the home of my dotfiles and nix configuration files
Find a file
Nico 5438cc0d76 forgejo: allow registration
previously registration was blocked (even with external providers) as
DISABLE_REGISTRATION was enabled.

now users can only register through oidc.
2025-05-25 01:14:43 +10:00
hosts bocchi: make the neoforge 1.21.1 minecraft server listen on port 25565 2025-05-24 22:55:13 +10:00
modules forgejo: allow registration 2025-05-25 01:14:43 +10:00
stow zsh: add brew to path on macOS systems 2025-05-23 19:18:06 +10:00
.gitignore chore: ignore .DS_Store files 2025-05-23 18:46:11 +10:00
conf.sh conf.sh: use sudo for darwin-rebuild 2025-05-24 15:20:49 +10:00
flake.lock nix: update flake sources to 698214a 2025-05-24 15:15:21 +10:00
flake.nix nijika: remove karakeep 2025-05-12 19:34:19 +10:00
LICENSE chore: add BSD0 license 2025-05-03 16:34:35 +10:00
README.md chore: add installation guide 2025-05-03 16:34:35 +10:00

my little nix system

installation

linux - desktop

  1. Boot up NixOS live iso on a system.
  2. Clone flake
  3. Make a folder for the system under hosts/
  4. Run nixos-generate-config --dir hosts/HOSTNAME
  5. Set LUKS encryption passphrase via sudo nano /tmp/secret.key
  6. Run disko sudo nix --experimental-features "nix-command flakes" run github:nix-community/disko/latest -- --mode destroy,format,mount /path/to/disko-config.nix
  7. Copy over flake directory to new system
  8. Install system with sudo nixos-install --flake .#HOSTNAME - set a password for root
  9. Reboot into new system.
  10. Open a terminal and run passwd
  11. Log into normal user and configure networking via nmtui
  12. Apply dotfiles via stow stow in the base of the dotfiles directory.
  13. Download a wallpaper and apply it via matugen image

Secure boot

If a system has a secure boot, install the system WITHOUT the secureboot module. Once the steps above have been completed return here.

  1. Generate secureboot signing keys with sudo nix run nixpkgs#sbctl create-keys
  2. Rebuild the system WITH the secureboot module.
  3. Run sudo sbctl verify to check if SOME of the files are signed.
  4. Reboot your system, in the UEFI enable onboarding secureboot keys, usually a setting called 'Reset to setup mode'.
  5. Boot into your NixOS system and run sudo sbctl enroll-keys --microsoft to enroll your keys.
  6. Reboot into your UEFI again and enable secure boot.

macOS

  1. Install xcode developer tools, determinate nix and brew.
xcode-select --install
curl -fsSL https://install.determinate.systems/nix | sh -s -- install --determinate
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"
  1. Install Nix flake to system. nix run nix-darwin/master#darwin-rebuild -- switch
  2. Reboot
  3. Install OpenUTAU https://github.com/stakira/OpenUtau/releases/latest/download/OpenUtau-osx-x64.dmg
  4. Configure non-automated settings
  • set accent colour
  • set display to be spacious
  • customise spotlight settings
  • disable bluetooth
  • enable firewall
  • set wallpaper
  • enable switching workspace keybinds