Compare commits

...

3 commits

View file

@ -5,7 +5,7 @@
{ config, pkgs, ... }: { config, pkgs, ... }:
let let
unstable = import <nixos-unstable> {}; unstable = import <nixos-unstable> { };
in in
{ {
@ -78,6 +78,7 @@ in
programs.wireshark = programs.wireshark =
{ {
enable = true; enable = true;
package = pkgs.wireshark;
}; };
programs.adb.enable = true; programs.adb.enable = true;
@ -95,8 +96,8 @@ in
# Open ports in the firewall. # Open ports in the firewall.
# networking.firewall.allowedTCPPorts = [ ... ]; # networking.firewall.allowedTCPPorts = [ ... ];
# networking.firewall.allowedUDPPorts = [ ... ]; # networking.firewall.allowedUDPPorts = [ ... ];
networking.firewall.allowedTCPPortRanges = [ { from = 1714; to = 1764; } ]; networking.firewall.allowedTCPPortRanges = [{ from = 1714; to = 1764; }];
networking.firewall.allowedUDPPortRanges = [ { from = 1714; to = 1764; } ]; # for KDE connect networking.firewall.allowedUDPPortRanges = [{ from = 1714; to = 1764; }]; # for KDE connect
# Or disable the firewall altogether. # Or disable the firewall altogether.
# networking.firewall.enable = false; # networking.firewall.enable = false;
@ -180,9 +181,36 @@ in
services.smartd = services.smartd =
{ {
enable = true; enable = true;
devices = [ { device = "/dev/sda"; } { device = "/dev/sdb"; } ]; devices = [{ device = "/dev/sda"; } { device = "/dev/sdb"; }];
}; };
# block certain sites to prevent procrastination
systemd.services.procrastinationstop = {
serviceConfig.Type = "oneshot";
wantedBy = [ ];
script = ''
ln -sf ${pkgs.writeText "blockedHosts" ''
::1 twitter.com
127.0.0.1 twitter.com
::1 api.twitter.com
127.0.0.1 api.twitter.com
::1 toot.matereal.eu
127.0.0.1 toot.matereal.eu
::1 tagesschau.de
127.0.0.1 tagesschau.de
::1 dnn.de
127.0.0.1 dnn.de
''} /etc/hosts
'';
};
systemd.services.procrastinationstart = {
serviceConfig.Type = "oneshot";
wantedBy = [ ];
script = ''
ln -sf /etc/static/hosts /etc/hosts
'';
};
fonts = { fonts = {
fontDir.enable = true; fontDir.enable = true;
@ -207,12 +235,12 @@ in
# declarative containers # declarative containers
containers = { containers = {
# hash2PubSim = import ./Hash2PubTestbed.nix # hash2PubSim = import ./Hash2PubTestbed.nix
# { # {
# inherit pkgs config; # inherit pkgs config;
# experimentUid = config.users.users.spiollinux.uid; # experimentUid = config.users.users.spiollinux.uid;
# projectDir = "/home/spiollinux/Seafile/Studium/Semester11/INF-PM-FP-ANW"; # projectDir = "/home/spiollinux/Seafile/Studium/Semester11/INF-PM-FP-ANW";
# }; # };
}; };
# stop NetworkManager from managing virtual interfaces # stop NetworkManager from managing virtual interfaces