diff options
Diffstat (limited to 'lass')
| -rw-r--r-- | lass/1systems/daedalus/config.nix | 1 | ||||
| -rw-r--r-- | lass/1systems/dishfire/config.nix | 1 | ||||
| -rw-r--r-- | lass/1systems/mors/config.nix | 4 | ||||
| -rw-r--r-- | lass/1systems/prism/config.nix | 16 | ||||
| -rw-r--r-- | lass/2configs/IM.nix | 15 | ||||
| -rw-r--r-- | lass/2configs/dns-stuff.nix | 22 | ||||
| -rw-r--r-- | lass/2configs/rebuild-on-boot.nix | 18 | ||||
| -rw-r--r-- | lass/2configs/security-workarounds.nix | 2 | 
8 files changed, 55 insertions, 24 deletions
diff --git a/lass/1systems/daedalus/config.nix b/lass/1systems/daedalus/config.nix index 6674b3db5..8ec744584 100644 --- a/lass/1systems/daedalus/config.nix +++ b/lass/1systems/daedalus/config.nix @@ -41,6 +41,7 @@ with import <stockholm/lib>;          skype          wine        ]; +      nixpkgs.config.firefox.enableAdobeFlash = true;        services.xserver.enable = true;        services.xserver.displayManager.lightdm.enable = true;        services.xserver.desktopManager.plasma5.enable = true; diff --git a/lass/1systems/dishfire/config.nix b/lass/1systems/dishfire/config.nix index 416edeb82..7993c763e 100644 --- a/lass/1systems/dishfire/config.nix +++ b/lass/1systems/dishfire/config.nix @@ -43,6 +43,7 @@        networking.dhcpcd.allowInterfaces = [          "enp*"          "eth*" +        "ens*"        ];      }      { diff --git a/lass/1systems/mors/config.nix b/lass/1systems/mors/config.nix index 8c7c39a6f..c231a0b10 100644 --- a/lass/1systems/mors/config.nix +++ b/lass/1systems/mors/config.nix @@ -71,10 +71,6 @@ with import <stockholm/lib>;        ];      }      { -      #ps vita stuff -      boot.extraModulePackages = [ config.boot.kernelPackages.exfat-nofuse ]; -    } -    {        services.tor = {          enable = true;          client.enable = true; diff --git a/lass/1systems/prism/config.nix b/lass/1systems/prism/config.nix index 593a1fc9c..03e9f6eeb 100644 --- a/lass/1systems/prism/config.nix +++ b/lass/1systems/prism/config.nix @@ -184,14 +184,17 @@ in {      }      {        #hotdog +      systemd.services."container@hotdog".reloadIfChanged = mkForce false;        containers.hotdog = {          config = { ... }: { +          imports = [ <stockholm/lass/2configs/rebuild-on-boot.nix> ];            environment.systemPackages = [ pkgs.git ];            services.openssh.enable = true;            users.users.root.openssh.authorizedKeys.keys = [              config.krebs.users.lass.pubkey            ];          }; +        autoStart = true;          enableTun = true;          privateNetwork = true;          hostAddress = "10.233.2.1"; @@ -200,8 +203,10 @@ in {      }      {        #kaepsele +      systemd.services."container@kaepsele".reloadIfChanged = mkForce false;        containers.kaepsele = {          config = { ... }: { +          imports = [ <stockholm/lass/2configs/rebuild-on-boot.nix> ];            environment.systemPackages = [ pkgs.git ];            services.openssh.enable = true;            users.users.root.openssh.authorizedKeys.keys = with config.krebs.users; [ @@ -209,6 +214,7 @@ in {              tv.pubkey            ];          }; +        autoStart = true;          enableTun = true;          privateNetwork = true;          hostAddress = "10.233.2.3"; @@ -217,8 +223,10 @@ in {      }      {        #onondaga +      systemd.services."container@onondaga".reloadIfChanged = mkForce false;        containers.onondaga = {          config = { ... }: { +          imports = [ <stockholm/lass/2configs/rebuild-on-boot.nix> ];            environment.systemPackages = [ pkgs.git ];            services.openssh.enable = true;            users.users.root.openssh.authorizedKeys.keys = [ @@ -226,6 +234,7 @@ in {              config.krebs.users.nin.pubkey            ];          }; +        autoStart = true;          enableTun = true;          privateNetwork = true;          hostAddress = "10.233.2.5"; @@ -302,6 +311,13 @@ in {          }        ];      } +    { +      krebs.repo-sync.repos.stockholm.timerConfig = { +        OnBootSec = "5min"; +        OnUnitInactiveSec = "2min"; +        RandomizedDelaySec = "2min"; +      }; +    }    ];    krebs.build.host = config.krebs.hosts.prism; diff --git a/lass/2configs/IM.nix b/lass/2configs/IM.nix index b94cb0634..51512955e 100644 --- a/lass/2configs/IM.nix +++ b/lass/2configs/IM.nix @@ -20,6 +20,17 @@ let    '';  in { +  services.bitlbee = { +    enable = true; +    portNumber = 6666; +    plugins = [ +      pkgs.bitlbee-facebook +      pkgs.bitlbee-steam +      pkgs.bitlbee-discord +    ]; +    libpurple_plugins = [ pkgs.telegram-purple ]; +  }; +    users.extraUsers.chat = {      home = "/home/chat";      uid = genid "chat"; @@ -46,6 +57,10 @@ in {      restartIfChanged = false; +    path = [ +      pkgs.rxvt_unicode.terminfo +    ]; +      serviceConfig = {        User = "chat";        RemainAfterExit = true; diff --git a/lass/2configs/dns-stuff.nix b/lass/2configs/dns-stuff.nix index 411b07503..cbcce8df9 100644 --- a/lass/2configs/dns-stuff.nix +++ b/lass/2configs/dns-stuff.nix @@ -11,24 +11,6 @@ with import <stockholm/lib>;        key = "1AFC:E58D:F242:0FBB:9EE9:4E51:47F4:5373:D9AE:C2AB:DD96:8448:333D:5D79:272C:A44C";      };    }; -  services.dnsmasq = { -    enable = true; -    resolveLocalQueries = false; -    extraConfig = '' -      server=127.1.0.1 -      #no-resolv -      cache-size=1000 -      min-cache-ttl=3600 -      bind-dynamic -      all-servers -      dnssec -      trust-anchor=.,19036,8,2,49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E8FB5 -      rebind-domain-ok=/onion/ -      server=/.onion/127.0.0.1#9053 -      port=53 -    ''; -  }; -  networking.extraResolvconfConf = '' -    name_servers='127.0.0.1' -  ''; +  services.resolved.enable = true; +  services.resolved.fallbackDns = [ "127.1.0.1" ];  } diff --git a/lass/2configs/rebuild-on-boot.nix b/lass/2configs/rebuild-on-boot.nix new file mode 100644 index 000000000..60198be7b --- /dev/null +++ b/lass/2configs/rebuild-on-boot.nix @@ -0,0 +1,18 @@ +{ config, pkgs, ... }: +with import <stockholm/lib>; +{ +  systemd.services.rebuild-on-boot = { +    wantedBy = [ "multi-user.target" ]; +    environment = { +      NIX_REMOTE = "daemon"; +      HOME = "/var/empty"; +    }; +    serviceConfig = { +      ExecStart = pkgs.writeScript "rebuild" '' +        #!${pkgs.bash}/bin/bash +        (/run/current-system/sw/bin/nixos-rebuild -I /var/src switch) & +      ''; +      ExecStop = "${pkgs.coreutils}/bin/sleep 10"; +    }; +  }; +} diff --git a/lass/2configs/security-workarounds.nix b/lass/2configs/security-workarounds.nix index 537c8a59b..c3d07d5fe 100644 --- a/lass/2configs/security-workarounds.nix +++ b/lass/2configs/security-workarounds.nix @@ -5,4 +5,6 @@ with import <stockholm/lib>;    boot.extraModprobeConfig = ''      install dccp /run/current-system/sw/bin/false    ''; + +  boot.kernelPackages = pkgs.linuxPackages_latest;  }  | 
