β UPDATE: This is sorely out of date. I have maintained all my Nix and Emacs config using a literate Org file for the last couple of years. I plan to tidy up the private parts and publishβ¦ at some point. β
Welcome to the bikeshed!
This repository houses all my machine configurations expressed declaratively using a Nix flake. It covers both my personal and work devices that are running either NixOS or macOS.
The expressions are organised into platform-agnostic modules that leverage the likes of the nixpkgs, home-manager and nix-darwin to fully configure the OS and userspace from scratch.
These days I am spending the majority of time in either Firefox or Emacs (+vterm). On NixOS I am using EXWM and on macOS I am usually just running native fullscreen, ββΉing between the two previously mentioned apps. Additionally, a simple theming system is used to switch various things between light and dark versions, and a secrets attribute set (kept encrypted in a private repository) is referenced throughout.
NOTE: Some twisted souls found value in all the ricing of the previous incarnation of this repository. Iβll keep archived on this branch for reference.
CI (Travis for NixOS, GitHub Actions for macOS) runs on push. The jobs generate a special CI machine that imports every module, and derives either a NixOS VM (via QEMU) or simply builds on a fresh Darwin agent VM (in the case of macOS). The resultant binaries are pushed to Cachix and subsequently become available for any of my other machines, saving a lot of wasted battery!
The Makefile (in conjunction with some helpful aliases) is used to drive most actions, abstracting away NixOS/macOS differences where necessary.
Below are some rough platform specific installation notes I use to go from fresh installs to fully configured machine.
From a fresh macOS install.
sudo systemsetup -setremotelogin onsudo xcodebuild -licensesudo scutil --set HostName nixmachine
sudo scutil --set LocalHostName nixmachine
sudo scutil --set ComputerName nixmachine
dscacheutil -flushcacheFor sops-nix.
- System settings β> Users and Groups β> Add Account β> Group
- Press (i) on
keysand attach it tombaillie
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install.sh)"softwareupdate --install-rosettacurl --proto '=https' --tlsv1.2 -sSf -L \
https://install.determinate.systems/nix | \
sh -s -- installnix copy --no-check-sigs --keep-going --to ssh-ng://$REMOTE ~/.nix-profilesudo git clone --recursive git@github.com:martinbaillie/dotfiles.git /etc/dotfiles
sudo chown -R $USER: /etc/dotfilesnix-shell -p cachix
cachix use martinbailliemake switchchsh -s /run/current-system/sw/bin/zsh $USERmake config-emacsSet Flux, Karabiner, Spectacle, Cursorcerer to start at boot, install kernel extensions and so on.
Download and verify latest NixOS minimal ISO:
"21.05"#+RESULTS[8f7a4f3511d5d6152ec17fdf52addc1eecd1a880]: nixos-ver
21.05
(format "%s.2796.110a2c9ebbf" nixos-ver)#+RESULTS[d02522c67a569b479981b108c6d2236d90a80aec]: nixos-rel
21.05.2796.110a2c9ebbf
(format "https://releases.nixos.org/nixos/%s" nixos-ver)#+RESULTS[6ea8b95b40577283983b31f1862093ba872ded97]: nixos-url
https://releases.nixos.org/nixos/21.05
curl -O ${NIXOS_URL}/nixos-${NIXOS_REL}/nixos-minimal-${NIXOS_REL}-x86_64-linux.iso
curl -O ${NIXOS_URL}/nixos-${NIXOS_REL}/nixos-minimal-${NIXOS_REL}-x86_64-linux.iso.sha256
sha256sum -c nixos-minimal-${NIXOS_REL}-x86_64-linux.iso.sha256Create a bootable NixOS USB (macOS example):
diskutil list # Find USB
diskutil unmountDisk /dev/disk2
dd if=nixos-minimal-${NIXOS_REL}-x86_64-linux.iso of=/dev/rdisk2 bs=4m
diskutil unmountDisk /dev/disk2Create a bootable NixOS USB (NixOS example):
lsblk -i # Locate the device.
cp nixos-minimal-${NIXOS_REL}-x86_64-linux.iso /dev/sdX # Target whole disk.- [X] Disable Secure Boot
- [X] Enable CSM Support
Setup networking:
sudo su
wpa_supplicant -B -i interface -c <(wpa_passphrase 'SSID' 'key')
ip addrConduct rest of install from other laptop for convenience (+SSH agent forwarding):
ssh -A root@<addr>Create a 500M boot partition:
gdisk /dev/nvme0n1
# o (create new empty partition table)
# n (add partition, 500M, type ef00 EFI)
# n (add partition, remaining space, type 8301 Linux Reserved - in the absence of a LUKS code)
# w (write partition table and exit)Setup the encrypted LUKS partition and open it:
cryptsetup luksFormat /dev/nvme0n1p2
cryptsetup luksOpen /dev/nvme0n1p2 enc-pvCreate two logical volumes (swap and root):
pvcreate /dev/mapper/enc-pv
vgcreate vg /dev/mapper/enc-pv
lvcreate -L 8G -n swap vg
lvcreate -l '100%FREE' -n root vgFormat the partitions:
mkfs.fat -F 32 /dev/nvme0n1p1
mkfs.ext4 -L root /dev/vg/root
mkswap -L swap /dev/vg/swapMount the partitions just created under /mnt:
mount /dev/vg/root /mnt
mkdir /mnt/boot
mount /dev/nvme0n1p1 /mnt/boot
swapon /dev/vg/swapInstall:
useradd -m -G wheel martin
sudo su - martin
nix-shell -p git --run \
git clone --recursive git@github.com:martinbaillie/dotfiles.git \
/mnt/etc/dotfiles
nix-shell -p nixUnstable -p git
sudo -E nixos-install --option pure-eval no --flake .\#$HOSTNAME
# make -C /mnt/etc/dotfiles installIf system doesnβt boot:
cryptsetup luksOpen /dev/nvme0n1p2 enc-pv
lvchange -a y /dev/vg/swap
lvchange -a y /dev/vg/root
mount /dev/vg/root /mnt
mount /dev/nvme0n1p1 /mnt/boot
swapon /dev/vg/swap
wpa_supplicant -B -i interface -c <(wpa_passphrase 'SSID' 'key')
nixos-enterTry again.
gpg --import ~/.gnupg/gpg.ascmake config-emacs