From a2703919f3f91ec74fae0000337d67a0107b9c53 Mon Sep 17 00:00:00 2001 From: tux Date: Sun, 23 Feb 2025 02:27:58 +0530 Subject: [PATCH] refactor: seperate modules --- hosts/rigel/default.nix | 2 +- modules/droid/sshd.nix | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/hosts/rigel/default.nix b/hosts/rigel/default.nix index 827a00b..e798a97 100644 --- a/hosts/rigel/default.nix +++ b/hosts/rigel/default.nix @@ -10,7 +10,7 @@ ../../modules/droid/sshd.nix ]; - services.openssh = { + tux.services.openssh = { enable = true; ports = [8022]; authorizedKeys = [ diff --git a/modules/droid/sshd.nix b/modules/droid/sshd.nix index a2b4da4..43a7dba 100644 --- a/modules/droid/sshd.nix +++ b/modules/droid/sshd.nix @@ -24,7 +24,7 @@ sshd-start-bin = "sshd-start"; # real config - cfg = config.services.openssh; + cfg = config.tux.services.openssh; pathOfKeyOf = type: "${keysFolder}/ssh_host_${type}_key"; @@ -56,7 +56,7 @@ ''; in { options = { - services.openssh = { + tux.services.openssh = { enable = lib.mkEnableOption '' Whether to enable the OpenSSH secure shell daemon, which allows secure remote logins.