removed all references to deprecated tool NixOps

This commit is contained in:
Fiscal Velvet Poet 2023-05-15 09:25:48 +10:00
parent c47b35f619
commit 6cabd62238
Signed by: fiscalvelvetpoet
GPG key ID: D8EBFD58B023BD47
10 changed files with 8 additions and 12 deletions

1
.envrc
View file

@ -3,4 +3,3 @@ watch_file flake.nix
# Allow ragenix to find it's configuration # Allow ragenix to find it's configuration
export RULES=$(realpath ./secrets/secrets.nix) export RULES=$(realpath ./secrets/secrets.nix)
export NIXOPS_DEPLOYMENT=jfdic-ops

View file

@ -14,6 +14,5 @@ with import ./nix args; {
treefmt # one CLI to format the code tree treefmt # one CLI to format the code tree
]; ];
NIX_PATH = "nixpkgs=${sources.nixpkgs}"; NIX_PATH = "nixpkgs=${sources.nixpkgs}";
NIXOPS_DEPLOYMENT = "${globals.deploymentName}";
}; };
} }

View file

@ -1,4 +1,4 @@
# NixOps configuration for the Linode VMs # Nix configuration for the Linode VMs
{ {
config, config,
pkgs, pkgs,

View file

@ -1,4 +1,4 @@
# NixOps configuration for the hosts running a Chrony service # Nix configuration for the hosts running a Chrony service
{config, ...}: { {config, ...}: {
services.chrony = { services.chrony = {
enable = true; # Enable Chrony enable = true; # Enable Chrony

View file

@ -56,7 +56,7 @@
cfg = cfg =
pkgs.writeText "configuration.nix" pkgs.writeText "configuration.nix"
'' ''
assert builtins.trace "This system is managed by NixOps." false; assert builtins.trace "This system is managed by Colmena." false;
{} {}
''; '';
in "nixos-config=${cfg}") in "nixos-config=${cfg}")

View file

@ -1,4 +1,4 @@
# logrotate configuration for NixOS / NixOps # logrotate configuration for NixOS
{config, ...}: { {config, ...}: {
services.logrotate = { services.logrotate = {
enable = true; # Enable the logrotate service enable = true; # Enable the logrotate service

View file

@ -1,4 +1,4 @@
# NixOps configuration nix-direnv # Nix configuration nix-direnv
{ {
config, config,
pkgs, pkgs,

View file

@ -54,7 +54,7 @@ in {
systemd = { systemd = {
services = { services = {
gitea = { gitea = {
# Ensure gitea starts after nixops keys are loaded # Ensure gitea starts after keys are loaded
after = ["gitea-dbpass-key.service"]; after = ["gitea-dbpass-key.service"];
wants = ["gitea-dbpass-key.service"]; wants = ["gitea-dbpass-key.service"];
}; };
@ -112,6 +112,4 @@ in {
"source.jfdic.org".email = "admin@reciproka.co"; "source.jfdic.org".email = "admin@reciproka.co";
}; };
}; };
users.groups.keys.members = ["gitea"]; # Required due to NixOps issue #1204
} }

View file

@ -1,4 +1,4 @@
# NixOps configuration for deploying the Reciproka Kolectiva website # Nix configuration for deploying the Reciproka Kolectiva website
{ {
self, self,
config, config,

View file

@ -1,4 +1,4 @@
# NixOps configuration for deploying the Voices of Capricornia website # Nix configuration for deploying the Voices of Capricornia website
{ {
self, self,
config, config,