diff --git a/home-manager/dunst.nix b/home-manager/dunst.nix index f70fcc7..5e3f5e7 100644 --- a/home-manager/dunst.nix +++ b/home-manager/dunst.nix @@ -20,7 +20,8 @@ in transparency = -1; frame_color = "#1a1c1b"; font = lib.mkDefault "Monospace 8"; - monitor = 1; + #monitor = 1; + follow = "mouse"; }; urgency_normal = { diff --git a/modules/services/coturn.nix b/modules/services/coturn.nix index 2942643..02e732f 100644 --- a/modules/services/coturn.nix +++ b/modules/services/coturn.nix @@ -25,6 +25,7 @@ enable = true; no-cli = true; #tls-listening-port = 5349; + #no-tcp-relay = true; listening-port = 3478; min-port = 49000; max-port = 50000; @@ -32,13 +33,15 @@ static-auth-secret-file = config.age.secrets.coturn-secret.path; relay-ips = [ "192.168.2.1" + "192.168.0.10" ]; listening-ips = [ "192.168.2.1" + "192.168.0.10" ]; - realm = "kopatz.ddns.net"; - #cert = "${config.security.acme.certs."kopatz.ddns.net".directory}/full.pem"; - #pkey = "${config.security.acme.certs."kopatz.ddns.net".directory}/key.pem"; + realm = "kopatz.dev"; + cert = "${config.security.acme.certs."kopatz.dev".directory}/full.pem"; + pkey = "${config.security.acme.certs."kopatz.dev".directory}/key.pem"; extraConfig = '' no-sslv3 no-tlsv1 diff --git a/modules/services/grafana.nix b/modules/services/grafana.nix index ca25192..d9781ce 100644 --- a/modules/services/grafana.nix +++ b/modules/services/grafana.nix @@ -58,6 +58,7 @@ in high_availability = false; }; security.admin_password = "$__file{${config.age.secrets.grafana-pw.path}}"; + security.secret_key = "dontcareaboutthis"; }; provision.alerting.contactPoints.path = config.age.secrets.grafana-contact-points.path; diff --git a/systems/amd-server-vm/configuration.nix b/systems/amd-server-vm/configuration.nix index 46bd195..b8a2261 100644 --- a/systems/amd-server-vm/configuration.nix +++ b/systems/amd-server-vm/configuration.nix @@ -19,6 +19,7 @@ ../../modules/services/samba.nix ../../modules/services/ddclient-cloudflare.nix ../../modules/services/grafana.nix + ../../modules/services/coturn.nix ./disk-config.nix ./mail.nix (modulesPath + "/installer/scan/not-detected.nix") diff --git a/systems/amd-server-vm/mail.nix b/systems/amd-server-vm/mail.nix index af63c5b..07b7261 100644 --- a/systems/amd-server-vm/mail.nix +++ b/systems/amd-server-vm/mail.nix @@ -171,6 +171,9 @@ in selector = "mail"; socket = "local:/run/opendkim/opendkim.sock"; }; + nixpkgs.config.permittedInsecurePackages = [ + "opendkim-2.11.0-Beta2" + ]; services.rspamd = { enable = true; postfix.enable = true;