integrate nixd

This commit is contained in:
atagen 2023-09-28 13:40:19 +10:00
parent 4477d0d4a2
commit 1c6a1a4305
3 changed files with 42 additions and 28 deletions

View file

@ -95,7 +95,7 @@
extraPackages = python3Packages:
with python3Packages; [
pkgs.stable.python3Packages.qtile-extras
coconut
# coconut
];
};
@ -119,6 +119,7 @@
enable = true;
extraPortals = with pkgs; [
xdg-desktop-portal-gtk
xdg-desktop-portal-wlr
];
};
@ -146,7 +147,7 @@
users.defaultUserShell = pkgs.zsh;
services.tumbler.enable = true; # thumbnailer for thunar
services.tailscale.enable = true;
# services.tailscale.enable = true;
environment.systemPackages = with pkgs; [
man-pages
@ -155,7 +156,7 @@
rnix-lsp
nixd
tailscale
# tailscale
home-manager
cachix
@ -183,36 +184,37 @@
programs.nix-index.enableZshIntegration = false;
programs.nix-index.enableBashIntegration = false;
programs.sway = {
# to use home-manager
package = null;
enable = true;
wrapperFeatures = {
base = true;
gtk = true;
};
# extraPackages = with pkgs; [swaylock swayidle foot dmenu vulkan-validation-layers];
};
# programs.sway = {
# # to use home-manager
# package = null;
# enable = true;
# wrapperFeatures = {
# base = true;
# gtk = true;
# };
# # extraPackages = with pkgs; [swaylock swayidle foot dmenu vulkan-validation-layers];
# };
services.mullvad-vpn.enable = true;
networking.firewall.enable = true;
networking.firewall = {
trustedInterfaces = ["tailscale0"];
# trustedInterfaces = ["tailscale0"];
checkReversePath = "loose";
};
systemd.services.fixNetworkingForTailscale = {
wantedBy = ["multi-user.target"];
after = ["network.target" "mullvad-daemon.service"];
description = "fix the damn routing table";
serviceConfig = {
Type = "oneshot";
User = "root";
ExecStart = ''${pkgs.bash}/bin/bash -c "if [[ \"$( ${pkgs.iproute2}/bin/ip rule | grep -e \"62:.*52\" | wc -l)\" -eq 0 ]]; then ${pkgs.iproute2}/bin/ip rule add pref 62 table 52; fi"'';
};
};
# systemd.services.fixNetworkingForTailscale = {
# wantedBy = ["multi-user.target"];
# after = ["network.target" "mullvad-daemon.service"];
# description = "fix the damn routing table";
# serviceConfig = {
# Type = "oneshot";
# User = "root";
# ExecStart = ''${pkgs.bash}/bin/bash -c "if [[ \"$( ${pkgs.iproute2}/bin/ip rule | grep -e \"62:.*52\" | wc -l)\" -eq 0 ]]; then ${pkgs.iproute2}/bin/ip rule add pref 62 table 52; fi"'';
# };
# };
# give cpuset to user
systemd.services."user@".serviceConfig.Delegate = "memory pids cpu cpuset";
security.pam.services.gtklock = {