- Encrypt everthing including /boot and /root
- Enter password once
- Support UEFI
Download NixOS minimal iso and copy to USB stick. For example on Mac OSX
$ diskutil list
$ diskutil unmountDisk /dev/disk1 # Make sure you got right device
#!/bin/bash | |
id=$(grep "$1" /etc/pve/.rrd | cut -d'/' -f 2 | cut -d':' -f 1) | |
[[ "$id" == '' ]] && echo "The specified LXC does not exist." && exit 1 | |
node=$(grep "^\"$id\":" /etc/pve/.vmlist | cut -d'"' -f 6) | |
[[ $(hostname) != "$node" ]] && pre="ssh -t $node " | |
echo "Entering LXC $id on node $node..." | |
${pre}pct enter $id |
#!/usr/bin/env python3 | |
# | |
# This script will collect all existing access keys of the current caller identity, | |
# create a new access key, update your credentials file, and then delete all previously existing access keys. | |
# | |
# This only works if the caller identity is an IAM User because if you're using AWS SSO or temporary session credentials, | |
# you probably don't need this. | |
# |
#!/usr/bin/env bash | |
# This script clones all repos in a GitHub org | |
# It requires the GH CLI: https://cli.github.com | |
# It can be re-run to collect new repos and pull the latest changes | |
set -euo pipefail | |
USAGE="Usage: gh-clone-org <user|org>" |
These are my notes on instaling NixOS 16.03 on a Lenovo ThinkPad X1 Carbon (4th generation) with an encrypted root file system using UEFI.
Most of this is scrambled from the following pages:
I hereby claim:
To claim this, I am signing this object:
// The tampermonkey script is now located in https://github.com/davegallant/rfd-redirect-stripper/blob/main/script.js | |
// Chrome extension: | |
// https://chromewebstore.google.com/detail/rfd-redirect-stripper/npnhoaofocjfjcjlglaihlhkbgaokmpa?authuser=0&hl=en | |
// Firefox Add-on: | |
// https://addons.mozilla.org/en-US/firefox/addon/rfd-redirect-stripper/ |