Add changes made since installation

This commit is contained in:
caem 2025-01-26 23:54:54 +01:00
parent b26fd20ead
commit 7e8b57b1a9
Signed by: caem
GPG key ID: 69A830D03203405F
13 changed files with 142 additions and 25 deletions

View file

@ -127,6 +127,12 @@ For your ssh key, place it in `~/.ssh` and create a symlink for the root user.
sudo ln -sf /home/nixos/.ssh /root/.ssh sudo ln -sf /home/nixos/.ssh /root/.ssh
``` ```
And start a instance of ssh-agent.
```sh
eval $(ssh-agent -s)
ssh-add ~/.ssh/[your key]
```
#### 3. Update the flake input for your secret #### 3. Update the flake input for your secret
In `flake.nix`, replace In `flake.nix`, replace
@ -141,6 +147,8 @@ with your url.
``` ```
#### 4. Update flake.lock (optional) #### 4. Update flake.lock (optional)
This is very useful and will also tell you if cloning your secrets work,
rather than only telling you after already having partitioned the drive.
```sh ```sh
nix --extra-experimental-features 'nix-command flakes' flake update nix --extra-experimental-features 'nix-command flakes' flake update
``` ```

91
flake.lock generated
View file

@ -39,6 +39,52 @@
"type": "github" "type": "github"
} }
}, },
"flake-parts_2": {
"inputs": {
"nixpkgs-lib": [
"nixpak",
"nixpkgs"
]
},
"locked": {
"lastModified": 1736143030,
"narHash": "sha256-+hu54pAoLDEZT9pjHlqL9DNzWz0NbUn8NEAHP7PQPzU=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "b905f6fc23a9051a6e1b741e1438dbfc0634c6de",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
"hercules-ci-effects": {
"inputs": {
"flake-parts": [
"nixpak",
"flake-parts"
],
"nixpkgs": [
"nixpak",
"nixpkgs"
]
},
"locked": {
"lastModified": 1736917206,
"narHash": "sha256-JTBWmyGf8K1Rwb+gviHIUzRJk/sITtT+72HXFkTZUjo=",
"owner": "hercules-ci",
"repo": "hercules-ci-effects",
"rev": "afd0a42e8c61ebb56899315ee4084a8b2e4ff425",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "hercules-ci-effects",
"type": "github"
}
},
"home-manager": { "home-manager": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
@ -62,11 +108,11 @@
}, },
"impermanence": { "impermanence": {
"locked": { "locked": {
"lastModified": 1736688610, "lastModified": 1737831083,
"narHash": "sha256-1Zl9xahw399UiZSJ9Vxs1W4WRFjO1SsNdVZQD4nghz0=", "narHash": "sha256-LJggUHbpyeDvNagTUrdhe/pRVp4pnS6wVKALS782gRI=",
"owner": "nix-community", "owner": "nix-community",
"repo": "impermanence", "repo": "impermanence",
"rev": "c64bed13b562fc3bb454b48773d4155023ac31b7", "rev": "4b3e914cdf97a5b536a889e939fb2fd2b043a170",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -75,13 +121,35 @@
"type": "github" "type": "github"
} }
}, },
"nixpak": {
"inputs": {
"flake-parts": "flake-parts_2",
"hercules-ci-effects": "hercules-ci-effects",
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1737599681,
"narHash": "sha256-sFzfMxH7c9UWyrFsC2wsPRJqTCHchz7q2zd04+9/yvw=",
"owner": "nixpak",
"repo": "nixpak",
"rev": "68beced51b937d506187431bec4847e78fd34911",
"type": "github"
},
"original": {
"owner": "nixpak",
"repo": "nixpak",
"type": "github"
}
},
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1737569578, "lastModified": 1737672001,
"narHash": "sha256-6qY0pk2QmUtBT9Mywdvif0i/CLVgpCjMUn6g9vB+f3M=", "narHash": "sha256-YnHJJ19wqmibLQdUeq9xzE6CjrMA568KN/lFPuSVs4I=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "47addd76727f42d351590c905d9d1905ca895b82", "rev": "035f8c0853c2977b24ffc4d0a42c74f00b182cd8",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -105,11 +173,11 @@
}, },
"nixpkgs-unstable": { "nixpkgs-unstable": {
"locked": { "locked": {
"lastModified": 1737469691, "lastModified": 1737746512,
"narHash": "sha256-nmKOgAU48S41dTPIXAq0AHZSehWUn6ZPrUKijHAMmIk=", "narHash": "sha256-nU6AezEX4EuahTO1YopzueAXfjFfmCHylYEFCagduHU=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "9e4d5190a9482a1fb9d18adf0bdb83c6e506eaab", "rev": "825479c345a7f806485b7f00dbe3abb50641b083",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -125,6 +193,7 @@
"flake-parts": "flake-parts", "flake-parts": "flake-parts",
"home-manager": "home-manager", "home-manager": "home-manager",
"impermanence": "impermanence", "impermanence": "impermanence",
"nixpak": "nixpak",
"nixpkgs": "nixpkgs", "nixpkgs": "nixpkgs",
"nixpkgs-unstable": "nixpkgs-unstable", "nixpkgs-unstable": "nixpkgs-unstable",
"secrets": "secrets", "secrets": "secrets",
@ -139,11 +208,11 @@
"rev": "2cfed436d84594b4d4a73843095c75c644628dfe", "rev": "2cfed436d84594b4d4a73843095c75c644628dfe",
"revCount": 4, "revCount": 4,
"type": "git", "type": "git",
"url": "ssh://git@git.caem.dev/caem/secrets" "url": "ssh://git@git.caem.dev/caem/secrets.git"
}, },
"original": { "original": {
"type": "git", "type": "git",
"url": "ssh://git@git.caem.dev/caem/secrets" "url": "ssh://git@git.caem.dev/caem/secrets.git"
} }
}, },
"sops-nix": { "sops-nix": {

View file

@ -2,7 +2,7 @@
description = "My NixOS configuration files."; description = "My NixOS configuration files.";
inputs = { inputs = {
secrets.url = "git+ssh://git@git.caem.dev/caem/secrets"; secrets.url = "git+ssh://git@git.caem.dev/caem/secrets.git";
nixpkgs.url = "github:nixos/nixpkgs/nixos-24.11"; nixpkgs.url = "github:nixos/nixpkgs/nixos-24.11";
nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable"; nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable";

View file

@ -18,6 +18,8 @@
efi.canTouchEfiVariables = true; efi.canTouchEfiVariables = true;
grub = { grub = {
enable = true; enable = true;
# Keep "nodev" for efi systems
device = "nodev";
efiSupport = true; efiSupport = true;
gfxmodeEfi = "1920x1080"; gfxmodeEfi = "1920x1080";
}; };

View file

@ -5,11 +5,11 @@
disk = { disk = {
master = { master = {
type = "disk"; type = "disk";
device = ""; # [managed by install.sh] device = "/dev/nvme0n1"; # [managed by install.sh]
content = { content = {
type = "gpt"; type = "gpt";
partitions = { partitions = {
ESP = { efi = {
priority = 1; priority = 1;
name = "efi"; name = "efi";
start = "1M"; start = "1M";

View file

@ -10,6 +10,7 @@
"${modules}/hardware/cpu/amd" "${modules}/hardware/cpu/amd"
"${modules}/multimedia" "${modules}/multimedia"
"${modules}/desktop/gnome" "${modules}/desktop/gnome"
"${modules}/communication"
]; ];
} }

