clean up last age attempt

This commit is contained in:
2025-10-05 09:05:48 -05:00
parent 898c17e537
commit b145d407cc
4 changed files with 17 additions and 124 deletions

100
flake.lock generated
View File

@@ -1,70 +1,6 @@
{ {
"nodes": { "nodes": {
"agenix": {
"inputs": {
"darwin": "darwin",
"home-manager": "home-manager",
"nixpkgs": "nixpkgs",
"systems": "systems"
},
"locked": {
"lastModified": 1754433428,
"narHash": "sha256-NA/FT2hVhKDftbHSwVnoRTFhes62+7dxZbxj5Gxvghs=",
"owner": "ryantm",
"repo": "agenix",
"rev": "9edb1787864c4f59ae5074ad498b6272b3ec308d",
"type": "github"
},
"original": {
"owner": "ryantm",
"repo": "agenix",
"type": "github"
}
},
"darwin": {
"inputs": {
"nixpkgs": [
"agenix",
"nixpkgs"
]
},
"locked": {
"lastModified": 1744478979,
"narHash": "sha256-dyN+teG9G82G+m+PX/aSAagkC+vUv0SgUw3XkPhQodQ=",
"owner": "lnl7",
"repo": "nix-darwin",
"rev": "43975d782b418ebf4969e9ccba82466728c2851b",
"type": "github"
},
"original": {
"owner": "lnl7",
"ref": "master",
"repo": "nix-darwin",
"type": "github"
}
},
"home-manager": { "home-manager": {
"inputs": {
"nixpkgs": [
"agenix",
"nixpkgs"
]
},
"locked": {
"lastModified": 1745494811,
"narHash": "sha256-YZCh2o9Ua1n9uCvrvi5pRxtuVNml8X2a03qIFfRKpFs=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "abfad3d2958c9e6300a883bd443512c55dfeb1be",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "home-manager",
"type": "github"
}
},
"home-manager_2": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
"nixpkgs" "nixpkgs"
@@ -86,22 +22,6 @@
} }
}, },
"nixpkgs": { "nixpkgs": {
"locked": {
"lastModified": 1754028485,
"narHash": "sha256-IiiXB3BDTi6UqzAZcf2S797hWEPCRZOwyNThJIYhUfk=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "59e69648d345d6e8fef86158c555730fa12af9de",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-25.05",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1759281824, "lastModified": 1759281824,
"narHash": "sha256-FIBE1qXv9TKvSNwst6FumyHwCRH3BlWDpfsnqRDCll0=", "narHash": "sha256-FIBE1qXv9TKvSNwst6FumyHwCRH3BlWDpfsnqRDCll0=",
@@ -118,24 +38,8 @@
}, },
"root": { "root": {
"inputs": { "inputs": {
"agenix": "agenix", "home-manager": "home-manager",
"home-manager": "home-manager_2", "nixpkgs": "nixpkgs"
"nixpkgs": "nixpkgs_2"
}
},
"systems": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
} }
} }
}, },

View File

@@ -14,7 +14,7 @@
ssh.enable = true; ssh.enable = true;
docker.enable = true; docker.enable = true;
syncthing.enable = true; syncthing.enable = true;
tailscale.enable = true; tailscale.enable = false;
nvidia.enable = false; nvidia.enable = false;
}; };
homelab = { homelab = {
@@ -29,21 +29,6 @@
blake.enable = true; blake.enable = true;
}; };
# passwordless rebuild
security.sudo.extraRules = [
{
users = [ "blake" ];
commands = [
{
command = "/run/current-system/sw/bin/nixos-rebuild";
options = [ "NOPASSWD" ];
}
];
}
];
# use the systemd-boot EFI boot loader. # use the systemd-boot EFI boot loader.
boot.loader.systemd-boot.enable = true; boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true; boot.loader.efi.canTouchEfiVariables = true;
@@ -82,7 +67,6 @@
# programs here, NOT in environment.systemPackages # programs here, NOT in environment.systemPackages
]; ];
# enable flakes # enable flakes
nix.settings.experimental-features = [ "nix-command" "flakes" ]; nix.settings.experimental-features = [ "nix-command" "flakes" ];

View File

@@ -1,23 +1,15 @@
{ pkgs, config, lib, ... }: { pkgs, config, lib, ... }:
{ {
#imports = [ agenix.nixosModules.default ];
options = { options = {
modules.system.tailscale.enable = lib.mkEnableOption "enables tailscale"; modules.system.tailscale.enable = lib.mkEnableOption "enables tailscale";
}; };
config = lib.mkIf config.modules.system.tailscale.enable { config = lib.mkIf config.modules.system.tailscale.enable {
age.secrets."tailscale_authkey" = {
file = ../../secrets/tailscale_authkey.txt.age;
owner = "blake";
group = "blake";
mode = "0400";
};
services.tailscale = { services.tailscale = {
enable = true; enable = true;
}; };
useRoutingFeatures = "both"; useRoutingFeatures = "both";
authKeyFile = "/run/agenix/tailscale_authkey"; #authKeyFile = "/home/blake/.nix/.keyring/tailscale/tailscale_authfile";
}; };
} }

View File

@@ -31,5 +31,18 @@
users.groups.blake = { users.groups.blake = {
gid = 1000; gid = 1000;
}; };
# passwordless rebuild
security.sudo.extraRules = [
{
users = [ "blake" ];
commands = [
{
command = "/run/current-system/sw/bin/nixos-rebuild";
options = [ "NOPASSWD" ];
}
];
}
];
}; };
} }