More tailscale cleanup
	
		
			
	
		
	
	
		
	
		
			All checks were successful
		
		
	
	
		
			
				
	
				Gitea Actions Demo / Explore-Gitea-Actions (push) Successful in 24s
				
			
		
		
	
	
				
					
				
			
		
			All checks were successful
		
		
	
	Gitea Actions Demo / Explore-Gitea-Actions (push) Successful in 24s
				
			This commit is contained in:
		
							parent
							
								
									b4327bf189
								
							
						
					
					
						commit
						d83ae3ba0f
					
				
					 2 changed files with 0 additions and 12 deletions
				
			
		| 
						 | 
					@ -49,10 +49,6 @@ in
 | 
				
			||||||
    users.me
 | 
					    users.me
 | 
				
			||||||
    machines.node
 | 
					    machines.node
 | 
				
			||||||
  ];
 | 
					  ];
 | 
				
			||||||
  "tailscale_git_server.age".publicKeys = [
 | 
					 | 
				
			||||||
    users.me
 | 
					 | 
				
			||||||
    machines.git
 | 
					 | 
				
			||||||
  ]; # This key expires, might have to update
 | 
					 | 
				
			||||||
  "teslamate_db.age".publicKeys = [
 | 
					  "teslamate_db.age".publicKeys = [
 | 
				
			||||||
    users.me
 | 
					    users.me
 | 
				
			||||||
    machines.node
 | 
					    machines.node
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -5,13 +5,10 @@
 | 
				
			||||||
}:
 | 
					}:
 | 
				
			||||||
let
 | 
					let
 | 
				
			||||||
  domain = "git.alejandr0angul0.dev";
 | 
					  domain = "git.alejandr0angul0.dev";
 | 
				
			||||||
  secrets = config.age.secrets;
 | 
					 | 
				
			||||||
in
 | 
					in
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
  imports = [ "${inputs.nixpkgs}/nixos/modules/virtualisation/digital-ocean-config.nix" ];
 | 
					  imports = [ "${inputs.nixpkgs}/nixos/modules/virtualisation/digital-ocean-config.nix" ];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  age.secrets.authKeyFile.file = ../../../secrets/tailscale_git_server.age;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  aa = {
 | 
					  aa = {
 | 
				
			||||||
    nix.enable = true;
 | 
					    nix.enable = true;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -32,11 +29,6 @@ in
 | 
				
			||||||
    enableACME = true;
 | 
					    enableACME = true;
 | 
				
			||||||
  };
 | 
					  };
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  services.tailscale = {
 | 
					 | 
				
			||||||
    authKeyFile = secrets.authKeyFile.path;
 | 
					 | 
				
			||||||
    extraUpFlags = [ "--ssh" ];
 | 
					 | 
				
			||||||
  };
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  security.acme = {
 | 
					  security.acme = {
 | 
				
			||||||
    acceptTerms = true;
 | 
					    acceptTerms = true;
 | 
				
			||||||
    defaults = {
 | 
					    defaults = {
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue