This commit is contained in:
mergify[bot] 2023-10-04 17:40:54 +00:00
parent 97e3026575
commit d4a1154757
7 changed files with 52 additions and 10 deletions

View File

@ -1,2 +1,2 @@
cp -r /nix/store/kjiq97lwj57gzr0vhcis6dy9wf1dzcjl-source/* .
cp -r /nix/store/s8h6l4z26rzjfp6fml1v2awdhh8z9vpg-source/* .
/nix/store/0sxw88ss9f7n3y9ka52bcd2wdbzdkpmh-mdbook-0.4.34/bin/mdbook build --dest-dir "$out"

View File

@ -3,10 +3,10 @@ declare -x HOME="/homeless-shelter"
declare -x HOST_PATH="/nix/store/apn3p2b40xvirn7w740wv2gy330ppib5-coreutils-9.3/bin:/nix/store/xvhh3dzdqfaz78nhya1xildz2r38sy3s-findutils-4.9.0/bin:/nix/store/5ca2vh08sq8m20mv4z3wd1lij6wngym0-diffutils-3.10/bin:/nix/store/7snlgj0l0ys6lbcl5pyy8vwnmk26wh8x-gnused-4.9/bin:/nix/store/4hx292xs95frrd1hqwwfc2fpcz0niwgp-gnugrep-3.11/bin:/nix/store/47pwjwir6m3r0czs8zir5wzfvk7i5z6i-gawk-5.2.2/bin:/nix/store/d960k69nahxms669k9fl5rqhk0fkfzr5-gnutar-1.35/bin:/nix/store/7nfcdvrmdbpms7wcrjjsqwkv07lswhli-gzip-1.13/bin:/nix/store/dwxydys9kcz5l2901asxdvh3qdh981b1-bzip2-1.0.8-bin/bin:/nix/store/s806iqg5vwsnp434i5whcn1rf605y9s6-gnumake-4.4.1/bin:/nix/store/vqvj60h076bhqj6977caz0pfxs6543nb-bash-5.2-p15/bin:/nix/store/63m0np3ypqr741nn1a3xmg39p6f97ix1-patch-2.7.6/bin:/nix/store/b1rpgx8n48m6520gakkf9rsqf7kv7sra-xz-5.4.4-bin/bin:/nix/store/vzjkllqadhpmy9jbzqvq94xipvd5xk5f-file-5.45/bin"
declare -x NIX_BUILD_CORES="2"
declare -x NIX_BUILD_TOP="/build"
declare -x NIX_CFLAGS_COMPILE=" -frandom-seed=jd5ppfp3ki"
declare -x NIX_CFLAGS_COMPILE=" -frandom-seed=gjjq0aaihr"
declare -x NIX_ENFORCE_NO_NATIVE="1"
declare -x NIX_ENFORCE_PURITY="1"
declare -x NIX_LDFLAGS="-rpath /nix/store/jd5ppfp3kiz3agd2f88snk9x66kd4zhn-nixos-anywhere-docs/lib "
declare -x NIX_LDFLAGS="-rpath /nix/store/gjjq0aaihrbn7mgqf4xbacajwhhy6hcm-nixos-anywhere-docs/lib "
declare -x NIX_LOG_FD="2"
declare -x NIX_SSL_CERT_FILE="/no-cert-file.crt"
declare -x NIX_STORE="/nix/store"
@ -46,7 +46,7 @@ declare -x enableParallelInstalling="1"
declare -x mesonFlags=""
declare -x name="nixos-anywhere-docs"
declare -x nativeBuildInputs=""
declare -x out="/nix/store/jd5ppfp3kiz3agd2f88snk9x66kd4zhn-nixos-anywhere-docs"
declare -x out="/nix/store/gjjq0aaihrbn7mgqf4xbacajwhhy6hcm-nixos-anywhere-docs"
declare -x outputs="out"
declare -x passAsFile="buildCommand"
declare -x patches=""

View File

@ -219,6 +219,14 @@ nixos-anywhere \
encryption password, and <code>my-disk-encryption-password</code> with the relevant entry
in your pass password store. Also, ensure to replace <code>'.#your-host'</code> and
<code>root@yourip</code> with your actual flake and IP address, respectively.</p>
<h2 id="example-using-existing-ssh-host-keys"><a class="header" href="#example-using-existing-ssh-host-keys">Example: Using existing SSH host keys</a></h2>
<p>If the system contains existing trusted <code>/etc/ssh/ssh_host_*</code> SSH host keys and
certificates, <code>nixos-anywhere</code> can copy them in case they are necessary during
installation and system activation.</p>
<pre><code>nixos-anywhere --copy-host-keys --flake '.#your-host' root@yourip
</code></pre>
<p>This would copy <code>/etc/ssh/ssh_host_*</code> to <code>/mnt</code> after kexec but before
installation, ignoring files that already exist in destination.</p>
</main>

