{ config, pkgs, ... }: { boot.tmpOnTmpfs = true; # see tmpfiles.d(5) systemd.tmpfiles.rules = [ "d /tmp 1777 root root - -" ]; time.timeZone = "Europe/Berlin"; virtualisation.libvirtd.enable = true; hardware.pulseaudio = { enable = true; systemWide = true; }; # multiple-definition-problem when defining environment.variables.EDITOR environment.extraInit = '' EDITOR=vim PAGER=most ''; programs.bash = { enableCompletion = true; interactiveShellInit = '' HISTCONTROL='erasedups:ignorespace' HISTSIZE=65536 HISTFILESIZE=$HISTSIZE shopt -s checkhash shopt -s histappend histreedit histverify shopt -s no_empty_cmd_completion complete -d cd #fancy colors if [ -e ~/LS_COLORS ]; then eval $(dircolors ~/LS_COLORS) fi if [ -e /etc/nixos/dotfiles/link ]; then /etc/nixos/dotfiles/link fi ''; promptInit = '' if test $UID = 0; then PS1='\[\033[1;31m\]\w\[\033[0m\] ' elif test $UID = 1337; then PS1='\[\033[1;32m\]\w\[\033[0m\] ' else PS1='\[\033[1;33m\]\u@\w\[\033[0m\] ' fi if test -n "$SSH_CLIENT"; then PS1='\[\033[35m\]\h'" $PS1" fi ''; }; programs.ssh.startAgent = false; security.setuidPrograms = [ "slock" ]; ###SERVICES BEGIN services.gitolite = { enable = true; dataDir = "/home/gitolite"; adminPubkey = '' ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAp83zynhIueJJsWlSEykVSBrrgBFKq38+vT8bRfa+csqyjZBl2SQFuCPo+Qbh49mwchpZRshBa9jQEIGqmXxv/PYdfBFQuOFgyUq9ZcTZUXqeynicg/SyOYFW86iiqYralIAkuGPfQ4howLPVyjTZtWeEeeEttom6p6LMY5Aumjz2em0FG0n9rRFY2fBzrdYAgk9C0N6ojCs/Gzknk9SGntA96MDqHJ1HXWFMfmwOLCnxtE5TY30MqSmkrJb7Fsejwjoqoe9Y/mCaR0LpG2cStC1+37GbHJNH0caCMaQCX8qdfgMVbWTVeFWtV6aWOaRgwLrPDYn4cHWQJqTfhtPrNQ== lass@mors ''; }; services.journald.extraConfig = '' SystemMaxUse=1G RuntimeMaxUse=128M ''; services.openssh = { enable = true; hostKeys = [ # XXX bits here make no science { bits = 8192; type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; } ]; }; services.printing = { enable = true; drivers = [ pkgs.foomatic_filters ]; }; ###SERVICES END environment.systemPackages = with pkgs; [ gitolite git #terminal most powertop #network iptables #video stuff haskellPackages.xmobar haskellPackages.yeganesh dmenu2 xlibs.fontschumachermisc ]; nix.useChroot = true; # # user settings # users.mutableUsers = false; users.extraUsers = { #gitolite = { # name = "gitolite"; # description = "gitolite git manager"; # home = "/home/gitolite"; # createHome = true; # useDefaultShell = true; #}; testing = { name = "testing"; description = "user for testing various stuff"; home = "/home/testing"; useDefaultShell = true; createHome = true; }; }; networking.firewall = { enable = true; allowedTCPPorts = [ 22 ]; extraCommands = '' iptables -A INPUT -j ACCEPT -m conntrack --ctstate RELATED,ESTABLISHED iptables -A INPUT -j ACCEPT -i lo #iptables -N Retiolum iptables -A INPUT -j Retiolum -i retiolum iptables -A Retiolum -j ACCEPT -p icmp iptables -A Retiolum -j ACCEPT -m conntrack --ctstate RELATED,ESTABLISHED iptables -A Retiolum -j REJECT -p tcp --reject-with tcp-reset iptables -A Retiolum -j REJECT -p udp --reject-with icmp-port-unreachable iptables -A Retiolum -j REJECT --reject-with icmp-proto-unreachable iptables -A Retiolum -j REJECT ''; extraStopCommands = "iptables -F"; }; }