69a3aaa086355dea51380c3ae9b5bd84a45ba4a7
sane-private-lock
this is handy esp for `servo`, where i don't want my keys to be accessible after i logout. longterm, i suppose i could run this automatically on session close (pam-umount or something i think exists for that?)
to deploy:
nixos-rebuild --flake "./#servo" {build,switch}
more options (like building packages defined in this repo):
nix flake show
secrets
i use sops for secrets.
see modules/universal/secrets.nix
for some tips.
building images
to build a distributable image (GPT-formatted image with rootfs and /boot partition):
nix build ./#imgs.lappy
this can then be dd
'd onto a disk and directly booted from a EFI system.
there's some post-processing to do before running a rebuild on the deployed system (deploying ssh keys, optionally changing fs UUIDs, etc).
refer to flake.nix for more details.
building packages
to build one of the custom sane packages, just name it:
nix build ./#fluffychat-moby
to build a nixpkg:
nix build ./#nixpkgs.curl
to build a package for another platform:
nix build ./#packages.aarch64-linux.nixpkgs.ubootRaspberryPi4_64bit
Description
Languages
Nix
80.9%
C
8.7%
Python
4.5%
Hare
2.9%
Shell
1.2%
Other
1.7%