remove lighthouse

This commit is contained in:
TheWanderingCrow 2025-04-22 09:32:49 -04:00
parent 8c68d5cdd1
commit 33ca31c4fa
7 changed files with 0 additions and 116 deletions

View file

@ -108,32 +108,6 @@
]
++ baseModules;
};
#########################
# DO Nebula Lighthouse1 #
#########################
WCE-Lighthouse1 = nixpkgs.lib.nixosSystem {
specialArgs = {inherit inputs;};
modules =
[
./hosts/WCE-Lighthouse
"${nixpkgs}/nixos/modules/virtualisation/digital-ocean-image.nix"
{
networking.hostName = "WCE-Lighthouse1";
sops.defaultSopsFile = inputs.nix-secrets.secrets.lighthouse1;
}
]
++ baseModules;
};
};
##############
# Nix Darwin #
##############
darwinConfigurations = {
tests-iMac-Pro = inputs.nix-darwin.lib.darwinSystem {
modules = [
./hosts/OSX-Darwin
];
};
};
############
# Terranix #

View file

@ -1,15 +0,0 @@
{
lib,
config,
pkgs,
...
}: {
imports = [
../../modules
];
nixpkgs.hostPlatform = "x86_64-linux";
ricing.basic.enable = false;
user.lighthouse.enable = true;
}

View file

@ -43,19 +43,5 @@
days_from_hiding_to_deleting = 1;
};
};
# "cloudflare_r2_bucket"."cache" = {
# account_id = "68c4b3ab47c1a97037ab5a938f772d69";
# name = "wce-attic-cache";
# storage_class = "Standard";
# };
#"digitalocean_droplet"."do-wce-lighthouse1" = {
# image = "177939596"; # nixos-digitalocean
# name = "WCE-Lighthouse1";
# region = "nyc3";
# size = "s-1vcpu-1gb";
# ssh_keys = ["45378200"];
#};
};
}

View file

@ -42,9 +42,6 @@
live = {
enable = lib.mkEnableOption "enable live disk user";
};
lighthouse = {
enable = lib.mkEnableOption "enable nebula lighthouse server";
};
};
desktop = {
@ -100,9 +97,6 @@
live = {
enable = lib.mkDefault false;
};
lighthouse = {
enable = lib.mkDefault false;
};
};
# Desktop options are declared in their relevant modules in module/desktops

View file

@ -1,10 +0,0 @@
{
lib,
config,
...
}: {
imports = [
./user.nix
./setup.nix
];
}

View file

@ -1,29 +0,0 @@
{
lib,
inputs,
config,
...
}:
lib.mkIf config.user.lighthouse.enable {
sops = {
age.keyFile = "/var/lib/sops-nix/key.txt";
age.generateKey = true;
};
sops.secrets.cert = {};
sops.secrets.key = {};
services.nebula.networks.WCE = {
inherit (inputs.nix-secrets.nebula) ca;
enable = true;
isLighthouse = true;
cert = config.sops.secrets.cert.path;
key = config.sops.secrets.key.path;
settings = {
listen = {
host = "0.0.0.0";
port = 4242;
};
};
};
}

View file

@ -1,16 +0,0 @@
{
inputs,
lib,
config,
...
}:
lib.mkIf config.user.lighthouse.enable {
config.users.users.lighthouse = {
isNormalUser = true;
initialPassword = "changeme";
extraGroups = ["wheel"];
openssh.authorizedKeys.keyFiles = [
inputs.nix-secrets.keys.default
];
};
}