Remove openvpn
This commit is contained in:
parent
8b73315235
commit
9a4a7d742d
@ -56,7 +56,6 @@ with import ../support.nix { inherit lib config; }; {
|
|||||||
home-manager.users.balsoft.xdg.mimeApps = {
|
home-manager.users.balsoft.xdg.mimeApps = {
|
||||||
enable = true;
|
enable = true;
|
||||||
defaultApplications =
|
defaultApplications =
|
||||||
|
|
||||||
with config.defaultApplications;
|
with config.defaultApplications;
|
||||||
builtins.mapAttrs (name: value:
|
builtins.mapAttrs (name: value:
|
||||||
if value ? desktop then [ "${value.desktop}.desktop" ] else value) {
|
if value ? desktop then [ "${value.desktop}.desktop" ] else value) {
|
||||||
|
@ -44,11 +44,7 @@
|
|||||||
gitlab-ci-mode
|
gitlab-ci-mode
|
||||||
gitlab-ci-mode-flycheck
|
gitlab-ci-mode-flycheck
|
||||||
gitlab
|
gitlab
|
||||||
github-issues
|
undo-tree
|
||||||
(github-pullrequest.overrideAttrs (oa: { buildInputs = oa.buildInputs ++ [pkgs.git]; }))
|
|
||||||
scad-mode
|
|
||||||
scad-preview
|
|
||||||
languagetool
|
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -38,7 +38,6 @@ device:
|
|||||||
./mailserver.nix
|
./mailserver.nix
|
||||||
./matrix-synapse.nix
|
./matrix-synapse.nix
|
||||||
./workspace/kanshi.nix
|
./workspace/kanshi.nix
|
||||||
./openvpn.nix
|
|
||||||
./nginx.nix
|
./nginx.nix
|
||||||
./gitea.nix
|
./gitea.nix
|
||||||
];
|
];
|
||||||
|
@ -65,7 +65,7 @@
|
|||||||
};
|
};
|
||||||
systemd.services.mautrix-telegram = {
|
systemd.services.mautrix-telegram = {
|
||||||
description = "A bridge between telegram and matrix";
|
description = "A bridge between telegram and matrix";
|
||||||
requires = [ "matrix-synapse.service" "openvpn-client.service" ];
|
requires = [ "matrix-synapse.service" ];
|
||||||
path = with pkgs; [ coreutils mautrix-telegram ];
|
path = with pkgs; [ coreutils mautrix-telegram ];
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
Restart = "always";
|
Restart = "always";
|
||||||
|
@ -1,86 +0,0 @@
|
|||||||
{ pkgs, config, lib, ... }:
|
|
||||||
lib.mkIf (! isNull config.secrets.openvpn) {
|
|
||||||
services.openvpn = {
|
|
||||||
servers = {
|
|
||||||
client = {
|
|
||||||
config = ''
|
|
||||||
proto tcp-client
|
|
||||||
|
|
||||||
|
|
||||||
remote cz2.getstaticip.com 443 # non-stadard port for OpenVPN
|
|
||||||
dev tun
|
|
||||||
|
|
||||||
nobind
|
|
||||||
persist-key
|
|
||||||
|
|
||||||
tls-client
|
|
||||||
remote-cert-tls server
|
|
||||||
#uncomment following line and comment verify-x509-name line if older OpenVPN version is installed on your device
|
|
||||||
#tls-remote eu3.finevpn.com
|
|
||||||
verify-x509-name eu3.finevpn.com name
|
|
||||||
|
|
||||||
verb 3
|
|
||||||
|
|
||||||
cipher AES-256-CBC
|
|
||||||
auth SHA1
|
|
||||||
pull
|
|
||||||
|
