nix(loki): disable nix-serve

This commit is contained in:
surtur 2023-12-02 21:46:21 +01:00
parent acc9d912b0
commit 02dd6dcfd7
Signed by: wanderer
SSH Key Fingerprint: SHA256:MdCZyJ2sHLltrLBp0xQO0O1qTW9BT/xl5nXkDvhlMCI

@ -18,7 +18,6 @@
../../modules/base.nix ../../modules/base.nix
../../modules/dnscrypt.nix ../../modules/dnscrypt.nix
# ../../modules/nix-serve.nix
../../modules/uptime-kuma.nix ../../modules/uptime-kuma.nix
]; ];
@ -45,12 +44,6 @@
nix.settings.trusted-users = ["@wheel" "root"]; nix.settings.trusted-users = ["@wheel" "root"];
nix.sshServe.enable = true;
nix.sshServe.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBtG6NCgdLHX4ztpfvYNRaslKWZcl6KdTc1DehVH4kAL"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBZbkw9vjCfbMPEH7ZAFq20XE9oIJ4w/HRIMu2ivNcej caelum's nixbldr key"
];
# forbid hibernation due to zfs-on-root. # forbid hibernation due to zfs-on-root.
boot.kernelParams = ["nohibernate"]; boot.kernelParams = ["nohibernate"];
boot.kernel.sysctl = { boot.kernel.sysctl = {
@ -198,8 +191,6 @@
]; ];
}; };
nix-serve.secretKeyFile = config.sops.secrets.nixServeSecretKey.path;
# TS is enabled in the imported module, this is additional config. # TS is enabled in the imported module, this is additional config.
tailscale = { tailscale = {
useRoutingFeatures = "both"; useRoutingFeatures = "both";