2.1 KiB
2.1 KiB
Initial setup (old)
nixos-generate-config
Reading list
- https://nixos.wiki/wiki/Flakes
- https://teu5us.github.io/nix-lib.html
- https://ryantm.github.io/nixpkgs/builders/trivial-builders/
- https://nixos.wiki/wiki/Nix-writers
TODOs:
- Split stuff into multiple files
- Make a flake
- merge hosted docs into a single subdomain
- Setup some remote-development and deploy flow
- host older versions of nixpkgs documentation (like 20.09)
- add a hidpi profile? https://wiki.archlinux.org/title/HiDPI
- rocm
- xclip
- https://git.m-labs.hk/M-Labs/wfvm
- https://github.com/kholia/OSX-KVM
- mlflow / wandb
- xforwarding over ssh
- autogenerate ssh keys
- switch to systemd networkd
- pre-commit hook with 'nix eval ...outPath'
- use
nom
when deploying - figure out how to reuse system flake lock while deplying, leave the night job to upgrade
- users/pbsds: Support multiple profiles, like headless, nixpkgs-dev, various desktops, hpc, pvv, etc
- gnome:
- lxterminal
- replace gnome terminal
- themes
- shortcuts
- pavucontrol
- lxterminal
- gnome:
- nixos-generate-config instructions for new hosts
- zfs, declarative pools?
- some tunneling for NFS hosts
- transgui config
- secrets - nix-sops ?
- flexget
- transmission
- transmission remote gui
- domeneshop
- hydra
- self-hosted binary cache (single-machine) (nix-serve, carinae, harmonia, eris or attic, ssh?)
- profiles/web: make ACME/nginx helper a function
- Support multiple tlds
- Support multiple acme accounts
- Support a per-account provider?
- Support DNS auth
- Setup aliases instead of a per-vhost cert?
- Preferably setup a wildchar cert per host
- once secrets are in place: coin a one true ssh key, automate adding ssh host public keys to flake