Skip to content

Latest commit

 

History

History
291 lines (212 loc) · 11.3 KB

TODO.md

File metadata and controls

291 lines (212 loc) · 11.3 KB

Roadmap of TODOs

README > Roadmap of TODOs

Short Term

  • next video - yubikey

    • write article/script
    • record camera/audio
    • record screencaptures
    • preproduction assets
    • edit
    • publish
  • neovim

    • sort out lsp deficiencies
  • enable backup (verify access to oops)

  • waybar - fix workspace issue. right monitor displays workspace '10' on reboot but should be '0'

  • symlink home stuff with /mnt/extra/foo

  • enable mediashare

  • investigate

    • hyprcursor
    • hyprlock

update docs in nix-secrets

Long Term

Project Stages

1. Core - Completed: 2023.12.24

Build up a stable config using grief lab. The focus will be on structure, nix-config automation, and core tty that will be common on all machines.

  • Basic utility shell for bootstrapping
  • Core host config common to all machines
    • garbage collection
    • clamav
    • msmtp notifier
    • ability to import modular options
  • Core home-manager config for primary user
    • cli configs
    • nvim config
    • ability to import modular options
  • Repository based secrets management for local users, remote host connection, and repository auth
  • Ability to consistently add new hosts and users with the core settings
  • Basic automation for rebuilds
  • Basic CI testing

2. Multihost, multiuser with basic GUI - Completed: 2024.02.18

This stage will add a second host machine, gusto (theatre). To effectively used gusto, we'll need to introduce gui elements such as a desktop, basic QoL tools for using the desktop, and some basic gui applications to play media, including the requisite audio/visual packages to make it all work.

  • Add a media user specifically for gusto (autolog that one)
  • Document and tweak steps to deploy to new host
  • Simple desktop - add visual desktop and a/v elements as common options
  • Stable windows manager environment
  • Stable audio
  • Stable video
  • Auto-upgrade
  • Better secrets management
    • private repo for secrets
    • personal documentation for secrets management, i.e. README for nix-secrets private repo
    • public documentation for secrets management, i.e. how to use this repo with the private repo
  • Review and complete applicable TODO sops, TODO yubi, and TODO stage 2
  • Deploy gusto

DEFERRED:

  • Potentially yubiauth and u2f for passwordless sudo

3. Installation Automation and drive encryption - Completed: 2024.08.08

Introduce declarative partitioning, custom iso generation, install automation, and full drive encryption. This stage was also initially intended to add impermanence and several other improvements aimed at keeping a cleaner environment. However, automation took substantially longer than anticipated and I need to start using NixOS as a daily driver sooner than later. Being spread across two distros and different config paradigms while putting 99% of the effort into the new distro/config is becoming unsustainable. As such, several features have been deferred until later stages.

3.1 automate nixos installation
  • nixos-anywhere
  • declarative partitioning and formatting via disko
  • light-weight bootstrap flake for basic, pre-secrets install
  • custom iso generation
  • automated bootstrap script
3.2 drive encryption

Local decryption only for now. Enabling remote decryption while working entirely from VMs is beyond my current abilities.

  • LUKS full drive encryption
3.x Extras
  • Make use of configLib.scanPaths
  • look for better syntax options to shorten just recipes
  • Decided to just re-enable nix-fmt update nix-fmt to nixfmt-rfc-style (including pre-commit) since it will be the standard for nix packages moving forward
  • update sops to make use of per host age keys for home-manager level secrets
  • don't bother maybe rename pkgs -> custom_pkgs and modules -> custom_modules
  • Enable git ssh signing in home/ta/common/core/git.nix

DEFERRED:

  • Investigate outstanding yubikey FIXMEs
  • Potentially yubiauth and u2f for passwordless sudo FidgetingBits still encounter significant issues with this when remoting
  • Confirm clamav scan notification
    • check email for clamavd notification on ~/clamav-testfile. If yes, remove the file
    • check if the two commented out options in hosts/common/options/services/clamav.nix are in stable yet.

