This commit is contained in:
RingOfStorms (Joshua Bell) 2025-03-10 10:29:00 -05:00
parent 5fd49b6456
commit 6d9f7679f0
4 changed files with 18 additions and 10 deletions

View file

@ -115,7 +115,7 @@ in
# LINODE SERVERS
"l001" = {
identityFile = age.secrets.nix2linode.path;
hostname = "172.236.111.33";
hostname = "172.236.111.33"; # Not on the tailscale network it is the primary host
user = "root";
};
"l002_" = {
@ -127,6 +127,16 @@ in
identityFile = age.secrets.nix2linode.path;
user = "root";
};
# ORACLE SERVERS
"o001" = {
identityFile = age.secrets.nix2oracle.path;
user = "root";
};
"o001_" = {
identityFile = age.secrets.nix2oracle.path;
hostname = "64.181.210.7";
user = "root";
};
};
};
}

View file

@ -6,8 +6,6 @@
ros_neovim.url = "git+https://git.joshuabell.xyz/nvim";
mod_common.url = "git+https://git.joshuabell.xyz/dotfiles?ref=mod_common";
mod_common.inputs.nixpkgs.follows = "nixpkgs";
# mod_ros_stormd.url = "git+https://git.joshuabell.xyz/dotfiles?ref=mod_stormd";
# mod_nebula.url = "git+https://git.joshuabell.xyz/dotfiles?ref=mod_nebula";
};
outputs =
@ -61,12 +59,10 @@
{ pkgs, ... }:
{
users.users.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFLBVLiPbhVG+riNNpkvXnNtOioByV3CQwtY9gu8pstp nix2l002"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJuo6L6V52AzdQIK6fWW9s0aX1yKUUTXbPd8v8IU9p2o nix2linode"
];
components = {
# NOTE we manually onboard this machine since it also hosts headscale itself and I don't want to push
# the key in this config.
# NOTE we manually onboard this machine since it has no secrets uploaded to it
tailscale.useSecretsAuth = false;
};
mods = {
@ -84,7 +80,6 @@
];
isNormalUser = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFLBVLiPbhVG+riNNpkvXnNtOioByV3CQwtY9gu8pstp nix2l002"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJuo6L6V52AzdQIK6fWW9s0aX1yKUUTXbPd8v8IU9p2o nix2linode"
];
};

View file

@ -96,11 +96,9 @@
discordo
discord
firefox-esr
# freecad
openscad
# ladybird
# ollama
vlc
bitwarden
];
};
};

View file

@ -54,12 +54,17 @@
./configuration.nix
./hardware-configuration.nix
./nginx.nix
../../../components/nix/tailscale.nix
(
{ pkgs, ... }:
{
users.users.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIG90Gg6dV3yhZ5+X40vICbeBwV9rfD39/8l9QSqluTw8 nix2oracle"
];
components = {
# NOTE we manually onboard this machine since it has no secrets uploaded to it
tailscale.useSecretsAuth = false;
};
mods = {
common = {
disableRemoteBuildsOnLio = true;