openvpn: remove openvpn in favour of wireguard

dev-docs
Moritz Böhme 2023-02-24 12:09:04 +01:00
parent ed5623256c
commit 968e70c387
Signed by: moritz
GPG Key ID: 970C6E89EB0547A9
6 changed files with 0 additions and 43 deletions

View File

@ -93,7 +93,6 @@ with lib; {
kdeconnect.enable = true; kdeconnect.enable = true;
mullvad.enable = true; mullvad.enable = true;
openconnect.enable = true; openconnect.enable = true;
openvpn.enable = true;
printing.enable = true; printing.enable = true;
redshift.enable = true; redshift.enable = true;
wireguard.enable = true; wireguard.enable = true;

View File

@ -8,7 +8,6 @@
./kdeconnect.nix ./kdeconnect.nix
./mullvad.nix ./mullvad.nix
./openconnect.nix ./openconnect.nix
./openvpn.nix
./picom.nix ./picom.nix
./printing.nix ./printing.nix
./redshift.nix ./redshift.nix

View File

@ -1,39 +0,0 @@
{ config
, lib
, pkgs
, ...
}:
with lib;
let
cfg = config.my.services.openvpn;
in
{
options.my.services.openvpn.enable = mkEnableOption "openvpn";
config = lib.mkIf cfg.enable {
age.secrets = {
homeVPN = {
file = ../../secrets/home-vpn.age;
owner = "1000";
};
homeVPNPassword = {
file = ../../secrets/home-vpn-password.age;
owner = "1000";
};
};
services.openvpn.servers = {
homeVPN = {
config = "config /run/agenix/homeVPN ";
autoStart = false;
updateResolvConf = true;
};
};
systemd.services.openvpn-homeVPN-password = {
description = "Enter homeVPN password";
script = "cat /run/agenix/homeVPNPassword | systemd-tty-ask-password-agent";
wantedBy = [ "openvpn-homeVPN.service" ];
after = [ "openvpn-homeVPN.service" ];
};
};
}

Binary file not shown.

Binary file not shown.

View File

@ -12,8 +12,6 @@ let
in in
{ {
"github.age".publicKeys = all; "github.age".publicKeys = all;
"home-vpn-password.age".publicKeys = all;
"home-vpn.age".publicKeys = all;
"nordvpn.age".publicKeys = all; "nordvpn.age".publicKeys = all;
"spotifyd.age".publicKeys = all; "spotifyd.age".publicKeys = all;
"ssh-home.age".publicKeys = all; "ssh-home.age".publicKeys = all;