nixcfg/hosts
Aly Raffauf 6b1be071f6
home/desktop: reorg with wayland helpers (#58)
* home/sway: use wayland helpers

* home/sway: reorg

* home/sway: simplify string interpolation

* home/sway: fix faulty helpers

* home/sway: consolidate secondary modules

* home/sway: cleanup

* home/wayland: simplify screenshooter

* home/sway: better random wallpaper handling

* home/sway: move display configuration to hosts

* home/sway: move touch config to hosts

* hosts/petalburg: add sway bindings

* home/wayland/helpers: save screenshots to config.xdg.userDirs.pictures

* home/wayland/helpers: enable mako dnd while slurping

* nix fmt
2024-07-21 23:25:10 -04:00
..
common hosts: update wifi docs 2024-07-20 20:37:46 -04:00
fallarbor home/desktop: reorg with wayland helpers (#58) 2024-07-21 23:25:10 -04:00
lavaridge home/desktop: reorg with wayland helpers (#58) 2024-07-21 23:25:10 -04:00
mauville home/desktop: reorg with wayland helpers (#58) 2024-07-21 23:25:10 -04:00
petalburg home/desktop: reorg with wayland helpers (#58) 2024-07-21 23:25:10 -04:00
rustboro home/desktop: reorg with wayland helpers (#58) 2024-07-21 23:25:10 -04:00
README.md hosts: add README.md 2024-07-20 20:35:01 -04:00

Hosts

Provisioning New Devices

  1. Create hosts/$HOSTNAME/default.nix and other host-specific nix modules (e.g. disko.nix,hardware.nix, and home.nix).
  2. Add host to nixosConfigurations in flake.nix.
  3. (OPTIONAL) Generate a cert.pem, key.pem, and device ID for Syncthing with syncthing -generate=$HOSTNAME. Find the device ID in the generated config.xml and add it to nixosModules/services/syncthing/default.nix, encrypt the cert and key with agenix, and set them as appropriate in the host configuration.
  4. Install NixOS from this flake. Secrets will not be available on first boot without a valid SSH private key.
  5. Copy the new system's public SSH key (/etc/ssh/ssh_host_ed25519_key.pub) to the host configuration (secrets/publicKeys/root_$HOSTNAME.pub).
  6. Add the new public key to secrets/secrets.nix and rekey all secrets with agenix --rekey.
  7. Rebuild the new system from git. Secrets will be automatically decrypted and immediately available in /run/agenix/ for NixOS and $XDG_RUNTIME_DIR/agenix/ for users.
  8. (OPTIONAL) Generate a new user SSH key and add it to nixosModules/users/default.nix in order to enable passwordless logins to other hosts.