diff options
Diffstat (limited to 'hosts/sif/default.nix')
-rw-r--r-- | hosts/sif/default.nix | 48 |
1 files changed, 10 insertions, 38 deletions
diff --git a/hosts/sif/default.nix b/hosts/sif/default.nix index f4de24e8..6214569a 100644 --- a/hosts/sif/default.nix +++ b/hosts/sif/default.nix | |||
@@ -12,7 +12,7 @@ let | |||
12 | in { | 12 | in { |
13 | imports = with flake.nixosModules.systemProfiles; [ | 13 | imports = with flake.nixosModules.systemProfiles; [ |
14 | ./hw.nix | 14 | ./hw.nix |
15 | ./mail ./libvirt ./greetd | 15 | ./email ./libvirt ./greetd |
16 | tmpfs-root bcachefs initrd-all-crypto-modules default-locale openssh rebuild-machines niri-unstable networkmanager | 16 | tmpfs-root bcachefs initrd-all-crypto-modules default-locale openssh rebuild-machines niri-unstable networkmanager |
17 | flakeInputs.nixos-hardware.nixosModules.lenovo-thinkpad-p1 | 17 | flakeInputs.nixos-hardware.nixosModules.lenovo-thinkpad-p1 |
18 | flakeInputs.impermanence.nixosModules.impermanence | 18 | flakeInputs.impermanence.nixosModules.impermanence |
@@ -130,6 +130,12 @@ in { | |||
130 | useNetworkd = true; | 130 | useNetworkd = true; |
131 | }; | 131 | }; |
132 | 132 | ||
133 | environment.etc."NetworkManager/dnsmasq.d/dnssec.conf" = { | ||
134 | text = '' | ||
135 | conf-file=${pkgs.dnsmasq}/share/dnsmasq/trust-anchors.conf | ||
136 | dnssec | ||
137 | ''; | ||
138 | }; | ||
133 | environment.etc."NetworkManager/dnsmasq.d/libvirt_dnsmasq.conf" = { | 139 | environment.etc."NetworkManager/dnsmasq.d/libvirt_dnsmasq.conf" = { |
134 | text = '' | 140 | text = '' |
135 | except-interface=virbr0 | 141 | except-interface=virbr0 |
@@ -372,19 +378,6 @@ in { | |||
372 | ]; | 378 | ]; |
373 | 379 | ||
374 | services = { | 380 | services = { |
375 | uucp = { | ||
376 | enable = true; | ||
377 | nodeName = "sif"; | ||
378 | remoteNodes = { | ||
379 | "ymir" = { | ||
380 | publicKeys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIG6KNtsCOl5fsZ4rV7udTulGMphJweLBoKapzerWNoLY root@ymir"]; | ||
381 | hostnames = ["ymir.yggdrasil.li" "ymir.niflheim.yggdrasil"]; | ||
382 | }; | ||
383 | }; | ||
384 | |||
385 | defaultCommands = lib.mkForce []; | ||
386 | }; | ||
387 | |||
388 | avahi.enable = true; | 381 | avahi.enable = true; |
389 | 382 | ||
390 | fwupd.enable = true; | 383 | fwupd.enable = true; |
@@ -403,8 +396,8 @@ in { | |||
403 | 396 | ||
404 | logind = { | 397 | logind = { |
405 | lidSwitch = "suspend"; | 398 | lidSwitch = "suspend"; |
406 | lidSwitchDocked = "lock"; | 399 | lidSwitchDocked = "ignore"; |
407 | lidSwitchExternalPower = "lock"; | 400 | lidSwitchExternalPower = "ignore"; |
408 | }; | 401 | }; |
409 | 402 | ||
410 | atd = { | 403 | atd = { |
@@ -610,25 +603,6 @@ in { | |||
610 | 603 | ||
611 | environment.etc."X11/xorg.conf.d/50-wacom.conf".source = lib.mkForce ./wacom.conf; | 604 | environment.etc."X11/xorg.conf.d/50-wacom.conf".source = lib.mkForce ./wacom.conf; |
612 | 605 | ||
613 | systemd.services."ac-plugged" = { | ||
614 | description = "Inhibit handling of lid-switch and sleep"; | ||
615 | |||
616 | path = with pkgs; [ systemd coreutils ]; | ||
617 | |||
618 | script = '' | ||
619 | exec systemd-inhibit --what=handle-lid-switch --why="AC is connected" --mode=block sleep infinity | ||
620 | ''; | ||
621 | |||
622 | serviceConfig = { | ||
623 | Type = "simple"; | ||
624 | }; | ||
625 | }; | ||
626 | |||
627 | services.udev.extraRules = with pkgs; lib.mkAfter '' | ||
628 | SUBSYSTEM=="power_supply", ENV{POWER_SUPPLY_ONLINE}=="0", RUN+="${systemd}/bin/systemctl --no-block stop ac-plugged.service" | ||
629 | SUBSYSTEM=="power_supply", ENV{POWER_SUPPLY_ONLINE}=="1", RUN+="${systemd}/bin/systemctl --no-block start ac-plugged.service" | ||
630 | ''; | ||
631 | |||
632 | systemd.services."nix-daemon".serviceConfig = { | 606 | systemd.services."nix-daemon".serviceConfig = { |
633 | MemoryAccounting = true; | 607 | MemoryAccounting = true; |
634 | MemoryHigh = "50%"; | 608 | MemoryHigh = "50%"; |
@@ -688,7 +662,7 @@ in { | |||
688 | directories = [ | 662 | directories = [ |
689 | "/nix" | 663 | "/nix" |
690 | "/root" | 664 | "/root" |
691 | "/home" | 665 | "/home" |
692 | "/var/log" | 666 | "/var/log" |
693 | "/var/lib/sops-nix" | 667 | "/var/lib/sops-nix" |
694 | "/var/lib/nixos" | 668 | "/var/lib/nixos" |
@@ -699,8 +673,6 @@ in { | |||
699 | "/var/lib/upower" | 673 | "/var/lib/upower" |
700 | "/var/lib/postfix" | 674 | "/var/lib/postfix" |
701 | "/etc/NetworkManager/system-connections" | 675 | "/etc/NetworkManager/system-connections" |
702 | { directory = "/var/uucp"; user = "uucp"; group = "uucp"; mode = "0700"; } | ||
703 | { directory = "/var/spool/uucp"; user = "uucp"; group = "uucp"; mode = "0750"; } | ||
704 | ]; | 676 | ]; |
705 | files = [ | 677 | files = [ |
706 | ]; | 678 | ]; |