feat(nixos): rename configuration from tako to mirai and update service imports
This commit renames the NixOS configuration from "tako" to "mirai" across all relevant files, updates secret paths, hostnames, and service imports accordingly. The changes reflect a complete renaming of the system configuration while maintaining all functionality.
This commit is contained in:
@@ -7,7 +7,7 @@
|
|||||||
imports = [
|
imports = [
|
||||||
# Include the results of the hardware scan.
|
# Include the results of the hardware scan.
|
||||||
./services
|
./services
|
||||||
./tako.nix
|
./mirai.nix
|
||||||
# ./docker.nix
|
# ./docker.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
@@ -24,7 +24,7 @@
|
|||||||
|
|
||||||
security.sudo.wheelNeedsPassword = false;
|
security.sudo.wheelNeedsPassword = false;
|
||||||
sops = {
|
sops = {
|
||||||
secrets."builder/tako/cache/private" = {};
|
secrets."builder/mirai/cache/private" = {};
|
||||||
secrets.users = {
|
secrets.users = {
|
||||||
sopsFile = ../../secrets/users.yaml;
|
sopsFile = ../../secrets/users.yaml;
|
||||||
format = "yaml";
|
format = "yaml";
|
||||||
@@ -51,14 +51,14 @@
|
|||||||
trusted-public-keys = [
|
trusted-public-keys = [
|
||||||
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
|
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
|
||||||
"nixos-raspberrypi.cachix.org-1:4iMO9LXa8BqhU+Rpg6LQKiGa2lsNh/j2oiYLNOQ5sPI="
|
"nixos-raspberrypi.cachix.org-1:4iMO9LXa8BqhU+Rpg6LQKiGa2lsNh/j2oiYLNOQ5sPI="
|
||||||
# "tako:bcVPoFGBZ0i7JAKMXIqLj2GY3CulLC4kP7rQyqes1RM="
|
# "mirai:bcVPoFGBZ0i7JAKMXIqLj2GY3CulLC4kP7rQyqes1RM="
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
extraOptions = ''
|
extraOptions = ''
|
||||||
build-users-group = nixbld
|
build-users-group = nixbld
|
||||||
extra-nix-path = nixpkgs=flake:nixpkgs
|
extra-nix-path = nixpkgs=flake:nixpkgs
|
||||||
builders-use-substitutes = true
|
builders-use-substitutes = true
|
||||||
secret-key-files = ${config.sops.secrets."builder/tako/cache/private".path}
|
secret-key-files = ${config.sops.secrets."builder/mirai/cache/private".path}
|
||||||
'';
|
'';
|
||||||
gc = {
|
gc = {
|
||||||
automatic = true;
|
automatic = true;
|
||||||
@@ -86,7 +86,7 @@
|
|||||||
users.groups.media = {};
|
users.groups.media = {};
|
||||||
|
|
||||||
nixpkgs.config.allowUnfree = true;
|
nixpkgs.config.allowUnfree = true;
|
||||||
networking.hostName = "tako"; # Define your hostname.
|
networking.hostName = "mirai"; # Define your hostname.
|
||||||
# Pick only one of the below networking options.
|
# Pick only one of the below networking options.
|
||||||
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
|
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
|
||||||
# networking.networkmanager.enable = true; # Easiest to use and most distros use this by default.
|
# networking.networkmanager.enable = true; # Easiest to use and most distros use this by default.
|
||||||
|
|||||||
@@ -1,26 +1,26 @@
|
|||||||
{...}: {
|
{...}: {
|
||||||
imports = [
|
imports = [
|
||||||
./atuin.nix
|
# ./atuin.nix
|
||||||
./authelia.nix
|
# ./authelia.nix
|
||||||
./caddy.nix
|
# ./caddy.nix
|
||||||
./excalidraw.nix
|
# ./excalidraw.nix
|
||||||
./fail2ban.nix
|
# ./fail2ban.nix
|
||||||
./flaresolverr.nix
|
# ./flaresolverr.nix
|
||||||
./games
|
# ./games
|
||||||
./gitea.nix
|
# ./gitea.nix
|
||||||
./homepage.nix
|
# ./homepage.nix
|
||||||
# ./immich.nix
|
# # ./immich.nix
|
||||||
./immich.nix
|
# ./immich.nix
|
||||||
# ./llama.nix
|
# # ./llama.nix
|
||||||
./lldap.nix
|
# ./lldap.nix
|
||||||
./nextcloud.nix
|
# ./nextcloud.nix
|
||||||
# ./paperless.nix
|
# # ./paperless.nix
|
||||||
./prowlarr.nix
|
