Compare commits
No commits in common. "36001254bfd1847fc4328d22020cdd71ba344611" and "265464ad213c1a9c8e8ddcc5595205c224db5c2f" have entirely different histories.
36001254bf
...
265464ad21
1 changed files with 10 additions and 38 deletions
|
@ -5,7 +5,7 @@
|
||||||
{ config, pkgs, ... }:
|
{ config, pkgs, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
unstable = import <nixos-unstable> { };
|
unstable = import <nixos-unstable> {};
|
||||||
|
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
@ -78,7 +78,6 @@ in
|
||||||
programs.wireshark =
|
programs.wireshark =
|
||||||
{
|
{
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.wireshark;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
programs.adb.enable = true;
|
programs.adb.enable = true;
|
||||||
|
@ -96,8 +95,8 @@ in
|
||||||
# Open ports in the firewall.
|
# Open ports in the firewall.
|
||||||
# networking.firewall.allowedTCPPorts = [ ... ];
|
# networking.firewall.allowedTCPPorts = [ ... ];
|
||||||
# networking.firewall.allowedUDPPorts = [ ... ];
|
# networking.firewall.allowedUDPPorts = [ ... ];
|
||||||
networking.firewall.allowedTCPPortRanges = [{ from = 1714; to = 1764; }];
|
networking.firewall.allowedTCPPortRanges = [ { from = 1714; to = 1764; } ];
|
||||||
networking.firewall.allowedUDPPortRanges = [{ from = 1714; to = 1764; }]; # for KDE connect
|
networking.firewall.allowedUDPPortRanges = [ { from = 1714; to = 1764; } ]; # for KDE connect
|
||||||
# Or disable the firewall altogether.
|
# Or disable the firewall altogether.
|
||||||
# networking.firewall.enable = false;
|
# networking.firewall.enable = false;
|
||||||
|
|
||||||
|
@ -181,36 +180,9 @@ in
|
||||||
services.smartd =
|
services.smartd =
|
||||||
{
|
{
|
||||||
enable = true;
|
enable = true;
|
||||||
devices = [{ device = "/dev/sda"; } { device = "/dev/sdb"; }];
|
devices = [ { device = "/dev/sda"; } { device = "/dev/sdb"; } ];
|
||||||
};
|
};
|
||||||
|
|
||||||
# block certain sites to prevent procrastination
|
|
||||||
systemd.services.procrastinationstop = {
|
|
||||||
serviceConfig.Type = "oneshot";
|
|
||||||
wantedBy = [ ];
|
|
||||||
script = ''
|
|
||||||
ln -sf ${pkgs.writeText "blockedHosts" ''
|
|
||||||
::1 twitter.com
|
|
||||||
127.0.0.1 twitter.com
|
|
||||||
::1 api.twitter.com
|
|
||||||
127.0.0.1 api.twitter.com
|
|
||||||
::1 toot.matereal.eu
|
|
||||||
127.0.0.1 toot.matereal.eu
|
|
||||||
::1 tagesschau.de
|
|
||||||
127.0.0.1 tagesschau.de
|
|
||||||
::1 dnn.de
|
|
||||||
127.0.0.1 dnn.de
|
|
||||||
''} /etc/hosts
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
systemd.services.procrastinationstart = {
|
|
||||||
serviceConfig.Type = "oneshot";
|
|
||||||
wantedBy = [ ];
|
|
||||||
script = ''
|
|
||||||
ln -sf /etc/static/hosts /etc/hosts
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
fonts = {
|
fonts = {
|
||||||
fontDir.enable = true;
|
fontDir.enable = true;
|
||||||
|
@ -235,12 +207,12 @@ in
|
||||||
|
|
||||||
# declarative containers
|
# declarative containers
|
||||||
containers = {
|
containers = {
|
||||||
# hash2PubSim = import ./Hash2PubTestbed.nix
|
# hash2PubSim = import ./Hash2PubTestbed.nix
|
||||||
# {
|
# {
|
||||||
# inherit pkgs config;
|
# inherit pkgs config;
|
||||||
# experimentUid = config.users.users.spiollinux.uid;
|
# experimentUid = config.users.users.spiollinux.uid;
|
||||||
# projectDir = "/home/spiollinux/Seafile/Studium/Semester11/INF-PM-FP-ANW";
|
# projectDir = "/home/spiollinux/Seafile/Studium/Semester11/INF-PM-FP-ANW";
|
||||||
# };
|
# };
|
||||||
};
|
};
|
||||||
|
|
||||||
# stop NetworkManager from managing virtual interfaces
|
# stop NetworkManager from managing virtual interfaces
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue