1
0
Fork 0
mirror of https://github.com/tboerger/nixos-config synced 2024-05-05 01:56:05 +02:00

fix: drop unused files and definitions

This commit is contained in:
Thomas Boerger 2024-01-30 23:48:00 +01:00
parent e3e249802b
commit 3f82017cf4
No known key found for this signature in database
GPG Key ID: F630596501026DB5
5 changed files with 46 additions and 282 deletions

View File

@ -1,9 +0,0 @@
SHELL := bash
.PHONY: update
update:
nix --extra-experimental-features "nix-command flakes" flake update
.PHONY: switch
switch:
sudo nixos-rebuild switch --flake .

View File

@ -34,6 +34,13 @@ cp /etc/ssh/ssh_host_* /mnt/etc/ssh/
nixos-install --no-root-password --root /mnt --flake github:tboerger/nixos-config#anubis
```
After a reboot of the system it should be fully provisioned with the regular
flake which includes all defined services:
```console
nixos-rebuild switch --flake github:tboerger/nixos-config#anubis
```
### Chnum
```console
@ -47,6 +54,13 @@ cp /etc/ssh/ssh_host_* /mnt/etc/ssh/
nixos-install --no-root-password --root /mnt --flake github:tboerger/nixos-config#chnum
```
After a reboot of the system it should be fully provisioned with the regular
flake which includes all defined services:
```console
nixos-rebuild switch --flake github:tboerger/nixos-config#chnum
```
## Servers
To apply updates for servers this repository should be updated to the latest
@ -70,6 +84,13 @@ cp /etc/ssh/ssh_host_* /mnt/etc/ssh/
nixos-install --no-root-password --root /mnt --flake github:tboerger/nixos-config#asgard
```
After a reboot of the system it should be fully provisioned with the regular
flake which includes all defined services:
```console
nix run github:serokell/deploy-rs github:tboerger/nixos-config#asgard
```
### Utgard
```console
@ -83,6 +104,13 @@ cp /etc/ssh/ssh_host_* /mnt/etc/ssh/
nixos-install --no-root-password --root /mnt --flake github:tboerger/nixos-config#utgard
```
After a reboot of the system it should be fully provisioned with the regular
flake which includes all defined services:
```console
nix run github:serokell/deploy-rs github:tboerger/nixos-config#utgard
```
### Vanaheim
```console
@ -96,6 +124,13 @@ cp /etc/ssh/ssh_host_* /mnt/etc/ssh/
nixos-install --no-root-password --root /mnt --flake github:tboerger/nixos-config#vanaheim
```
After a reboot of the system it should be fully provisioned with the regular
flake which includes all defined services:
```console
nix run github:serokell/deploy-rs github:tboerger/nixos-config#vanaheim
```
### Yggdrasil
```console
@ -109,6 +144,13 @@ cp /etc/ssh/ssh_host_* /mnt/etc/ssh/
nixos-install --no-root-password --root /mnt --flake github:tboerger/nixos-config#yggdrasil
```
After a reboot of the system it should be fully provisioned with the regular
flake which includes all defined services:
```console
nix run github:serokell/deploy-rs github:tboerger/nixos-config#yggdrasil
```
## Finish
Finally after I have setup the whole system I usually copy the remaining

View File

@ -1,3 +0,0 @@
{ inputs, ... }:
{ }

View File

@ -274,12 +274,6 @@
# ];
};
# anubis = self.nixosConfigurations.anubis.config.system.build.toplevel;
# chnum = self.nixosConfigurations.chnum.config.system.build.toplevel;
# asgard = self.nixosConfigurations.asgard.config.system.build.toplevel;
# utgard = self.nixosConfigurations.utgard.config.system.build.toplevel;
# yggdrasil = self.nixosConfigurations.yggdrasil.config.system.build.toplevel;
deploy = {
nodes = {
asgard = {
@ -288,7 +282,7 @@
fastConnection = true;
profiles = {
system = {
sshUser = "root";
sshUser = "thomas";
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.asgard;
user = "root";
};
@ -300,7 +294,7 @@
fastConnection = true;
profiles = {
system = {
sshUser = "root";
sshUser = "thomas";
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.utgard;
user = "root";
};
@ -312,7 +306,7 @@
fastConnection = true;
profiles = {
system = {
sshUser = "root";
sshUser = "thomas";
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.vanaheim;
user = "root";
};
@ -324,7 +318,7 @@
# fastConnection = true;
# profiles = {
# system = {
# sshUser = "root";
# sshUser = "thomas";
# path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.yggdrasil;
# user = "root";
# };

