feat(misc): wireguard nixin, passff, pinentry,..
This commit is contained in:
parent
4d148f1644
commit
e768a80700
5 changed files with 39 additions and 8 deletions
|
@ -43,7 +43,7 @@
|
||||||
pandoc
|
pandoc
|
||||||
pass
|
pass
|
||||||
pciutils
|
pciutils
|
||||||
pinentry
|
pinentry-all
|
||||||
ripgrep
|
ripgrep
|
||||||
rustc
|
rustc
|
||||||
slides
|
slides
|
||||||
|
|
|
@ -40,12 +40,40 @@
|
||||||
|
|
||||||
swapDevices = [ { device = "/dev/disk/by-uuid/96a0423d-a4c0-4376-9d34-5a99b764010a"; } ];
|
swapDevices = [ { device = "/dev/disk/by-uuid/96a0423d-a4c0-4376-9d34-5a99b764010a"; } ];
|
||||||
|
|
||||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
networking = {
|
||||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
useDHCP = lib.mkDefault true;
|
||||||
# still possible to use this option, but it's recommended to use it in conjunction
|
wg-quick.interfaces = {
|
||||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
wgnixin = {
|
||||||
networking.useDHCP = lib.mkDefault true;
|
address = [
|
||||||
# networking.interfaces.enp2s0.useDHCP = lib.mkDefault true;
|
"192.168.12.4/32"
|
||||||
|
"2a01:4f9:1a:9a05::4/128"
|
||||||
|
];
|
||||||
|
dns = [
|
||||||
|
"80.67.169.12"
|
||||||
|
"80.67.169.40"
|
||||||
|
"2001:910:800::12"
|
||||||
|
"2001:910:800::40"
|
||||||
|
];
|
||||||
|
privateKeyFile = "/home/mrflos/Nextcloud/Apps/lab12.mrflos.wg-private.key";
|
||||||
|
|
||||||
|
peers = [
|
||||||
|
{
|
||||||
|
publicKey = "cUmp55I20JEhxr+RMmOsX+6U9kcDiAq3grnvzjQ642w=";
|
||||||
|
#allowedIPs = [
|
||||||
|
# "0.0.0.0/0"
|
||||||
|
# "::/0"
|
||||||
|
#];
|
||||||
|
allowedIPs = [
|
||||||
|
"192.168.12.0/24"
|
||||||
|
"2a01:4f9:1a:9a05::/64"
|
||||||
|
];
|
||||||
|
endpoint = "vpn.lab12.fr:51812";
|
||||||
|
persistentKeepalive = 25;
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||||
|
|
|
@ -22,6 +22,7 @@
|
||||||
atuin
|
atuin
|
||||||
bat
|
bat
|
||||||
btop
|
btop
|
||||||
|
busybox
|
||||||
cargo
|
cargo
|
||||||
catnip
|
catnip
|
||||||
cmatrix
|
cmatrix
|
||||||
|
@ -56,7 +57,7 @@
|
||||||
pandoc
|
pandoc
|
||||||
pass
|
pass
|
||||||
pciutils
|
pciutils
|
||||||
pinentry
|
pinentry-all
|
||||||
ripgrep
|
ripgrep
|
||||||
rustc
|
rustc
|
||||||
slides
|
slides
|
||||||
|
|
|
@ -59,6 +59,7 @@
|
||||||
droidcam.enable = true;
|
droidcam.enable = true;
|
||||||
firefox.enable = true;
|
firefox.enable = true;
|
||||||
firefox.languagePacks = [ "fr" ];
|
firefox.languagePacks = [ "fr" ];
|
||||||
|
firefox.nativeMessagingHosts.packages = [ pkgs.passff-host ];
|
||||||
hyprland.enable = true;
|
hyprland.enable = true;
|
||||||
|
|
||||||
ssh.askPassword = pkgs.lib.mkForce "${pkgs.ksshaskpass.out}/bin/ksshaskpass"; # conflict between kde and gnome cf. https://github.com/NixOS/nixpkgs/issues/75867
|
ssh.askPassword = pkgs.lib.mkForce "${pkgs.ksshaskpass.out}/bin/ksshaskpass"; # conflict between kde and gnome cf. https://github.com/NixOS/nixpkgs/issues/75867
|
||||||
|
|
|
@ -108,6 +108,7 @@
|
||||||
python311Packages.virtualenv
|
python311Packages.virtualenv
|
||||||
rpi-imager
|
rpi-imager
|
||||||
ruff-lsp
|
ruff-lsp
|
||||||
|
stdenvNoCC
|
||||||
stylelint
|
stylelint
|
||||||
symfony-cli
|
symfony-cli
|
||||||
tree-sitter
|
tree-sitter
|
||||||
|
|
Loading…
Add table
Reference in a new issue