Drive encryption (#11)

- Add drive encryption with luks
- Refactor Hyprland binds
- Refactor cache
- Minor spelling fixes
- Add firefox stylix profiles
This commit is contained in:
Dashie 2025-05-02 12:19:48 +02:00 committed by GitHub
parent 32f0512ef5
commit 45954db37a
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
10 changed files with 334 additions and 292 deletions

View file

@ -33,7 +33,16 @@
example = true;
description = ''
enables secure boot.
Please don't forget to add your keys.
Note: Secure boot is NOT reproducible
Here are the necessary steps:
+ create your keys with sbctl -> sudo sbctl create-keys
+ build with systemd once -> set this to false and build once
+ build with secureBoot true
+ verify that your keys are signed (note, only systemd and your generations should now be signed): sudo sbtcl verify
+ enroll your keys (microsoft is necessary for windows dualboot support, leave it there): sudo sbctl enroll-keys --microsoft
+ reboot with secureboot enabled
Note: Some motherboards have vendor specific keys for secure boot, this may not necessarily work with our self signed keys
You likely have to disable these vendor specific keys (example HP: sure boot)
'';
};