4. Ghost

4.1 Prep
  • setup borg module
  • hyprland prep
  • migrate dotfiles to nix-config
  • ghost modules
  • change over and recovery plan
4.2 Change over
  • install nixos on Ghost
  • verify drives
  • verify critical apps and services functionality
  • enable backup
  • enable mediashare
4.3 Get comfortable
  • setup and enable hyprland basics
    • hyprlock or similar
    • logout manager
    • waypaper
    • dunst
    • rofi-wayland
  • reestablish workflow
4.3.x Extras
  • Investigate outstanding yubikey FIXMEs
  • yubiauth and u2f for passwordless sudo
  • Confirm clamav scan notification
    • check email for clamavd notification on ~/clamav-testfile. If yes, remove the file
    • check if the two commented out options in hosts/common/options/services/clamav.nix are in stable yet.
  • basic themeing via stylix or nix-colors
  • dig into fzf and telescope
  • hotkey for sleeping monitors (all or game mode)
  • disk usage notifier
  • check out ananicy - hold over todo from arch but there is a nixos pkg here https://search.nixos.org/packages?channel=23.11&from=0&size=50&sort=relevance&type=packages&query=ananicy
  • more desktop utils and customization
Stage 4 References

5. Squeaky clean

5.x impermanence
  • declare what needs to persist

  • enable impermanence

    • make sure to include /luks-secondary-unlock.key

    Need to sort out how to maintain /etc/ssh/ssh_host_ed25519_key and /etc/ssh/ssh_host_ed25519_key.pub

5.x remote luks decryption

The following has to happen on bare metal because I can't seem to get the yubikey's to redirect to the VM for use with git-agecrypt.

  • Remote LUKS decrypt over ssh for headless hosts
    • need to set up age-crypt keys because this happens before sops and therefore we can't use nix-secrets
    • add initrd-ssh module that will spawn an ssh service for use during boot
5.x automate config deployment
  • Per host branch scheme
  • Automated machine update on branch release
  • Handle general auto updates as well
5.x script cleaning
  • Consider nixifying bash scripts (see refs below)
  • Overhaul just file
    • clean up
    • add {{just.executable()}} to just entries
    • explore direnv
5.x reduce duplication and modularize
  • Refactor nix-config to use more extensive specialArgs and extraSpecial Args for common user and host settings
  • Re-implement modules to make use of options for enablement
5.x secure boot

Some stage 1 with systemd info for reference (not specific to lanzaboote)

5.x Extras
  • automatic scheduled sops rotate
  • Look at re-enabling CI pipelines. These were disabled during stage 2 because I moved to inputting the private nix-secrets repo in flake.nix. Running nix flake check in a gitlab pipeline now requires figuring out access tokens. There were higher priorities considering the check can be run locally prior to pushing.
  • move Gusto to disko
  • revisit scanPaths. Usage in hosts/common/core is doubled up when hosts/common/core/services is imported. Options are: declare services imports individually in services/default.nix, move services modules into parent core directory... or add a recursive variant of scanPaths.
Stage 5 references

Impermanence - These two are the references to follow and integrate. The primer list below is good review before diving into this:

Impermanence primer info

Migrating bash scripts to nix

  • https://www.youtube.com/watch?v=diIh0P12arA and https://www.youtube.com/watch?v=qRE6kf30u4g
  • Consider also the first comment "writeShellApplication over writeShellScriptBin. writeShellApplication also runs your shell script through shellcheck, great for people like me who write sloppy shell scripts. You can also specify runtime dependencies by doing runtimeInputs = [ cowsay ];, that way you can just write cowsay without having to reference the path to cowsay explicitly within the script"

6. Laptops

Add laptop support to the mix to handle stuff like power, lid state, wifi, and the like.

  • laptop utils

7. Ricing

8. tbd


Return to top

README > Roadmap of TODOs