# ./prowlarr.nix
|
||||||
./resolved.nix
|
# ./resolved.nix
|
||||||
./searxng.nix
|
# ./searxng.nix
|
||||||
./tailscale.nix
|
./tailscale.nix
|
||||||
./headscale.nix
|
# ./headscale.nix
|
||||||
./shitpost.nix
|
# ./shitpost.nix
|
||||||
];
|
];
|
||||||
services = {
|
services = {
|
||||||
nix-serve = {
|
nix-serve = {
|
||||||
|
|||||||
@@ -6,7 +6,7 @@
|
|||||||
}: {
|
}: {
|
||||||
virtualisation.docker.enable = true;
|
virtualisation.docker.enable = true;
|
||||||
sops = {
|
sops = {
|
||||||
# secrets."gitea/registration".owner = config.systemd.services.gitea-actions-tako.serviceConfig.User;
|
# secrets."gitea/registration".owner = config.systemd.services.gitea-actions-mirai.serviceConfig.User;
|
||||||
secrets."gitea/registration" = {};
|
secrets."gitea/registration" = {};
|
||||||
secrets."authelia/oidc/gitea/client_secret" = {
|
secrets."authelia/oidc/gitea/client_secret" = {
|
||||||
owner = config.systemd.services.authelia-darksailor.serviceConfig.User;
|
owner = config.systemd.services.authelia-darksailor.serviceConfig.User;
|
||||||
@@ -77,9 +77,9 @@
|
|||||||
};
|
};
|
||||||
# gitea-actions-runner = {
|
# gitea-actions-runner = {
|
||||||
# instances = {
|
# instances = {
|
||||||
# tako = {
|
# mirai = {
|
||||||
# enable = true;
|
# enable = true;
|
||||||
# name = "tako";
|
# name = "mirai";
|
||||||
# url = "https://git.darksailor.dev";
|
# url = "https://git.darksailor.dev";
|
||||||
# labels = [
|
# labels = [
|
||||||
# "ubuntu-latest:docker://catthehacker/ubuntu:full-latest"
|
# "ubuntu-latest:docker://catthehacker/ubuntu:full-latest"
|
||||||
@@ -149,7 +149,7 @@
|
|||||||
after = ["sops-install-secrets.service"];
|
after = ["sops-install-secrets.service"];
|
||||||
};
|
};
|
||||||
|
|
||||||
# systemd.services."gitea-actions-tako" = {
|
# systemd.services."gitea-actions-mirai" = {
|
||||||
# after = ["gitea.service"];
|
# after = ["gitea.service"];
|
||||||
# };
|
# };
|
||||||
|
|
||||||
|
|||||||
@@ -1,26 +1,26 @@
|
|||||||
{...}: {
|
{...}: {
|
||||||
imports = [
|
imports = [
|
||||||
./excalidraw.nix
|
# ./games
|
||||||
# ./fail2ban.nix
|
|
||||||
./flaresolverr.nix
|
|
||||||
# # ./games
|
|
||||||
# ./gitea.nix
|
|
||||||
./homepage.nix
|
|
||||||
# # ./llama.nix
|
|
||||||
# # ./monitoring.nix
|
|
||||||
# # ./nextcloud.nix
|
|
||||||
# # ./paperless.nix
|
|
||||||
./prowlarr.nix
|
|
||||||
# ./resolved.nix
|
|
||||||
./searxng.nix
|
|
||||||
# ./headscale.nix
|
# ./headscale.nix
|
||||||
|
# ./llama.nix
|
||||||
|
# ./monitoring.nix
|
||||||
|
# ./paperless.nix
|
||||||
# ./shitpost.nix
|
# ./shitpost.nix
|
||||||
./atuin.nix
|
./atuin.nix
|
||||||
./caddy.nix
|
|
||||||
./authelia.nix
|
./authelia.nix
|
||||||
|
./caddy.nix
|
||||||
|
./excalidraw.nix
|
||||||
|
./fail2ban.nix
|
||||||
|
./flaresolverr.nix
|
||||||
|
./gitea.nix
|
||||||
|
./homepage.nix
|
||||||
./immich.nix
|
./immich.nix
|
||||||
./lldap.nix
|
./lldap.nix
|
||||||
|
./nextcloud.nix
|
||||||
./openssh.nix
|
./openssh.nix
|
||||||
|
./prowlarr.nix
|
||||||
|
./resolved.nix
|
||||||
|
./searxng.nix
|
||||||
./tailscale.nix
|
./tailscale.nix
|
||||||
];
|
];
|
||||||
services = {
|
services = {
|
||||||
|
|||||||
@@ -13,7 +13,6 @@
|
|||||||
maxtime = "168h"; # Do not ban for more than 1 week
|
maxtime = "168h"; # Do not ban for more than 1 week
|
||||||
overalljails = true; # Calculate the bantime based on all the violations
|
overalljails = true; # Calculate the bantime based on all the violations
|
||||||
};
|
};
|
||||||
# I'm beind a CG-NAT
|
|
||||||
ignoreIP = [
|
ignoreIP = [
|
||||||
"106.219.121.52"
|
"106.219.121.52"
|
||||||
];
|
];
|
||||||
|
|||||||
Reference in New Issue
Block a user