@@ -1,4 +1,4 @@
|
||||
{ config, pkgs, network, ... }:
|
||||
{ config, pkgs, lib', ... }:
|
||||
{
|
||||
imports = [
|
||||
./networking.nix
|
||||
@@ -12,7 +12,7 @@
|
||||
shell = pkgs.zsh;
|
||||
home = "/home/spark";
|
||||
extraGroups = [ "wheel" ];
|
||||
openssh.authorizedKeys.keys = network.commonSSHKeys;
|
||||
openssh.authorizedKeys.keys = lib'.network.commonSSHKeys;
|
||||
};
|
||||
|
||||
time.timeZone = "Asia/Kolkata";
|
||||
|
@@ -1,4 +1,4 @@
|
||||
{ config, pkgs, network, ... }:
|
||||
{ config, pkgs, lib', ... }:
|
||||
{
|
||||
networking = {
|
||||
hostName = "marisa";
|
||||
@@ -41,7 +41,7 @@
|
||||
}];
|
||||
};
|
||||
};
|
||||
wireguard.interfaces.wg0 = with network.addresses.wireguard.ips; {
|
||||
wireguard.interfaces.wg0 = with lib'.network.addresses.wireguard.ips; {
|
||||
ips = [ marisa ];
|
||||
listenPort = 17840;
|
||||
privateKeyFile = "/var/secrets/wg.key";
|
||||
@@ -50,7 +50,7 @@
|
||||
#Oracle VM1
|
||||
publicKey = "z0Y2VNEWcyVQVSqRHiwmiJ5/0MgSPM+HZfEcwIccSxM=";
|
||||
allowedIPs = [ remilia ];
|
||||
endpoint = "${network.addresses.domain.natto}:17840";
|
||||
endpoint = "${lib'.network.addresses.domain.natto}:17840";
|
||||
persistentKeepalive = 25;
|
||||
}
|
||||
];
|
||||
|
@@ -1,4 +1,4 @@
|
||||
{ config, pkgs, network, ... }:
|
||||
{ config, pkgs, lib', ... }:
|
||||
{
|
||||
imports = [
|
||||
./networking.nix
|
||||
@@ -15,7 +15,7 @@
|
||||
shell = pkgs.zsh;
|
||||
home = "/home/bat";
|
||||
extraGroups = [ "wheel" ];
|
||||
openssh.authorizedKeys.keys = network.commonSSHKeys;
|
||||
openssh.authorizedKeys.keys = lib'.network.commonSSHKeys;
|
||||
};
|
||||
|
||||
system.stateVersion = "21.11";
|
||||
|
@@ -1,7 +1,7 @@
|
||||
{ config, pkgs, lib, network, ... }:
|
||||
{ config, pkgs, lib', network, ... }:
|
||||
{
|
||||
mailserver =
|
||||
let domain = network.addresses.domain.natto; in
|
||||
let domain = lib'.network.addresses.domain.natto; in
|
||||
rec {
|
||||
enable = true;
|
||||
fqdn = "mail.${domain}";
|
||||
|
@@ -1,4 +1,4 @@
|
||||
{ lib, config, network, pkgs, ... }:
|
||||
{ lib, config, lib', pkgs, ... }:
|
||||
{
|
||||
networking = {
|
||||
useDHCP = false;
|
||||
@@ -27,7 +27,7 @@
|
||||
useDHCP = true;
|
||||
};
|
||||
};
|
||||
nat = with network.addresses.wireguard.ips; {
|
||||
nat = with lib'.network.addresses.wireguard.ips; {
|
||||
enable = true;
|
||||
externalInterface = "ens3";
|
||||
internalInterfaces = [ "wg0" ];
|
||||
@@ -46,7 +46,7 @@
|
||||
}
|
||||
];
|
||||
};
|
||||
wireguard.interfaces = with network.addresses.wireguard; {
|
||||
wireguard.interfaces = with lib'.network.addresses.wireguard; {
|
||||
wg0 = {
|
||||
ips = [ ips.remilia ];
|
||||
listenPort = 17840;
|
||||
|
@@ -1,6 +1,6 @@
|
||||
{ config, pkgs, lib, network, ... }:
|
||||
{ config, pkgs, lib, lib', ... }:
|
||||
let
|
||||
domain = network.addresses.domain.natto;
|
||||
domain = lib'.network.addresses.domain.natto;
|
||||
in
|
||||
{
|
||||
services = {
|
||||
@@ -40,7 +40,7 @@ in
|
||||
};
|
||||
};
|
||||
in
|
||||
with network.addresses.wireguard.ips; {
|
||||
with lib'.network.addresses.wireguard.ips; {
|
||||
"${domain}" = {
|
||||
addSSL = true;
|
||||
enableACME = true;
|
||||
|
@@ -1,4 +1,4 @@
|
||||
{ config, pkgs, network, ... }:
|
||||
{ config, pkgs, lib', ... }:
|
||||
|
||||
{
|
||||
networking = {
|
||||
@@ -18,7 +18,7 @@
|
||||
trustedInterfaces = [ "docker0" ];
|
||||
};
|
||||
|
||||
wireguard.interfaces.wg0 = with network.addresses.wireguard.ips; {
|
||||
wireguard.interfaces.wg0 = with lib'.network.addresses.wireguard.ips; {
|
||||
ips = [ satori ];
|
||||
listenPort = 17840;
|
||||
privateKeyFile = "/var/secrets/wg.key";
|
||||
@@ -27,7 +27,7 @@
|
||||
#Oracle VM1
|
||||
publicKey = "z0Y2VNEWcyVQVSqRHiwmiJ5/0MgSPM+HZfEcwIccSxM=";
|
||||
allowedIPs = [ remilia ];
|
||||
endpoint = "${network.addresses.domain.natto}:17840";
|
||||
endpoint = "${lib'.network.addresses.domain.natto}:17840";
|
||||
persistentKeepalive = 25;
|
||||
}
|
||||
];
|
||||
|
@@ -3,7 +3,10 @@
|
||||
{
|
||||
services = {
|
||||
tor.enable = true;
|
||||
openssh.enable = true;
|
||||
openssh = {
|
||||
enable = true;
|
||||
settings.permitRootLogin = "yes";
|
||||
};
|
||||
ratbagd.enable = true;
|
||||
btrfs.autoScrub.enable = true;
|
||||
zfs.autoScrub.enable = true;
|
||||
|
Reference in New Issue
Block a user