nixcfg/hosts
2024-07-21 22:25:42 -04:00
..
common hosts: update wifi docs 2024-07-20 20:37:46 -04:00
fallarbor home/sway: move display configuration to hosts 2024-07-21 22:25:42 -04:00
lavaridge home/sway: move display configuration to hosts 2024-07-21 22:25:42 -04:00
mauville home/sway: move display configuration to hosts 2024-07-21 22:25:42 -04:00
petalburg home/sway: move display configuration to hosts 2024-07-21 22:25:42 -04:00
rustboro home/sway: move display configuration to hosts 2024-07-21 22:25:42 -04:00
README.md hosts: add README.md 2024-07-20 20:35:01 -04:00

Hosts

Provisioning New Devices

  1. Create hosts/$HOSTNAME/default.nix and other host-specific nix modules (e.g. disko.nix,hardware.nix, and home.nix).
  2. Add host to nixosConfigurations in flake.nix.
  3. (OPTIONAL) Generate a cert.pem, key.pem, and device ID for Syncthing with syncthing -generate=$HOSTNAME. Find the device ID in the generated config.xml and add it to nixosModules/services/syncthing/default.nix, encrypt the cert and key with agenix, and set them as appropriate in the host configuration.
  4. Install NixOS from this flake. Secrets will not be available on first boot without a valid SSH private key.
  5. Copy the new system's public SSH key (/etc/ssh/ssh_host_ed25519_key.pub) to the host configuration (secrets/publicKeys/root_$HOSTNAME.pub).
  6. Add the new public key to secrets/secrets.nix and rekey all secrets with agenix --rekey.
  7. Rebuild the new system from git. Secrets will be automatically decrypted and immediately available in /run/agenix/ for NixOS and $XDG_RUNTIME_DIR/agenix/ for users.
  8. (OPTIONAL) Generate a new user SSH key and add it to nixosModules/users/default.nix in order to enable passwordless logins to other hosts.