diff --git a/flake.lock b/flake.lock index 76a0889..15b7eeb 100644 --- a/flake.lock +++ b/flake.lock @@ -411,26 +411,9 @@ "nixpkgs-unstable-raw": "nixpkgs-unstable-raw", "nur": "nur", "plasma-manager": "plasma-manager", - "secrets": "secrets", "vscode-extensions": "vscode-extensions" } }, - "secrets": { - "flake": false, - "locked": { - "lastModified": 1708347322, - "narHash": "sha256-30rLLNMGvVz8xbklqRpA3uE6UDneAUGFz7dCmH9YbA8=", - "ref": "refs/heads/main", - "rev": "409536f1d2b8ffe741fe47b8701ba28137f9de38", - "revCount": 3, - "type": "git", - "url": "http://git.everest.sable-pancake.ts.net/Toast/nix-secrets" - }, - "original": { - "type": "git", - "url": "http://git.everest.sable-pancake.ts.net/Toast/nix-secrets" - } - }, "systems": { "locked": { "lastModified": 1681028828, diff --git a/flake.nix b/flake.nix index 326a5f9..4074c49 100644 --- a/flake.nix +++ b/flake.nix @@ -2,10 +2,6 @@ description = "Configuration for Everest"; inputs = { - secrets = { - url = "git+http://git.everest.sable-pancake.ts.net/Toast/nix-secrets"; - flake = false; - }; nixpkgs-raw.url = "nixpkgs/nixos-23.11"; nixpkgs-unstable-raw.url = "nixpkgs/nixos-unstable"; diff --git a/machines/WinMax2/hardware-configuration.nix b/machines/WinMax2/hardware-configuration.nix index 39126af..de97fb0 100755 --- a/machines/WinMax2/hardware-configuration.nix +++ b/machines/WinMax2/hardware-configuration.nix @@ -43,12 +43,12 @@ in fsType = "btrfs"; options = [ "subvol=@" ]; }; - "btrfs_persist" = { - mountPoint = "/persist"; + /*"btrfs_boot" = { + mountPoint = "/boot"; label = ssdLabel; fsType = "btrfs"; - options = [ "subvol=@persist" ]; - }; + options = [ "subvol=@boot" ]; + };*/ "btrfs_home" = { mountPoint = "/home"; label = ssdLabel; diff --git a/roles/common/configuration.nix b/roles/common/configuration.nix index 3e42588..9caaeb9 100755 --- a/roles/common/configuration.nix +++ b/roles/common/configuration.nix @@ -105,7 +105,11 @@ # Set up secrets age = { identityPaths = [ - "/persist/id_host" + "/etc/ssh/ssh_host_rsa_key" + "/etc/ssh/ssh_host_ed25519_key" + # This key has a passcode, so if you need to use it you'll have to + # enter the password A LOT of times. Only on the first setup tho + "/tmp/id_ed25519_bootstrap" ]; }; diff --git a/roles/common/services/syncthing.nix b/roles/common/services/syncthing.nix index 9bcfb63..5691ef3 100755 --- a/roles/common/services/syncthing.nix +++ b/roles/common/services/syncthing.nix @@ -1,19 +1,7 @@ -{ config, flakeSelf, ... }: - -let - hostSecrets = "${flakeSelf.inputs.secrets}/" + config.networking.hostName; -in +{ config, ... }: { - # Get secrets - age.secrets = { - syncthingKey.file = hostSecrets + "/syncthingKey.age"; - syncthingCert.file = hostSecrets + "/syncthingCert.age"; - }; - services.syncthing = { - key = config.age.secrets.syncthingKey.path; - cert = config.age.secrets.syncthingCert.path; overrideDevices = true; overrideFolders = true; openDefaultPorts = true;