aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--hosts/aptos/networking.nix8
-rw-r--r--hosts/carmel/networking.nix1
-rw-r--r--hosts/tahoe/networking.nix8
-rw-r--r--modules/services/default.nix3
-rw-r--r--modules/services/fwupd/default.nix5
-rw-r--r--modules/services/ssh-server/default.nix17
-rw-r--r--modules/services/tailscale/default.nix15
-rw-r--r--profiles/default.nix2
-rw-r--r--profiles/nas.nix4
-rw-r--r--profiles/server.nix9
-rw-r--r--profiles/tailscale.nix6
-rw-r--r--profiles/workstation.nix5
12 files changed, 26 insertions, 57 deletions
diff --git a/hosts/aptos/networking.nix b/hosts/aptos/networking.nix
index b157ec5..84c32e5 100644
--- a/hosts/aptos/networking.nix
+++ b/hosts/aptos/networking.nix
@@ -26,12 +26,4 @@
services.nscd.enable = false;
system.nssModules = lib.mkForce [ ];
-
- # Use systemd-resolved
- services.resolved = {
- enable = true;
- dnssec = "false";
- };
-
- my.services.tailscale.enable = true;
}
diff --git a/hosts/carmel/networking.nix b/hosts/carmel/networking.nix
index b814a22..99c9796 100644
--- a/hosts/carmel/networking.nix
+++ b/hosts/carmel/networking.nix
@@ -111,5 +111,4 @@ in
};
networking.private-wireguard.enable = true;
- my.services.tailscale.enable = true;
}
diff --git a/hosts/tahoe/networking.nix b/hosts/tahoe/networking.nix
index 22a7251..8ea6667 100644
--- a/hosts/tahoe/networking.nix
+++ b/hosts/tahoe/networking.nix
@@ -27,12 +27,4 @@
services.nscd.enable = false;
system.nssModules = lib.mkForce [ ];
-
- # Use systemd-resolved
- services.resolved = {
- enable = true;
- dnssec = "false";
- };
-
- my.services.tailscale.enable = true;
}
diff --git a/modules/services/default.nix b/modules/services/default.nix
index 457d86a..b6b34d5 100644
--- a/modules/services/default.nix
+++ b/modules/services/default.nix
@@ -5,16 +5,13 @@
./avahi
./backup
./cgit
- ./fwupd
./gitolite
./monitoring
./navidrome
./nginx
./samba
./sendsms
- ./ssh-server
./syncthing
- ./tailscale
./transmission
./unifi
];
diff --git a/modules/services/fwupd/default.nix b/modules/services/fwupd/default.nix
deleted file mode 100644
index 52dc13e..0000000
--- a/modules/services/fwupd/default.nix
+++ /dev/null
@@ -1,5 +0,0 @@
-{ ... }:
-
-{
- services.fwupd.enable = true;
-}
diff --git a/modules/services/ssh-server/default.nix b/modules/services/ssh-server/default.nix
deleted file mode 100644
index ce5d4c8..0000000
--- a/modules/services/ssh-server/default.nix
+++ /dev/null
@@ -1,17 +0,0 @@
-{ ... }: {
- services.openssh = {
- enable = true;
- permitRootLogin = "yes";
- passwordAuthentication = false;
- };
-
- programs.mosh.enable = true;
-
- networking.firewall.allowedTCPPorts = [ 22 ];
-
- # Relevant ports for mosh
- networking.firewall.allowedUDPPortRanges = [{
- from = 6000;
- to = 6100;
- }];
-}
diff --git a/modules/services/tailscale/default.nix b/modules/services/tailscale/default.nix
deleted file mode 100644
index 14753f4..0000000
--- a/modules/services/tailscale/default.nix
+++ /dev/null
@@ -1,15 +0,0 @@
-{ config, lib, ... }:
-let cfg = config.my.services.tailscale;
-in
-{
-
- options.my.services.tailscale = with lib; {
- enable = mkEnableOption "tailscale configuration";
- };
-
- config = lib.mkIf cfg.enable {
- services.tailscale.enable = true;
- networking.firewall.trustedInterfaces = [ "tailscale0" ];
- networking.firewall.checkReversePath = "loose";
- };
-}
diff --git a/profiles/default.nix b/profiles/default.nix
index 4575b13..2353dde 100644
--- a/profiles/default.nix
+++ b/profiles/default.nix
@@ -26,6 +26,8 @@
services.fstrim.enable = true;
+ services.fwupd.enable = true;
+
programs.ssh = {
# $ ssh-keyscan example.com
knownHosts = {
diff --git a/profiles/nas.nix b/profiles/nas.nix
index 9c25c22..d1033af 100644
--- a/profiles/nas.nix
+++ b/profiles/nas.nix
@@ -11,4 +11,8 @@
group = "nas";
isSystemUser = true;
};
+
+ # Use systemd-resolved
+ services.resolved.enable = true;
+ services.resolved.dnssec = "false";
}
diff --git a/profiles/server.nix b/profiles/server.nix
index 5a95dff..731ebe8 100644
--- a/profiles/server.nix
+++ b/profiles/server.nix
@@ -2,6 +2,7 @@
{
imports = [
./default.nix
+ ./tailscale.nix
];
powerManagement.cpuFreqGovernor = "schedutil";
@@ -12,4 +13,12 @@
packages = with pkgs; [ terminus_font ];
keyMap = "us";
};
+
+ services.openssh = {
+ enable = true;
+ permitRootLogin = "yes";
+ passwordAuthentication = false;
+ };
+
+ networking.firewall.allowedTCPPorts = [ 22 ];
}
diff --git a/profiles/tailscale.nix b/profiles/tailscale.nix
new file mode 100644
index 0000000..61c1a38
--- /dev/null
+++ b/profiles/tailscale.nix
@@ -0,0 +1,6 @@
+{ ... }:
+{
+ services.tailscale.enable = true;
+ networking.firewall.trustedInterfaces = [ "tailscale0" ];
+ networking.firewall.checkReversePath = "loose";
+}
diff --git a/profiles/workstation.nix b/profiles/workstation.nix
index f136c33..3b422a6 100644
--- a/profiles/workstation.nix
+++ b/profiles/workstation.nix
@@ -4,6 +4,7 @@
./default.nix
./documentation.nix
./btrfs.nix
+ ./tailscale.nix
];
virtualisation.docker.enable = false;
@@ -82,4 +83,8 @@
pavucontrol
easyeffects
];
+
+ # Use systemd-resolved
+ services.resolved.enable = true;
+ services.resolved.dnssec = "false";
}