View file

@ -84,8 +84,8 @@ sed_safe () {
} }
update_managed_values() { update_managed_values() {
sed -i 's/\( *device = \)".*"\(; #.*\)/\1"'"$(sed_safe "$CAENIX_INSTALL_DEVICE")"'"\2/' "./hosts/$DOTNIX_HOSTNAME/default.nix" sed -i 's/\( *device = \)".*"\(; # [managed by install\.sh].*\)/\1"'"$(sed_safe "$CAENIX_INSTALL_DEVICE")"'"\2/' "./hosts/$CAENIX_HOSTNAME/default.nix"
sed -i 's/\( *device = \)".*"\(; #.*\)/\1"'"$(sed_safe "$CAENIX_INSTALL_DEVICE")"'"\2/' "./hosts/$DOTNIX_HOSTNAME/disko.nix" sed -i 's/\( *device = \)".*"\(; #.*\)/\1"'"$(sed_safe "$CAENIX_INSTALL_DEVICE")"'"\2/' "./hosts/$CAENIX_HOSTNAME/disko.nix"
sed -i 's/\( *system.stateVersion = \)".*"\(; #.*\)/\1"'"$(sed_safe "$(nixos-version | cut -f1,2 -d '.')")"'"\2/' "./hosts/$CAENIX_HOSTNAME/default.nix" sed -i 's/\( *system.stateVersion = \)".*"\(; #.*\)/\1"'"$(sed_safe "$(nixos-version | cut -f1,2 -d '.')")"'"\2/' "./hosts/$CAENIX_HOSTNAME/default.nix"
} }
@ -144,8 +144,8 @@ copy_files_to_new_install() {
fi fi
sudo cp -vr . /mnt/nix/config sudo cp -vr . /mnt/nix/config
sudo mkdir -p "/mnt/nix/persist/home/$username/programming" sudo mkdir -p "/mnt/nix/persist/home/$username/programming/personal"
sudo ln -svf /nix/config "/mnt/nix/persist/home/$username/programming/caenix" sudo ln -svf /nix/config "/mnt/nix/persist/home/$username/programming/personal/caenix"
sudo chown -R 1000:100 "/mnt/nix/persist/home/$username" sudo chown -R 1000:100 "/mnt/nix/persist/home/$username"
sudo chown -R 1000:100 "/mnt/nix/config" sudo chown -R 1000:100 "/mnt/nix/config"
} }

View file

@ -3,6 +3,6 @@
{ {
programs.gpg = { programs.gpg = {
enable = true; enable = true;
homedir = "${config.xdg.dataHome}"; homedir = "${config.xdg.dataHome}/gnupg";
}; };
} }

View file

@ -30,6 +30,30 @@
}; };
}; };
programs.fastfetch = {
enable = true;
settings = {
modules = [
"title"
"separator"
"os"
"kernel"
"initsystem"
"uptime"
"datetime"
"packages"
"terminal"
"wm"
"shell"
"cpu"
"gpu"
"memory"
"break"
"colors"
];
};
};
home.file.".zshenv".enable = false; home.file.".zshenv".enable = false;
home.file.".config/zsh/conf.d" = { home.file.".config/zsh/conf.d" = {
source = ./conf.d; source = ./conf.d;

View file

@ -33,9 +33,19 @@
sops.age.keyFile = "/nix/config/keys.txt"; sops.age.keyFile = "/nix/config/keys.txt";
environment.persistence."/nix/persist" = { environment.persistence."/nix/persist" = {
users."${username}".directories = [ files = [
".ssh" "/root/.ssh/known_hosts"
".local/share/gnupg" ];
users."${username}".directories = let
baseAttrs = {
user = "${username}";
group = "users";
mode = "u=rwx,g=,o=";
};
in [
(baseAttrs // { directory = ".ssh"; })
(baseAttrs // { directory = ".local/share/gnupg"; })
(baseAttrs // { directory = ".local/share/keyrings"; })
]; ];
}; };
} }

View file

@ -55,6 +55,9 @@
# of having them set imperatively and simply persisted. # of having them set imperatively and simply persisted.
".config/forge" ".config/forge"
]; ];
files = [
".config/monitors.xml"
];
}; };
}; };
} }

View file

@ -32,10 +32,10 @@
nix = { nix = {
settings = { settings = {
substituters = [ substituters = [
"https://cuda-maintainers.cachix.org" "https://nix-community.cachix.org"
]; ];
trusted-public-keys = [ trusted-public-keys = [
"cuda-maintainers.cachix.org-1:0dq3bujKpuEPMCX6U4WylrUDZ9JyUG0VpVZa7CNfq5E=" "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
]; ];
}; };
}; };

View file

@ -6,7 +6,7 @@
firefox-esr firefox-esr
]; ];
environment.persistence."/nix/config" = { environment.persistence."/nix/persist" = {
users."${username}".directories = [ users."${username}".directories = [
".config/mozilla" ".config/mozilla"
]; ];