hosts/dunamis/nix.nix: sync nix
hosts/eldrid/nix.nix: sync nix hosts/sarien/nix.nix: sync nix Signed-off-by: unexplrd <unexplrd@linerds.us>
This commit is contained in:
@ -2,12 +2,14 @@
|
|||||||
{
|
{
|
||||||
config,
|
config,
|
||||||
inputs,
|
inputs,
|
||||||
|
# pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
imports = with inputs; [
|
imports = with inputs; [
|
||||||
lix.nixosModules.default
|
determinate.nixosModules.default
|
||||||
];
|
];
|
||||||
nix = {
|
nix = {
|
||||||
|
# package = pkgs.lix;
|
||||||
channel.enable = false;
|
channel.enable = false;
|
||||||
settings.experimental-features = ["nix-command" "flakes"];
|
settings.experimental-features = ["nix-command" "flakes"];
|
||||||
daemonCPUSchedPolicy = "idle";
|
daemonCPUSchedPolicy = "idle";
|
||||||
|
@ -1,12 +1,18 @@
|
|||||||
|
# TODO: better file name
|
||||||
{
|
{
|
||||||
config,
|
config,
|
||||||
inputs,
|
inputs,
|
||||||
|
# pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}: let
|
||||||
|
inherit (config.sops) secrets;
|
||||||
|
inherit (inputs) mysecrets;
|
||||||
|
in {
|
||||||
imports = with inputs; [
|
imports = with inputs; [
|
||||||
lix.nixosModules.default
|
determinate.nixosModules.default
|
||||||
];
|
];
|
||||||
nix = {
|
nix = {
|
||||||
|
# package = pkgs.lix;
|
||||||
channel.enable = false;
|
channel.enable = false;
|
||||||
daemonCPUSchedPolicy = "idle";
|
daemonCPUSchedPolicy = "idle";
|
||||||
settings = {
|
settings = {
|
||||||
@ -19,9 +25,9 @@
|
|||||||
hostName = "dunamis";
|
hostName = "dunamis";
|
||||||
sshUser = "nix-ssh";
|
sshUser = "nix-ssh";
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
sshKey = config.sops.secrets."ssh-eldrid-user".path;
|
sshKey = secrets."ssh-eldrid-user".path;
|
||||||
supportedFeatures = ["nixos-test" "big-parallel" "kvm" "benchmark"];
|
supportedFeatures = ["nixos-test" "big-parallel" "kvm" "benchmark"];
|
||||||
publicHostKey = builtins.readFile "${inputs.mysecrets}/ssh/ssh_host_ed25519_dunamis.base64";
|
publicHostKey = builtins.readFile "${mysecrets}/ssh/ssh_host_ed25519_dunamis.base64";
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
@ -1,9 +1,13 @@
|
|||||||
|
# TODO: better file name
|
||||||
{
|
{
|
||||||
config,
|
config,
|
||||||
inputs,
|
inputs,
|
||||||
pkgs,
|
# pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}: let
|
||||||
|
inherit (config.sops) secrets;
|
||||||
|
inherit (inputs) mysecrets;
|
||||||
|
in {
|
||||||
imports = with inputs; [
|
imports = with inputs; [
|
||||||
determinate.nixosModules.default
|
determinate.nixosModules.default
|
||||||
];
|
];
|
||||||
@ -21,9 +25,9 @@
|
|||||||
hostName = "dunamis";
|
hostName = "dunamis";
|
||||||
sshUser = "nix-ssh";
|
sshUser = "nix-ssh";
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
sshKey = config.sops.secrets."ssh-sarien-user".path;
|
sshKey = secrets."ssh-eldrid-user".path;
|
||||||
supportedFeatures = ["nixos-test" "big-parallel" "kvm" "benchmark"];
|
supportedFeatures = ["nixos-test" "big-parallel" "kvm" "benchmark"];
|
||||||
publicHostKey = builtins.readFile "${inputs.mysecrets}/ssh/ssh_host_ed25519_dunamis.base64";
|
publicHostKey = builtins.readFile "${mysecrets}/ssh/ssh_host_ed25519_dunamis.base64";
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
Reference in New Issue
Block a user