aboutsummaryrefslogtreecommitdiffstats
path: root/hosts/darkstar/default.nix
diff options
context:
space:
mode:
Diffstat (limited to 'hosts/darkstar/default.nix')
-rw-r--r--hosts/darkstar/default.nix34
1 files changed, 17 insertions, 17 deletions
diff --git a/hosts/darkstar/default.nix b/hosts/darkstar/default.nix
index ed5ca70..80ee6be 100644
--- a/hosts/darkstar/default.nix
+++ b/hosts/darkstar/default.nix
@@ -25,9 +25,9 @@
};
environment = {
- etc."mitmproxy-c64u.py".source = ./mitmproxy-c64u.py;
+ #etc."mitmproxy-c64u.py".source = ./mitmproxy-c64u.py;
systemPackages = [
- pkgs.master.mitmproxy
+ #pkgs.master.mitmproxy
pkgs.speedtest-go
];
};
@@ -127,21 +127,21 @@
system.stateVersion = "23.11";
systemd.services = {
- "mitmproxy" = let rules_script = ''
- ${pkgs.mitmproxy}/bin/mitmdump -p 80 -s /etc/mitmproxy-c64u.py --mode reverse:http://185.187.254.229:80 --set block_global=false
- ''; in {
- description = "proxy for C64 site hackerswithstyle.se";
- script = rules_script;
- serviceConfig = {
- Restart = "on-failure";
- RestartSec = 5;
- StandardError = "append:/var/log/mitmproxy.log";
- StandardOutput = "append:/var/log/mitmproxy.log";
- Type = "simple";
- };
- after = [ "network.target" ];
- wantedBy = [ "multi-user.target" ];
- };
+ #"mitmproxy" = let rules_script = ''
+ # ${pkgs.mitmproxy}/bin/mitmdump -p 80 -s /etc/mitmproxy-c64u.py --mode reverse:http://185.187.254.229:80 --set block_global=false
+ #''; in {
+ # description = "proxy for C64 site hackerswithstyle.se";
+ # script = rules_script;
+ # serviceConfig = {
+ # Restart = "on-failure";
+ # RestartSec = 5;
+ # StandardError = "append:/var/log/mitmproxy.log";
+ # StandardOutput = "append:/var/log/mitmproxy.log";
+ # Type = "simple";
+ # };
+ # after = [ "network.target" ];
+ # wantedBy = [ "multi-user.target" ];
+ #};
"nftables-extra" = let rules_script = ''
${pkgs.nftables}/bin/nft -a list chain inet nixos-fw input | ${pkgs.gnugrep}/bin/grep @anveo | ${pkgs.gnugrep}/bin/grep -Eo 'handle [[:digit:]]+$' | ${pkgs.gnused}/bin/sed -e 's/^handle //' | while read handle; do ${pkgs.nftables}/bin/nft delete rule inet nixos-fw input handle ''${handle}; done
if ${pkgs.nftables}/bin/nft list set inet nixos-fw anveo 2>/dev/null; then ${pkgs.nftables}/bin/nft delete set inet nixos-fw anveo; fi