summaryrefslogtreecommitdiff
path: root/modules/desktop/software/access
diff options
context:
space:
mode:
authorFuwn <[email protected]>2024-10-01 06:02:50 -0700
committerFuwn <[email protected]>2024-10-01 06:02:50 -0700
commitfcddd3ba06088e235243d41395e40fd9e0107a76 (patch)
tree8b4fabd85315ec93a09842a2123a2e6e16583c75 /modules/desktop/software/access
parentmodules: move shared i18n to pc (diff)
downloadnixos-config-fcddd3ba06088e235243d41395e40fd9e0107a76.tar.xz
nixos-config-fcddd3ba06088e235243d41395e40fd9e0107a76.zip
modules: move shared pc modules from desktop to pc
Diffstat (limited to 'modules/desktop/software/access')
-rw-r--r--modules/desktop/software/access/default.nix6
-rw-r--r--modules/desktop/software/access/gnupg.nix18
-rw-r--r--modules/desktop/software/access/ssh.nix11
3 files changed, 0 insertions, 35 deletions
diff --git a/modules/desktop/software/access/default.nix b/modules/desktop/software/access/default.nix
deleted file mode 100644
index 32d5500..0000000
--- a/modules/desktop/software/access/default.nix
+++ /dev/null
@@ -1,6 +0,0 @@
-{
- imports = [
- ./gnupg.nix
- ./ssh.nix
- ];
-}
diff --git a/modules/desktop/software/access/gnupg.nix b/modules/desktop/software/access/gnupg.nix
deleted file mode 100644
index e60da30..0000000
--- a/modules/desktop/software/access/gnupg.nix
+++ /dev/null
@@ -1,18 +0,0 @@
-{ pkgs, ... }:
-{
- programs.gnupg.agent = {
- enable = true;
- enableSSHSupport = true;
- pinentryPackage = pkgs.pinentry-curses;
- enableExtraSocket = true;
- enableBrowserSocket = true;
-
- settings = {
- enable-ssh-support = "";
- ttyname = "$GPG_TTY";
- default-cache-ttl = 34560000; # 60
- max-cache-ttl = 34560000; # 120
- allow-loopback-pinentry = "";
- };
- };
-}
diff --git a/modules/desktop/software/access/ssh.nix b/modules/desktop/software/access/ssh.nix
deleted file mode 100644
index b514049..0000000
--- a/modules/desktop/software/access/ssh.nix
+++ /dev/null
@@ -1,11 +0,0 @@
-{ lib, config, ... }:
-{
- programs.ssh.startAgent = false;
- security.pam.sshAgentAuth.enable = true;
-
- services.fail2ban.jails.sshd.settings = {
- enabled = true;
- filter = "sshd[mode=aggressive]";
- port = lib.strings.concatStringsSep "," (map toString config.services.openssh.ports);
- };
-}