Personal Nix setup

Upgrade tangled knot

Changed files
+10 -20
modules
+4 -4
flake.lock
···
"sqlite-lib-src": "sqlite-lib-src"
},
"locked": {
-
"lastModified": 1755521231,
-
"narHash": "sha256-DmOKT1H/A+viByvtkV53YcRYlYODh5dvy7CfM/73cDs=",
+
"lastModified": 1756753599,
+
"narHash": "sha256-yD8PMlRjUI2sN5PvkDJRfGz96zCp4gejaguDVmZ4utg=",
"ref": "refs/heads/master",
-
"rev": "12a8c093e27c5a95b281908f43982f49624f9959",
-
"revCount": 1174,
+
"rev": "da3540c0c134331c10f1a8d124ee0925e57f8112",
+
"revCount": 1279,
"type": "git",
"url": "ssh://git@tangled.sh/tangled.sh/core"
},
-5
modules/server/encrypt/tangled-knot-secret.age
···
-
age-encryption.org/v1
-
-> ssh-ed25519 QwbpPw 33WczOs4JEiVVA8CzFii7hWMA+N2FxeMj0ya1JHim1A
-
kfxuJo5DLQJ0vZ6P3ubiadIb0nO3YFFdiMGsTCG00N4
-
--- M5dUQ19fOQdclRb1kt0DbAv8BrFMih+Uy2dlxskeVzg
-
�S*ɀ�!Q]�T�����^�C��-X��Tҕ�r�^��D�m�잫�aD��;k�t@��/��i����A��A��A@I���Ù�8�����E=^���>����B^۰�):�
+6 -10
modules/server/tangled.nix
···
type = types.bool;
};
+
owner = mkOption {
+
default = "did:plc:726afsuwa5x6qaytybar3bfs";
+
type = types.str;
+
};
+
hostname = mkOption {
default = "knot.kitten.sh";
type = types.str;
···
};
config = mkIf (cfg.enable && cfg.tangled.enable) {
-
age.secrets."tangled-knot" = let
-
inherit (config.services.tangled-knot) gitUser;
-
in {
-
file = ./encrypt/tangled-knot-secret.age;
-
owner = gitUser;
-
group = gitUser;
-
mode = "0440";
-
};
-
services.tangled-knot = {
enable = true;
openFirewall = true;
server = {
hostname = cfg.tangled.hostname;
listenAddr = "127.0.0.1:5555";
-
secretFile = config.age.secrets."tangled-knot".path;
+
owner = cfg.tangled.owner;
};
};
};
-1
secrets.nix
···
"./modules/server/encrypt/tailscale.age".publicKeys = keys;
"./modules/server/encrypt/rclone.conf.age".publicKeys = keys;
-
"./modules/server/encrypt/tangled-knot-secret.age".publicKeys = keys;
"./modules/server/encrypt/tangled-knot-ssh.age".publicKeys = keys;
"./home/fonts/encrypt/DankMono-Regular.otf.age".publicKeys = keys;