enable ipv6 everywhere, unify nix cache config

auto-flake-update
Yorick van Pelt 2018-11-20 22:26:42 +01:00
parent e6419467f9
commit 17cb322d24
Signed by: yorick
GPG Key ID: D8D3CC6D951384DE
8 changed files with 48 additions and 23 deletions

View File

@ -13,13 +13,11 @@
"https://cache.nixos.org"
"https://disciplina.cachix.org"
];
binaryCachePublicKeys = [
"serokell:ic/49yTkeFIk4EBX1CZ/Wlt5fQfV7yCifaJyoM+S3Ss="
"disciplina.cachix.org-1:zDeIFV5cu22v04EUuRITz/rYxpBCGKY82x0mIyEYjxE="
];
};
users.users.lars = {
isNormalUser = true;
openssh.authorizedKeys.keys = [ "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBze0fBV/Fpz9bz1WKkbPlj8h526ZfduOcQVlA+7j0+yzlT+jX6nLNjXNmIi6JZoERj8lG4/avkagldj+wwqWrKM2xOMgIUx34i+br5+U4Y7DedljfPV9k8eE55SI4BjfO697V7BhHP4eooRUjNVmqSmRAld06hJzMj7irGWHK+RPrK0M1BvGgSV5pL50jzQGd2unxvNuxSk1rWBNfNEGt6ok0G8/ud0Gw5QbcYWzbbnKBB8JsgBct22txtcgVbRyqftD+vpFl0Oyq4tiQbSHqa8qpFyV/wTf4Cs1Zz7WrqH+2xfx+oUsCOfMKuvCI8FKtriAWEmfOM42bBi50v2kj" ];
openssh.authorizedKeys.keys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBze0fBV/Fpz9bz1WKkbPlj8h526ZfduOcQVlA+7j0+yzlT+jX6nLNjXNmIi6JZoERj8lG4/avkagldj+wwqWrKM2xOMgIUx34i+br5+U4Y7DedljfPV9k8eE55SI4BjfO697V7BhHP4eooRUjNVmqSmRAld06hJzMj7irGWHK+RPrK0M1BvGgSV5pL50jzQGd2unxvNuxSk1rWBNfNEGt6ok0G8/ud0Gw5QbcYWzbbnKBB8JsgBct22txtcgVbRyqftD+vpFl0Oyq4tiQbSHqa8qpFyV/wTf4Cs1Zz7WrqH+2xfx+oUsCOfMKuvCI8FKtriAWEmfOM42bBi50v2kj"
];
};
}

View File

@ -8,8 +8,6 @@
system.stateVersion = "17.09";
#networking.enableIPv6 = lib.mkOverride 30 true;
services.xserver.displayManager.sessionCommands = ''
${pkgs.xorg.xrandr}/bin/xrandr --dpi 192

View File

@ -11,8 +11,6 @@
../modules/muflax-blog.nix
];
networking.enableIPv6 = lib.mkOverride 30 true;
system.stateVersion = "16.03";
services.nginx.enable = true;

View File

@ -0,0 +1,4 @@
builtins.fetchTarball {
url = "https://github.com/NixOS/nixos-hardware/archive/d534770be7f699b3332ef09bd043745a38d115ad.tar.gz";
sha256 = "0h4xzs0bp0v01rzqm023ia2rgmcxv32jdiinp7ylxxh384vf5h0h";
}

View File

@ -0,0 +1,30 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, ... }:
{
boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" "rtsx_pci_sdmmc" ];
boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/a751e4ea-f1aa-48e1-9cbe-423878e29b62";
fsType = "btrfs";
};
boot.initrd.luks.devices."nix-crypt".device = "/dev/disk/by-uuid/320ef81d-283f-4916-ac26-ecfb0f31e549";
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/0E07-7805";
fsType = "vfat";
};
swapDevices =
[ { device = "/dev/disk/by-uuid/d9c4c15b-0e9c-47f6-8675-93b1b8de5f9d"; }
];
nix.maxJobs = lib.mkDefault 4;
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
}

View File

@ -21,15 +21,6 @@ in
};
services.timesyncd.enable = true;
services.fail2ban.enable = true;
# ban repeat offenders longer
services.fail2ban.jails.recidive = ''
filter = recidive
action = iptables-allports[name=recidive]
maxretry = 5
bantime = 604800 ; 1 week
findtime = 86400 ; 1 day
'';
users.extraUsers.yorick = {
isNormalUser = true;
uid = 1000;
@ -50,7 +41,7 @@ in
'';
# Networking
networking.enableIPv6 = false;
networking.enableIPv6 = true;
services.openssh = {
enable = true;

View File

@ -2,6 +2,7 @@
imports = [ <yori-nix/roles> ];
services.nixosManual.enable = false;
services.sshguard.enable = true;
environment.noXlibs = true;
networking.firewall.logRefusedConnections = false; # Silence logging of scanners and knockers

View File

@ -26,15 +26,20 @@
"https://cache.nixos.org"
];
trustedBinaryCaches = config.nix.binaryCaches ++ [
"https://builder.serokell.io"
"ssh://yorick@jupiter.serokell.io"
"ssh-ng://jupiter"
"https://cache.lumi.guide"
"https://serokell.cachix.org"
];
binaryCachePublicKeys = [
"serokell:ic/49yTkeFIk4EBX1CZ/Wlt5fQfV7yCifaJyoM+S3Ss="
"serokell-1:aIojg2Vxgv7MkzPJoftOO/I8HKX622sT+c0fjnZBLj0="
"cache.lumi.guide-1:z813xH+DDlh+wvloqEiihGvZqLXFmN7zmyF8wR47BHE="
"serokell.cachix.org-1:5DscEJD6c1dD1Mc/phTIbs13+iW22AVbx0HqiSb+Lq8="
"disciplina.cachix.org-1:zDeIFV5cu22v04EUuRITz/rYxpBCGKY82x0mIyEYjxE="
];
#extraOptions = ''
# netrc-file = ${nixnetrc}
#'';
extraOptions = ''
netrc-file = ${nixnetrc}
'';
};
}