78 lines
2.3 KiB

# Tudor's Dotfiles / Nix configuration
This is my Nix configuration, which works both for NixOS and for Nix
Acknowledgements to for heavily inspiring the layout of this config.
> **Warning**
> The configuration codified here was made to be used by me and only me.
> While I am publishing them to help others to learn Nix and dotfile management,
> copying them verbatim will likely produce an unusable system.
## Installation
### NixOS
First, provision a machine with NixOS.
1. Clone this repo somewhere on the machine.
2. `nix run .#nixos-rebuild -- boot --flake .#<hostname> --use-remote-sudo`
Remote server:
1. `nix run .#deploy-rs -- .#<hostname>`
### Any other Linux distro for sane people
The companion distro for this config is [My Build of Fedora Silverblue](
It is made with [BlueBuild]( The desktop-oriented configs in this repo
are meant to be used with this Fedora build only.
1. Provision a system with the [ISO](
2. Install Nix (my installer of choice is [nix-installer][nix-installer]).
3. Clone this repo somewhere on the machine
4. `nix run .#home-manager -- switch --flake .#tudor`
## Considerations for WSL
### Dependencies
The WSL setup assumes that you have 1Password and npiperelay [npiperelay] installed.
You can install npiperelay with winget:
winget install npiperelay
### Installing the thing
Assuming you have Nix set up on some other machine, clone this repo and run:
nix build
This will build the distro tarball in `./result/tarball/`. You can then import it in WSL:
# Create the directory that will store the distro's disk image
New-Item -ItemType Directory c:\WSL\NixOS
# Import the tarball as a distro in WSL
wsl --import NixOS c:\WSL\NixOS .\result\tarball\<whatever>.tar.gz
# Boot it!
wsl -d NixOS
## Considerations for encrypting secrets
Secrets are encrypted and used through [agenix][agenix]. When provisioning a new machine, make sure to
take its host public key and rekey secrets accordingly.