260
nixos.nix
View File

@ -1,260 +0,0 @@
{ nixpkgs, inputs, ... }:
{
imports = [
inputs.profile-parts.flakeModules.nixos
];
profile-parts = {
default.nixos = {
inherit (inputs) nixpkgs;
enable = true;
system = "x86_64-linux";
exposePackages = true;
};
global.nixos = {
modules =
{ name
, profile
,
}: [
({ pkgs, ... }:
{
nixpkgs = {
overlays = [
(import ./overlays)
];
};
}
)
inputs.homemanager.nixosModules.home-manager
inputs.agenix.nixosModules.default
];
specialArgs = {
inherit inputs;
};
};
nixos = {
anubis = {
hostname = "anubis";
nixpkgs = inputs.nixpkgs;
system = "x86_64-linux";
modules = [
inputs.disko.nixosModules.disko
./desktops/anubis
./home/thomas/user.nix
./home/anna/user.nix
./home/adrian/user.nix
./home/tabea/user.nix
{
home-manager = {
extraSpecialArgs = {
desktopSystem = true;
};
users = {
thomas = {
imports = [
inputs.homeage.homeManagerModules.homeage
./home/thomas
];
};
anna = {
imports = [
inputs.homeage.homeManagerModules.homeage
./home/anna
];
};
adrian = {
imports = [
inputs.homeage.homeManagerModules.homeage
./home/adrian
];
};
tabea = {
imports = [
inputs.homeage.homeManagerModules.homeage
./home/tabea
];
};
};
};
}
];
};
chnum = {
hostname = "chnum";
nixpkgs = inputs.nixpkgs;
system = "x86_64-linux";
modules = [
inputs.disko.nixosModules.disko
./desktops/chnum
./home/thomas/user.nix
./home/anna/user.nix
./home/adrian/user.nix
./home/tabea/user.nix
{
home-manager = {
extraSpecialArgs = {
desktopSystem = true;
};
users = {
thomas = {
imports = [
inputs.homeage.homeManagerModules.homeage
./home/thomas
];
};
anna = {
imports = [
inputs.homeage.homeManagerModules.homeage
./home/anna
];
};
adrian = {
imports = [
inputs.homeage.homeManagerModules.homeage
./home/adrian
];
};
tabea = {
imports = [
inputs.homeage.homeManagerModules.homeage
./home/tabea
];
};
};
};
}
];
};
asgard = {
hostname = "asgard";
nixpkgs = inputs.nixpkgs;
system = "x86_64-linux";
modules = [
inputs.disko.nixosModules.disko
./desktops/asgard
./home/thomas/user.nix
{
home-manager = {
extraSpecialArgs = {
desktopSystem = true;
};
users = {
thomas = {
imports = [
inputs.homeage.homeManagerModules.homeage
./home/thomas
];
};
};
};
}
];
};
utgard = {
hostname = "utgard";
nixpkgs = inputs.nixpkgs;
system = "x86_64-linux";
modules = [
inputs.disko.nixosModules.disko
./desktops/utgard
./home/thomas/user.nix
{
home-manager = {
extraSpecialArgs = {
desktopSystem = true;
};
users = {
thomas = {
imports = [
inputs.homeage.homeManagerModules.homeage
./home/thomas
];
};
};
};
}
];
};
vanaheim = {
hostname = "vanaheim";
nixpkgs = inputs.nixpkgs;
system = "x86_64-linux";
modules = [
inputs.disko.nixosModules.disko
./desktops/vanaheim
./home/thomas/user.nix
{
home-manager = {
extraSpecialArgs = {
desktopSystem = true;
};
users = {
thomas = {
imports = [
inputs.homeage.homeManagerModules.homeage
./home/thomas
];
};
};
};
}
];
};
yggdrasil = {
hostname = "yggdrasil";
nixpkgs = inputs.nixpkgs;
system = "aarch64-linux";
modules = [
inputs.nixos-hardware.nixosModules.raspberry-pi-4
./desktops/yggdrasil
./home/thomas/user.nix
{
home-manager = {
extraSpecialArgs = {
desktopSystem = true;
};
users = {
thomas = {
imports = [
inputs.homeage.homeManagerModules.homeage
./home/thomas
];
};
};
};
}
];
};
};
};
}