Compare commits
2 commits
e047cc1f13
...
b72c2a344d
Author | SHA1 | Date | |
---|---|---|---|
b72c2a344d | |||
8745cf3eff |
5 changed files with 42 additions and 18 deletions
|
@ -5,8 +5,9 @@
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
inherit (pkgs.writers) writeFishBin;
|
inherit (pkgs.writers) writeFishBin writeBashBin;
|
||||||
inherit (lib.my) getExe;
|
inherit (lib.my) getExe;
|
||||||
|
runner = config.modules.system.roles.desktop.runner;
|
||||||
nixos-rebuild =
|
nixos-rebuild =
|
||||||
name: word:
|
name: word:
|
||||||
writeFishBin name ''
|
writeFishBin name ''
|
||||||
|
@ -111,4 +112,15 @@ in
|
||||||
--use-remote-sudo &| ${getExe pkgs.nix-output-monitor}
|
--use-remote-sudo &| ${getExe pkgs.nix-output-monitor}
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
powerMenu = writeBashBin "power-menu" ''
|
||||||
|
case "$(echo -e "Shutdown\nRestart\nHibernate\nLogout\nSuspend\nLock" | ${runner.dmenu} )" in
|
||||||
|
Shutdown) exec systemctl poweroff ;;
|
||||||
|
Restart) exec systemctl reboot ;;
|
||||||
|
Logout) exec loginctl terminate-session "$${XDG_SESSION_ID-}" ;;
|
||||||
|
Hibernate) exec systemctl hibernate ;;
|
||||||
|
Suspend) exec systemctl suspend ;;
|
||||||
|
Lock) exec loginctl lock-session "$${XDG_SESSION_ID-}" ;;
|
||||||
|
esac
|
||||||
|
'';
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -63,7 +63,7 @@ lib.mkIf osConfig.programs.sway.enable {
|
||||||
lib.mkOptionDefault {
|
lib.mkOptionDefault {
|
||||||
"${mod}+p" = "exec ${getExe pkgs.hyprlock}";
|
"${mod}+p" = "exec ${getExe pkgs.hyprlock}";
|
||||||
|
|
||||||
"${mod}+Shift+p" = "exec ${getExe pkgs.rofi} -show p -modi p:${getExe pkgs.rofi-power-menu}";
|
"${mod}+Shift+p" = "exec ${getExe pkgs.scripts.powerMenu}";
|
||||||
# Reload the config file
|
# Reload the config file
|
||||||
"${mod}+Shift+c" = "reload";
|
"${mod}+Shift+c" = "reload";
|
||||||
# Kill the focused window
|
# Kill the focused window
|
||||||
|
|
|
@ -22,7 +22,10 @@ in
|
||||||
auth_attempts = 5;
|
auth_attempts = 5;
|
||||||
block_auth_min = 10;
|
block_auth_min = 10;
|
||||||
dns = {
|
dns = {
|
||||||
bind_hosts = [ "0.0.0.0" ];
|
bind_hosts = [
|
||||||
|
"192.168.178.27"
|
||||||
|
"100.64.0.4"
|
||||||
|
];
|
||||||
port = 53;
|
port = 53;
|
||||||
upstream_mode = "load_balance";
|
upstream_mode = "load_balance";
|
||||||
upstream_dns_file = config.age.secrets.adguard-dns-list.path;
|
upstream_dns_file = config.age.secrets.adguard-dns-list.path;
|
||||||
|
|
|
@ -159,20 +159,29 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
|
||||||
networking.firewall.allowedTCPPorts = [ 5232 ];
|
|
||||||
|
|
||||||
# security.acme = {
|
ntfy-sh = {
|
||||||
#acceptTerms = true;
|
enable = true;
|
||||||
#certs = {
|
settings =
|
||||||
#"ccnlc.eu" = {
|
let
|
||||||
#email = "dns@ccnlc.eu";
|
root = "/var/lib/ntfy-sh";
|
||||||
#dnsProvider = "ovh";
|
in
|
||||||
#extraDomainNames = [ "*.ccnlc.eu" ];
|
{
|
||||||
#environmentFile = "/var/secrets/ovh-ccnlc";
|
base-url = "https://ntfy.ccnlc.eu";
|
||||||
#};
|
listen-http = "0.0.0.0:9393";
|
||||||
#};
|
auth-default-access = "deny-all";
|
||||||
#};
|
behind-proxy = true;
|
||||||
|
attachment-cache-dir = "${root}/attachments";
|
||||||
|
enable-signup = true;
|
||||||
|
enable-login = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.firewall.allowedTCPPorts = [
|
||||||
|
5232
|
||||||
|
9393
|
||||||
|
];
|
||||||
|
|
||||||
fileSystems = {
|
fileSystems = {
|
||||||
"/mnt/shows" = {
|
"/mnt/shows" = {
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
{ config, lib, ... }:
|
{ config, lib, ... }:
|
||||||
let
|
let
|
||||||
cfg = config.modules.container;
|
cfg = config.modules.container;
|
||||||
inherit (lib) mkIf mkEnableOption;
|
inherit (lib) mkIf mkEnableOption mkForce;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
|
@ -20,7 +20,7 @@ in
|
||||||
dockerCompat = true;
|
dockerCompat = true;
|
||||||
defaultNetwork.settings = {
|
defaultNetwork.settings = {
|
||||||
# Required for container networking to be able to use names.
|
# Required for container networking to be able to use names.
|
||||||
dns_enabled = false;
|
dns_enabled = mkForce false;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
virtualisation.oci-containers.backend = "podman";
|
virtualisation.oci-containers.backend = "podman";
|
||||||
|
|
Loading…
Add table
Reference in a new issue