mirror of
https://github.com/kittywitch/nixfiles.git
synced 2026-02-09 12:29:19 -08:00
Refactors, konawall-py for darwin, sumireko update to Sonoma
This commit is contained in:
parent
091ddb5b91
commit
bc61d82487
151 changed files with 691 additions and 792 deletions
|
|
@ -13,20 +13,6 @@
|
|||
config.users.users);
|
||||
};
|
||||
in {
|
||||
security.sudo.extraRules = [
|
||||
{
|
||||
users = ["deploy"];
|
||||
commands = [
|
||||
{
|
||||
command = "ALL";
|
||||
options = [
|
||||
"NOPASSWD"
|
||||
"SETENV"
|
||||
];
|
||||
}
|
||||
];
|
||||
}
|
||||
];
|
||||
users.users = {
|
||||
root = commonUser;
|
||||
deploy =
|
||||
|
|
|
|||
|
|
@ -1,6 +0,0 @@
|
|||
{config, ...}: {
|
||||
system.autoUpgrade = {
|
||||
enable = false;
|
||||
flake = "github:kittywitch/infrastructure#${config.networking.hostName}";
|
||||
};
|
||||
}
|
||||
|
|
@ -1,4 +1,3 @@
|
|||
_: {
|
||||
networking.nftables.enable = true;
|
||||
services.tailscale.enable = true;
|
||||
}
|
||||
9
nixos/common/nix-deploy-trusted-user.nix
Normal file
9
nixos/common/nix-deploy-trusted-user.nix
Normal file
|
|
@ -0,0 +1,9 @@
|
|||
_: {
|
||||
nix = {
|
||||
settings = {
|
||||
trusted-users = [
|
||||
"deploy"
|
||||
];
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
@ -1,21 +0,0 @@
|
|||
{lib, ...}: let
|
||||
inherit (lib.modules) mkDefault;
|
||||
in {
|
||||
boot.loader = {
|
||||
grub.configurationLimit = 8;
|
||||
systemd-boot.configurationLimit = 8;
|
||||
};
|
||||
|
||||
nix = {
|
||||
settings = {
|
||||
trusted-users = [
|
||||
"deploy"
|
||||
];
|
||||
};
|
||||
gc = {
|
||||
automatic = mkDefault false;
|
||||
dates = mkDefault "weekly";
|
||||
options = mkDefault "--delete-older-than 7d";
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
@ -9,22 +9,10 @@
|
|||
in {
|
||||
networking.firewall = {
|
||||
allowedTCPPorts = [(list.unsafeHead config.services.openssh.ports)];
|
||||
allowedUDPPortRanges = [
|
||||
{
|
||||
from = 60000;
|
||||
to = 61000;
|
||||
}
|
||||
];
|
||||
};
|
||||
|
||||
services.openssh = {
|
||||
enable = true;
|
||||
/*
|
||||
knownHosts.katca = {
|
||||
certAuthority = true;
|
||||
publicKey = builtins.readFile ./ca-pubkey.pem;
|
||||
};
|
||||
*/
|
||||
settings = {
|
||||
KexAlgorithms = ["curve25519-sha256@libssh.org"];
|
||||
PasswordAuthentication = false;
|
||||
|
|
@ -37,6 +25,4 @@ in {
|
|||
LogLevel VERBOSE
|
||||
'';
|
||||
};
|
||||
|
||||
programs.mosh.enable = true;
|
||||
}
|
||||
|
|
|
|||
16
nixos/common/sudo-nopasswd.nix
Normal file
16
nixos/common/sudo-nopasswd.nix
Normal file
|
|
@ -0,0 +1,16 @@
|
|||
_: {
|
||||
security.sudo.extraRules = [
|
||||
{
|
||||
users = ["deploy"];
|
||||
commands = [
|
||||
{
|
||||
command = "ALL";
|
||||
options = [
|
||||
"NOPASSWD"
|
||||
"SETENV"
|
||||
];
|
||||
}
|
||||
];
|
||||
}
|
||||
];
|
||||
}
|
||||
3
nixos/common/tailscale.nix
Normal file
3
nixos/common/tailscale.nix
Normal file
|
|
@ -0,0 +1,3 @@
|
|||
_: {
|
||||
services.tailscale.enable = true;
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue