awawa
This commit is contained in:
parent
04c97a404a
commit
a970493019
|
@ -27,6 +27,8 @@
|
||||||
experimental-features = "nix-command flakes";
|
experimental-features = "nix-command flakes";
|
||||||
# Deduplicate and optimize nix store
|
# Deduplicate and optimize nix store
|
||||||
auto-optimise-store = true;
|
auto-optimise-store = true;
|
||||||
|
|
||||||
|
warn-dirty = false;
|
||||||
};
|
};
|
||||||
|
|
||||||
# This will add each flake input as a registry
|
# This will add each flake input as a registry
|
||||||
|
@ -55,16 +57,16 @@
|
||||||
|
|
||||||
# Unfree packages that can be installes regardless of the mchine's fre software policy
|
# Unfree packages that can be installes regardless of the mchine's fre software policy
|
||||||
config.allowUnfreePredicate = pkg:
|
config.allowUnfreePredicate = pkg:
|
||||||
builtins.elem (lib.getName pkg) [
|
builtins.elem (lib.getName pkg) [
|
||||||
# Steam
|
# Steam
|
||||||
"steam"
|
"steam"
|
||||||
"steam-original"
|
"steam-original"
|
||||||
"steam-run"
|
"steam-run"
|
||||||
|
|
||||||
# Nvidia drivers
|
# Nvidia drivers
|
||||||
"nvidia-x11"
|
"nvidia-x11"
|
||||||
"nvidia-settings"
|
"nvidia-settings"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
# Some programs need SUID wrappers, can be configured further or are
|
# Some programs need SUID wrappers, can be configured further or are
|
||||||
|
|
|
@ -1,15 +1,19 @@
|
||||||
{
|
{
|
||||||
boot.loader = {
|
boot = {
|
||||||
systemd-boot = {
|
loader = {
|
||||||
enable = true;
|
systemd-boot = {
|
||||||
editor = false;
|
enable = true;
|
||||||
};
|
editor = false;
|
||||||
|
};
|
||||||
|
|
||||||
efi.canTouchEfiVariables = true;
|
efi.canTouchEfiVariables = true;
|
||||||
|
};
|
||||||
|
initrd = {
|
||||||
|
enable = true;
|
||||||
|
systemd.enable = true;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
boot.initrd.enable = true;
|
|
||||||
boot.initrd.systemd.enable = true;
|
|
||||||
# boot.plymouth = {
|
# boot.plymouth = {
|
||||||
# enable = true;
|
# enable = true;
|
||||||
# font = "${pkgs.jetbrains-mono}/share/fonts/truetype/JetBrainsMono-Regular.ttf";
|
# font = "${pkgs.jetbrains-mono}/share/fonts/truetype/JetBrainsMono-Regular.ttf";
|
||||||
|
|
|
@ -2,6 +2,7 @@
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
# See ./plasma6.nix
|
# See ./plasma6.nix
|
||||||
ksshaskpass
|
ksshaskpass
|
||||||
|
aha
|
||||||
|
|
||||||
libreoffice
|
libreoffice
|
||||||
kleopatra
|
kleopatra
|
||||||
|
|
|
@ -1,5 +1,13 @@
|
||||||
{
|
{
|
||||||
# sudo and nix can only be used by the wheel group
|
# sudo and nix can only be used by the wheel group
|
||||||
|
|
||||||
nix.settings.allowed-users = ["@wheel"];
|
nix.settings.allowed-users = ["@wheel"];
|
||||||
security.sudo.execWheelOnly = true;
|
|
||||||
|
security.sudo = {
|
||||||
|
enable = true;
|
||||||
|
execWheelOnly = true;
|
||||||
|
extraConfig = "Defaults insults";
|
||||||
|
};
|
||||||
|
|
||||||
|
# services.fail2ban.enable = true;
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,5 +1,7 @@
|
||||||
{
|
{
|
||||||
security.tpm2.enable = true;
|
security.tpm2 = {
|
||||||
security.tpm2.pkcs11.enable = true; # expose /run/current-system/sw/lib/libtpm2_pkcs11.so
|
enable = true;
|
||||||
security.tpm2.tctiEnvironment.enable = true; # TPM2TOOLS_TCTI and TPM2_PKCS11_TCTI env variables
|
pkcs11.enable = true; # expose /run/current-system/sw/lib/libtpm2_pkcs11.so
|
||||||
|
tctiEnvironment.enable = true; # TPM2TOOLS_TCTI and TPM2_PKCS11_TCTI env variables
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -7,6 +7,8 @@
|
||||||
|
|
||||||
shellAliases = {
|
shellAliases = {
|
||||||
ll = "ls -al";
|
ll = "ls -al";
|
||||||
|
done = "curl -d 'Done' ntfy.sh/tasiaiso_done";
|
||||||
|
rebuild = "sudo nixos-rebuild switch -flake -I nixos-config=/home/tasia/nixos-config"; # .#hostname
|
||||||
};
|
};
|
||||||
|
|
||||||
ohMyZsh = {
|
ohMyZsh = {
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
# Ad-blocking DNS server
|
# Ad-blocking DNS server
|
||||||
|
# Web UI available at http://localhost:3000
|
||||||
services.adguardhome.enable = true;
|
services.adguardhome.enable = true;
|
||||||
|
|
||||||
networking.nameservers = ["127.0.0.1"];
|
networking.nameservers = ["127.0.0.1"];
|
||||||
|
|
|
@ -1,10 +1,9 @@
|
||||||
{
|
{
|
||||||
# Hardened OpenSSH server
|
# Hardened OpenSSH server
|
||||||
# Resources:
|
# Resources:
|
||||||
# https://cyber.gouv.fr/en/publications/openssh-secure-use-recommendations
|
# https://cyber.gouv.fr/en/publications/openssh-secure-use-recommendations (2015)
|
||||||
services.openssh = {
|
services.openssh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
# banner = "hello world";
|
|
||||||
|
|
||||||
allowSFTP = false;
|
allowSFTP = false;
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{lib, ...}: {
|
{lib, ...}: {
|
||||||
# File sync service
|
# File sync service
|
||||||
|
# Web UI available at http://localhost:8384
|
||||||
services.syncthing = {
|
services.syncthing = {
|
||||||
enable = true;
|
enable = true;
|
||||||
user = lib.mkDefault "user";
|
user = lib.mkDefault "user";
|
||||||
|
|
|
@ -1,17 +1,20 @@
|
||||||
{
|
{
|
||||||
|
# USBGuard is a service that allows you to create a whitelist of the USB device you want your system to connect to.
|
||||||
|
# Other devices will be blocked by default
|
||||||
|
# This minimizes the impact of BadUSB attacks
|
||||||
services.usbguard = {
|
services.usbguard = {
|
||||||
enable = true;
|
enable = true;
|
||||||
dbus.enable = true;
|
|
||||||
|
|
||||||
|
# Regular users can interact with usbguard
|
||||||
IPCAllowedGroups = ["wheel"];
|
IPCAllowedGroups = ["wheel"];
|
||||||
|
|
||||||
rules = ''
|
rules = ''
|
||||||
# new-new-phoenix
|
# new-new-phoenix
|
||||||
allow id 1d6b:0002 serial "0000:00:14.0" name "xHCI Host Controller" hash "jEP/6WzviqdJ5VSeTUY8PatCNBKeaREvo2OqdplND/o=" parent-hash "rV9bfLq7c2eA4tYjVjwO4bxhm+y6GgZpl9J60L0fBkY=" with-interface 09:00:00 with-connect-type ""
|
allow id 1d6b:0002 serial "0000:00:14.0" name "xHCI Host Controller"
|
||||||
allow id 1d6b:0003 serial "0000:00:14.0" name "xHCI Host Controller" hash "prM+Jby/bFHCn2lNjQdAMbgc6tse3xVx+hZwjOPHSdQ=" parent-hash "rV9bfLq7c2eA4tYjVjwO4bxhm+y6GgZpl9J60L0fBkY=" with-interface 09:00:00 with-connect-type ""
|
allow id 1d6b:0003 serial "0000:00:14.0" name "xHCI Host Controller"
|
||||||
allow id 0bda:0129 serial "20100201396000000" name "USB2.0-CRW" hash "om34qyRbPxnt/bsdFrR3g2SWxDVsInxWWsiFkDIyEnY=" parent-hash "jEP/6WzviqdJ5VSeTUY8PatCNBKeaREvo2OqdplND/o=" with-interface ff:06:50 with-connect-type "hotplug"
|
allow id 0bda:0129 serial "20100201396000000" name "USB2.0-CRW"
|
||||||
allow id 048d:ce00 serial "" name "ITE Device(8291)" hash "snB5qcpdMc66wcxBmMAn+LStZHfOTO/c5RtrU9nzyHc=" parent-hash "jEP/6WzviqdJ5VSeTUY8PatCNBKeaREvo2OqdplND/o=" via-port "1-6" with-interface { 03:01:01 03:00:00 } with-connect-type "hardwired"
|
allow id 048d:ce00 serial "" name "ITE Device(8291)"
|
||||||
allow id 8087:0025 serial "" name "" hash "N/wLaNIwbl3mtRa9CDFbUH7EfSZDhv2X+d2xcrwsw8Q=" parent-hash "jEP/6WzviqdJ5VSeTUY8PatCNBKeaREvo2OqdplND/o=" via-port "1-14" with-interface { e0:01:01 e0:01:01 e0:01:01 e0:01:01 e0:01:01 e0:01:01 e0:01:01 e0:01:01 } with-connect-type "hardwired"
|
allow id 8087:0025 serial "" name ""
|
||||||
|
|
||||||
# USB Drives
|
# USB Drives
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue