about summary refs log tree commit diff
path: root/nixos/socrates/default.nix
diff options
context:
space:
mode:
Diffstat (limited to 'nixos/socrates/default.nix')
-rw-r--r--nixos/socrates/default.nix22
1 files changed, 0 insertions, 22 deletions
diff --git a/nixos/socrates/default.nix b/nixos/socrates/default.nix
index ec0bf3a73dc5..8b762a56de5f 100644
--- a/nixos/socrates/default.nix
+++ b/nixos/socrates/default.nix
@@ -1,8 +1,6 @@
 let
   briefcase = import <briefcase> {};
   pkgs = briefcase.third_party.pkgs;
-  trimNewline = x: pkgs.lib.removeSuffix "\n" x;
-  readSecret = x: trimNewline (builtins.readFile ("/etc/secrets/" + x));
 in {
   imports = [ ./hardware.nix ];
 
@@ -116,26 +114,6 @@ in {
     };
   };
 
-  # systemd.services.monzo-token-server = {
-  #   enable = true;
-  #   description = "Ensure my Monzo access token is valid";
-  #   script = "${briefcase.tools.monzo_ynab.tokens}/bin/token-server";
-  #   # TODO(wpcarro): I'm unsure of the size of this security risk, but if a
-  #   # non-root user runs `systemctl cat monzo-token-server`, they could read the
-  #   # following, sensitive environment variables.
-  #   environment = {
-  #     store_path = "/var/cache/monzo_ynab";
-  #     monzo_client_id = readSecret "monzo-client-id";
-  #     monzo_client_secret = readSecret "monzo-client-secret";
-  #     ynab_personal_access_token = readSecret "ynab-personal-access-token";
-  #     ynab_account_id = readSecret "ynab-account-id";
-  #     ynab_budget_id = readSecret "ynab-budget-id";
-  #   };
-  #   serviceConfig = {
-  #     Type = "simple";
-  #   };
-  # };
-
   systemd.services.zoo = {
     enable = true;
     description = "Run my monoserver";