|
||||||
auth-user-pass
|
|
||||||
|
|
||||||
#if connection is terminated, it will attempt to connect without promting username and pass
|
|
||||||
auth-retry nointeract
|
|
||||||
|
|
||||||
# redirect-gateway def1
|
|
||||||
#dhcp-option DNS 8.8.8.8
|
|
||||||
#dhcp-option DNS 8.8.4.4
|
|
||||||
|
|
||||||
<ca>
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIEyzCCA7OgAwIBAgIJAKPYkg7opAaCMA0GCSqGSIb3DQEBCwUAMIGaMQswCQYD
|
|
||||||
VQQGEwJDWjEVMBMGA1UECBMMVXN0ZWNreSBLcmFqMRcwFQYDVQQHEw5Vc3RpIG5h
|
|
||||||
ZCBMYWJlbTEUMBIGA1UEChMLRmluZVZQTi5jb20xCzAJBgNVBAsTAklUMRcwFQYD
|
|
||||||
VQQDEw5GaW5lVlBOLmNvbSBDQTEfMB0GCSqGSIb3DQEJARYQaW5mb0BmaW5ldnBu
|
|
||||||
LmNvbTAeFw0xODAyMjYxMjIzMzVaFw0yODAyMjQxMjIzMzVaMIGaMQswCQYDVQQG
|
|
||||||
EwJDWjEVMBMGA1UECBMMVXN0ZWNreSBLcmFqMRcwFQYDVQQHEw5Vc3RpIG5hZCBM
|
|
||||||
YWJlbTEUMBIGA1UEChMLRmluZVZQTi5jb20xCzAJBgNVBAsTAklUMRcwFQYDVQQD
|
|
||||||
Ew5GaW5lVlBOLmNvbSBDQTEfMB0GCSqGSIb3DQEJARYQaW5mb0BmaW5ldnBuLmNv
|
|
||||||
bTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALyWG6suxMedT1coO5Gc
|
|
||||||
F/lTCARRK3vh6I5HWb9Rhbxq0fkxHn8vp3haHX2uJXf/udv7wR43Z+1p+nhdwGMD
|
|
||||||
5rNUVf7AqSYAWprWI4GB5twuYQnh+Iqoj+T527WlYG0kEl47W0Yk/8EortcQtCg7
|
|
||||||
yvM4+CF5LC9Kfy1rWGtcxWohYSw4KrDRbL8EVE7cJSGC/Mxphkfe3Vwop+Moa9ww
|
|
||||||
b9USOocxHzI2hGq9M0hNtXUcMxwzhNVek+4JEKTm5cf28X0DIPvVOLRFbUBHAYXA
|
|
||||||
L0/WqkZiW8A56h6Agwg8dgm7n9qsHY51A36Es5X05QVaL0XCJ7pVDQzDkkejTZpZ
|
|
||||||
cl8CAwEAAaOCARAwggEMMB0GA1UdDgQWBBTb+GbEL1EZefoHABF/VZsw5UGy6zCB
|
|
||||||
zwYDVR0jBIHHMIHEgBTb+GbEL1EZefoHABF/VZsw5UGy66GBoKSBnTCBmjELMAkG
|
|
||||||
A1UEBhMCQ1oxFTATBgNVBAgTDFVzdGVja3kgS3JhajEXMBUGA1UEBxMOVXN0aSBu
|
|
||||||
YWQgTGFiZW0xFDASBgNVBAoTC0ZpbmVWUE4uY29tMQswCQYDVQQLEwJJVDEXMBUG
|
|
||||||
A1UEAxMORmluZVZQTi5jb20gQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9AZmluZXZw
|
|
||||||
bi5jb22CCQCj2JIO6KQGgjAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjANBgkq
|
|
||||||
hkiG9w0BAQsFAAOCAQEANZNy+OEKNoAFNo0TjBCCyaXL6Pr3rD++I8C2X6QtGY1E
|
|
||||||
+754H3h4/vfSDMZFT8QvVrfOXnYrN+anjM5wGXLuYlECZ69zaINdkA5NCjoFSnhG
|
|
||||||
EnArMcDeOfuCJJEIN9hsILvRdS+WW/UrMjF/minrACAAnwQInB0AVXinglzqvnYf
|
|
||||||
WOogFS9WvQeNn+moWzEkpBipdpXn7flgrPQsU29kK8HEI3bek2YRJoCjhe5S3rGB
|
|
||||||
73mS0NORGcpDwlUuQeU54Qtl9i/cs6PrbGia9AvrKcHipLJC9dTq1mMKvmEupDBm
|
|
||||||
DtHIEdmbuqGBHTJvKERSSdPiqfwUP11hfXyCfoty5g==
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</ca>
|
|
||||||
|
|
||||||
'';
|
|
||||||
up = ''
|
|
||||||
ip route delete 0.0.0.0/1
|
|
||||||
ip route delete 128.0.0.0/1
|
|
||||||
|
|
||||||
ip route add table 42 default via 93.190.51.91
|
|
||||||
# When we recieve traffic from our VPN ip, reply to it there
|
|
||||||
ip rule add from 93.190.51.91 table 42
|
|
||||||
