diff options
Diffstat (limited to 'hosts')
-rw-r--r-- | hosts/sif/default.nix | 13 | ||||
-rw-r--r-- | hosts/surtr/prometheus/default.nix | 2 | ||||
-rw-r--r-- | hosts/surtr/vpn/default.nix | 1 | ||||
-rw-r--r-- | hosts/vidhar/default.nix | 2 | ||||
-rw-r--r-- | hosts/vidhar/prometheus/default.nix | 2 | ||||
-rw-r--r-- | hosts/vidhar/samba.nix | 32 |
6 files changed, 19 insertions, 33 deletions
diff --git a/hosts/sif/default.nix b/hosts/sif/default.nix index e81205b3..e71ee4ec 100644 --- a/hosts/sif/default.nix +++ b/hosts/sif/default.nix | |||
@@ -646,19 +646,6 @@ in { | |||
646 | environment.sessionVariables."GTK_USE_PORTAL" = "1"; | 646 | environment.sessionVariables."GTK_USE_PORTAL" = "1"; |
647 | xdg.portal = { | 647 | xdg.portal = { |
648 | enable = true; | 648 | enable = true; |
649 | # gtkUsePortal = true; | ||
650 | config.preferred.default = "gtk"; | ||
651 | extraPortals = let | ||
652 | gtk-portal = pkgs.xdg-desktop-portal-gtk.overrideAttrs (oldAttrs: { | ||
653 | postFixup = '' | ||
654 | ${oldAttrs.postFixup or ""} | ||
655 | |||
656 | ${pkgs.gnused}/bin/sed -ri \ | ||
657 | 's|UseIn=gnome|UseIn=gnome;none+xmonad|' \ | ||
658 | $out/share/xdg-desktop-portal/portals/gtk.portal | ||
659 | ''; | ||
660 | }); | ||
661 | in [ gtk-portal ]; | ||
662 | }; | 649 | }; |
663 | 650 | ||
664 | environment.persistence."/.bcachefs" = { | 651 | environment.persistence."/.bcachefs" = { |
diff --git a/hosts/surtr/prometheus/default.nix b/hosts/surtr/prometheus/default.nix index 0f0cf586..5a58aa92 100644 --- a/hosts/surtr/prometheus/default.nix +++ b/hosts/surtr/prometheus/default.nix | |||
@@ -22,7 +22,7 @@ in { | |||
22 | }; | 22 | }; |
23 | unbound = { | 23 | unbound = { |
24 | enable = true; | 24 | enable = true; |
25 | controlInterface = "/run/unbound/unbound.ctl"; | 25 | unbound.host = "unix:///run/unbound/unbound.ctl"; |
26 | group = config.services.unbound.group; | 26 | group = config.services.unbound.group; |
27 | }; | 27 | }; |
28 | wireguard = { | 28 | wireguard = { |
diff --git a/hosts/surtr/vpn/default.nix b/hosts/surtr/vpn/default.nix index 3f7483bd..1bdcf74e 100644 --- a/hosts/surtr/vpn/default.nix +++ b/hosts/surtr/vpn/default.nix | |||
@@ -34,7 +34,6 @@ in { | |||
34 | }; | 34 | }; |
35 | 35 | ||
36 | environment = { | 36 | environment = { |
37 | noXlibs = true; | ||
38 | systemPackages = with pkgs; [ wireguard-tools ]; | 37 | systemPackages = with pkgs; [ wireguard-tools ]; |
39 | }; | 38 | }; |
40 | 39 | ||
diff --git a/hosts/vidhar/default.nix b/hosts/vidhar/default.nix index 78f305f8..42a9e80d 100644 --- a/hosts/vidhar/default.nix +++ b/hosts/vidhar/default.nix | |||
@@ -136,7 +136,7 @@ with lib; | |||
136 | wantedBy = ["basic.target"]; | 136 | wantedBy = ["basic.target"]; |
137 | serviceConfig = { | 137 | serviceConfig = { |
138 | ExecStart = pkgs.writeShellScript "limit-pstate-start" '' | 138 | ExecStart = pkgs.writeShellScript "limit-pstate-start" '' |
139 | echo 80 > /sys/devices/system/cpu/intel_pstate/max_perf_pct | 139 | echo 60 > /sys/devices/system/cpu/intel_pstate/max_perf_pct |
140 | ''; | 140 | ''; |
141 | RemainAfterExit = true; | 141 | RemainAfterExit = true; |
142 | ExecStop = pkgs.writeShellScript "limit-pstate-stop" '' | 142 | ExecStop = pkgs.writeShellScript "limit-pstate-stop" '' |
diff --git a/hosts/vidhar/prometheus/default.nix b/hosts/vidhar/prometheus/default.nix index 3e938933..d368ad52 100644 --- a/hosts/vidhar/prometheus/default.nix +++ b/hosts/vidhar/prometheus/default.nix | |||
@@ -40,7 +40,7 @@ in { | |||
40 | }; | 40 | }; |
41 | unbound = { | 41 | unbound = { |
42 | enable = true; | 42 | enable = true; |
43 | controlInterface = "/run/unbound/unbound.ctl"; | 43 | unbound.host = "unix:///run/unbound/unbound.ctl"; |
44 | group = config.services.unbound.group; | 44 | group = config.services.unbound.group; |
45 | }; | 45 | }; |
46 | wireguard = { | 46 | wireguard = { |
diff --git a/hosts/vidhar/samba.nix b/hosts/vidhar/samba.nix index 89d9f12e..58fd435c 100644 --- a/hosts/vidhar/samba.nix +++ b/hosts/vidhar/samba.nix | |||
@@ -3,22 +3,22 @@ | |||
3 | config = { | 3 | config = { |
4 | services.samba = { | 4 | services.samba = { |
5 | enable = true; | 5 | enable = true; |
6 | securityType = "user"; | 6 | settings = { |
7 | extraConfig = '' | 7 | global = { |
8 | domain master = yes | 8 | security = "user"; |
9 | workgroup = WORKGROUP | 9 | "domain master" = true; |
10 | load printers = no | 10 | workgroup = "WORKGROUP"; |
11 | printing = bsd | 11 | "load printers" = false; |
12 | printcap name = /dev/null | 12 | printing = "bsd"; |
13 | disable spoolss = yes | 13 | "printcap name" = "/dev/null"; |
14 | guest account = nobody | 14 | "disable spoolss" = true; |
15 | bind interfaces only = yes | 15 | "guest account" = "nobody"; |
16 | interfaces = lo lan | 16 | "bind interfaces only" = true; |
17 | server signing = mandatory | 17 | interfaces = ["lo" "lan"]; |
18 | server min protocol = SMB3 | 18 | "server signing" = "mandatory"; |
19 | server smb encrypt = required | 19 | "server min protocol" = "SMB3"; |
20 | ''; | 20 | "server smb encrypt" = "required"; |
21 | shares = { | 21 | }; |
22 | homes = { | 22 | homes = { |
23 | comment = "Home directory for %S"; | 23 | comment = "Home directory for %S"; |
24 | path = "/home/%S"; | 24 | path = "/home/%S"; |