --run "rclone config" you need to set up a remote called backups, which will be used as the destination for all backups

teidesu-osx

cp /var/run/current-system/Library/Fonts/* /Library/Fonts - copy nix-managed fonts to system fonts (waiting for this PR)

setting up

macos:

curl -L https://nixos.org/nix/install | sh
git clone https://github.com/teidesu/nixos ~/nixos
cd ~/nixos
./switch

cat in a readme 🐈

cat