diff options
43 files changed, 644 insertions, 1486 deletions
diff --git a/jeschli/1systems/bln/config.nix b/jeschli/1systems/bln/config.nix deleted file mode 100644 index 6e3c3be..0000000 --- a/jeschli/1systems/bln/config.nix +++ /dev/null @@ -1,173 +0,0 @@ -{ config, lib, pkgs, ... }: -# bln config file -{ -  imports = [ -    ./hardware-configuration.nix -    <stockholm/jeschli> -    <stockholm/jeschli/2configs/virtualbox.nix> -    <stockholm/jeschli/2configs/urxvt.nix> -    <stockholm/jeschli/2configs/emacs.nix> -    <stockholm/jeschli/2configs/xdg.nix> -    <stockholm/jeschli/2configs/xserver> -#    <stockholm/jeschli/1systems/bln/dcso-vpn.nix> -    <stockholm/jeschli/2configs/officevpn.nix> -  ]; - -#  boot.loader.systemd-boot.enable = true; -  boot.loader.efi.canTouchEfiVariables = true; -  boot.loader.efi.efiSysMountPoint = "/boot"; -  boot.loader.grub = { -    devices = [ "nodev" ]; -    efiSupport = true; -    enable = true; -    extraEntries = '' -      menuentry "Debian" { -        insmod ext2 -        insmod chain -        chainloader /EFI/debian/grubx64.efi -      } -    ''; -    version = 2; -  }; - -  jeschliFontSize = 20; - -  environment.shellAliases = { -    n = "nix-shell"; -    gd = "cd /home/markus/go/src/gitlab.dcso.lolcat"; -    gh = "cd /home/markus/go/src/github.com"; -    stocki = pkgs.writeDash "deploy" '' -      cd ~/stockholm -      LOGNAME=jeschli exec nix-shell -I stockholm="$PWD" --run 'deploy  --system="bln"' -    ''; -  }; -  networking.hostName = lib.mkForce "BLN02NB0232"; -  networking.networkmanager.enable = true; - -  # Set your time zone. -  time.timeZone = "Europe/Berlin"; - -  # Setup Packages -  nixpkgs.config.allowUnfree = true; -  environment.variables = { GOROOT= [ "${pkgs.go.out}/share/go" ]; }; -  environment.systemPackages = with pkgs; [ -    termite -  # system helper -    ag -    copyq -    dmenu -    git -    tig -    i3lock -    keepass -    networkmanagerapplet -    rsync -    terminator -    tmux -    wget -    rxvt_unicode -  # editors -    emacs -  # databases -    sqlite -  # internet -    thunderbird -    chromium -    google-chrome -  # programming languages -    elmPackages.elm -    go -    gcc -    ghc -    python35 -    python35Packages.pip -  # go tools -    golint -    gotools -  # dev tools -    gnumake -    jetbrains.pycharm-professional -    jetbrains.webstorm -    jetbrains.goland -    jetbrains.datagrip -    texlive.combined.scheme-full -    pandoc -    redis -    vagrant -  # document viewer -    zathura - -    samba -  ]; - - -  programs.bash.enableCompletion = true; -  programs.vim.defaultEditor = true; - -  services.openssh.enable = true; - -  # Enable CUPS to print documents. -  services.printing.enable = true; -  services.printing.drivers = [ pkgs.postscript-lexmark ]; - -  services.redis.enable = true; - -  services.xserver = { - -    desktopManager.session = lib.mkForce []; - -    enable = true; -    display = 11; -    tty = 11; - -    dpi = 200; - -    videoDrivers = [ "nvidia" ]; -    synaptics = { -      enable = false; -    }; - -  }; - - -  users.extraUsers.jeschli = { -    isNormalUser = true; -    extraGroups = ["docker" "vboxusers" "audio"]; -    uid = 1000; -  }; - -  system.stateVersion = "17.09"; -  # Gogland Debugger workaround -  #  nixpkgs.config.packageOverrides = super: { -  #    idea.gogland = lib.overrideDerivation super.idea.gogland (attrs: { -  #      postFixup = '' -  #	interp="$(cat $NIX_CC/nix-support/dynamic-linker)" -  #	patchelf --set-interpreter $interp $out/gogland*/plugins/intellij-go-plugin/lib/dlv/linux/dlv -  #        chmod +x $out/gogland*/plugins/intellij-go-plugin/lib/dlv/linux/dlv -  #     ''; -  #    }); -  #  }; - -  virtualisation.docker.enable = true; - -  # DCSO Certificates -  security.pki.certificateFiles = [ -    (pkgs.fetchurl { url = "http://pki.dcso.de/ca/PEM/DCSOCAROOTC1G1.pem"; sha256 = "006j61q2z44z6d92638iin6r46r4cj82ipwm37784h34i5x4mp0d"; }) -    (pkgs.fetchurl { url = "http://pki.dcso.de/ca/PEM/DCSOCAROOTC2G1.pem"; sha256 = "1nkd1rjcn02q9xxjg7sw79lbwy08i7hb4v4pn98djknvcmplpz5m"; }) -    (pkgs.fetchurl { url = "http://pki.dcso.de/ca/PEM/DCSOCAROOTC3G1.pem"; sha256 = "094m12npglnnv1nf1ijcv70p8l15l00id44qq7rwynhcgxi5539i"; }) - -    (pkgs.fetchurl { url = "http://pki.dcso.de/ca/PEM/DCSOCACOMPC2G1.pem"; sha256 = "1anfncdf5xsp219kryncv21ra87flpzcjwcc85hzvlwbxhid3g4x"; }) -    (pkgs.fetchurl { url = "http://pki.dcso.de/ca/PEM/DCSOCACOMPC3G1.pem"; sha256 = "035kkfizyl5dndj7rhvmy91rr75lakqbqgjx4dpiw0kqq369mz8r"; }) -    (pkgs.fetchurl { url = "http://pki.dcso.de/ca/PEM/DCSOCAIDENC2G1.pem"; sha256 = "14fpzx1qjs9ws9sz0y7pb6j40336xlckkqcm2rc5j86yn7r22lp7"; }) -    (pkgs.fetchurl { url = "http://pki.dcso.de/ca/PEM/DCSOCAIDENC3G1.pem"; sha256 = "1yjl3kyw4chc8vw7bnqac2h9vn8dxryw7lr7i03lqi9sdvs4108s"; }) -  ]; - - -  hardware.bluetooth.enable = true; -  krebs.build.host = config.krebs.hosts.bln; - -  networking.interfaces.enp0s31f6.ipv4.addresses = [ -    { address = "10.99.23.2"; prefixLength = 24; } -  ]; - -} diff --git a/jeschli/1systems/bln/dcso-vpn.nix b/jeschli/1systems/bln/dcso-vpn.nix deleted file mode 100644 index 0a5623b..0000000 --- a/jeschli/1systems/bln/dcso-vpn.nix +++ /dev/null @@ -1,44 +0,0 @@ -with import <stockholm/lib>; -{ ... }: - -{ - -  users.extraUsers = { -    dcsovpn = rec { -      name = "dcsovpn"; -      uid = genid "dcsovpn"; -      description = "user for running dcso openvpn"; -      home = "/home/${name}"; -    }; -  }; - -  users.extraGroups.dcsovpn.gid = genid "dcsovpn"; - -  services.openvpn.servers = { -    dcso = { -      config = '' -        client -        dev tun -        tun-mtu 1356 -        mssfix -        proto udp -        float -        remote 217.111.55.41 1194 -        nobind -        user dcsovpn -        group dcsovpn -        persist-key -        persist-tun -        ca ${toString <secrets/dcsovpn/ca.pem>} -        cert ${toString <secrets/dcsovpn/cert.pem>} -        key ${toString <secrets/dcsovpn/cert.key>} -        verb 3 -        mute 20 -        auth-user-pass ${toString <secrets/dcsovpn/login.txt>} -        route-method exe -        route-delay 2 -      ''; -      updateResolvConf = true; -    }; -  }; -} diff --git a/jeschli/1systems/bln/hardware-configuration.nix b/jeschli/1systems/bln/hardware-configuration.nix deleted file mode 100644 index 35f0b3b..0000000 --- a/jeschli/1systems/bln/hardware-configuration.nix +++ /dev/null @@ -1,35 +0,0 @@ -{ config, lib, pkgs, ... }: - -{ -  imports = -    [ <nixpkgs/nixos/modules/installer/scan/not-detected.nix> -    ]; - -  boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" "usb_storage" "sr_mod" "rtsx_pci_sdmmc" ]; -  boot.kernelModules = [ "kvm-intel" ]; -  boot.extraModulePackages = [ ]; - -  boot.initrd.luks.devices.crypted.device = "/dev/disk/by-uuid/25534522-5748-4dcc-a5ca-80a3ac70f59d"; - -  fileSystems."/" = -    { device = "/dev/disk/by-uuid/496c8889-96db-446d-9bac-60d4347faeac"; -      fsType = "ext4"; -    }; - -  fileSystems."/home" = -    { device = "/dev/disk/by-uuid/2785adf5-a99e-49d7-86d6-99f393f457ea"; -      fsType = "ext4"; -    }; - -  fileSystems."/boot" = -    { device = "/dev/disk/by-uuid/927E-01A0"; -      fsType = "vfat"; -    }; - -  swapDevices = [ ]; - -  nix.maxJobs = lib.mkDefault 8; -  powerManagement.cpuFreqGovernor = "powersave"; - -  hardware.pulseaudio.enable = true; -} diff --git a/jeschli/1systems/brauerei/config.nix b/jeschli/1systems/brauerei/config.nix index 4cd544a..98db60e 100644 --- a/jeschli/1systems/brauerei/config.nix +++ b/jeschli/1systems/brauerei/config.nix @@ -37,6 +37,11 @@        cd ~/stockholm        exec nix-shell -I stockholm="$PWD" --run 'deploy  --system="brauerei"'      ''; +    deploy = pkgs.writeDash "deploy" '' +      set -eu +      export SYSTEM="$1" +      $(nix-build $HOME/stockholm/jeschli/krops.nix --no-out-link --argstr name "$SYSTEM" -A deploy) +    '';    };    environment.systemPackages = with pkgs; [ @@ -114,6 +119,8 @@      # Don't install feh into systemPackages      # refs <nixpkgs/nixos/modules/services/x11/desktop-managers>      desktopManager.session = lib.mkForce []; +    displayManager.lightdm.enable = lib.mkForce false; +    displayManager.job.execCmd = lib.mkForce "derp";      enable = true;      display = 11; @@ -138,6 +145,15 @@      isNormalUser = true;      uid = 1001; # TODO genid    }; +  users.users.dev = { +    isNormalUser = true; +    openssh.authorizedKeys.keys = [ +      config.krebs.users.lass.pubkey +      "ssh-rsa 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 lhebendanz@nixos" +      "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAEZgHR1ZPDBMUjGWar/QmI2GiUkZM8pAXRyBDh8j3hGlxlS+0lsBV6bTAI5F13iyzTC4pCuEuDO2OlFB0scwjcOATci8phd8jTjOIDodqDaeQZXbshyuUBfyiAV6q0Sc+cUDV3D6GhzigH3t8EiQmvXmUGm916yFotT12o0dm83SCOh1nAf9ZveC1Hz/eEUTvgWvIb58OdUR5F/S5OVBnIIJZ8tcp0BP9lyjjJCcANWkYJlwaVcNNb0UarCRhvRtptFj+e/EPqQxSCaS2QcxW4zBsQ6C81TFf7WrdH+pwtFg0owlWsxv547sRLLiPf2h2YuQgSoAaW24N0SHhUqvOXd+JyaYw7MAF8Qh3jHm2iJQRgXNuIN0msFi1alwAevilL2mnfAt2biQ9sS9g+CVvQCwX3mg09E4Y3UmFLzvsJafD9meKVrjnDCcXySeAfts59eFmwKtMQ0qrEWaclzUiA6Ay3uD1zma8x1XELGTf8nxnXCGl8s2i2APn7y1Tcwep69DlENWSaReF5zBLIkCtIUDd+8xBFTF3yu5CpyRrRMKGa0QX/MtsQl4SGJWadOTwpM8joIbrIVfKkTNB2McxAjvo0iaRoBDm409gi2Ycy+NSoUV/KAIUG7OysAQZ62hr+E/Kw1ocJCIVI+9vzKx/EnEIHkCSwhYKl5393W7CShVJjJUcKcZddqX2smSShXq8rXPzhIHk1dAVn5Ff/vGZT9z9R0QN3z6Oa9QN5t5TjTdUDToqHTudqOpDxPl2c2yXK9wV+aoHFoML9AmbzTT1U1mKU7GXSoFACiKNzhDzkovyJGpWRyvisX5t75IfuVqvGGI8n3u8OhPMdyyOHRylVaciDzBMZ00xnIHB+dJG9IeYaMm9bW1Li4Jo0CWnogo2+olfHPMLijBuu+bsa5Kp6kFkccJYR/xqcSq0lVXkpGm692JI4dnMGjchipXEGh1gXof9jXHemMMBwjpLFGty+D0r5KdA33m+mIqc9hi0ShquA9nA7E1IxDlgE0gQg+P5ZOeeIN7q54AQmT8iCCCRyne2Kw57XxaGgZoLfj7VjjaeRlzBUglmtyq8B7/c0J3y41vt9Hxhj4sKD+vufZu+M9E6E936KsJlIi+3U0PtopM/b8L4jcH1JYpPljapsys8wkJZ1ymHf6Kj/0FHyi1V+GvquiVrlFN+aHECIzNlCiSMO4MqfPUO1A+s9zkG2ZgPNNv+LoZqnokjbmKM4kdxexMxaL/Eo9Nd/bzdYiFYXlllEL7Uox+yV0N3loQ2juh4zn+ctCnwHi+V9X4l4rB8amW96WrXiJ/WqEK2UO8St8dcQWhCsUUm2OawSrbYYZw5HhJwz/Rhz2UsdSc56s5OUiQLJqpILYvCnqSLlF4iZdRSdDQNpKn+le3CeGUl5UUuvK2BpKGrbPKx0i/2ZSEMxNA5GnDMx/NyiNyDBcoPu/XOlNi8VWsEbCtoTQRamvqHjOmNcPrxCxds+TaF8c0wMR720yj5sWq8= jeschli@nixos" +    ]; +  }; +    users.users.root.openssh.authorizedKeys.keys = [      "ssh-rsa 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 jeschli@nixos" diff --git a/jeschli/2configs/emacs.nix b/jeschli/2configs/emacs.nix index 3bd2dbf..5fc8874 100644 --- a/jeschli/2configs/emacs.nix +++ b/jeschli/2configs/emacs.nix @@ -67,7 +67,6 @@ let    emacsWithCustomPackages = (pkgs.emacsPackagesNgGen pkgs.emacs).emacsWithPackages (epkgs: [      epkgs.melpaPackages.evil      epkgs.melpaStablePackages.magit -    epkgs.melpaPackages.mmm-mode      epkgs.melpaPackages.nix-mode      epkgs.melpaPackages.go-mode      epkgs.melpaPackages.google-this diff --git a/jeschli/5pkgs/simple/xmonad-jeschli/default.nix b/jeschli/5pkgs/simple/xmonad-jeschli/default.nix index 8885602..4ebd98f 100644 --- a/jeschli/5pkgs/simple/xmonad-jeschli/default.nix +++ b/jeschli/5pkgs/simple/xmonad-jeschli/default.nix @@ -222,7 +222,7 @@ myKeys conf = Map.fromList $  pagerConfig :: PagerConfig  pagerConfig = def      { pc_font           = myFont -    , pc_cellwidth      = 256 +    , pc_cellwidth      = 100      --, pc_cellheight     = 36 -- TODO automatically keep screen aspect      --, pc_borderwidth    = 1      --, pc_matchcolor     = "#f0b000" diff --git a/nin/0tests/dummysecrets/hashedPasswords.nix b/nin/0tests/dummysecrets/hashedPasswords.nix deleted file mode 100644 index 0967ef4..0000000 --- a/nin/0tests/dummysecrets/hashedPasswords.nix +++ /dev/null @@ -1 +0,0 @@ -{} diff --git a/nin/0tests/dummysecrets/ssh.id_ed25519 b/nin/0tests/dummysecrets/ssh.id_ed25519 deleted file mode 100644 index e69de29..0000000 --- a/nin/0tests/dummysecrets/ssh.id_ed25519 +++ /dev/null diff --git a/nin/1systems/axon/config.nix b/nin/1systems/axon/config.nix deleted file mode 100644 index 5e81afd..0000000 --- a/nin/1systems/axon/config.nix +++ /dev/null @@ -1,132 +0,0 @@ -# Edit this configuration file to define what should be installed on -# your system.  Help is available in the configuration.nix(5) man page -# and in the NixOS manual (accessible by running ‘nixos-help’). - -{ config, lib, pkgs, ... }: - -with lib; - -{ -  imports = [ -    <stockholm/nin> -    <nixpkgs/nixos/modules/installer/scan/not-detected.nix> -    #../2configs/copyq.nix -    <stockholm/nin/2configs/ableton.nix> -    <stockholm/nin/2configs/games.nix> -    <stockholm/nin/2configs/git.nix> -    <stockholm/nin/2configs/retiolum.nix> -    <stockholm/nin/2configs/termite.nix> -  ]; - -  krebs.build.host = config.krebs.hosts.axon; - -  boot.initrd.availableKernelModules = [ "xhci_pci" "ehci_pci" "ahci" "sd_mod" "sr_mod" "rtsx_pci_sdmmc" ]; -  boot.kernelModules = [ "kvm-intel" ]; -  boot.extraModulePackages = [ ]; - -  fileSystems."/" = -    { device = "/dev/pool/root"; -      fsType = "ext4"; -    }; - -  fileSystems."/tmp" = -    { device = "tmpfs"; -      fsType = "tmpfs"; -    }; - -  fileSystems."