How exactly the Titan escaped an inescapable prison, he alone can say. But the groaning wheels and machinery throughout the place have grown more prevalent since his return, suggesting long-dormant plans that came finally to fruition.
A mix of system- & user-level configurations for the machines that I administer; shared here for convenience and in case anyone else finds them useful.
hosts/: host configurationschronos/: NixOS home server & NASmoros/: personal laptop (M2 MacBook Pro)prometheus/: work-issued laptop (M4 MacBook Pro)
modules/: config & options modules laid out according to RFC 0140- each terminal directory contains one or more of the following files, which are automatically collected in flake outputs:
module.nix: modules that are compatible with both NixOS &nix-darwindarwin-module.nix:nix-darwinsystem modulesnixos-module.nix: NixOS system moduleshome-module.nix:home-managermodulesflake-module.nix:flake-partsmodules
- each terminal directory contains one or more of the following files, which are automatically collected in flake outputs:
overlays/: overlays that are exposed in this flake & applied to some of the package sets I useusers/: user configurations, typically exposingflake-partsmodules containing variations on the following:darwinModules.jkachmar:nix-darwinconfiguration for my personal user profilenixosModules.jkachmar: NixOS system configuration for my personal user profilehomeModules.jkachmar:home-managerconfiguration for my personal user profile
chronos's root partition can be formatted using its diskoConfigurations
entry; when run from this flake's directory, the following will wipe the NVMe
drive & install NixOS on the host:
$ nix develop
$ disko --flake .#hrodreptus --mode zap_create_mount
$ nixos-install --flake .#chronos --no-root-password--no-root-password is necessary if (as the flag implies) users.users.root
doesn't have a password set. At the time of writing, root access is handled by
ssh-agent & rssh PAM, but this is kinda dicey from a recovery PoV.