diff --git a/hosts/physique/hyponix/services/fail2ban.nix b/hosts/physique/hyponix/services/fail2ban.nix index a997185..edc9a34 100644 --- a/hosts/physique/hyponix/services/fail2ban.nix +++ b/hosts/physique/hyponix/services/fail2ban.nix @@ -2,10 +2,6 @@ { services.fail2ban = { enable = true; - - ignoreIP = [ - "zamok.crans.org" - ]; }; services.openssh.settings.LogLevel = "VERBOSE"; diff --git a/modules/available/vaultwarden.nix b/modules/available/vaultwarden.nix deleted file mode 100644 index bdd8533..0000000 --- a/modules/available/vaultwarden.nix +++ /dev/null @@ -1,34 +0,0 @@ -{ config, ... }: -let - domain = "pass.${config.networking.domain}"; -in -{ - - age.secrets = { - vaultwarden_secret = { - file = ../../secrets/services/vaultwarden.age; - owner = "vaultwarden"; - }; - }; - - - services.vaultwarden = { - enable = false; # TODO: enable - # TODO: move to pgsql - #dbBackend = "postgresql"; - environmentFile = config.age.secrets.vaultwarden_secret.path; - config = { - DOMAIN = "https://${domain}"; - SIGNUPS_ALLOWED = false; - - ROCKET_ADDRESS = "::1"; - ROCKET_PORT = 8222; - }; - }; - - services.caddy.virtualHosts."${domain}" = { - extraConfig = '' - reverse_proxy localhost:${builtins.toString config.services.vaultwarden.config.ROCKET_PORT} - ''; - }; -} diff --git a/modules/common/monitoring.nix b/modules/common/monitoring.nix index 117328d..90ea232 100644 --- a/modules/common/monitoring.nix +++ b/modules/common/monitoring.nix @@ -1,4 +1,4 @@ -{ config, ... }: +{ ... }: { services.prometheus.exporters = { node = { @@ -9,19 +9,6 @@ "--collector.softirqs" "--collector.tcpstat" ]; - - openFirewall = true; - }; - - postgres = { - enable = config.services.postgresql.enable; }; }; - - - services.caddy.globalConfig = " - metrics { - per_host - } - "; } diff --git a/tools/devshell.nix b/tools/devshell.nix index 3dd58fb..724c18e 100644 --- a/tools/devshell.nix +++ b/tools/devshell.nix @@ -8,7 +8,7 @@ pkgs.mkShell { packages = with pkgs; [ nil nixpkgs-fmt - agenix.packages.${stdenv.hostPlatform.system}.default + agenix.packages.${system}.default ]; shellHook = ''