/boot" = -    { device = "/dev/sda1"; -      fsType = "ext2"; -    }; - -  boot.initrd.luks.devices.crypted.device = "/dev/sda2"; -  boot.initrd.luks.cryptoModules = [ "aes" "sha512" "sha1" "xts" ]; - -  swapDevices = [ ]; - -  nix.maxJobs = lib.mkDefault 4; -  # Use the GRUB 2 boot loader. -  boot.loader.grub.enable = true; -  boot.loader.grub.version = 2; -  # Define on which hard drive you want to install Grub. -  boot.loader.grub.device = "/dev/sda"; - -  # Enable the OpenSSH daemon. -  services.openssh.enable = true; - -  # Enable CUPS to print documents. -  # services.printing.enable = true; - -  # nin config -  time.timeZone = "Europe/Berlin"; -  services.xserver = { -    enable = true; - -    displayManager.lightdm.enable = true; -  }; - -  networking.networkmanager.enable = true; -  #networking.wireless.enable = true; - -  hardware.pulseaudio = { -    enable = true; -    systemWide = true; -  }; - -  hardware.bluetooth.enable = true; - -  hardware.opengl.driSupport32Bit = true; - -  #nixpkgs.config.steam.java = true; - -  environment.systemPackages = with pkgs; [ -    atom -    chromium -    firefox -    git -    htop -    keepassx -    lmms -    networkmanagerapplet -    openvpn -    python -    ruby -    steam -    taskwarrior -    thunderbird -    vim -    virtmanager -  ]; - -  nixpkgs.config = { - -    allowUnfree = true; - -  }; - -  #services.logind.extraConfig = "HandleLidSwitch=ignore"; - -  services.xserver.synaptics = { -    enable = true; -  }; - -  services.xserver.displayManager.sessionCommands = '' -    ${pkgs.xorg.xhost}/bin/xhost + local: -  ''; - -  services.xserver.desktopManager.xfce = let -    xbindConfig = pkgs.writeText "xbindkeysrc" '' -      "${pkgs.pass}/bin/passmenu --type" -        Control + p -  ''; -  in { -  enable = true; -      extraSessionCommands = '' -      ${pkgs.xbindkeys}/bin/xbindkeys -f ${xbindConfig} -    ''; -  }; - - # The NixOS release to be compatible with for stateful data such as databases. -  system.stateVersion = "17.03"; - -} diff --git a/nin/1systems/hiawatha/config.nix b/nin/1systems/hiawatha/config.nix deleted file mode 100644 index a09eed9..0000000 --- a/nin/1systems/hiawatha/config.nix +++ /dev/null @@ -1,126 +0,0 @@ -# Edit this configuration file to define what should be installed on -# your system.  Help is available in the configuration.nix(5) man page -# and in the NixOS manual (accessible by running ‘nixos-help’). - -{ config, lib, pkgs, ... }: - -with lib; - -{ -  imports = [ -    <stockholm/nin> -    <nixpkgs/nixos/modules/installer/scan/not-detected.nix> -    #../2configs/copyq.nix -    <stockholm/nin/2configs/games.nix> -    <stockholm/nin/2configs/git.nix> -    <stockholm/nin/2configs/retiolum.nix> -    <stockholm/nin/2configs/termite.nix> -  ]; - -  krebs.build.host = config.krebs.hosts.hiawatha; - -  boot.initrd.availableKernelModules = [ "xhci_pci" "ehci_pci" "ahci" "sd_mod" "sr_mod" "rtsx_pci_sdmmc" ]; -  boot.kernelModules = [ "kvm-intel" ]; -  boot.extraModulePackages = [ ]; - -  fileSystems."/" = -    { device = "/dev/disk/by-uuid/b83f8830-84f3-4282-b10e-015c4b76bd9e"; -      fsType = "ext4"; -    }; - -  fileSystems."/tmp" = -    { device = "tmpfs"; -      fsType = "tmpfs"; -    }; - -  fileSystems."/home" = -    { device = "/dev/fam/home"; -    }; - - -  fileSystems."/boot" = -    { device = "/dev/disk/by-uuid/2f319b08-2560-401d-b53c-2abd28f1a010"; -      fsType = "ext2"; -    }; - -  boot.initrd.luks.devices = [ { name = "luksroot"; device = "/dev/sda2"; } ]; -  boot.initrd.luks.cryptoModules = [ "aes" "sha512" "sha1" "xts" ]; - -  swapDevices = [ ]; - -  nix.maxJobs = lib.mkDefault 4; -  # Use the GRUB 2 boot loader. -  boot.loader.grub.enable = true; -  boot.loader.grub.version = 2; -  # Define on which hard drive you want to install Grub. -  boot.loader.grub.device = "/dev/sda"; - -  # Enable the OpenSSH daemon. -  services.openssh.enable = true; - -  # Enable CUPS to print documents. -  # services.printing.enable = true; - -  fileSystems."/home/nin/.local/share/Steam" = { -    device = "/dev/fam/steam"; -  }; - -  # nin config -  time.timeZone = "Europe/Berlin"; -  services.xserver.enable = true; - -  networking.networkmanager.enable = true; -  #networking.wireless.enable = true; - -  hardware.pulseaudio = { -    enable = true; -    systemWide = true; -  }; - -  hardware.bluetooth.enable = true; - -  hardware.opengl.driSupport32Bit = true; - -  #nixpkgs.config.steam.java = true; - -  environment.systemPackages = with pkgs; [ -    firefox -    git -    lmms -    networkmanagerapplet -    python -    steam -    thunderbird -    vim -    virtmanager -  ]; - -  nixpkgs.config = { - -    allowUnfree = true; - -  }; - -  #services.logind.extraConfig = "HandleLidSwitch=ignore"; - -  services.xserver.synaptics = { -    enable = true; -  }; - - -  services.xserver.desktopManager.xfce = let -    xbindConfig = pkgs.writeText "xbindkeysrc" '' -      "${pkgs.pass}/bin/passmenu --type" -        Control + p -  ''; -  in { -    enable = true; -      extraSessionCommands = '' -      ${pkgs.xbindkeys}/bin/xbindkeys -f ${xbindConfig} -    ''; -  }; - - # The NixOS release to be compatible with for stateful data such as databases. -  system.stateVersion = "17.03"; - -} diff --git a/nin/1systems/onondaga/config.nix b/nin/1systems/onondaga/config.nix deleted file mode 100644 index 3cd0773..0000000 --- a/nin/1systems/onondaga/config.nix +++ /dev/null @@ -1,23 +0,0 @@ -# Edit this configuration file to define what should be installed on -# your system.  Help is available in the configuration.nix(5) man page -# and in the NixOS manual (accessible by running ‘nixos-help’). - -{ config, lib, pkgs, ... }: - -{ -  imports = [ -    <stockholm/nin> -    <stockholm/nin/2configs/retiolum.nix> -    <stockholm/nin/2configs/weechat.nix> -    <stockholm/nin/2configs/git.nix> -  ]; - -  krebs.build.host = config.krebs.hosts.onondaga; - -  boot.isContainer = true; -  networking.useDHCP = false; - -  time.timeZone = "Europe/Amsterdam"; - -  services.openssh.enable = true; -} diff --git a/nin/2configs/ableton.nix b/nin/2configs/ableton.nix deleted file mode 100644 index 343a908..0000000 --- a/nin/2configs/ableton.nix +++ /dev/null @@ -1,20 +0,0 @@ -{ config, pkgs, ... }: let -  mainUser = config.users.extraUsers.nin; -in { -  users.users= { -    ableton = { -      isNormalUser = true; -      extraGroups = [ -        "audio" -        "video" -      ]; -      packages = [ -        pkgs.wine -        pkgs.winetricks -      ]; -    }; -  }; -  security.sudo.extraConfig = '' -    ${mainUser.name} ALL=(ableton) NOPASSWD: ALL -  ''; -} diff --git a/nin/2configs/copyq.nix b/nin/2configs/copyq.nix deleted file mode 100644 index 0616c40..0000000 --- a/nin/2configs/copyq.nix +++ /dev/null @@ -1,38 +0,0 @@ -{ config, pkgs, ... }: -with import <stockholm/lib>; -let -  copyqConfig = pkgs.writeDash "copyq-config" '' -    ${pkgs.copyq}/bin/copyq config check_clipboard true -    ${pkgs.copyq}/bin/copyq config check_selection true -    ${pkgs.copyq}/bin/copyq config copy_clipboard true -    ${pkgs.copyq}/bin/copyq config copy_selection true - -    ${pkgs.copyq}/bin/copyq config activate_closes true -    ${pkgs.copyq}/bin/copyq config clipboard_notification_lines 0 -    ${pkgs.copyq}/bin/copyq config clipboard_tab clipboard -    ${pkgs.copyq}/bin/copyq config disable_tray true -    ${pkgs.copyq}/bin/copyq config hide_tabs true -    ${pkgs.copyq}/bin/copyq config hide_toolbar true -    ${pkgs.copyq}/bin/copyq config item_popup_interval true -    ${pkgs.copyq}/bin/copyq config maxitems 1000 -    ${pkgs.copyq}/bin/copyq config move true -    ${pkgs.copyq}/bin/copyq config text_wrap true -  ''; -in { -  systemd.user.services.copyq = { -    after = [ "graphical.target" ]; -    wants = [ "graphical.target" ]; -    wantedBy = [ "default.target" ]; -    environment = { -      DISPLAY = ":0"; -    }; -    serviceConfig = { -      SyslogIdentifier = "copyq"; -      ExecStart = "${pkgs.copyq}/bin/copyq"; -      ExecStartPost = copyqConfig; -      Restart = "always"; -      RestartSec = "2s"; -      StartLimitBurst = 0; -    }; -  }; -} diff --git a/nin/2configs/default.nix b/nin/2configs/default.nix deleted file mode 100644 index 62f499a..0000000 --- a/nin/2configs/default.nix +++ /dev/null @@ -1,173 +0,0 @@ -{ config, lib, pkgs, ... }: - -with import <stockholm/lib>; -{ -  imports = [ -    ../2configs/vim.nix -    <stockholm/krebs/2configs/binary-cache/nixos.nix> -    <stockholm/krebs/2configs/binary-cache/prism.nix> -    { -      users.extraUsers = -        mapAttrs (_: h: { hashedPassword = h; }) -                 (import <secrets/hashedPasswords.nix>); -    } -    { -      users.users = { -        root = { -          openssh.authorizedKeys.keys = [ -            config.krebs.users.nin.pubkey -            config.krebs.users.nin_h.pubkey -          ]; -        }; -        nin = { -          name = "nin"; -          uid = 1337; -          home = "/home/nin"; -          group = "users"; -          createHome = true; -          useDefaultShell = true; -          extraGroups = [ -            "audio" -            "fuse" -          ]; -          openssh.authorizedKeys.keys = [ -            config.krebs.users.nin.pubkey -            config.krebs.users.nin_h.pubkey -          ]; -        }; -      }; -    } -    { -      environment.variables = { -        NIX_PATH = mkForce "secrets=/var/src/stockholm/null:/var/src"; -      }; -    } -    (let ca-bundle = "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"; in { -      environment.variables = { -        CURL_CA_BUNDLE = ca-bundle; -        GIT_SSL_CAINFO = ca-bundle; -        SSL_CERT_FILE = ca-bundle; -      }; -    }) -  ]; - -  networking.hostName = config.krebs.build.host.name; -  nix.maxJobs = config.krebs.build.host.cores; - -  krebs = { -    enable = true; -    search-domain = "r"; -    build = { -      user = config.krebs.users.nin; -    }; -  }; - -  nix.useSandbox = true; - -  users.mutableUsers = false; - -  services.timesyncd.enable = true; - -  #why is this on in the first place? -  services.nscd.enable = false; - -  boot.tmpOnTmpfs = true; -  # see tmpfiles.d(5) -  systemd.tmpfiles.rules = [ -    "d /tmp 1777 root root - -"<  | 
