{ lib, config, pkgs, ... }: { krebs.build.host = config.krebs.hosts.vbob; makefu.awesome.modkey = "Mod1"; imports = [ # Include the results of the hardware scan. ../. (toString ) (toString ) ../2configs/main-laptop.nix #< base-gui ../2configs/sshd-totp.nix # Tools ../2configs/tools/core.nix ../2configs/tools/core-gui.nix ../2configs/tools/dev.nix ../2configs/tools/extra-gui.nix ../2configs/tools/sec.nix # environment ../2configs/tinc/retiolum.nix ../2configs/audio/jack-on-pulse.nix ../2configs/audio/realtime-audio.nix ]; networking.extraHosts = import (toString ); nixpkgs.config.allowUnfree = true; fileSystems."/nix" = { device ="/dev/disk/by-label/nixstore"; fsType = "ext4"; }; # allow vbob to deploy self users.extraUsers = { root = { openssh.authorizedKeys.keys = [ config.krebs.users.makefu-vbob.pubkey ]; }; }; environment.shellAliases = { forti = "cat ~/vpn/pw.txt | xclip; sudo forticlientsslvpn"; }; # TODO: for forticleintsslpn # ln -s /r/current-system/sw/bin/pppd /usr/sbin/pppd # ln -s /r/current-system/sw/bin/tail /usr/bin/tail environment.systemPackages = with pkgs;[ fortclientsslvpn ppp xclip get logstash # docker #devpi-web #devpi-client debmirror ansible ]; # virtualisation.docker.enable = true; networking.firewall.allowedTCPPorts = [ 25 80 8010 ]; fileSystems."/media/share" = { fsType = "vboxsf"; device = "share"; options = [ "rw" "uid=9001" "gid=9001" ]; }; }