Compare commits
3 commits
265464ad21
...
36001254bf
Author | SHA1 | Date | |
---|---|---|---|
36001254bf | |||
62935211c5 | |||
38d50cb04d |
1 changed files with 38 additions and 10 deletions
|
@ -5,7 +5,7 @@
|
||||||
{ config, pkgs, ... }:
|
{ config, pkgs, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
unstable = import <nixos-unstable> {};
|
unstable = import <nixos-unstable> { };
|
||||||
|
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
@ -78,6 +78,7 @@ in
|
||||||
programs.wireshark =
|
programs.wireshark =
|
||||||
{
|
{
|
||||||
enable = true;
|
enable = true;
|
||||||
|
package = pkgs.wireshark;
|
||||||
};
|
};
|
||||||
|
|
||||||
programs.adb.enable = true;
|
programs.adb.enable = true;
|
||||||
|
@ -95,8 +96,8 @@ in
|
||||||
# Open ports in the firewall.
|
# Open ports in the firewall.
|
||||||
# networking.firewall.allowedTCPPorts = [ ... ];
|
# networking.firewall.allowedTCPPorts = [ ... ];
|
||||||
# networking.firewall.allowedUDPPorts = [ ... ];
|
# networking.firewall.allowedUDPPorts = [ ... ];
|
||||||
networking.firewall.allowedTCPPortRanges = [ { from = 1714; to = 1764; } ];
|
networking.firewall.allowedTCPPortRanges = [{ from = 1714; to = 1764; }];
|
||||||
networking.firewall.allowedUDPPortRanges = [ { from = 1714; to = 1764; } ]; # for KDE connect
|
networking.firewall.allowedUDPPortRanges = [{ from = 1714; to = 1764; }]; # for KDE connect
|
||||||
# Or disable the firewall altogether.
|
# Or disable the firewall altogether.
|
||||||
# networking.firewall.enable = false;
|
# networking.firewall.enable = false;
|
||||||
|
|
||||||
|
@ -180,9 +181,36 @@ in
|
||||||
services.smartd =
|
services.smartd =
|
||||||
{
|
{
|
||||||
enable = true;
|
enable = true;
|
||||||
devices = [ { device = "/dev/sda"; } { device = "/dev/sdb"; } ];
|
devices = [{ device = "/dev/sda"; } { device = "/dev/sdb"; }];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# block certain sites to prevent procrastination
|
||||||
|
systemd.services.procrastinationstop = {
|
||||||
|
serviceConfig.Type = "oneshot";
|
||||||
|
wantedBy = [ ];
|
||||||
|
script = ''
|
||||||
|
ln -sf ${pkgs.writeText "blockedHosts" ''
|
||||||
|
::1 twitter.com
|
||||||
|
127.0.0.1 twitter.com
|
||||||
|
::1 api.twitter.com
|
||||||
|
127.0.0.1 api.twitter.com
|
||||||
|
::1 toot.matereal.eu
|
||||||
|
127.0.0.1 toot.matereal.eu
|
||||||
|
::1 tagesschau.de
|
||||||
|
127.0.0.1 tagesschau.de
|
||||||
|
::1 dnn.de
|
||||||
|
127.0.0.1 dnn.de
|
||||||
|
''} /etc/hosts
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services.procrastinationstart = {
|
||||||
|
serviceConfig.Type = "oneshot";
|
||||||
|
wantedBy = [ ];
|
||||||
|
script = ''
|
||||||
|
ln -sf /etc/static/hosts /etc/hosts
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
fonts = {
|
fonts = {
|
||||||
fontDir.enable = true;
|
fontDir.enable = true;
|
||||||
|
@ -207,12 +235,12 @@ in
|
||||||
|
|
||||||
# declarative containers
|
# declarative containers
|
||||||
containers = {
|
containers = {
|
||||||
# hash2PubSim = import ./Hash2PubTestbed.nix
|
# hash2PubSim = import ./Hash2PubTestbed.nix
|
||||||
# {
|
# {
|
||||||
# inherit pkgs config;
|
# inherit pkgs config;
|
||||||
# experimentUid = config.users.users.spiollinux.uid;
|
# experimentUid = config.users.users.spiollinux.uid;
|
||||||
# projectDir = "/home/spiollinux/Seafile/Studium/Semester11/INF-PM-FP-ANW";
|
# projectDir = "/home/spiollinux/Seafile/Studium/Semester11/INF-PM-FP-ANW";
|
||||||
# };
|
# };
|
||||||
};
|
};
|
||||||
|
|
||||||
# stop NetworkManager from managing virtual interfaces
|
# stop NetworkManager from managing virtual interfaces
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue