diff --git a/hosts/hyrule/default.nix b/hosts/hyrule/default.nix index 76b8d68..5f14a2a 100755 --- a/hosts/hyrule/default.nix +++ b/hosts/hyrule/default.nix @@ -18,11 +18,6 @@ in { #../modules/server/fail2ban.nix ]; - # override wishlist with the new cool one! - #pkgs.config.packageOverrides = { - # wishlist = inputs.wishlist.packages.x86_64-linux.wishlist; - #}; - nix.settings = { # make wheel group trusted users allows my "ae" user # to import packages not signed by a trusted key @@ -47,16 +42,6 @@ in { targetHost = "imbored.dev"; targetUser = "ae"; targetPort = 22; - # the following line is unnecessary if using an ssh agent - #sshOptions = ["-i /home/me/.ssh/id_hyrule"]; - #keys = { - # "imbored.dev" = { - # # text, keyCommand, or keyFile must be set - # # text = ""; - # #keyCommand = [ "" ]; - # keyFile = "/home/me/.ssh/id_hyrule"; - # }; - #}; buildOnTarget = false; # build locally then deploy }; @@ -88,7 +73,6 @@ in { }; }; - # grant passwordless sudo to wheel group security.sudo.wheelNeedsPassword = false; users = { @@ -471,17 +455,5 @@ in { }; }; - #systemd.services.wishlist = { - # description = "Single entrypoint for multiple SSH endpoints"; - # wantedBy = ["multi-user.target"]; - # - # serviceConfig = { - # DynamicUser = "yes"; - # ExecStart = "${pkgs.wishlist}/bin/wishlist serve --config /home/$USER/.ssh/config"; - # Restart = "always"; - # RestartSec = "2s"; - # }; - #}; - system.stateVersion = "24.11"; # DO NOT MODIFY }