mirror of
https://gitlab.com/upRootNutrition/dotfiles.git
synced 2025-08-08 21:04:38 -05:00
Compare commits
No commits in common. "d73b1c5abe2da061aae8d3fdac3829106a8492a1" and "31c2843393f233e7d4f92800a15e750dcd2d4a99" have entirely different histories.
d73b1c5abe
...
31c2843393
15 changed files with 28 additions and 56 deletions
|
@ -22,7 +22,6 @@ in
|
|||
address1 = "0.0.0.0"; # All
|
||||
address2 = "192.168.50.1"; # Router
|
||||
address3 = "192.168.50.0"; # Router
|
||||
address4 = "192.168.1.0"; # Router
|
||||
};
|
||||
remotehost = {
|
||||
address0 = "24.76.173.0";
|
||||
|
|
|
@ -14,7 +14,6 @@ in
|
|||
path0 = "${sopsPath}/${name}";
|
||||
};
|
||||
ports = {
|
||||
port0 = 53;
|
||||
port1 = 51821;
|
||||
port0 = 51821;
|
||||
};
|
||||
}
|
||||
|
|
|
@ -1,11 +0,0 @@
|
|||
{
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
{
|
||||
home.packages = builtins.attrValues {
|
||||
inherit (pkgs)
|
||||
dig
|
||||
;
|
||||
};
|
||||
}
|
|
@ -1,11 +0,0 @@
|
|||
{
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
{
|
||||
home.packages = builtins.attrValues {
|
||||
inherit (pkgs)
|
||||
iptables
|
||||
;
|
||||
};
|
||||
}
|
|
@ -18,6 +18,7 @@ in
|
|||
wayland
|
||||
searx
|
||||
flatpak
|
||||
wireGuard
|
||||
;
|
||||
};
|
||||
};
|
||||
|
@ -32,6 +33,7 @@ in
|
|||
sddm
|
||||
flatpak
|
||||
espanso
|
||||
wireGuard
|
||||
glance
|
||||
;
|
||||
};
|
||||
|
@ -42,6 +44,7 @@ in
|
|||
inherit (modules)
|
||||
plasma
|
||||
sddm
|
||||
wireGuard
|
||||
;
|
||||
};
|
||||
};
|
||||
|
@ -67,15 +70,6 @@ in
|
|||
};
|
||||
};
|
||||
|
||||
crust = {
|
||||
imports = builtins.attrValues {
|
||||
inherit (modules)
|
||||
hardware
|
||||
programs
|
||||
;
|
||||
};
|
||||
};
|
||||
|
||||
mantle = {
|
||||
imports = builtins.attrValues {
|
||||
inherit (modules)
|
||||
|
@ -85,6 +79,15 @@ in
|
|||
};
|
||||
};
|
||||
|
||||
crust = {
|
||||
imports = builtins.attrValues {
|
||||
inherit (modules)
|
||||
hardware
|
||||
programs
|
||||
;
|
||||
};
|
||||
};
|
||||
|
||||
core = {
|
||||
imports = builtins.attrValues {
|
||||
inherit (modules)
|
||||
|
|
0
modules/nixos/services/searx/config/engines.nix
Executable file → Normal file
0
modules/nixos/services/searx/config/engines.nix
Executable file → Normal file
0
modules/nixos/services/searx/config/general.nix
Executable file → Normal file
0
modules/nixos/services/searx/config/general.nix
Executable file → Normal file
0
modules/nixos/services/searx/config/outgoing.nix
Executable file → Normal file
0
modules/nixos/services/searx/config/outgoing.nix
Executable file → Normal file
0
modules/nixos/services/searx/config/plugins.nix
Executable file → Normal file
0
modules/nixos/services/searx/config/plugins.nix
Executable file → Normal file
0
modules/nixos/services/searx/config/search.nix
Executable file → Normal file
0
modules/nixos/services/searx/config/search.nix
Executable file → Normal file
3
modules/nixos/services/searx/config/server.nix
Executable file → Normal file
3
modules/nixos/services/searx/config/server.nix
Executable file → Normal file
|
@ -9,8 +9,7 @@ let
|
|||
in
|
||||
{
|
||||
port = configHelpers.service.ports.port0;
|
||||
bind_address =
|
||||
if configHelpers.hostname == ceres.name then ceres.wireguard.ip0 else configHelpers.localhost;
|
||||
bind_address = ceres.wireguard.ip0;
|
||||
secret_key = config.sops.secrets.searx-key.path;
|
||||
limiter = false;
|
||||
public_instance = false;
|
||||
|
|
0
modules/nixos/services/searx/config/ui.nix
Executable file → Normal file
0
modules/nixos/services/searx/config/ui.nix
Executable file → Normal file
|
@ -5,7 +5,7 @@
|
|||
...
