stockholm/old/modules/uriel/default.nix

189 lines
4.8 KiB
Nix
Raw Normal View History

2015-05-15 14:42:01 +00:00
{ config, pkgs, ... }:
2015-04-10 19:20:11 +00:00
2015-05-15 14:42:01 +00:00
{
imports = [
../lass/desktop-base.nix
2015-07-13 11:39:49 +00:00
./retiolum.nix
2015-05-15 14:42:01 +00:00
../lass/browsers.nix
../lass/programs.nix
../lass/games.nix
../tv/exim-retiolum.nix
../lass/pass.nix
../lass/vim.nix
../lass/urxvt.nix
2015-05-15 14:41:02 +00:00
../common/nixpkgs.nix
2015-05-15 14:38:55 +00:00
../../secrets/uriel-pw.nix
2015-05-15 14:41:02 +00:00
../lass/sshkeys.nix
2015-05-19 20:30:29 +00:00
../lass/bird.nix
2015-05-25 17:32:54 +00:00
./repos.nix
2015-06-14 23:19:14 +00:00
../lass/chromium-patched.nix
2015-07-13 11:39:49 +00:00
./git.nix
2015-04-10 19:20:11 +00:00
];
2015-06-09 22:21:12 +00:00
2015-05-07 21:34:28 +00:00
nixpkgs = {
url = "https://github.com/Lassulus/nixpkgs";
2015-07-13 11:39:49 +00:00
rev = "7ef800430789252dac47f0b67e75a6b9bb616397";
2015-05-21 17:36:17 +00:00
};
2015-04-10 19:20:11 +00:00
networking.hostName = "uriel";
networking.wireless.enable = true;
nix.maxJobs = 2;
hardware.enableAllFirmware = true;
nixpkgs.config.allowUnfree = true;
boot = {
#kernelParams = [
# "acpi.brightness_switch_enabled=0"
#];
#loader.grub.enable = true;
#loader.grub.version = 2;
#loader.grub.device = "/dev/sda";
loader.gummiboot.enable = true;
loader.gummiboot.timeout = 5;
initrd.luks.devices = [ { name = "luksroot"; device = "/dev/sda2"; } ];
initrd.luks.cryptoModules = [ "aes" "sha512" "sha1" "xts" ];
initrd.availableKernelModules = [ "xhci_hcd" "ehci_pci" "ahci" "usb_storage" ];
#kernelModules = [ "kvm-intel" "msr" ];
kernelModules = [ "msr" ];
extraModprobeConfig = ''
'';
};
fileSystems = {
"/" = {
device = "/dev/pool/root";
fsType = "ext4";
};
"/boot" = {
device = "/dev/sda1";
};
};
services.udev.extraRules = ''
SUBSYSTEM=="net", ATTR{address}=="64:27:37:7d:d8:ae", NAME="wl0"
SUBSYSTEM=="net", ATTR{address}=="f0:de:f1:b8:c8:2e", NAME="et0"
'';
#services.xserver = {
#};
services.xserver.synaptics = {
enable = true;
twoFingerScroll = true;
accelFactor = "0.035";
additionalOptions = ''
Option "FingerHigh" "60"
Option "FingerLow" "60"
'';
};
users.extraUsers = {
root = {
openssh.authorizedKeys.keys = [
2015-05-15 14:23:22 +00:00
config.sshKeys.lass.pub
];
2015-04-10 19:20:11 +00:00
};
mainUser = {
2015-04-10 19:20:11 +00:00
uid = 1337;
name = "lass";
#isNormalUser = true;
group = "users";
createHome = true;
home = "/home/lass";
useDefaultShell = true;
isSystemUser = false;
description = "lassulus";
extraGroups = [ "wheel" "audio" ];
openssh.authorizedKeys.keys = [
2015-05-15 14:23:22 +00:00
config.sshKeys.lass.pub
2015-04-10 19:20:11 +00:00
];
};
};
environment.systemPackages = with pkgs; [
];
2015-07-13 11:39:49 +00:00
#for google hangout
users.extraUsers.google.extraGroups = [ "audio" "video" ];
2015-05-21 17:36:17 +00:00
2015-04-10 19:20:11 +00:00
#users.extraGroups = {
# loot = {
# members = [
# "lass"
# "firefox"
# "chromium"
# "google"
# ];
# };
#};
#
# iptables
#
#networking.firewall.enable = false;
#system.activationScripts.iptables =
# let
# log = false;
# when = c: f: if c then f else "";
# in
# ''
# ip4tables() { ${pkgs.iptables}/sbin/iptables "$@"; }
# ip6tables() { ${pkgs.iptables}/sbin/ip6tables "$@"; }
# ipXtables() { ip4tables "$@"; ip6tables "$@"; }
# #
# # nat
# #
# # reset tables
# ipXtables -t nat -F
# ipXtables -t nat -X
# #
# #ipXtables -t nat -A PREROUTING -j REDIRECT ! -i retiolum -p tcp --dport ssh --to-ports 0
# ipXtables -t nat -A PREROUTING -j REDIRECT -p tcp --dport 11423 --to-ports ssh
# #
# # filter
# #
# # reset tables
# ipXtables -P INPUT DROP
# ipXtables -P FORWARD DROP
# ipXtables -F
# ipXtables -X
# # create custom chains
# ipXtables -N Retiolum
# # INPUT
# ipXtables -A INPUT -j ACCEPT -m conntrack --ctstate RELATED,ESTABLISHED
# ipXtables -A INPUT -j ACCEPT -i lo
# ipXtables -A INPUT -j ACCEPT -p tcp --dport ssh -m conntrack --ctstate NEW
# ipXtables -A INPUT -j ACCEPT -p tcp --dport http -m conntrack --ctstate NEW
# ipXtables -A INPUT -j ACCEPT -p tcp --dport tinc -m conntrack --ctstate NEW
# ipXtables -A INPUT -j Retiolum -i retiolum
# ${when log "ipXtables -A INPUT -j LOG --log-level info --log-prefix 'INPUT DROP '"}
# # FORWARD
# ${when log "ipXtables -A FORWARD -j LOG --log-level info --log-prefix 'FORWARD DROP '"}
# # Retiolum
# ip4tables -A Retiolum -j ACCEPT -p icmp --icmp-type echo-request
# ip6tables -A Retiolum -j ACCEPT -p ipv6-icmp -m icmp6 --icmpv6-type echo-request
# ${when log "ipXtables -A Retiolum -j LOG --log-level info --log-prefix 'REJECT '"}
# ipXtables -A Retiolum -j REJECT -p tcp --reject-with tcp-reset
# ip4tables -A Retiolum -j REJECT -p udp --reject-with icmp-port-unreachable
# ip4tables -A Retiolum -j REJECT --reject-with icmp-proto-unreachable
# ip6tables -A Retiolum -j REJECT -p udp --reject-with icmp6-port-unreachable
# ip6tables -A Retiolum -j REJECT
# '';
}