nix-config/README.md

136 lines
3.5 KiB
Markdown
Raw Normal View History

2021-02-22 12:31:58 +01:00
# Setup
## Flakes
Nix with flakes support is required. Run this in a shell…
```
# Enter a temporary shell with flakes support:
nix-shell --packages nixFlakes
# Set some configuration (do this only once):
echo 'experimental-features = nix-command flakes' >> ~/.config/nix/nix.conf
# Add this repository to your local flake registry:
nix registry add c3d2 git+https://gitea.c3d2.de/C3D2/nix-config
```
…or set this to your NixOS configuration:
```
{ pkgs, ... }: {
nix = {
package = pkgs.nixFlakes;
extraOptions = "experimental-features = nix-command flakes";
};
}
```
And add this repository to your local flake registry:
```
nix registry add c3d2 git+https://gitea.c3d2.de/C3D2/nix-config
```
# Deployment
Beide failen bei Activation des neuen Profils. (TODO)
2021-03-28 21:10:52 +02:00
## Mit Flakes
### Local deployment
Running `nixos-rebuild --flake c3d2 switch` on a machine should be sufficient
to update that machine to the current configuration and Nixpkgs revision.
2021-02-22 12:31:58 +01:00
### Remote deployment
2021-03-28 21:10:52 +02:00
2021-02-22 12:31:58 +01:00
Use `nix run` with one of the deploy scripts exported by the flake,
for example: `nix run c3d2#glotzbert-nixos-rebuild switch`. Use `nix flake show c3d2`
to show what is available. Note that the deploy scripts only work if
the target machines already has flakes enabled.
2019-07-04 00:31:45 +02:00
## Mit NixOps
The official way for deployment is through `deployer.serv.zentralwerk.org`
### Deploy changes
Use deployer system:
```shell
2019-07-04 00:31:45 +02:00
ssh k-ot@172.20.73.9
cd nix-config/
nixops deploy -d hq --check --include=[hostname]
```
2019-07-04 00:31:45 +02:00
### Creating new Container
This does not work yet, as the nixos-system-x86_64-linux.tar.xz image is broken.
1. log into any proxmox server
2. pct create [num] cephfs-iso:vztmpl/nixos-system-x86_64-linux.tar.xz -ostype unmanaged -net0 name=eth0,bridge=vmbr0,tag=[vlantag] -storage vms -hostname [hostname]
3. adjustments through ui if necessary
4. Adjust hq.nixops, add [hostname]
5. Run
```shell
2019-07-04 04:23:39 +02:00
ssh k-ot@172.20.73.16
2019-07-04 00:31:45 +02:00
cd nix-config/
nixops deploy -d hq --check --include=[hostname]
```
2021-02-24 11:52:19 +01:00
Tarballs can be built for containers using `config.system.build.tarball`.
```
nix build c3d2#nixosConfigurations.dhcp.config.system.build.tarball
```
2019-07-04 00:31:45 +02:00
## Mit `nixos-switch rebuild`
```shell
2019-07-04 00:31:45 +02:00
nixos-rebuild switch -I nixos-config=./hosts/containers/$HOST/configuration.nix --target-host "root@$HOST.hq.c3d2.de"
```
2019-04-30 23:21:34 +02:00
2019-07-04 00:31:45 +02:00
2019-04-30 23:21:34 +02:00
# Secrets
2019-05-01 00:55:11 +02:00
Add your gpg-id to the .gpg-id file in secrets and let somebody reencrypt it for you.
Maybe this works for you, maybe not. I did it somehow:
2020-01-01 13:40:42 +01:00
```
PASSWORD_STORE_DIR=`pwd` tr '\n' ' ' < .gpg-id | xargs -I{} pass init {}
```
2019-05-01 00:55:11 +02:00
Your gpg key has to have the Authenticate flag set. If not update it and push it to a keyserver and wait.
This is necessary, so you can login to any machine with your gpg key.
2020-01-01 13:40:42 +01:00
# Laptops / Desktops
2021-02-22 12:31:58 +01:00
This repository contains a NixOS module that can be used with personal machines
as well. This module appends `/etc/ssh/ssh_known_hosts` with the host keys of
registered HQ hosts, and optionally appends `/etc/hosts` with static IPv6
addresses local to HQ. Simply import the `lib` directory to use the module. As
2020-01-01 13:40:42 +01:00
an example:
```nix
# /etc/nixos/configuration.nix
{ config, pkgs, lib, ... }:
let
c3d2Config =
builtins.fetchGit { url = "https://gitea.c3d2.de/C3D2/nix-config.git"; };
in {
imports = [
# ...
"${c3d2Config}/lib"
];
c3d2 = {
isInHq = false; # not in HQ, this is the default.
mapHqHosts = true; # Make entries in /etc/hosts for *.hq internal addresses.
enableMotd = true; # Set the login shell message to the <<</>> logo.
};
# ...
}
```