Laptop, desktop, and home lab flake featuring Hyprland, Sway, declarative containers, a reverse proxy, and more.
Find a file
Aly Raffauf 0c2b2cd0a2
Some checks are pending
git-mirror / gitlab-sync (push) Waiting to run
nix-build / default-build (push) Waiting to run
nix-build / fallarbor-build (push) Waiting to run
nix-build / lavaridge-build (push) Waiting to run
nix-build / mauville-build (push) Waiting to run
nix-build / petalburg-build (push) Waiting to run
nix-build / rustboro-build (push) Waiting to run
nix-build / slateport-build (push) Waiting to run
nix-check / fmt-check (push) Waiting to run
nix-check / eval-check (push) Waiting to run
lavaridge: force disable firefox vaapi decoding
2024-08-24 19:46:41 -04:00
.github/workflows flake: onboard slateport (#94) 2024-08-22 06:21:00 -04:00
_img README.md: update features and screenshots 2024-08-15 20:46:05 -04:00
common flake: reorg common modules as flake outputs (#95) 2024-08-22 07:46:19 -04:00
flake clean-install: prompt for host 2024-07-17 11:07:29 -04:00
homeManagerModules desktop: add polkit-gnome window rules 2024-08-24 19:05:09 -04:00
homes aly: webcord -> vesktop 2024-08-24 17:55:56 -04:00
hosts lavaridge: force disable firefox vaapi decoding 2024-08-24 19:46:41 -04:00
nixosModules flatpak: integrate workarounds with stylix themes 2024-08-23 13:52:54 -04:00
secrets flake: onboard slateport (#94) 2024-08-22 06:21:00 -04:00
userModules aly/syncthing: share with slateport 2024-08-22 19:21:45 -04:00
.gitignore add .gitignore 2024-04-02 17:48:27 -04:00
.gitlab-ci.yml code cleanup (#47) 2024-07-18 21:05:35 -04:00
flake.lock flake: update inputs (#100) 2024-08-24 16:46:26 -04:00
flake.nix hosts: enable secureboot and tpm luks unlocking (#99) 2024-08-24 15:25:41 -04:00
LICENSE.md hosts: add READMEs (#50) 2024-07-20 19:41:51 -04:00
README.md hosts: enable secureboot and tpm luks unlocking (#99) 2024-08-24 15:25:41 -04:00
update_fetchgit.sh flake: update fetchgit script 2024-08-18 22:45:00 -04:00

nixos

My comprehensive NixOS flake for managing my laptop, desktop, and home lab environments.

Features

  • Hyprland: Dynamic tiling Wayland compositor and window manager.
  • Stylix: Auto-gnerated base16 themes for the whole desktop.
  • Encryption: Encrypted boot drives with Secure Boot and LUKS with TPM decryption.
  • Home Lab: Media, file sharing, and more with a efficnet routing via reverse proxy.

Inputs

This flake takes a variety of inputs, first and foremost my other flakes:

  • nixhw: opinionated set of generic (AMD, Intel, Laptop, SSD) and specific (Framework 13, Yoga 9i, Thinkpad T440p) hardware configuration modules for NixOS.
  • raffauflabs: everything (containers, services, nginx, etc) that makes my home lab a home lab.

As well as upstream third-party projects that I use for various tasks:

  • agenix: secrets storage and orchestration.
  • disko: declarative partitions and disk configuration.
  • home-manager: declarative dotfile and user package management.
  • hyprland: great dynamic tiling wayland compositor.
  • iio-hyprland: autorotate daemon for Hyprland.
  • lanzaboote: ssecure boot for NixOS.
  • nur: extra packages from the nix user repository.
  • stylix: system-wide colorscheming and typography.
  • sway: fantastic, rock-solid tiling compositor for wayland.

Outputs

  • homeManagerModules.default: app modules + everything you need for a competent Hyprland desktop (and a few others).
  • homeManagerModules.aly: my home-manager config.
  • homeManagerModules.aly-nox: my home-manager config, but for headless systems.
  • homeManagerModules.dustin: my husband's home-manager config.
  • nixosModules.common: various common modules specific to my hosts.
  • nixosModules.nixos: opinionated desktop, app, and service options.
  • nixosModules.users: basic user configuration options.

In addition, this flake outputs NixOS configuration and home-manager configurations for all of my hosts and users, respectively.

Deploying to NixOS

Each hardware configuration is host-specific. If you fork this repository, add a host configuration for your own hardware. Secrets are encrypted with agenix and will not be available without the private decryption keys.

Enabling Flakes

While widely used and considered stable, flakes are still considered experimental. To enable Flakes, add the following lines to your configuration.nix and rebuild.

nix.settings.experimental-features = [ "nix-command" "flakes" ];

Alternatively, pass --experimental-features "nix-command flakes" to nix to temporarily use flakes.

Building Flake

In order to deploy this Flake on your host, run the following command:

sudo nixos-rebuild boot --flake github:alyraffauf/nixcfg#$HOSTNAME

Substitute $HOSTNAME for whichever hostname you have chosen. Reboot to apply the flake's configuration for the chosen host.

Installing from Live USB

If you want to install NixOS from this flake, run the following commands, ideally from a NixOS live environment, providing the hostname associated with a NixOS configuration specified in flake.nix when prompted.

sudo nix --experimental-features "nix-command flakes" run github:alyraffauf/nixcfg