|
||||
}:
|
||||
let
|
||||
inherit (flake.config.machines.devices) ceres mars;
|
||||
inherit (flake.config.machines.devices) ceres;
|
||||
inherit (flake.config.services.instances) searx web;
|
||||
configHelpers = {
|
||||
service = searx;
|
||||
|
@ -47,9 +47,8 @@ in
|
|||
"${configHelpers.host}" = {
|
||||
extraConfig = ''
|
||||
@allowed_ips {
|
||||
remote_ip ${mars.wireguard.ip0}
|
||||
remote_ip 10.100.0.2
|
||||
}
|
||||
|
||||
handle @allowed_ips {
|
||||
redir /.well-known/carddav /remote.php/dav/ 301
|
||||
redir /.well-known/caldav /remote.php/dav/ 301
|
||||
|
|
13
systems/ceres/config/wireguard.nix
Executable file → Normal file
13
systems/ceres/config/wireguard.nix
Executable file → Normal file
|
@ -1,21 +1,20 @@
|
|||
{ config, flake, ... }:
|
||||
let
|
||||
inherit (flake.config.services.instances) wireGuard searx;
|
||||
inherit (flake.config.services.instances) wireGuard web;
|
||||
inherit (flake.config.machines.devices) mars ceres;
|
||||
service = wireGuard;
|
||||
in
|
||||
{
|
||||
networking = {
|
||||
firewall = {
|
||||
allowedTCPPorts = [
|
||||
service.ports.port0
|
||||
];
|
||||
allowedUDPPorts = [
|
||||
53
|
||||
service.ports.port0
|
||||
service.ports.port1
|
||||
];
|
||||
interfaces.wg0.allowedTCPPorts = [
|
||||
searx.ports.port0
|
||||
80
|
||||
443
|
||||
8080
|
||||
];
|
||||
};
|
||||
|
||||
|
@ -29,7 +28,7 @@ in
|
|||
wireguard.interfaces = {
|
||||
wg0 = {
|
||||
ips = [ "${ceres.wireguard.ip0}/24" ];
|
||||
listenPort = service.ports.port1;
|
||||
listenPort = service.ports.port0;
|
||||
privateKeyFile = config.sops.secrets."${service.name}-private".path;
|
||||
peers = [
|
||||
{
|
||||
|
|
|
@ -1,27 +1,23 @@
|
|||
{ config, flake, ... }:
|
||||
let
|
||||
inherit (flake.config.services.instances) wireGuard web;
|
||||
inherit (flake.config.services) instances;
|
||||
inherit (flake.config.machines.devices) ceres mars;
|
||||
inherit (flake.config.machines.devices) mars;
|
||||
service = wireGuard;
|
||||
in
|
||||
{
|
||||
networking = {
|
||||
hosts = {
|
||||
${ceres.wireguard.ip0} = [ instances.searx.domains.url0 ];
|
||||
};
|
||||
wireguard.interfaces = {
|
||||
wg-quick.interfaces = {
|
||||
wg0 = {
|
||||
ips = [ "${mars.wireguard.ip0}/32" ];
|
||||
address = [ "${mars.wireguard.ip0}/24" ];
|
||||
privateKeyFile = config.sops.secrets."${service.name}-mars-private".path;
|
||||
peers = [
|
||||
{
|
||||
publicKey = "fs58+Kz+eG9qAXvvMB2NkW+wa88yP61uam4HHWaBJVw=";
|
||||
allowedIPs = [
|
||||
"${ceres.wireguard.ip0}/32"
|
||||
"${web.localhost.address4}/24"
|
||||
"10.100.0.0/24"
|
||||
"192.168.1.0/24"
|
||||
];
|
||||
endpoint = "${web.remotehost.address0}:${builtins.toString service.ports.port1}";
|
||||
endpoint = "${web.remotehost.address0}:${builtins.toString service.ports.port0}";
|
||||
persistentKeepalive = 25;
|
||||
}
|
||||
];
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue