This is primarily a guide for myself on how to setup my own systems, feel free to copy anything, but do not expect a direct copy of everything to work for you.
Note to self: Make sure to follow the guide for each system step by step.
Note
I also maintain a private repository with a nix flake containing soft
and hard secrets. Directly copying the configuration will therefore fail
since it will fail to fetch the private repository. The private flake uses
Age keys to further encrypt the most critical secrets. To include them in
the build, add the age keys to ~/.config/sops/age/keys.txt
First install macOS normally by following the default installation on the mac. To access the installer hold the power button during boot to access recovery options. Then go through all the sections below for the initial setup.
System Integrity Protection (SIP) needs to be partially disabled for the yabai tiling window manager to work correctly.
-
Turn off the mac, then press and hold the power button until "Loading startup options" appears. Click Options, then click Continue.
-
In the menu bar, choose
Utilities, thenTerminal -
Run this:
csrutil enable --without fs --without debug --without nvramAfter rebooting run this:
sudo nvram boot-args=-arm64e_preview_abiThen reboot again.
Install Xcode command line tools:
xcode-select --installAccept the license agreement:
sudo xcodebuild -license acceptsoftwareupdate --install-rosetta --agree-to-licenseRun the following command to install Nix:
curl --proto '=https' --tlsv1.2 -sSf -L \
https://install.determinate.systems/nix | \
sh -s -- installWhen prompted to install Determinate Nix, explicitly say no.
Move over the GitHub SSH private key and make sure SSH works.
Move the user secrets Age key to ~/.config/sops/age/keys.txt.
Then clone the nix configuration:
git clone git@github.com:michaelbrusegard/nix-config.git ~/Projects/nix-configBuild the system the first time using the following command:
nix run nix-darwin -- switch --flake $HOME/Projects/nix-config#lungoLater rebuilds can use the nrs alias.
Download the Karabiner-DriverKit-VirtualHIDDevice manually and install the package. Afterwards make sure it is enabled in System Settings, General -> Login Items & Extensions -> Driver Extensions (At the bottom).
Also make sure that /run/current-system/sw/bin/kanata is added as an
allowed application under Privacy & Security -> Input Monitoring. If kanata
is already added, remove it and try again. This may have to be redone if
Kanata is updated since the Nix Store path would change.
Lastly, go to Keyboard -> Keyboard Shortcuts... -> Modifier Keys, and make sure the Karabiner DriverKit VirtualHIDDevice is selected as the keyboard.
Create an installer by downloading the minimal ISO image from NixOS download page and flashing it to an USB drive using the following command:
sudo dd if=~/Downloads/YYY.iso of=/dev/XXX bs=4M status=progress oflag=syncReplace YYY.iso with the name of the downloaded ISO file and /dev/XXX
with the path to your USB drive.
Plug in the installer USB and set a temporary password using the passwd command for SSH access.
You can run ip a to find the IP address.
-
Prepare Local Files:
- Create LUKS passphrase file:
./secret.key. - Get host SSH key:
./keys/etc/ssh/ssh_host_ed25519_keyand./keys/etc/ssh/ssh_host_ed25519_key.pub
- Create LUKS passphrase file:
-
Run Install:
nixos-anywhere --extra-files ./keys --flake .#ristretto --disk-encryption-keys /tmp/secret.key ./secret.key --build-on remote nixos@IP_ADDRESS -
Post-Install:
- Add user Age key to
~/.config/sops/age/keys.txt). - Move over the GitHub SSH private key and clone the nix configuration:
git clone git@github.com:michaelbrusegard/nix-config.git ~/Projects/nix-config. - For TPM auto unlock:
sudo systemd-cryptenroll --tpm2-device=auto --tpm2-pcrs=0+2+7 /dev/sda2.
- Add user Age key to
To create the installation ISO for Windows, we use Chris Titus Tech's Windows Utility to create a clean telemetry-free ISO that does not require a Microsoft account (This has to be run on a Windows machine or in a VM). The commands require administrator privileges, so make sure to run PowerShell as administrator.
First, enable execution of scripts in PowerShell:
Set-ExecutionPolicy RemoteSigned -Scope CurrentUserThen load the tool:
irm "https://christitus.com/win" | iexIn the tool we can download the newest Windows ISO image from Microsoft.
Then choose the username and password.
Append the tweaks settings from windows/winutil.json and start the process.
When we have the MicroWin ISO we can flash an USB drive using Rufus.
[!INFO] The current setup also requires the AMD RAID driver to run the two NVMe drives in RAID 0. This is not supported by the Windows installer, so we need to add the drivers manually. They can be downloaded from here ASUS motherboard downloads.
Create a drivers directory on the installer USB and add the rcbottom.inf,
rcraid.inf and rccfg.inf. They should be loaded in that order during the installation.
After installation has finished go to Windows Update and run it to make sure the system is updated.
