Personal dotfiles for Linux, mostly for Nixpkgs/NixOS-based and Termux setups. Mirrored using GitLab's push mirroring feature. gitlab.com/andreijiroh-dev/dotfiles
linux dotfiles
Nix 80.7%
Shell 5.0%
Other 14.3%
25 3 0

Clone this repository

https://tangled.org/andreijiroh.dev/dotfiles
git@tangled.org:andreijiroh.dev/dotfiles

For self-hosted knots, clone URLs may differ based on your setup.

README.md

@andreijiroh-dev/dotfiles@nixos - @ajhalili2006's dotfiles under nixos + nixpkgs!#

Yup, I'm starting a fresh for my dotfiles for 2025 and beyond, now with nixpkgs and home-manager in mind. Backwards-compatible with non-nixpkgs setups via yadm.

Usage#

Plain dotfiles#

Make sure Git is installed in your non NixOS/nixpkgs setup for the setup to work.

cd ~
git init
git remote add origin https://mau.dev/andreijiroh-dev/dotfiles
git checkout -f main
ln -s ./.git ./.local/share/yadm/repo.git # so that we can use yadm later

If you prefer to cook up with yadm first:

yadm clone https://github.com/andreijiroh-dev/dotfiles
ln -s ./.local/share/yadm/repo.git ./.git # so that we can normally use git here

Using nix flakes + home-manager#

# A quick home-manager switch should do the trick
nix run home-manager/master -- switch --flake github:andreijiroh-dev/nixops-config

# otherwise a quick copy paste configs should fix 'em if you use a different username
# (not different home directory yet!)

Updating authorized_keys with Nix#

  1. Update [shared/ssh-keys.nix][ssh-keys] and users.users.<gildedguy|ajhalili2006>.openssh.authorizedKeys.keys
  2. Run nixos-rebuild switch to regenerate /etc/ssh/authorized_keys.d/<gildedguy|ajhalili2006>.
  3. Copy that file back to .ssh/authorized_keys. Commit changes and push.
  4. On the affected machines, just git pull away.

Using 1Password SSH Agent integration#

WARNING

1Password Desktop app must be installed and enabled Use SSH Agent in Settings -> Developer -> SSH Agent after signing in.

Note that this should work on most desktop apps, although if you're in Nest (and friends with RDP access), connect to there first and authenicate. You may need to adjust security settings in the desktop app to ensure nothing go wrong.

Alternatively, you can export the private keys with password encryption

Directory + File Map#

Essientials#

License#

MPL-2.0