disable wireguard

This commit is contained in:
Charlotte 🦝 Delenk 2023-12-06 17:23:37 +01:00
parent 6945480d40
commit 0ea668a296
Signed by: darkkirb
GPG key ID: AB2BD8DAF2E37122
14 changed files with 2 additions and 46 deletions

View file

@ -47,7 +47,6 @@
];
listenAddress = "0.0.0.0";
};
networking.firewall.interfaces."wg0".allowedTCPPorts = [config.services.prometheus.exporters.node.port];
environment.pathsToLink = ["/share/zsh"];

View file

@ -2,8 +2,5 @@
imports = [
"${nixpkgs}/nixos/modules/installer/cd-dvd/installation-cd-minimal.nix"
];
networking.wireguard.interfaces."wg0".ips = [
"fd0d:a262:1fa6:e621:6ec2:1e4e:ce7f:d2af/64"
];
networking.hostId = "8425e349";
}

View file

@ -71,7 +71,6 @@
fsType = "vfat";
};
networking.wireguard.interfaces."wg0".ips = ["fd0d:a262:1fa6:e621:bc9b:6a33:86e4:873b/64"];
environment.etc."sysconfig/lm_sensors".text = ''
# Generated by sensors-detect on Sun Apr 24 08:31:51 2022
# This file is sourced by /etc/init.d/lm_sensors and defines the modules to
@ -111,15 +110,6 @@
];
nix.daemonCPUSchedPolicy = "idle";
nix.daemonIOSchedClass = "idle";
networking.wireguard.interfaces.wg0.peers = [
# nutty-noon
{
publicKey = "YYQmSJwipRkZJUsPV5DxhfyRBMdj/O1XzN+cGYtUi1s=";
allowedIPs = [
"fd0d:a262:1fa6:e621:47e6:24d4:2acb:9437/128"
];
}
];
system.stateVersion = "22.05";
home-manager.users.darkkirb = import ./home-manager/darkkirb.nix {

View file

@ -33,6 +33,7 @@
./services/shitalloverme.nix
./services/wordpress.nix
./services/initrd-ssh.nix
./wireguard
];
boot.initrd.availableKernelModules = ["ata_piix" "virtio_pci" "virtio_scsi" "xhci_pci" "sd_mod" "sr_mod"];

View file

@ -85,8 +85,6 @@
system.stateVersion = "21.11";
networking.wireguard.interfaces."wg0".ips = ["fd0d:a262:1fa6:e621:47e6:24d4:2acb:9437/64"];
services.xserver.videoDrivers = ["amdgpu"];
environment.etc."sysconfig/lm_sensors".text = ''
@ -114,17 +112,7 @@
hardware.enableRedistributableFirmware = true;
nix.daemonCPUSchedPolicy = "idle";
nix.daemonIOSchedClass = "idle";
networking.wireguard.interfaces.wg0.peers = [
# nas
{
publicKey = "RuQImASPojufJMoJ+zZ4FceC+mMN5vhxNR+i+m7g9Bc=";
allowedIPs = [
"fd0d:a262:1fa6:e621:bc9b:6a33:86e4:873b/128"
];
endpoint = "192.168.2.1:51820";
}
];
nix.settings.system-features = [
"kvm"
"nixos-test"

View file

@ -12,7 +12,4 @@ _: {
system.stateVersion = "21.11";
home-manager.users.darkkirb = import ./home-manager/darkkirb.nix false;
nix.settings.cores = 4;
networking.wireguard.interfaces."wg0".ips = [
"fd0d:a262:1fa6:e621:6a74:93b8:e164:cd7c/64"
];
}

View file

@ -22,8 +22,6 @@
publish.enable = true;
publish.userServices = true;
};
networking.firewall.interfaces.wg0.allowedUDPPorts = [631];
networking.firewall.interfaces.wg0.allowedTCPPorts = [631];
#imports = ["${nixpkgs}/nixos/modules/services/hardware/sane_extra_backends/brscan4.nix"];
hardware.sane.enable = true;

View file

@ -93,7 +93,6 @@ in {
"/run/hydra-machines"
];
};
networking.firewall.interfaces."wg0".allowedTCPPorts = [9199];
nix.settings.allowed-uris = ["https://github.com/" "https://git.chir.rs/" "https://darkkirb.de/" "https://git.neo-layout.org/" "https://static.darkkirb.de/" "https://gist.github.com/" "https://git.kescher.at/" "https://akkoma.dev/" "https://gitlab.com/" "https://api.github.com/" "https://git.sr.ht/"];
sops.secrets."services/hydra/gitea_token" = {};
sops.secrets."services/hydra/github_token" = {};

View file

@ -3,5 +3,4 @@ _: {
enable = true;
configFile = ./loki.yaml;
};
networking.firewall.interfaces."wg0".allowedTCPPorts = [3100];
}

View file

@ -102,7 +102,6 @@
};
});
in {
networking.firewall.interfaces."wg0".allowedTCPPorts = [9000];
systemd.services.matrix-media-repo = {
description = "Matrix Media Repo";
after = ["network.target"];

View file

@ -21,5 +21,4 @@
user = "postgres";
listenAddress = "0.0.0.0";
};
networking.firewall.interfaces."wg0".allowedTCPPorts = [9187 5432];
}

View file

@ -194,11 +194,5 @@
sops.secrets."services/rspamd/dkim/darkkirb.de" = {owner = "rspamd";};
sops.secrets."services/rspamd/dkim/miifox.net" = {owner = "rspamd";};
sops.secrets."services/rspamd/dkim/chir.rs" = {owner = "rspamd";};
networking.firewall.interfaces."wg0".allowedTCPPorts = [
11332
11333
11334
7980
];
services.prometheus.exporters.rspamd.enable = true;
}

View file

@ -3,7 +3,6 @@ _: {
enable = true;
guiAddress = "[::]:8384";
};
networking.firewall.interfaces."wg0".allowedTCPPorts = [8384];
networking.firewall.allowedTCPPorts = [22000];
networking.firewall.allowedUDPPorts = [22000];
}

View file

@ -66,9 +66,6 @@
networking.interfaces.enp0s31f6.useDHCP = true;
system.stateVersion = "23.11";
networking.wireguard.interfaces."wg0".ips = [
"fd0d:a262:1fa6:e621:f45a:db9f:eb7c:1a3f/64"
];
services.xserver.videoDrivers = ["modesetting"];
nix.settings.cores = 4;