diff options
Diffstat (limited to 'lass/1systems')
| -rw-r--r-- | lass/1systems/archprism/config.nix | 328 | ||||
| -rw-r--r-- | lass/1systems/daedalus/config.nix | 5 | ||||
| -rw-r--r-- | lass/1systems/helios/config.nix | 39 | ||||
| -rw-r--r-- | lass/1systems/littleT/config.nix | 84 | ||||
| -rw-r--r-- | lass/1systems/littleT/source.nix (renamed from lass/1systems/archprism/source.nix) | 3 | ||||
| -rw-r--r-- | lass/1systems/mors/config.nix | 10 | ||||
| -rw-r--r-- | lass/1systems/prism/config.nix | 20 | ||||
| -rw-r--r-- | lass/1systems/xerxes/config.nix | 40 | ||||
| -rw-r--r-- | lass/1systems/xerxes/source.nix | 11 | 
9 files changed, 199 insertions, 341 deletions
| diff --git a/lass/1systems/archprism/config.nix b/lass/1systems/archprism/config.nix deleted file mode 100644 index 6411c423d..000000000 --- a/lass/1systems/archprism/config.nix +++ /dev/null @@ -1,328 +0,0 @@ -{ config, lib, pkgs, ... }: -with import <stockholm/lib>; - -let -  ip = config.krebs.build.host.nets.internet.ip4.addr; - -in { -  imports = [ -    <stockholm/lass> -    { -      networking.interfaces.et0.ip4 = [ -        { -          address = ip; -          prefixLength = 24; -        } -      ]; -      networking.defaultGateway = "213.239.205.225"; -      networking.nameservers = [ -        "8.8.8.8" -      ]; -      services.udev.extraRules = '' -        SUBSYSTEM=="net", ATTR{address}=="54:04:a6:7e:f4:06", NAME="et0" -      ''; -    } -    <stockholm/lass/2configs/retiolum.nix> -    <stockholm/lass/2configs/exim-smarthost.nix> -    #<stockholm/lass/2configs/downloading.nix> -    <stockholm/lass/2configs/ts3.nix> -    <stockholm/lass/2configs/bitlbee.nix> -    <stockholm/lass/2configs/weechat.nix> -    <stockholm/lass/2configs/privoxy-retiolum.nix> -    <stockholm/lass/2configs/radio.nix> -    <stockholm/lass/2configs/repo-sync.nix> -    <stockholm/lass/2configs/binary-cache/server.nix> -    <stockholm/lass/2configs/iodined.nix> -    <stockholm/lass/2configs/libvirt.nix> -    <stockholm/lass/2configs/hfos.nix> -    <stockholm/lass/2configs/monitoring/server.nix> -    <stockholm/lass/2configs/monitoring/monit-alarms.nix> -    <stockholm/lass/2configs/paste.nix> -    <stockholm/lass/2configs/syncthing.nix> -    #<stockholm/lass/2configs/reaktor-coders.nix> -    <stockholm/lass/2configs/ciko.nix> -    <stockholm/lass/2configs/container-networking.nix> -    #<stockholm/lass/2configs/reaktor-krebs.nix> -    #{ -    #  lass.pyload.enable = true; -    #} -    { -      imports = [ -        <stockholm/lass/2configs/bepasty.nix> -      ]; -      krebs.bepasty.servers."paste.r".nginx.extraConfig = '' -        if ( $server_addr = "${config.krebs.build.host.nets.internet.ip4.addr}" ) { -          return 403; -        } -      ''; -    } -    { -      users.extraGroups = { -        # ● systemd-tmpfiles-setup.service - Create Volatile Files and Directories -        #    Loaded: loaded (/nix/store/2l33gg7nmncqkpysq9f5fxyhlw6ncm2j-systemd-217/example/systemd/system/systemd-tmpfiles-setup.service) -        #    Active: failed (Result: exit-code) since Mon 2015-03-16 10:29:18 UTC; 4s ago -        #      Docs: man:tmpfiles.d(5) -        #            man:systemd-tmpfiles(8) -        #   Process: 19272 ExecStart=/nix/store/2l33gg7nmncqkpysq9f5fxyhlw6ncm2j-systemd-217/bin/systemd-tmpfiles --create --remove --boot --exclude-prefix=/dev (code=exited, status=1/FAILURE) -        #  Main PID: 19272 (code=exited, status=1/FAILURE) -        # -        # Mar 16 10:29:17 cd systemd-tmpfiles[19272]: [/usr/lib/tmpfiles.d/legacy.conf:26] Unknown group 'lock'. -        # Mar 16 10:29:18 cd