feat(nixos): rename configuration from tako to mirai and update service imports

This commit renames the NixOS configuration from "tako" to "mirai" across all relevant files, updates secret paths, hostnames, and service imports accordingly. The changes reflect a complete renaming of the system configuration while maintaining all functionality.
This commit is contained in:
uttarayan21
2025-11-28 00:55:19 +05:30
parent e53c1d2f25
commit 96c927c0db
5 changed files with 43 additions and 44 deletions

View File

@@ -7,7 +7,7 @@
imports = [ imports = [
# Include the results of the hardware scan. # Include the results of the hardware scan.
./services ./services
./tako.nix ./mirai.nix
# ./docker.nix # ./docker.nix
]; ];
@@ -24,7 +24,7 @@
security.sudo.wheelNeedsPassword = false; security.sudo.wheelNeedsPassword = false;
sops = { sops = {
secrets."builder/tako/cache/private" = {}; secrets."builder/mirai/cache/private" = {};
secrets.users = { secrets.users = {
sopsFile = ../../secrets/users.yaml; sopsFile = ../../secrets/users.yaml;
format = "yaml"; format = "yaml";
@@ -51,14 +51,14 @@
trusted-public-keys = [ trusted-public-keys = [
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
"nixos-raspberrypi.cachix.org-1:4iMO9LXa8BqhU+Rpg6LQKiGa2lsNh/j2oiYLNOQ5sPI=" "nixos-raspberrypi.cachix.org-1:4iMO9LXa8BqhU+Rpg6LQKiGa2lsNh/j2oiYLNOQ5sPI="
# "tako:bcVPoFGBZ0i7JAKMXIqLj2GY3CulLC4kP7rQyqes1RM=" # "mirai:bcVPoFGBZ0i7JAKMXIqLj2GY3CulLC4kP7rQyqes1RM="
]; ];
}; };
extraOptions = '' extraOptions = ''
build-users-group = nixbld build-users-group = nixbld
extra-nix-path = nixpkgs=flake:nixpkgs extra-nix-path = nixpkgs=flake:nixpkgs
builders-use-substitutes = true builders-use-substitutes = true
secret-key-files = ${config.sops.secrets."builder/tako/cache/private".path} secret-key-files = ${config.sops.secrets."builder/mirai/cache/private".path}
''; '';
gc = { gc = {
automatic = true; automatic = true;
@@ -86,7 +86,7 @@
users.groups.media = {}; users.groups.media = {};
nixpkgs.config.allowUnfree = true; nixpkgs.config.allowUnfree = true;
networking.hostName = "tako"; # Define your hostname. networking.hostName = "mirai"; # Define your hostname.
# Pick only one of the below networking options. # Pick only one of the below networking options.
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant. # networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
# networking.networkmanager.enable = true; # Easiest to use and most distros use this by default. # networking.networkmanager.enable = true; # Easiest to use and most distros use this by default.

View File

@@ -1,26 +1,26 @@
{...}: { {...}: {
imports = [ imports = [
./atuin.nix # ./atuin.nix
./authelia.nix # ./authelia.nix
./caddy.nix # ./caddy.nix
./excalidraw.nix # ./excalidraw.nix
./fail2ban.nix # ./fail2ban.nix
./flaresolverr.nix # ./flaresolverr.nix
./games # ./games
./gitea.nix # ./gitea.nix
./homepage.nix # ./homepage.nix
# # ./immich.nix
# ./immich.nix # ./immich.nix
./immich.nix # # ./llama.nix
# ./llama.nix # ./lldap.nix
./lldap.nix # ./nextcloud.nix
./nextcloud.nix # # ./paperless.nix
# ./paperless.nix # ./prowlarr.nix
./prowlarr.nix # ./resolved.nix
./resolved.nix # ./searxng.nix
./searxng.nix
./tailscale.nix ./tailscale.nix
./headscale.nix # ./headscale.nix
./shitpost.nix # ./shitpost.nix
]; ];
services = { services = {
nix-serve = { nix-serve = {

View File

@@ -6,7 +6,7 @@
}: { }: {
virtualisation.docker.enable = true; virtualisation.docker.enable = true;
sops = { sops = {
# secrets."gitea/registration".owner = config.systemd.services.gitea-actions-tako.serviceConfig.User; # secrets."gitea/registration".owner = config.systemd.services.gitea-actions-mirai.serviceConfig.User;
secrets."gitea/registration" = {}; secrets."gitea/registration" = {};
secrets."authelia/oidc/gitea/client_secret" = { secrets."authelia/oidc/gitea/client_secret" = {
owner = config.systemd.services.authelia-darksailor.serviceConfig.User; owner = config.systemd.services.authelia-darksailor.serviceConfig.User;
@@ -77,9 +77,9 @@
}; };
# gitea-actions-runner = { # gitea-actions-runner = {
# instances = { # instances = {
# tako = { # mirai = {
# enable = true; # enable = true;
# name = "tako"; # name = "mirai";
# url = "https://git.darksailor.dev"; # url = "https://git.darksailor.dev";
# labels = [ # labels = [
# "ubuntu-latest:docker://catthehacker/ubuntu:full-latest" # "ubuntu-latest:docker://catthehacker/ubuntu:full-latest"
@@ -149,7 +149,7 @@
after = ["sops-install-secrets.service"]; after = ["sops-install-secrets.service"];
}; };
# systemd.services."gitea-actions-tako" = { # systemd.services."gitea-actions-mirai" = {
# after = ["gitea.service"]; # after = ["gitea.service"];
# }; # };

View File

@@ -1,26 +1,26 @@
{...}: { {...}: {
imports = [ imports = [
./excalidraw.nix # ./games
# ./fail2ban.nix
./flaresolverr.nix
# # ./games
# ./gitea.nix
./homepage.nix
# # ./llama.nix
# # ./monitoring.nix
# # ./nextcloud.nix
# # ./paperless.nix
./prowlarr.nix
# ./resolved.nix
./searxng.nix
# ./headscale.nix # ./headscale.nix
# ./llama.nix
# ./monitoring.nix
# ./paperless.nix
# ./shitpost.nix # ./shitpost.nix
./atuin.nix ./atuin.nix
./caddy.nix
./authelia.nix ./authelia.nix
./caddy.nix
./excalidraw.nix
./fail2ban.nix
./flaresolverr.nix
./gitea.nix
./homepage.nix
./immich.nix ./immich.nix
./lldap.nix ./lldap.nix
./nextcloud.nix
./openssh.nix ./openssh.nix
./prowlarr.nix
./resolved.nix
./searxng.nix
./tailscale.nix ./tailscale.nix
]; ];
services = { services = {

View File

@@ -13,7 +13,6 @@
maxtime = "168h"; # Do not ban for more than 1 week maxtime = "168h"; # Do not ban for more than 1 week
overalljails = true; # Calculate the bantime based on all the violations overalljails = true; # Calculate the bantime based on all the violations
}; };
# I'm beind a CG-NAT
ignoreIP = [ ignoreIP = [
"106.219.121.52" "106.219.121.52"
]; ];