Personal Nix setup

Update tailscale key

Changed files
+10 -11
machines
modules
server
+4
machines/ramune/configuration.nix
···
};*/
};
};
+
server = {
+
enable = true;
+
tailscale.enable = true;
+
};
};
system.stateVersion = "24.11";
+5 -5
modules/server/encrypt/tailscale.age
···
age-encryption.org/v1
-
-> ssh-ed25519 QwbpPw e0s6sI6aX9E6Raeep7UpHV0grnf6TdSQjGMH+x7cF1Q
-
a9ZVCwy7TKf6Fwtai0La9osx4qeo8ytAuXO+ZSzX1Ic
-
--- ysFkOjL7ep6LXu9D3ZtDRerJX1WIvt+I3Jj+JLpqON4
-
�l�{z�u�q���a�(<��7��՗�3�M��v�G��KX��m�|X�� �?���
-
Ww7��4}Êp Ƴ��dJ!�麦B�}p�#0 �
+
-> ssh-ed25519 QwbpPw FaPxNkTb6Q5EYBjIM4pglJWVW/LkW9lLzsNrSOElB3I
+
XTzvqUF3sQhrhgpjIooRlxQR8Ju8xyA4H4b9xVIORy4
+
--- yEmYYxb8bsLjC1y+cSvkq1YcLkRDFP6YYSdJypoA4wY
+
�@X�YaA懆����R�E��W�^^;Y���"'a���.<�O��I���ܬ
+
F� �� ��)�u���Q���n���t/�Bhx����(�ʮ}WB
+1 -6
modules/server/tailscale.nix
···
description = "Whether to enable Tailscale.";
type = types.bool;
};
-
-
authKeySecret = {
-
description = "Age Secret of auth keyfile for Tailscale.";
-
type = types.path;
-
};
};
config = mkIf (cfg.enable && cfgRoot.enable) {
···
age.secrets."tailscale" = {
symlink = true;
path = "/run/secrets/tailscale";
-
file = cfg.authKeySecret;
+
file = ./encrypt/tailscale.age;
};
services.tailscale = {