diff options
author | lassulus <lass@aidsballs.de> | 2015-07-29 15:09:32 +0200 |
---|---|---|
committer | lassulus <lass@aidsballs.de> | 2015-07-29 15:09:32 +0200 |
commit | 40bef339003191d6eef4dbef69cb96f2bd73e688 (patch) | |
tree | 192155d37eb8cd7347bb61a1349438bcf4ffc2cf /makefu/2configs/base.nix | |
parent | c58ab1ba4978aae8200bc840fbfe6d9d62a0759d (diff) | |
parent | fe188078f3ee9536bb0eb5a63058346c75c8ab53 (diff) |
Merge remote-tracking branch 'pnp/master' into newmaster
Diffstat (limited to 'makefu/2configs/base.nix')
-rw-r--r-- | makefu/2configs/base.nix | 100 |
1 files changed, 100 insertions, 0 deletions
diff --git a/makefu/2configs/base.nix b/makefu/2configs/base.nix new file mode 100644 index 000000000..8dfb2ef27 --- /dev/null +++ b/makefu/2configs/base.nix @@ -0,0 +1,100 @@ +{ config, lib, pkgs, ... }: + +with lib; +{ + imports = [ ]; + krebs.enable = true; + krebs.search-domain = "retiolum"; + + networking.hostName = config.krebs.build.host.name; + users.extraUsers = { + root = { + openssh.authorizedKeys.keys = [ config.krebs.users.makefu.pubkey ]; + }; + makefu = { + uid = 9001; + group = "users"; + home = "/home/makefu"; + createHome = true; + useDefaultShell = true; + extraGroups = [ + "wheel" + ]; + openssh.authorizedKeys.keys = [ config.krebs.users.makefu.pubkey ]; + }; + }; + + services.openssh.enable = true; + nix.useChroot = true; + + users.mutableUsers = true; + + boot.tmpOnTmpfs = true; + systemd.tmpfiles.rules = [ + "d /tmp 1777 root root - -" + ]; + + environment.extraInit = '' + EDITOR=vim + ''; + + environment.systemPackages = with pkgs; [ + jq + git + vim + gnumake + rxvt_unicode.terminfo + ]; + + programs.bash = { + enableCompletion = true; + interactiveShellInit = '' + HISTCONTROL='erasedups:ignorespace' + HISTSIZE=900001 + HISTFILESIZE=$HISTSIZE + + shopt -s checkhash + shopt -s histappend histreedit histverify + shopt -s no_empty_cmd_completion + complete -d cd + ''; + + promptInit = '' + case $UID in + 0) PS1='\[\e[1;31m\]\w\[\e[0m\] ' ;; + 9001) PS1='\[\e[1;32m\]\w\[\e[0m\] ' ;; + *) PS1='\[\e[1;35m\]\u \[\e[1;32m\]\w\[\e[0m\] ' ;; + esac + if test -n "$SSH_CLIENT"; then + PS1='\[\033[35m\]\h'" $PS1" + fi + ''; + }; + + environment.shellAliases = { + lsl = "ls -lAtr"; + }; + + nixpkgs.config.packageOverrides = pkgs: { + nano = pkgs.runCommand "empty" {} "mkdir -p $out"; + }; + + services.cron.enable = false; + services.nscd.enable = false; + + security.setuidPrograms = [ "sendmail" ]; + services.journald.extraConfig = '' + SystemMaxUse=1G + RuntimeMaxUse=128M + ''; + # Enable IPv6 Privacy Extensions + boot.kernel.sysctl = { + "net.ipv6.conf.all.use_tempaddr" = 2; + "net.ipv6.conf.default.use_tempaddr" = 2; + }; + + i18n = { + consoleKeyMap = "us"; + defaultLocale = "en_US.UTF-8"; + }; +} |