systemd-tmpfiles[19272]: Two or more conflicting lines for /var/log/journal configured, ignoring. -        # Mar 16 10:29:18 cd systemd-tmpfiles[19272]: Two or more conflicting lines for /var/log/journal/7b35116927d74ea58785e00b47ac0f0d configured, ignoring. -        # Mar 16 10:29:18 cd systemd[1]: systemd-tmpfiles-setup.service: main process exited, code=exited, status=1/FAILURE -        # Mar 16 10:29:18 cd systemd[1]: Failed to start Create Volatile Files and Directories. -        # Mar 16 10:29:18 cd systemd[1]: Unit systemd-tmpfiles-setup.service entered failed state. -        # Mar 16 10:29:18 cd systemd[1]: systemd-tmpfiles-setup.service failed. -        # warning: error(s) occured while switching to the new configuration -        lock.gid = 10001; -      }; -    } -    { -      boot.loader.grub = { -        devices = [ -          "/dev/sda" -          "/dev/sdb" -        ]; -        splashImage = null; -      }; - -      boot.initrd.availableKernelModules = [ -        "ata_piix" -        "vmw_pvscsi" -      ]; - -      fileSystems."/" = { -        device = "/dev/pool/nix"; -        fsType = "ext4"; -      }; - -      fileSystems."/boot" = { -        device = "/dev/disk/by-uuid/7ca12d8c-606d-41ce-b10d-62b654e50e36"; -      }; - -      fileSystems."/var/download" = { -        device = "/dev/pool/download"; -      }; - -      fileSystems."/srv/http" = { -        device = "/dev/pool/http"; -      }; - -      fileSystems."/srv/o.ubikmedia.de-data" = { -        device = "/dev/pool/owncloud-ubik-data"; -      }; - -      fileSystems."/bku" = { -        device = "/dev/pool/bku"; -      }; - -      fileSystems."/tmp" = { -        device = "tmpfs"; -        fsType = "tmpfs"; -        options = ["nosuid" "nodev" "noatime"]; -      }; - -    } -    { -      sound.enable = false; -    } -    { -      nixpkgs.config.allowUnfree = true; -    } -    { -      #stuff for juhulian -      users.extraUsers.juhulian = { -        name = "juhulian"; -        uid = 1339; -        home = "/home/juhulian"; -        group = "users"; -        createHome = true; -        useDefaultShell = true; -        extraGroups = [ -        ]; -        openssh.authorizedKeys.keys = [ -          "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBQhLGvfv4hyQ/nqJGy1YgHXPSVl6igeWTroJSvAhUFgoh+rG+zvqY0EahKXNb3sq0/OYDCTJVuucc0hgCg7T2KqTqMtTb9EEkRmCFbD7F7DWZojCrh/an6sHneqT5eFvzAPZ8E5hup7oVQnj5P5M3I9keRHBWt1rq6q0IcOEhsFvne4qJc73aLASTJkxzlo5U8ju3JQOl6474ECuSn0lb1fTrQ/SR1NgF7jV11eBldkS8SHEB+2GXjn4Yrn+QUKOnDp+B85vZmVlJSI+7XR1/U/xIbtAjGTEmNwB6cTbBv9NCG9jloDDOZG4ZvzzHYrlBXjaigtQh2/4mrHoKa5eV juhulian@juhulian" -        ]; -      }; -      krebs.iptables.tables.filter.INPUT.rules = [ -        { predicate = "-p udp --dport 60000:61000"; target = "ACCEPT";} -      ]; -    } -    { -      environment.systemPackages = [ -        pkgs.perlPackages.Plack -      ]; -      krebs.iptables.tables.filter.INPUT.rules = [ -        { predicate = "-p tcp --dport 8080"; target = "ACCEPT";} -      ]; -    } -    { -      time.timeZone = "Europe/Berlin"; -    } -    { -      imports = [ -        <stockholm/lass/2configs/websites/domsen.nix> -        <stockholm/lass/2configs/websites/lassulus.nix> -      ]; -      krebs.iptables.tables.filter.INPUT.rules = [ -         { predicate = "-p tcp --dport http"; target = "ACCEPT"; } -         { predicate = "-p tcp --dport https"; target = "ACCEPT"; } -      ]; -    } -    { -      services.tor = { -        enable = true; -      }; -    } -    { -      lass.ejabberd = { -        enable = true; -        hosts = [ "lassul.us" ]; -      }; -      krebs.iptables.tables.filter.INPUT.rules = [ -        { predicate = "-p tcp --dport xmpp-client"; target = "ACCEPT"; } -        { predicate = "-p tcp --dport xmpp-server"; target = "ACCEPT"; } -      ]; -    } -    { -      imports = [ -        <stockholm/lass/2configs/realwallpaper.nix> -      ]; -      services.nginx.virtualHosts."lassul.us".locations."/wallpaper.png".extraConfig = '' -        alias /var/realwallpaper/realwallpaper.png; -      ''; -    } -    { -      environment.systemPackages = with pkgs; [ -        mk_sql_pair -      ]; -    } -    { -      users.users.tv = { -        uid = genid "tv"; -        inherit (config.krebs.users.tv) home; -        group = "users"; -        createHome = true; -        useDefaultShell = true; -        openssh.authorizedKeys.keys = [ -          config.krebs.users.tv.pubkey -        ]; -      }; -      users.users.makefu = { -        uid = genid "makefu"; -        isNormalUser = true; -        openssh.authorizedKeys.keys = [ -          config.krebs.users.makefu.pubkey -        ]; -      }; -      users.users.nin = { -        uid = genid "nin"; -        inherit (config.krebs.users.nin) home; -        group = "users"; -        createHome = true; -        useDefaultShell = true; -        openssh.authorizedKeys.keys = [ -          config.krebs.users.nin.pubkey -        ]; -        extraGroups = [ -          "libvirtd" -        ]; -      }; -    } -    { -      krebs.repo-sync.timerConfig = { -        OnBootSec = "15min"; -        OnUnitInactiveSec = "90min"; -        RandomizedDelaySec = "30min"; -      }; -      krebs.repo-sync.repos.stockholm.timerConfig = { -        OnBootSec = "5min"; -        OnUnitInactiveSec = "2min"; -        RandomizedDelaySec = "2min"; -      }; -    } -    { -      lass.usershadow = { -        enable = true; -      }; -    } -    #{ -    #  krebs.Reaktor.prism = { -    #    nickname = "Reaktor|lass"; -    #    channels = [ "#retiolum" ]; -    #    extraEnviron = { -    #      REAKTOR_HOST = "ni.r"; -    #    }; -    #    plugins = with pkgs.ReaktorPlugins; [ -    #      sed-plugin -    #    ]; -    #  }; -    #} -    { -      #stuff for dritter -      users.extraUsers.dritter = { -        name = "dritter"; -        uid = genid "dritter"; -        home = "/home/dritter"; -        group = "users"; -        createHome = true; -        useDefaultShell = true; -        extraGroups = [ -          "download" -        ]; -        openssh.authorizedKeys.keys = [ -          "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnqOWDDk7QkSAvrSLkEoz7dY22+xPyv5JDn2zlfUndfavmTMfZvPx9REMjgULbcCSM4m3Ncf40yUjciDpVleGoEz82+p/ObHAkVWPQyXRS3ZRM2IJJultBHEFc61+61Pi8k3p5pBhPPaig6VncJ4uUuuNqen9jqLesSTVXNtdntU2IvnC8B8k1Kq6fu9q1T2yEOMxkD31D5hVHlqAly0LdRiYvtsRIoCSmRvlpGl70uvPprhQxhtoiEUeDqmIL7BG9x7gU0Swdl7R0/HtFXlFuOwSlNYDmOf/Zrb1jhOpj4AlCliGUkM0iKIJhgH0tnJna6kfkGKHDwuzITGIh6SpZ dritter@Janeway" -        ]; -      }; -    } -    { -      #hotdog -      containers.hotdog = { -        config = { ... }: { -          services.openssh.enable = true; -          users.users.root.openssh.authorizedKeys.keys = [ -            config.krebs.users.lass.pubkey -          ]; -        }; -        enableTun = true; -        privateNetwork = true; -        hostAddress = "10.233.2.1"; -        localAddress = "10.233.2.2"; -      }; -    } -    { -      #kaepsele -      containers.kaepsele = { -        config = { ... }: { -          services.openssh.enable = true; -          users.users.root.openssh.authorizedKeys.keys = with config.krebs.users; [ -            lass.pubkey -            tv.pubkey -          ]; -        }; -        enableTun = true; -        