Also make sure to install updated drivers for the system, the download pages for the current system can be found below:
First we need to build the NixOS WSL tarball. This can be done by running the following command on a nix machine:
sudo nix run .#nixosConfigurations.ristretto-wsl.config.system.build.tarballBuilderPut this on a flash drive and copy it to the Windows machine.
Then start by installing Windows Subsystem for Linux (WSL) on Windows:
wsl --install --no-distributionThen reboot the computer and install the NixOS WSL tarball by running the following command (You have to move the tarball to the current directory first from the flash drive):
wsl --install --from-file nixos.wslTo enter the WSL environment, run:
wslNow clone the nix-config repository, add the age keys and rebuild.
First rerun the WinUtil tool:
irm "https://christitus.com/win" | iexUnder Performance Plan click "Add and Activate Ultimate Performance Profile".
In the Updates tab select "Security Settings" to prevent Windows Updates from automatically installing updates at the worst times.
Then run the setup.ps1 script to install packages and apply registry tweaks:
powershell -ExecutionPolicy Bypass -File \
\\wsl.localhost\NixOS\home\michaelbrusegard\Developer\dotfiles\windows\setup.ps1The custom keyboard layout is set up like the default US layout, but with
mac like behaviour for special characters when holding AltGr (This helps with
typing Norwegian characters like æøå when using the US layout). It is
configured with MSKLC
and the configuration can be imported into the app to be edited via
keyboard.klc.
To apply the custom keyboard layout copy the keyboard.zip file from WSL:
SRC=\\wsl$\\NixOS\\home\\michaelbrusegard\\Developer\\dotfiles\\windows\\keyboard.zip
cp $SRC C:\Users\michaelbrusegard\DownloadsThe resulting image can be found in result/sd-image/. It is a compressed
Zstandard archive that can be flashed to an SD card.
We need to plug in the SD card and find out what the device path is for the SD card.
On linux:
lsblkOn Darwin:
diskutil listOn Linux it is usually /dev/sdX where X is a letter, for example
/dev/sdb. On Darwin it is usually /dev/diskX where X is a number for
example /dev/disk6.
To flash the image to the SD card you can use the following command, make
sure to replace /dev/XXX with the correct device path for your SD card:
zstd -dc result/sd-image/*.zst | sudo dd of=/dev/XXX bs=4M status=progress oflag=syncBuild the SD image on a machine with nix using the following command:
nix build .#MacchiatoThe resulting image can be found in result/sd-image/. It is a compressed
Zstandard archive that can be flashed to an SD card.
We need to plug in the SD card and find out what the device path is for the SD card.
On Linux:
lsblkOn Darwin:
diskutil listOn Linux it is usually /dev/sdX where X is a letter, for example
/dev/sdb. On Darwin it is usually /dev/diskX where X is a number for
example /dev/disk6.
To flash the image to the SD card you can use the following command, make
sure to replace /dev/XXX with the correct device path for your SD card:
zstd -dc result/sd-image/*.zst | sudo dd of=/dev/XXX bs=4M status=progress oflag=syncThe Espresso setup consists of HA k3s nodes (espresso1, espresso2, espresso3) for running containerized homelab and business services like websites, media hosting and automation.
sudo systemctl stop k3s sudo rm -rf /var/lib/rancher/k3s
Start with obtaining MAC addresses for each node by enabling PXE (Preboot Execution Environment) and writing down the MAC address. Then disable PXE again and assign a static IP to each node from the router.
nixos-anywhere --extra-files ./keys --flake .#espresso-1 --disk-encryption-keys /tmp/secret.key ./secret.key --build-on remote nixos@10.0.186.19
First, build the appropriate bootstrap ISO:
nix build .#bootstrapIsoX86Flash the resulting ISO (result/iso/*.iso) to a USB drive:
sudo dd if=result/iso/*.iso of=/dev/sdX bs=4M status=progress oflag=syncBoot each node from the USB drive. Once booted, the node will have SSH enabled with your key.
Then, for each node, run:
nixos-anywhere --flake ~/Developer/dotfiles#Espresso1 \
-i ~/.config/sops-nix/secrets/ssh/bootstrap/private-key \
root@node-ipReplace Espresso1 with Espresso2/Espresso3 and the correct IP.
- Copy sops keys to each node (e.g., via SSH or USB)
- Access via
kubectlafter connecting to any node - Drain nodes for maintenance:
kubectl drain espresso1 - Uncordon after:
kubectl uncordon espresso1
- LGUG2Z'z nix-wsl-starter
- Andrey0189's Nix Hyprland configuration
- Notusknot's nix-dotfiles
- Mathias Bynens and his macOS defaults
- Dries Vints and his SSH script
- Antione Martin and his GPG script
- Elliot's fast and beautiful .zshrc prompt
- Michael Bao's dotfiles
- Josean Martinez's dev environment files
- TheBlueRuby's awesome Arch Linux setup


