76 lines
2.3 KiB
Nix
76 lines
2.3 KiB
Nix
{ config, pkgs, ... }:
|
|
|
|
let
|
|
unstable = import <unstable> {};
|
|
fhs = pkgs.writeShellScriptBin "fhs"
|
|
("${pkgs.docker}/bin/docker run -v /home/user:/home/user -v /nix:/nix "+
|
|
"-e \"HOST_PWD=$PWD\" -it fhs");
|
|
in {
|
|
security.allowUserNamespaces = true;
|
|
security.allowSimultaneousMultithreading = true;
|
|
security.lockKernelModules = false;
|
|
|
|
programs.ssh.startAgent = false;
|
|
programs.gnupg = {
|
|
agent.enable = true;
|
|
agent.enableSSHSupport = true;
|
|
agent.enableExtraSocket = true;
|
|
agent.enableBrowserSocket = true;
|
|
dirmngr.enable = true;
|
|
};
|
|
|
|
# Bus 001 Device 002: ID 1050:0404 Yubico.com Yubikey 4 CCID
|
|
services.udev = {
|
|
extraRules = ''
|
|
ACTION=="add|change", ATTRS{idVendor}=="1050", ATTRS{idProduct}=="0404", MODE="0666"
|
|
'';
|
|
};
|
|
|
|
systemd = {
|
|
services = {
|
|
"force-lock-after-suspend" = {
|
|
serviceConfig.User = "user";
|
|
description = "Force xsecurelock after suspend";
|
|
before = [ "suspend.target" "hibernate.target" "hybrid-sleep.target" ];
|
|
wantedBy = [ "suspend.target" "hibernate.target" "hybrid-sleep.target" ];
|
|
script = ''
|
|
DISPLAY=:0 ${pkgs.xsecurelock}/bin/xsecurelock
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
# Allow manage backlight without sudo
|
|
security.sudo = {
|
|
enable = true;
|
|
extraConfig = ''
|
|
%wheel ALL=(ALL:ALL) NOPASSWD: ${pkgs.light}/bin/light
|
|
%wheel ALL=(captive) NOPASSWD: ${pkgs.firefox}/bin/firefox
|
|
%wheel ALL=(root) NOPASSWD: ${fhs}/bin/fhs
|
|
%wheel ALL=(out-of-tree) NOPASSWD: ${unstable.out-of-tree}/bin/out-of-tree
|
|
'';
|
|
};
|
|
|
|
users.users.out-of-tree = {
|
|
home = "/var/out-of-tree";
|
|
createHome = true;
|
|
extraGroups = [ "docker" "kvm" ];
|
|
};
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
(writeShellScriptBin "fhs" "sudo ${fhs}/bin/fhs")
|
|
(writeShellScriptBin "captive" "sudo -H -u captive ${pkgs.firefox}/bin/firefox")
|
|
(writeShellScriptBin "fhs-ptrace"
|
|
("sudo ${pkgs.docker}/bin/docker run -v /home/user:/home/user " +
|
|
"--cap-add=SYS_PTRACE --security-opt seccomp=unconfined" +
|
|
" -e \"HOST_PWD=$PWD\" -v /nix=/nix -it fhs"))
|
|
(writeShellScriptBin "out-of-tree"
|
|
"sudo -H -u out-of-tree ${unstable.out-of-tree}/bin/out-of-tree $@")
|
|
];
|
|
|
|
security.wrappers = {
|
|
pmount.source = "${pkgs.pmount}/bin/pmount";
|
|
pumount.source = "${pkgs.pmount}/bin/pumount";
|
|
};
|
|
}
|