mirror of
https://codeberg.org/leana8959/.files.git
synced 2025-12-06 14:49:14 +00:00
146 lines
4.8 KiB
Nix
146 lines
4.8 KiB
Nix
{
|
|
config,
|
|
pkgs,
|
|
lib,
|
|
...
|
|
}: {
|
|
# For nautilius and iOS
|
|
services.gvfs.enable = true;
|
|
# iOS
|
|
services.usbmuxd.enable = true;
|
|
environment.systemPackages = with pkgs; [libimobiledevice idevicerestore];
|
|
|
|
# https://unix.stackexchange.com/questions/592775/how-can-i-enable-apple-ios-fast-charge-support
|
|
services.udev.extraRules = ''
|
|
SUBSYSTEM=="usb", ACTION=="add", DRIVER=="apple-mfi-fastcharge", RUN+="/bin/sh -c 'echo Fast > /sys/class/power_supply/apple_mfi_fastcharge/charge_type'"
|
|
'';
|
|
|
|
users.users.root.openssh.authorizedKeys.keys = let
|
|
ids = import ../../../identities.nix;
|
|
in
|
|
builtins.concatMap builtins.attrValues (builtins.attrValues ids);
|
|
|
|
networking = {
|
|
networkmanager.enable = lib.mkForce false;
|
|
|
|
firewall.allowedTCPPorts = [
|
|
8080
|
|
|
|
# For 'localsend'
|
|
# https://github.com/localsend/localsend?tab=readme-ov-file#setup
|
|
53317
|
|
];
|
|
|
|
# To enable roaming https://wiki.archlinux.org/title/Wpa_supplicant#Roaming
|
|
wireless = {
|
|
enable = true;
|
|
userControlled.enable = true;
|
|
secretsFile = config.age.secrets.wpa_password.path;
|
|
scanOnLowSignal = false;
|
|
networks = let
|
|
# wpa_supplicant uses `strchr` to seek to the first `=`, so the only forbidden character is `=`.
|
|
escapePwdKey = lib.replaceStrings ["="] ["_"];
|
|
|
|
fromList = ns: let
|
|
go = networkArgs @ {
|
|
ssid,
|
|
# Custom fields wrapping nixpkgs module options
|
|
hasPassword ? false,
|
|
scanOnLowSignal ? false,
|
|
randomizeMac ? false,
|
|
...
|
|
}: {
|
|
${ssid} = lib.mkMerge [
|
|
(builtins.removeAttrs networkArgs ["ssid" "hasPassword" "scanOnLowSignal" "randomizeMac"])
|
|
(lib.optionalAttrs hasPassword {
|
|
pskRaw = "ext:${escapePwdKey ssid}";
|
|
})
|
|
(lib.optionalAttrs scanOnLowSignal {
|
|
extraConfig = ''
|
|
bgscan="simple:30:-70:3600"
|
|
'';
|
|
})
|
|
(lib.optionalAttrs randomizeMac {
|
|
extraConfig = ''
|
|
mac_addr=1
|
|
'';
|
|
})
|
|
];
|
|
};
|
|
in
|
|
lib.mkMerge (map go ns);
|
|
in
|
|
fromList (import ./connectivity/networks.nix);
|
|
};
|
|
};
|
|
|
|
services.mullvad-vpn.enable = true;
|
|
|
|
hardware.bluetooth.enable = true;
|
|
|
|
#
|
|
# Secure DNS
|
|
#
|
|
# https://nixos.wiki/wiki/Encrypted_DNS
|
|
networking = {
|
|
nameservers = ["127.0.0.1" "::1"];
|
|
dhcpcd.extraConfig = "nohook resolv.conf";
|
|
# networkmanager.dns = "none";
|
|
};
|
|
|
|
services.resolved.enable = false;
|
|
|
|
services.dnscrypt-proxy2 = {
|
|
enable = true;
|
|
# Settings reference:
|
|
# https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml
|
|
settings = {
|
|
listen_addresses = ["127.0.0.1:53"];
|
|
ipv4_servers = true;
|
|
|
|
require_dnssec = true;
|
|
require_nolog = true;
|
|
require_nofilter = true;
|
|
|
|
lb_strategy = "p2";
|
|
lb_estimator = true;
|
|
|
|
blocked_names = {
|
|
# Blocklists are made of one pattern per line.
|
|
# https://github.com/DNSCrypt/dnscrypt-proxy/blob/fa59f990431a49b6485f63f96601bc7e64017bf8/dnscrypt-proxy/example-dnscrypt-proxy.toml#L583C4-L583C75
|
|
blocked_names_file = let
|
|
sources = import ../../../../npins;
|
|
|
|
# Prevent building up reliance on chatbots
|
|
# Gotta preserve that thinking ability of my smoof bwain
|
|
ai_list = lib.pipe (builtins.readFile "${sources.ai-blocklist}/noai_hosts.txt") [
|
|
(lib.replaceStrings ["\r\n"] ["\n"]) # convert to unix ending just in case
|
|
(lib.splitString "\n")
|
|
(builtins.filter (x: ! (x == "" || lib.hasPrefix "#" x)))
|
|
(builtins.map (x: builtins.elemAt (lib.splitString " " x) 1)) # remove 0.0.0.0
|
|
];
|
|
|
|
hategroup_list = lib.pipe (builtins.readFile "${sources.hategroup-blocklist}/blocklist.txt") [
|
|
(lib.replaceStrings ["\r\n"] ["\n"]) # convert to unix ending just in case
|
|
(lib.splitString "\n")
|
|
(builtins.filter (x: ! (x == "" || lib.hasPrefix "#" x)))
|
|
];
|
|
|
|
combined_lists = ai_list ++ hategroup_list;
|
|
in
|
|
pkgs.writeText "dnsblocklist" (builtins.concatStringsSep "\n" combined_lists);
|
|
};
|
|
|
|
# Add this to test if dnscrypt-proxy is actually used to resolve DNS requests
|
|
# query_log.file = "/var/log/dnscrypt-proxy/query.log";
|
|
sources.public-resolvers = {
|
|
urls = [
|
|
"https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/public-resolvers.md"
|
|
"https://download.dnscrypt.info/resolvers-list/v3/public-resolvers.md"
|
|
];
|
|
cache_file = "/var/cache/dnscrypt-proxy/public-resolvers.md";
|
|
minisign_key = "RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3";
|
|
};
|
|
};
|
|
};
|
|
}
|