My NixOS-managed dotfiles repository.
These can be installed using nixos-anywhere, however the installation steps are subtly different from the upstream ones:
Warning yui has not yet been set up for this process
- Get the gpg secret directory from a backup. If no backup is available, set up a new gpg directory as in the new machine instructions.
- Boot the NixOS install disk on the machine in question, set up networking and a user password.
- ssh into the machine, copy the ssh public key into
/root/.ssh/authorized_keys
- Place the desired disk encryption password in a file
(
secret.key
), ensuring it does not end in a newline (echo -e
). - Run
nix run --inputs-from . nixos-anywhere -- -f .#<hostname> root@<ip> --no-reboot --disk-encryption-keys /tmp/secret.key secret.key
- If some permission error around
secret.key
pops up, rerun the command without the--disk-encryption-keys
. They will already have been copied over, some kind of upstream bug.
- If some permission error around
- Before rebooting:
- Copy the gpg dir acquired in step 1 to
/mnt/var/lib/sops
- Place a copy of
/etc/sops/secrets.yaml
in/mnt/etc/sops/secrets.yaml
. - Set a password for tlater with
nixos-enter
andpasswd
- Copy the gpg dir acquired in step 1 to
Before the configuration can be installed, we need to set up a few basic things.
It's easiest to do this when the system in question is already running, and we're ssh'd into it, so we can read out some device data. So boot into the NixOS installer first (will be useful later anyway).
Create a new subdirectory of nixos-config
named after the new host,
and create a new nixosConfigurations
entry for it.
Then set up:
- Basic networking. Typically a bond config, see ren/yui for examples.
- Make sure to include one of the network modules so that wireless networking is set up on first boot.
- Generate and include a new
hardware-configuration.nix
:nixos-generate-config --no-filesystems --show-hardware-config
- Set up a new sops target.
- Firstly, create a new gpg dir according to these instructions.
- Then, add the generated fingerprint to
.sops.yaml
, and re-encrypt/etc/sops/secrets.yaml
.
For non-NixOS hosts, this requires nix >=2.4 with flakes enabled. To install this on an arbitrary Linux distro, follow the upstream nix installation instructions and then run:
nix-env -iA nixpkgs.nixFlakes
mkdir -p ~/.config/nix
echo 'experimental-features = nix-command flakes' > ~/.config/nix/nix.conf
After that, enter a devshell for this flake and install it with home-manager:
nix develop github:tlater/dotfiles
home-manager switch --flake github:tlater/dotfiles#gnome-vm