View File

@ -583,6 +583,14 @@ nixos-anywhere \
encryption password, and <code>my-disk-encryption-password</code> with the relevant entry
in your pass password store. Also, ensure to replace <code>'.#your-host'</code> and
<code>root@yourip</code> with your actual flake and IP address, respectively.</p>
<h2 id="example-using-existing-ssh-host-keys"><a class="header" href="#example-using-existing-ssh-host-keys">Example: Using existing SSH host keys</a></h2>
<p>If the system contains existing trusted <code>/etc/ssh/ssh_host_*</code> SSH host keys and
certificates, <code>nixos-anywhere</code> can copy them in case they are necessary during
installation and system activation.</p>
<pre><code>nixos-anywhere --copy-host-keys --flake '.#your-host' root@yourip
</code></pre>
<p>This would copy <code>/etc/ssh/ssh_host_*</code> to <code>/mnt</code> after kexec but before
installation, ignoring files that already exist in destination.</p>
<div style="break-before: page; page-break-before: always;"></div><h1 id="use-without-flakes"><a class="header" href="#use-without-flakes">Use without flakes</a></h1>
<p>While <code>nixos-anywhere</code> is designed to work optimally with Nix Flakes, it also
supports the traditional approach without flakes. This document outlines how to
@ -645,17 +653,28 @@ Options:
set the flake to install the system from.
* -i &lt;identity_file&gt;
selects which SSH private key file to use.
* -p, --ssh-port &lt;ssh_port&gt;
set the ssh port to connect with
* --ssh-option &lt;ssh_option&gt;
set an ssh option
* -L, --print-build-logs
print full build logs
* -s, --store-paths &lt;disko-script&gt; &lt;nixos-system&gt;
set the store paths to the disko-script and nixos-system directly
if this is give, flake is not needed
* -t --tty
Force pseudo-terminal allocation in SSH sessions. Use this when you expect e.g.
to be asked for password entry during LUKS configuration.
* --no-reboot
do not reboot after installation, allowing further customization of the target installation.
* --kexec &lt;url&gt;
* --kexec &lt;path&gt;
use another kexec tarball to bootstrap NixOS
* --post-kexec-ssh-port &lt;ssh_port&gt;
after kexec is executed, use a custom ssh port to connect. Defaults to 22
* --copy-host-keys
copy over existing /etc/ssh/ssh_host_* host keys to the installation
* --stop-after-disko
exit after disko formating, you can then proceed to install manually or some other way
exit after disko formatting, you can then proceed to install manually or some other way
* --extra-files &lt;file...&gt;
files to copy into the new nixos installation
* --disk-encryption-keys &lt;remote_path&gt; &lt;local_path&gt;
@ -671,6 +690,8 @@ Options:
URL of the source Nix store to copy the nixos and disko closure from
* --build-on-remote
build the closure on the remote machine instead of locally and copy-closuring it
* --vm-test
build the system and test the disk configuration inside a VM without installing it to the target.
</code></pre>
<h2 id="explanation-of-known-error-messages"><a class="header" href="#explanation-of-known-error-messages">Explanation of known error messages</a></h2>
<p>TODO: Add additional error messages and meanings. Fill in missing explanations</p>

View File

@ -184,17 +184,28 @@ Options:
set the flake to install the system from.
* -i &lt;identity_file&gt;
selects which SSH private key file to use.
* -p, --ssh-port &lt;ssh_port&gt;
set the ssh port to connect with
* --ssh-option &lt;ssh_option&gt;
set an ssh option
* -L, --print-build-logs
print full build logs
* -s, --store-paths &lt;disko-script&gt; &lt;nixos-system&gt;
set the store paths to the disko-script and nixos-system directly
if this is give, flake is not needed
* -t --tty
Force pseudo-terminal allocation in SSH sessions. Use this when you expect e.g.
to be asked for password entry during LUKS configuration.
* --no-reboot
do not reboot after installation, allowing further customization of the target installation.
* --kexec &lt;url&gt;
* --kexec &lt;path&gt;
use another kexec tarball to bootstrap NixOS
* --post-kexec-ssh-port &lt;ssh_port&gt;
after kexec is executed, use a custom ssh port to connect. Defaults to 22
* --copy-host-keys
copy over existing /etc/ssh/ssh_host_* host keys to the installation
* --stop-after-disko
exit after disko formating, you can then proceed to install manually or some other way
exit after disko formatting, you can then proceed to install manually or some other way
* --extra-files &lt;file...&gt;
files to copy into the new nixos installation
* --disk-encryption-keys &lt;remote_path&gt; &lt;local_path&gt;
@ -210,6 +221,8 @@ Options:
URL of the source Nix store to copy the nixos and disko closure from
* --build-on-remote
build the closure on the remote machine instead of locally and copy-closuring it
* --vm-test
build the system and test the disk configuration inside a VM without installing it to the target.
</code></pre>
<h2 id="explanation-of-known-error-messages"><a class="header" href="#explanation-of-known-error-messages">Explanation of known error messages</a></h2>
<p>TODO: Add additional error messages and meanings. Fill in missing explanations</p>

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long