feat(nixos): rename configuration from tako to mirai and update service imports

This commit renames the NixOS configuration from "tako" to "mirai" across all relevant files, updates secret paths, hostnames, and service imports accordingly. The changes reflect a complete renaming of the system configuration while maintaining all functionality.
This commit is contained in:
uttarayan21
2025-11-28 00:55:19 +05:30
parent e53c1d2f25
commit 96c927c0db
5 changed files with 43 additions and 44 deletions

View File

@@ -7,7 +7,7 @@
imports = [
# Include the results of the hardware scan.
./services
./tako.nix
./mirai.nix
# ./docker.nix
];
@@ -24,7 +24,7 @@
security.sudo.wheelNeedsPassword = false;
sops = {
secrets."builder/tako/cache/private" = {};
secrets."builder/mirai/cache/private" = {};
secrets.users = {
sopsFile = ../../secrets/users.yaml;
format = "yaml";
@@ -51,14 +51,14 @@
trusted-public-keys = [
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
"nixos-raspberrypi.cachix.org-1:4iMO9LXa8BqhU+Rpg6LQKiGa2lsNh/j2oiYLNOQ5sPI="
# "tako:bcVPoFGBZ0i7JAKMXIqLj2GY3CulLC4kP7rQyqes1RM="
# "mirai:bcVPoFGBZ0i7JAKMXIqLj2GY3CulLC4kP7rQyqes1RM="
];
};
extraOptions = ''
build-users-group = nixbld
extra-nix-path = nixpkgs=flake:nixpkgs
builders-use-substitutes = true
secret-key-files = ${config.sops.secrets."builder/tako/cache/private".path}
secret-key-files = ${config.sops.secrets."builder/mirai/cache/private".path}
'';
gc = {
automatic = true;
@@ -86,7 +86,7 @@
users.groups.media = {};
nixpkgs.config.allowUnfree = true;
networking.hostName = "tako"; # Define your hostname.
networking.hostName = "mirai"; # Define your hostname.
# Pick only one of the below networking options.
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
# networking.networkmanager.enable = true; # Easiest to use and most distros use this by default.

View File

@@ -1,26 +1,26 @@
{...}: {
imports = [
./atuin.nix
./authelia.nix
./caddy.nix
./excalidraw.nix
./fail2ban.nix
./flaresolverr.nix
./games
./gitea.nix
./homepage.nix
# ./immich.nix
./immich.nix
# ./llama.nix
./lldap.nix
./nextcloud.nix
# ./paperless.nix
./prowlarr.nix
./resolved.nix
./searxng.nix
# ./atuin.nix
# ./authelia.nix
# ./caddy.nix
# ./excalidraw.nix
# ./fail2ban.nix
# ./flaresolverr.nix
# ./games
# ./gitea.nix
# ./homepage.nix
# # ./immich.nix
# ./immich.nix
# # ./llama.nix
# ./lldap.nix
# ./nextcloud.nix
# # ./paperless.nix
# ./prowlarr.nix
# ./resolved.nix
# ./searxng.nix
./tailscale.nix
./headscale.nix
./shitpost.nix
# ./headscale.nix
# ./shitpost.nix
];
services = {
nix-serve = {

View File

@@ -6,7 +6,7 @@
}: {
virtualisation.docker.enable = true;
sops = {
# secrets."gitea/registration".owner = config.systemd.services.gitea-actions-tako.serviceConfig.User;
# secrets."gitea/registration".owner = config.systemd.services.gitea-actions-mirai.serviceConfig.User;
secrets."gitea/registration" = {};
secrets."authelia/oidc/gitea/client_secret" = {
owner = config.systemd.services.authelia-darksailor.serviceConfig.User;
@@ -77,9 +77,9 @@
};
# gitea-actions-runner = {
# instances = {
# tako = {
# mirai = {
# enable = true;
# name = "tako";
# name = "mirai";
# url = "https://git.darksailor.dev";
# labels = [
# "ubuntu-latest:docker://catthehacker/ubuntu:full-latest"
@@ -149,7 +149,7 @@
after = ["sops-install-secrets.service"];
};
# systemd.services."gitea-actions-tako" = {
# systemd.services."gitea-actions-mirai" = {
# after = ["gitea.service"];
# };

View File

@@ -1,26 +1,26 @@
{...}: {
imports = [
./excalidraw.nix
# ./fail2ban.nix
./flaresolverr.nix
# # ./games
# ./gitea.nix
./homepage.nix
# # ./llama.nix
# # ./monitoring.nix
# # ./nextcloud.nix
# # ./paperless.nix
./prowlarr.nix
# ./resolved.nix
./searxng.nix
# ./games
# ./headscale.nix
# ./llama.nix
# ./monitoring.nix
# ./paperless.nix
# ./shitpost.nix
./atuin.nix
./caddy.nix
./authelia.nix
./caddy.nix
./excalidraw.nix
./fail2ban.nix
./flaresolverr.nix
./gitea.nix
./homepage.nix
./immich.nix
./lldap.nix
./nextcloud.nix
./openssh.nix
./prowlarr.nix
./resolved.nix
./searxng.nix
./tailscale.nix
];
services = {

View File

@@ -13,7 +13,6 @@
maxtime = "168h"; # Do not ban for more than 1 week
overalljails = true; # Calculate the bantime based on all the violations
};
# I'm beind a CG-NAT
ignoreIP = [
"106.219.121.52"
];