(͡ ͡° ͜ つ ͡͡°) っ✂╰⋃╯
Go to file
Peder Bergebakken Sundt 824e57739e laksdaladsdsalkjdsalkjdsalkj 2023-03-03 21:42:29 +01:00
cachix lots of small fixes 2023-02-25 01:37:09 +01:00
hardware laksdaladsdsalkjdsalkjdsalkj 2023-03-03 21:42:29 +01:00
hosts laksdaladsdsalkjdsalkjdsalkj 2023-03-03 21:42:29 +01:00
profiles laksdaladsdsalkjdsalkjdsalkj 2023-03-03 21:42:29 +01:00
users users.pbsds.home: better mpv 2023-03-03 21:12:55 +01:00
.editorconfig lots of small fixes 2023-02-25 01:37:09 +01:00
.envrc laksdaladsdsalkjdsalkjdsalkj 2023-03-03 21:42:29 +01:00
.gitignore make it snow! 2023-02-25 05:06:52 +01:00
README.md laksdaladsdsalkjdsalkjdsalkj 2023-03-03 21:42:29 +01:00
base.nix laksdaladsdsalkjdsalkjdsalkj 2023-03-03 21:42:29 +01:00
cachix.nix Initial commit 2023-02-24 21:36:30 +01:00
flake.lock flake.lock: Update 2023-03-03 21:12:55 +01:00
flake.nix laksdaladsdsalkjdsalkjdsalkj 2023-03-03 21:42:29 +01:00
shell.nix laksdaladsdsalkjdsalkjdsalkj 2023-03-03 21:42:29 +01:00

README.md

Initial setup (old)

nixos-generate-config

Reading list

TODOs:

  • Split stuff into multiple files
  • Make a flake
  • merge hosted docs into a single subdomain
  • pre-commit hook with 'nix eval ...outPath'
  • use nom when deploying
  • figure out how to reuse system flake lock while deplying, leave the night job to upgrade
  • Setup some remote-development and deploy flow
  • users/pbsds: Support multiple profiles, like headless, nixpkgs-dev, various desktops, hpc, pvv, etc
  • nixos-generate-config instructions for new hosts
  • zfs, declarative pools?
  • secrets - nix-sops ?
    • flexget
    • transmission
    • domeneshop
  • hydra
  • self-hosted binary cache (single-machine) (nix-serve, carinae, harmonia, eris or attic)
  • profiles/web: make ACME/nginx helper a function
    • Support multiple tlds
    • Support multiple acme accounts
    • Support a per-account provider?
    • Support DNS auth
    • Setup aliases instead of a per-vhost cert?
      • Preferably setup a wildchar cert per host

Cheatsheet

How to deploy

Via git, build on remote:

ssh -t HOST sudo nixos-rebuild test --flake git+ssh://git@github.com/pbsds/nix-dotfiles.git --recreate-lock-file --no-write-lock-file

From local checkout to remote where you're not a trusted user, build on remote:

tar cf - --directory="$(nix eval --raw .#inputs.self.outPath)" . | ssh bolle.pbsds.net -- bash -xc '"cd $(mktemp -d); pwd; tar xf - && nixos-rebuild test . "$@""' -- --recreate-lock-file --no-write-lock-file

.. wait doesn't that litter /tmp or /run/user/.../tmp?

¯_(ツ)_/¯

From local checkout to remote if local nix daemon has ssh keys, then build on remote:

nix copy --from "$(nix eval .#inputs.self.outPath)" --to TODO

Build locally, copy to remote

TODO

How to evaluate nixos flake/configuration.nix, checking if the drv hash is equal

nix eval .#nixosConfigurations.noximilien.config.system.build.toplevel.outPath

old way:

nix-instantiate '<nixpkgs/nixos>' -A system -I nixos-config=./configuration.nix