stockholm/krebs/2configs/default.nix

67 lines
1.5 KiB
Nix
Raw Normal View History

{ config, lib, pkgs, ... }:
2016-10-20 18:54:38 +00:00
with import <stockholm/lib>;
{
2017-07-22 19:59:00 +00:00
imports = [
./backup.nix
2017-09-09 14:20:47 +00:00
(let ca-bundle = "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"; in {
environment.variables = {
CURL_CA_BUNDLE = ca-bundle;
GIT_SSL_CAINFO = ca-bundle;
SSL_CERT_FILE = ca-bundle;
};
})
2017-07-22 19:59:00 +00:00
];
krebs.announce-activation.enable = true;
krebs.enable = true;
2019-07-25 20:13:14 +00:00
krebs.tinc.retiolum.enable = mkDefault true;
2017-07-13 22:17:58 +00:00
krebs.build.user = mkDefault config.krebs.users.krebs;
networking.hostName = config.krebs.build.host.name;
nix.maxJobs = 1;
2016-10-19 16:33:42 +00:00
nix.useSandbox = true;
environment.systemPackages = with pkgs; [
git
2017-08-16 10:08:14 +00:00
vim
rxvt_unicode.terminfo
];
2020-06-17 07:08:34 +00:00
console.keyMap = "us";
2019-07-17 08:55:36 +00:00
i18n = {
defaultLocale = lib.mkForce "C";
};
programs.ssh.startAgent = false;
services.openssh = {
enable = true;
hostKeys = [
{ type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; }
];
};
services.cron.enable = false;
services.ntp.enable = false;
2021-11-27 23:12:00 +00:00
# limit journald size
services.journald.extraConfig = ''
SystemMaxUse=1G
RuntimeMaxUse=128M
Storage=persistent
'';
users.mutableUsers = false;
users.extraUsers.root.openssh.authorizedKeys.keys = [
config.krebs.users.jeschli-brauerei.pubkey
config.krebs.users.lass.pubkey
2018-06-04 04:29:37 +00:00
config.krebs.users.lass-mors.pubkey
config.krebs.users.makefu.pubkey
config.krebs.users.tv.pubkey
];
# The NixOS release to be compatible with for stateful data such as databases.
2017-07-20 22:35:08 +00:00
system.stateVersion = "17.03";
}