summaryrefslogtreecommitdiff
path: root/hosts
diff options
context:
space:
mode:
Diffstat (limited to 'hosts')
-rw-r--r--hosts/sif/default.nix13
-rw-r--r--hosts/surtr/prometheus/default.nix2
-rw-r--r--hosts/surtr/vpn/default.nix1
-rw-r--r--hosts/vidhar/default.nix2
-rw-r--r--hosts/vidhar/prometheus/default.nix2
-rw-r--r--hosts/vidhar/samba.nix32
6 files changed, 19 insertions, 33 deletions
diff --git a/hosts/sif/default.nix b/hosts/sif/default.nix
index e81205b3..e71ee4ec 100644
--- a/hosts/sif/default.nix
+++ b/hosts/sif/default.nix
@@ -646,19 +646,6 @@ in {
646 environment.sessionVariables."GTK_USE_PORTAL" = "1"; 646 environment.sessionVariables."GTK_USE_PORTAL" = "1";
647 xdg.portal = { 647 xdg.portal = {
648 enable = true; 648 enable = true;
649 # gtkUsePortal = true;
650 config.preferred.default = "gtk";
651 extraPortals = let
652 gtk-portal = pkgs.xdg-desktop-portal-gtk.overrideAttrs (oldAttrs: {
653 postFixup = ''
654 ${oldAttrs.postFixup or ""}
655
656 ${pkgs.gnused}/bin/sed -ri \
657 's|UseIn=gnome|UseIn=gnome;none+xmonad|' \
658 $out/share/xdg-desktop-portal/portals/gtk.portal
659 '';
660 });
661 in [ gtk-portal ];
662 }; 649 };
663 650
664 environment.persistence."/.bcachefs" = { 651 environment.persistence."/.bcachefs" = {
diff --git a/hosts/surtr/prometheus/default.nix b/hosts/surtr/prometheus/default.nix
index 0f0cf586..5a58aa92 100644
--- a/hosts/surtr/prometheus/default.nix
+++ b/hosts/surtr/prometheus/default.nix
@@ -22,7 +22,7 @@ in {
22 }; 22 };
23 unbound = { 23 unbound = {
24 enable = true; 24 enable = true;
25 controlInterface = "/run/unbound/unbound.ctl"; 25 unbound.host = "unix:///run/unbound/unbound.ctl";
26 group = config.services.unbound.group; 26 group = config.services.unbound.group;
27 }; 27 };
28 wireguard = { 28 wireguard = {
diff --git a/hosts/surtr/vpn/default.nix b/hosts/surtr/vpn/default.nix
index 3f7483bd..1bdcf74e 100644
--- a/hosts/surtr/vpn/default.nix
+++ b/hosts/surtr/vpn/default.nix
@@ -34,7 +34,6 @@ in {
34 }; 34 };
35 35
36 environment = { 36 environment = {
37 noXlibs = true;
38 systemPackages = with pkgs; [ wireguard-tools ]; 37 systemPackages = with pkgs; [ wireguard-tools ];
39 }; 38 };
40 39
diff --git a/hosts/vidhar/default.nix b/hosts/vidhar/default.nix
index 78f305f8..42a9e80d 100644
--- a/hosts/vidhar/default.nix
+++ b/hosts/vidhar/default.nix
@@ -136,7 +136,7 @@ with lib;
136 wantedBy = ["basic.target"]; 136 wantedBy = ["basic.target"];
137 serviceConfig = { 137 serviceConfig = {
138 ExecStart = pkgs.writeShellScript "limit-pstate-start" '' 138 ExecStart = pkgs.writeShellScript "limit-pstate-start" ''
139 echo 80 > /sys/devices/system/cpu/intel_pstate/max_perf_pct 139 echo 60 > /sys/devices/system/cpu/intel_pstate/max_perf_pct
140 ''; 140 '';
141 RemainAfterExit = true; 141 RemainAfterExit = true;
142 ExecStop = pkgs.writeShellScript "limit-pstate-stop" '' 142 ExecStop = pkgs.writeShellScript "limit-pstate-stop" ''
diff --git a/hosts/vidhar/prometheus/default.nix b/hosts/vidhar/prometheus/default.nix
index 3e938933..d368ad52 100644
--- a/hosts/vidhar/prometheus/default.nix
+++ b/hosts/vidhar/prometheus/default.nix
@@ -40,7 +40,7 @@ in {
40 }; 40 };
41 unbound = { 41 unbound = {
42 enable = true; 42 enable = true;
43 controlInterface = "/run/unbound/unbound.ctl"; 43 unbound.host = "unix:///run/unbound/unbound.ctl";
44 group = config.services.unbound.group; 44 group = config.services.unbound.group;
45 }; 45 };
46 wireguard = { 46 wireguard = {
diff --git a/hosts/vidhar/samba.nix b/hosts/vidhar/samba.nix
index 89d9f12e..58fd435c 100644
--- a/hosts/vidhar/samba.nix
+++ b/hosts/vidhar/samba.nix
@@ -3,22 +3,22 @@
3 config = { 3 config = {
4 services.samba = { 4 services.samba = {
5 enable = true; 5 enable = true;
6 securityType = "user"; 6 settings = {
7 extraConfig = '' 7 global = {
8 domain master = yes 8 security = "user";
9 workgroup = WORKGROUP 9 "domain master" = true;
10 load printers = no 10 workgroup = "WORKGROUP";
11 printing = bsd 11 "load printers" = false;
12 printcap name = /dev/null 12 printing = "bsd";
13 disable spoolss = yes 13 "printcap name" = "/dev/null";
14 guest account = nobody 14 "disable spoolss" = true;
15 bind interfaces only = yes 15 "guest account" = "nobody";
16 interfaces = lo lan 16 "bind interfaces only" = true;
17 server signing = mandatory 17 interfaces = ["lo" "lan"];
18 server min protocol = SMB3 18 "server signing" = "mandatory";
19 server smb encrypt = required 19 "server min protocol" = "SMB3";
20 ''; 20 "server smb encrypt" = "required";
21 shares = { 21 };
22 homes = { 22 homes = {
23 comment = "Home directory for %S"; 23 comment = "Home directory for %S";
24 path = "/home/%S"; 24 path = "/home/%S";