Add tryhackme vpn

This commit is contained in:
Charlotte Van Petegem 2021-12-03 14:54:01 +01:00
parent 4ef66cce90
commit f3cfc8e0df
No known key found for this signature in database
GPG key ID: 019E764B7184435A
4 changed files with 57 additions and 46 deletions

12
flake.lock generated
View file

@ -42,11 +42,11 @@
}, },
"emacs-overlay": { "emacs-overlay": {
"locked": { "locked": {
"lastModified": 1638466261, "lastModified": 1638497718,
"narHash": "sha256-X/+fUmwDQq4NYJW8cPrvluCwhkgOQdbsNJhoY3W8+8c=", "narHash": "sha256-KoVCSZKy1CrWLKHNndkfKYI/Stf5ouun0FPcvVYx26o=",
"owner": "nix-community", "owner": "nix-community",
"repo": "emacs-overlay", "repo": "emacs-overlay",
"rev": "931eaf998fd6ebbbd662798b5756f962fb4cda6a", "rev": "225d81933fe74ecd8dacc267a472f92159b832f4",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -77,11 +77,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1638415301, "lastModified": 1638484748,
"narHash": "sha256-iqszstbHaO5PYeBXQf1ukgYj/aq9wznBbZMrtYMZzgI=", "narHash": "sha256-Xb5X84/PUMXCyZGnixyqjtVyEt5tlCCrSp4lfJdtiHw=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "de54d513c74bf8f4f3a58954b80b5f690639fe72", "rev": "fbb80207f3840785e2918143ebe709f26372f91d",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -1,52 +1,61 @@
{ pkgs, lib, ... }: { pkgs, lib, config, ... }:
{ {
imports = [ ./hardware.nix ]; imports = [ ./hardware.nix ];
networking.hostId = "3cc1a4b2"; config = {
networking.hostId = "3cc1a4b2";
time.timeZone = "Europe/Brussels"; time.timeZone = "Europe/Brussels";
# Machine-specific module settings services.openvpn.servers.tryhackme = {
chvp = { autoStart = false;
stateVersion = "20.09"; config = "config ${config.age.secrets."files/services/openvpn/tryhackme".path}";
base = { };
bluetooth.enable = true;
network.mobile = { age.secrets."files/services/openvpn/tryhackme".file = ../../secrets/files/services/openvpn/tryhackme.age;
enable = true;
wireless-interface = "wlp0s20f3"; # Machine-specific module settings
wired-interfaces = { chvp = {
"enp0s31f6" = { }; stateVersion = "20.09";
base = {
bluetooth.enable = true;
network.mobile = {
enable = true;
wireless-interface = "wlp0s20f3";
wired-interfaces = {
"enp0s31f6" = { };
};
};
zfs = {
encrypted = true;
backups = [
{
path = "rpool/safe/data";
remotePath = "zdata/recv/kholinar/safe/data";
fast = true;
location = "lasting-integrity";
}
];
rootDataset = "rpool/local/root";
}; };
}; };
zfs = { development = {
encrypted = true; enable = true;
backups = [ android.enable = true;
{
path = "rpool/safe/data";
remotePath = "zdata/recv/kholinar/safe/data";
fast = true;
location = "lasting-integrity";
}
];
rootDataset = "rpool/local/root";
}; };
games.enable = true;
graphical.enable = true;
programs = {
calibre.enable = false;
deluge.enable = true;
eid.enable = true;
element.enable = true;
hledger.enable = true;
obs.enable = true;
};
# It's a pandemic.
work.enable = true;
}; };
development = {
enable = true;
android.enable = true;
};
games.enable = true;
graphical.enable = true;
programs = {
calibre.enable = false;
deluge.enable = true;
eid.enable = true;
element.enable = true;
hledger.enable = true;
obs.enable = true;
};
# It's a pandemic.
work.enable = true;
}; };
} }

View file

@ -55,6 +55,8 @@ in
"secrets/files/programs/ssh/host_configuration.age".publicKeys = hosts ++ users; "secrets/files/programs/ssh/host_configuration.age".publicKeys = hosts ++ users;
"secrets/files/services/openvpn/tryhackme.age".publicKeys = [ kholinar ] ++ users;
"secrets/files/services/matrix-appservice-slack/config.yml.age".publicKeys = [ lasting-integrity ] ++ users; "secrets/files/services/matrix-appservice-slack/config.yml.age".publicKeys = [ lasting-integrity ] ++ users;
"secrets/files/services/matrix-appservice-slack/registration.yml.age".publicKeys = [ lasting-integrity ] ++ users; "secrets/files/services/matrix-appservice-slack/registration.yml.age".publicKeys = [ lasting-integrity ] ++ users;
"secrets/files/services/matrix-synapse/config.yml.age".publicKeys = [ lasting-integrity ] ++ users; "secrets/files/services/matrix-synapse/config.yml.age".publicKeys = [ lasting-integrity ] ++ users;

Binary file not shown.