# Also send all smtp traffic via VPN ip
|
|
||||||
ip rule add dport 25 table 42
|
|
||||||
ip rule add dport 465 table 42
|
|
||||||
ip rule add dport 587 table 42
|
|
||||||
'';
|
|
||||||
authUserPass.username = config.secrets.openvpn.user;
|
|
||||||
authUserPass.password = config.secrets.openvpn.password;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
@ -25,8 +25,6 @@ let
|
|||||||
};
|
};
|
||||||
in rec {
|
in rec {
|
||||||
options.secrets = {
|
options.secrets = {
|
||||||
owm-key = secret "OpenWeatherMap key";
|
|
||||||
irc = mkCredOption "IRC (konversation)" { };
|
|
||||||
slack-term = secret "slack token";
|
slack-term = secret "slack token";
|
||||||
yt-utilities = mkOption {
|
yt-utilities = mkOption {
|
||||||
description = "youtrack";
|
description = "youtrack";
|
||||||
|
@ -43,4 +43,24 @@
|
|||||||
virtualisation.libvirtd = {
|
virtualisation.libvirtd = {
|
||||||
enable = config.deviceSpecific.isHost;
|
enable = config.deviceSpecific.isHost;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
services.vsftpd = {
|
||||||
|
enable = true;
|
||||||
|
anonymousUser = true;
|
||||||
|
};
|
||||||
|
networking.firewall.trustedInterfaces = [ "eth0" ];
|
||||||
|
|
||||||
|
services.nextcloud = {
|
||||||
|
enable = true;
|
||||||
|
nginx.enable = true;
|
||||||
|
hostName = "nextcloud.balsoft.ru";
|
||||||
|
config.adminpassFile = "/home/balsoft/nextcloud-admin";
|
||||||
|
package = pkgs.nextcloud19;
|
||||||
|
};
|
||||||
|
|
||||||
|
services.nginx.virtualHosts."nextcloud.balsoft.ru" = {
|
||||||
|
enableACME = true;
|
||||||
|
forceSSL = true;
|
||||||
|
};
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
{
|
{
|
||||||
services.mopidy = {
|
services.mopidy = {
|
||||||
enable = true;
|
enable = true;
|
||||||
extensionPackages = with pkgs; [ mopidy-mpd mopidy-gmusic ];
|
extensionPackages = with pkgs; [ mopidy-mpd mopidy-gmusic mopidy-youtube ];
|
||||||
configuration = (if (!isNull config.secrets.gpmusic) then ''
|
configuration = (if (!isNull config.secrets.gpmusic) then ''
|
||||||
[gmusic]
|
[gmusic]
|
||||||
username = ${config.secrets.gpmusic.user}
|
username = ${config.secrets.gpmusic.user}
|
||||||
|
@ -46,7 +46,7 @@
|
|||||||
"p" = "nix-shell --run zsh -p";
|
"p" = "nix-shell --run zsh -p";
|
||||||
"o" = "xdg-open";
|
"o" = "xdg-open";
|
||||||
"post" = ''curl -F"file=@-" https://0x0.st'';
|
"post" = ''curl -F"file=@-" https://0x0.st'';
|
||||||
"clip" = "${pkgs.xclip}/bin/xclip -selection clipboard";
|
"cat" = "${pkgs.bat}/bin/bat";
|
||||||
};
|
};
|
||||||
initExtra = ''
|
initExtra = ''
|
||||||
r(){nix run nixpkgs.$1 -c $@ }
|
r(){nix run nixpkgs.$1 -c $@ }
|
||||||
|
BIN
secret.nix
BIN
secret.nix
Binary file not shown.
Loading…
Reference in New Issue
Block a user