stockholm/makefu/2configs/default.nix

194 lines
4.8 KiB
Nix
Raw Normal View History

{ config, lib, pkgs, ... }:
2016-10-20 18:54:38 +00:00
with import <stockholm/lib>;
{
2015-08-07 11:51:49 +00:00
imports = [
{
2017-05-02 12:05:06 +00:00
users.users =
2015-08-07 11:51:49 +00:00
mapAttrs (_: h: { hashedPassword = h; })
2015-10-01 16:49:16 +00:00
(import <secrets/hashedPasswords.nix>);
2015-08-07 11:51:49 +00:00
}
2015-08-07 13:50:06 +00:00
./vim.nix
2016-07-14 20:31:27 +00:00
./binary-cache/nixos.nix
2015-08-07 11:51:49 +00:00
];
2017-04-17 11:12:16 +00:00
programs.command-not-found.enable = false;
nixpkgs.config.allowUnfreePredicate = (pkg: pkgs.lib.hasPrefix "unrar-" pkg.name);
2015-11-06 22:54:27 +00:00
krebs = {
enable = true;
2016-06-23 14:45:44 +00:00
2016-07-18 10:14:05 +00:00
dns.providers.lan = "hosts";
search-domain = "r";
build = {
2015-11-06 22:54:27 +00:00
user = config.krebs.users.makefu;
2016-10-19 19:53:18 +00:00
source = let
inherit (config.krebs.build) host user;
2017-07-03 06:26:33 +00:00
ref = "06734d1"; # unstable @ 2017-07-03 + graceful requests2 (a772c3aa)
2016-10-19 19:53:18 +00:00
in {
nixpkgs = if config.makefu.full-populate || (getEnv "dummy_secrets" == "true") then
2016-10-19 19:53:18 +00:00
{
2017-02-04 13:35:29 +00:00
git = { url = https://github.com/makefu/nixpkgs; inherit ref; };
2016-08-21 09:54:46 +00:00
}
else
# TODO use http, once it is implemented
# right now it is simply extracted revision folder
## prepare so we do not have to wait for rsync:
## cd /var/src; curl https://github.com/nixos/nixpkgs/tarball/125ffff -L | tar zx && mv NixOS-nixpkgs-125ffff nixpkgs
2016-10-19 19:53:18 +00:00
{ file = "/home/makefu/store/${ref}";};
secrets.file =
if getEnv "dummy_secrets" == "true"
then toString <stockholm/makefu/6tests/data/secrets>
else "/home/makefu/secrets/${host.name}";
2016-08-04 19:55:36 +00:00
stockholm.file = getEnv "PWD";
2015-11-06 22:54:27 +00:00
# Defaults for all stockholm users?
nixos-config.symlink =
"stockholm/${user.name}/1systems/${host.name}.nix";
2015-11-06 22:54:27 +00:00
};
};
};
users.extraUsers = {
root = {
openssh.authorizedKeys.keys = [ config.krebs.users.makefu.pubkey ];
};
makefu = {
uid = 9001;
group = "users";
home = "/home/makefu";
createHome = true;
useDefaultShell = true;
extraGroups = [
"wheel"
];
openssh.authorizedKeys.keys = [ config.krebs.users.makefu.pubkey ];
};
};
2015-08-07 10:10:02 +00:00
networking.hostName = config.krebs.build.host.name;
2015-08-13 15:13:13 +00:00
nix.maxJobs = config.krebs.build.host.cores;
time.timeZone = "Europe/Berlin";
2015-08-07 13:50:06 +00:00
#nix.maxJobs = 1;
2015-08-07 10:10:02 +00:00
programs.ssh = {
startAgent = false;
};
services.openssh.enable = true;
nix.useSandbox = true;
2015-08-07 11:51:49 +00:00
users.mutableUsers = false;
boot.tmpOnTmpfs = true;
2015-08-11 19:00:22 +00:00
networking.firewall.rejectPackets = true;
networking.firewall.allowPing = true;
systemd.tmpfiles.rules = [
"d /tmp 1777 root root - -"
];
2016-06-02 12:41:12 +00:00
nix.nixPath = [ "/var/src" ];
environment.variables = let
ca-bundle = "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt";
in {
NIX_PATH = mkForce "/var/src";
EDITOR = mkForce "vim";
CURL_CA_BUNDLE = ca-bundle;
GIT_SSL_CAINFO = ca-bundle;
SSL_CERT_FILE = ca-bundle;
};
environment.systemPackages = with pkgs; [
2015-07-28 23:07:41 +00:00
jq
git
2016-02-11 16:27:53 +00:00
get
2015-07-26 16:18:41 +00:00
gnumake
rxvt_unicode.terminfo
2015-08-13 15:13:13 +00:00
htop
];
programs.bash = {
enableCompletion = true;
interactiveShellInit = ''
HISTCONTROL='erasedups:ignorespace'
HISTSIZE=900001
HISTFILESIZE=$HISTSIZE
PYTHONSTARTUP="~/.pythonrc";
shopt -s checkhash
shopt -s histappend histreedit histverify
shopt -s no_empty_cmd_completion
'';
promptInit = ''
case $UID in
0) PS1='\[\e[1;31m\]\w\[\e[0m\] ' ;;
9001) PS1='\[\e[1;32m\]\w\[\e[0m\] ' ;;
*) PS1='\[\e[1;35m\]\u \[\e[1;32m\]\w\[\e[0m\] ' ;;
esac
if test -n "$SSH_CLIENT"; then
PS1='\[\033[35m\]\h'" $PS1"
fi
'';
};
environment.shellAliases = {
2017-05-02 12:05:06 +00:00
# TODO: see .aliases
2015-07-24 21:13:16 +00:00
lsl = "ls -lAtr";
psg = "ps -ef | grep";
nmap = "nmap -oN $HOME/loot/scan-`date +\%s`.nmap -oX $HOME/loot/scan-`date +%s`.xml";
grep = "grep --color=auto";
};
nixpkgs.config.packageOverrides = pkgs: {
nano = pkgs.runCommand "empty" {} "mkdir -p $out";
2016-03-16 07:39:58 +00:00
tinc = pkgs.tinc_pre;
};
networking.timeServers = [
"pool.ntp.org"
"time.windows.com"
"time.apple.com"
"time.nist.gov"
];
2016-05-02 15:38:27 +00:00
nix.extraOptions = ''
auto-optimise-store = true
'';
2017-03-05 15:59:34 +00:00
security.wrappers.sendmail = {
source = "${pkgs.exim}/bin/sendmail";
setuid = true;
};
services.journald.extraConfig = ''
SystemMaxUse=1G
RuntimeMaxUse=128M
'';
# Enable IPv6 Privacy Extensions
boot.kernel.sysctl = {
"net.ipv6.conf.all.use_tempaddr" = 2;
"net.ipv6.conf.default.use_tempaddr" = 2;
};
system.activationScripts.nix-defexpr = ''
(set -euf
for i in /home/makefu /root/;do
f="$i/.nix-defexpr"
rm -fr "$f"
ln -s /var/src/nixpkgs "$f"
done)
'';
i18n = {
consoleKeyMap = "us";
defaultLocale = "en_US.UTF-8";
};
2016-07-20 20:55:19 +00:00
# suppress chrome autit event messages
security.audit = {
rules = [
"-a task,never"
];
};
}