summaryrefslogtreecommitdiffstats
path: root/makefu/2configs/base.nix
diff options
context:
space:
mode:
authortv <tv@shackspace.de>2015-07-29 15:21:15 +0200
committertv <tv@shackspace.de>2015-07-29 15:21:15 +0200
commit9eb2d720e1799cf41560c0f4eaea12cd7f73080c (patch)
tree4723487906fab61f7f8b11f79fc6e6bf9bd05eaf /makefu/2configs/base.nix
parentb2de0815bd6f4387debd6918381eb66c76a2bb35 (diff)
parente5b8e2e4a4e15f587586d308b159d657bf0ede9c (diff)
Merge remote-tracking branch 'pnp/master'
Diffstat (limited to 'makefu/2configs/base.nix')
-rw-r--r--makefu/2configs/base.nix100
1 files changed, 100 insertions, 0 deletions
diff --git a/makefu/2configs/base.nix b/makefu/2configs/base.nix
new file mode 100644
index 000000000..8dfb2ef27
--- /dev/null
+++ b/makefu/2configs/base.nix
@@ -0,0 +1,100 @@
+{ config, lib, pkgs, ... }:
+
+with lib;
+{
+ imports = [ ];
+ krebs.enable = true;
+ krebs.search-domain = "retiolum";
+
+ networking.hostName = config.krebs.build.host.name;
+ users.extraUsers = {
+ root = {
+ openssh.authorizedKeys.keys = [ config.krebs.users.makefu.pubkey ];
+ };
+ makefu = {
+ uid = 9001;
+ group = "users";
+ home = "/home/makefu";
+ createHome = true;
+ useDefaultShell = true;
+ extraGroups = [
+ "wheel"
+ ];
+ openssh.authorizedKeys.keys = [ config.krebs.users.makefu.pubkey ];
+ };
+ };
+
+ services.openssh.enable = true;
+ nix.useChroot = true;
+
+ users.mutableUsers = true;
+
+ boot.tmpOnTmpfs = true;
+ systemd.tmpfiles.rules = [
+ "d /tmp 1777 root root - -"
+ ];
+
+ environment.extraInit = ''
+ EDITOR=vim
+ '';
+
+ environment.systemPackages = with pkgs; [
+ jq
+ git
+ vim
+ gnumake
+ rxvt_unicode.terminfo
+ ];
+
+ programs.bash = {
+ enableCompletion = true;
+ interactiveShellInit = ''
+ HISTCONTROL='erasedups:ignorespace'
+ HISTSIZE=900001
+ HISTFILESIZE=$HISTSIZE
+
+ shopt -s checkhash
+ shopt -s histappend histreedit histverify
+ shopt -s no_empty_cmd_completion
+ complete -d cd
+ '';
+
+ promptInit = ''
+ case $UID in
+ 0) PS1='\[\e[1;31m\]\w\[\e[0m\] ' ;;
+ 9001) PS1='\[\e[1;32m\]\w\[\e[0m\] ' ;;
+ *) PS1='\[\e[1;35m\]\u \[\e[1;32m\]\w\[\e[0m\] ' ;;
+ esac
+ if test -n "$SSH_CLIENT"; then
+ PS1='\[\033[35m\]\h'" $PS1"
+ fi
+ '';
+ };
+
+ environment.shellAliases = {
+ lsl = "ls -lAtr";
+ };
+
+ nixpkgs.config.packageOverrides = pkgs: {
+ nano = pkgs.runCommand "empty" {} "mkdir -p $out";
+ };
+
+ services.cron.enable = false;
+ services.nscd.enable = false;
+
+ security.setuidPrograms = [ "sendmail" ];
+ services.journald.extraConfig = ''
+ SystemMaxUse=1G
+ RuntimeMaxUse=128M
+ '';
+ # Enable IPv6 Privacy Extensions
+ boot.kernel.sysctl = {
+ "net.ipv6.conf.all.use_tempaddr" = 2;
+ "net.ipv6.conf.default.use_tempaddr" = 2;
+ };
+
+ i18n = {
+ consoleKeyMap = "us";
+ defaultLocale = "en_US.UTF-8";
+ };
+}