privateNetwork = true; -        hostAddress = "10.233.2.3"; -        localAddress = "10.233.2.4"; -      }; -    } -    { -      #onondaga -      containers.onondaga = { -        config = { ... }: { -          services.openssh.enable = true; -          users.users.root.openssh.authorizedKeys.keys = [ -            config.krebs.users.lass.pubkey -            config.krebs.users.nin.pubkey -          ]; -        }; -        enableTun = true; -        privateNetwork = true; -        hostAddress = "10.233.2.4"; -        localAddress = "10.233.2.5"; -      }; -    } -  ]; - -  krebs.build.host = config.krebs.hosts.archprism; -} diff --git a/lass/1systems/daedalus/config.nix b/lass/1systems/daedalus/config.nix index 7b90ebb63..6674b3db5 100644 --- a/lass/1systems/daedalus/config.nix +++ b/lass/1systems/daedalus/config.nix @@ -37,6 +37,9 @@ with import <stockholm/lib>;          networkmanagerapplet          libreoffice          audacity +        zathura +        skype +        wine        ];        services.xserver.enable = true;        services.xserver.displayManager.lightdm.enable = true; @@ -52,8 +55,10 @@ with import <stockholm/lib>;            name = "bitcoin";            description = "user for bitcoin stuff";            home = "/home/bitcoin"; +          isNormalUser = true;            useDefaultShell = true;            createHome = true; +          extraGroups = [ "audio" ];          };        };        security.sudo.extraConfig = '' diff --git a/lass/1systems/helios/config.nix b/lass/1systems/helios/config.nix index c64789d8d..b14ef2a3e 100644 --- a/lass/1systems/helios/config.nix +++ b/lass/1systems/helios/config.nix @@ -10,8 +10,12 @@ with import <stockholm/lib>;      <stockholm/lass/2configs/pass.nix>      <stockholm/lass/2configs/retiolum.nix>      <stockholm/lass/2configs/otp-ssh.nix> -    <stockholm/lass/2configs/git.nix> +    # TODO fix krebs.git.rules.[definition 2-entry 2].lass not defined +    #<stockholm/lass/2configs/git.nix>      <stockholm/lass/2configs/dcso-vpn.nix> +    <stockholm/lass/2configs/virtualbox.nix> +    <stockholm/lass/2configs/dcso-dev.nix> +    <stockholm/lass/2configs/steam.nix>      { # automatic hardware detection        boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" "usb_storage" "sd_mod" "rtsx_pci_sdmmc" ];        boot.kernelModules = [ "kvm-intel" ]; @@ -59,6 +63,13 @@ with import <stockholm/lib>;          maxTime = 9001;        };      } +    { +      #urban terror port +      krebs.iptables.tables.filter.INPUT.rules = [ +        { predicate = "-p tcp --dport 27960"; target = "ACCEPT"; } +        { predicate = "-p udp --dport 27960"; target = "ACCEPT"; } +      ]; +    }    ];    krebs.build.host = config.krebs.hosts.helios; @@ -68,6 +79,16 @@ with import <stockholm/lib>;        repo = [ config.krebs.git.repos.stockholm ];        perm = with git; push "refs/heads/*" [ fast-forward non-fast-forward create delete merge ];      } +    { +      lass.umts = { +        enable = true; +        modem = "/dev/serial/by-id/usb-Lenovo_F5521gw_2C7D8D7C35FC7040-if09"; +        initstrings = '' +          Init1 = AT+CFUN=1 +          Init2 = AT+CGDCONT=1,"IP","pinternet.interkom.de","",0,0 +        ''; +      }; +    }    ];    # Use the systemd-boot EFI boot loader. @@ -80,7 +101,6 @@ with import <stockholm/lib>;    environment.systemPackages = with pkgs; [      ag      vim -    rxvt_unicode      git      rsync      hashPassword @@ -100,11 +120,16 @@ with import <stockholm/lib>;    services.xserver.videoDrivers = [ "nvidia" ];    services.xserver.xrandrHeads = [ -    { output = "DP-0.8"; } -    { output = "DP-4"; monitorConfig = ''Option "Rotate" "right"''; }      { output = "DP-2"; primary = true; } +    { output = "DP-4"; monitorConfig = ''Option "Rotate" "left"''; } +    { output = "DP-0"; }    ]; +  services.xserver.displayManager.sessionCommands = '' +    ${pkgs.xorg.xrandr}/bin/xrandr --output DP-6 --off --output DP-5 --off --output DP-4 --mode 2560x1440 --pos 3840x0 --rotate left --output DP-3 --off --output DP-2 --primary --mode 3840x2160 --pos 0x400 --rotate normal --output DP-1 --off --output DP-0 --mode 2560x1440 --pos 5280x1120 --rotate normal +    ${pkgs.systemd}/bin/systemctl start xresources.service +  ''; +    networking.hostName = lib.mkForce "BLN02NB0162";    security.pki.certificateFiles = [ @@ -123,8 +148,6 @@ with import <stockholm/lib>;    programs.adb.enable = true;    users.users.mainUser.extraGroups = [ "adbusers" ]; -  services.printing = { -    enable = true; -    drivers = [ pkgs.postscript-lexmark ]; -  }; +  services.printing.drivers = [ pkgs.postscript-lexmark ]; +  } diff --git a/lass/1systems/littleT/config.nix b/lass/1systems/littleT/config.nix new file mode 100644 index 000000000..7211c78eb --- /dev/null +++ b/lass/1systems/littleT/config.nix @@ -0,0 +1,84 @@ +with import <stockholm/lib>; +{ config, pkgs, ... }: + +{ +  imports = [ +    <stockholm/lass> +    <stockholm/lass/2configs/hw/x220.nix> +    <stockholm/lass/2configs/boot/stock-x220.nix> + +    <stockholm/lass/2configs/retiolum.nix> +    <stockholm/lass/2configs/backups.nix> +    <stockholm/lass/2configs/steam.nix> +    { +      users.users.blacky = { +        uid = genid "blacky"; +        home = "/home/blacky"; +        group = "users"; +        createHome = true; +        extraGroups = [ +          "audio" +          "networkmanager" +          "video" +        ]; +        useDefaultShell = true; +      }; +      networking.networkmanager.enable = true; +      networking.wireless.enable = mkForce false; +      hardware.pulseaudio = { +        enable = true; +        systemWide = true; +      }; +      environment.systemPackages = with pkgs; [ +        pavucontrol +        chromium +        hexchat +        networkmanagerapplet +        vlc +      ]; +      services.xserver.enable = true; +      services.xserver.displayManager.lightdm.enable = true; +      services.xserver.desktopManager.plasma5.enable = true; +      services.xserver.layout = "de"; +      users.mutableUsers = mkForce true; +      services.xserver.synaptics.enable = true; +    } +    { +      #remote control +      environment.systemPackages = with pkgs; [ +        x11vnc +      ]; +      krebs.iptables.tables.filter.INPUT.rules = [ +        { predicate = "-p tcp -i retiolum --dport 5900"; target = "ACCEPT"; } +      ]; +    } +  ]; + +  time.timeZone = "Europe/Berlin"; + +  hardware.trackpoint = { +    enable = true; +    sensitivity = 220; +    speed = 0; +    emulateWheel = true; +  }; + +  services.logind.extraConfig = '' +    HandleLidSwitch=ignore +  ''; + +  krebs.build.host = config.krebs.hosts.littleT; + +  #fileSystems = { +  #  "/bku" = { +  #    device = "/dev/mapper/pool-bku"; +  #    fsType = "btrfs"; +  #    options = ["defaults" "noatime" "ssd" "compress=lzo"]; +  #  }; +  #}; + +  #services.udev.extraRules = '' +  #  SUBSYSTEM=="net", ATTR{address}=="08:11:96:0a:5d:6c", NAME="wl0" +  #  SUBSYSTEM=="net", ATTR{address}=="f0:de:f1:71:cb:35", NAME="et0" +  #''; +} diff --git a/lass/1systems/archprism/source.nix b/lass/1systems/littleT/source.nix index 3e96c1d38..a86b8fd10 100644 --- a/lass/1systems/archprism/source.nix +++ b/lass/1systems/littleT/source.nix @@ -1,3 +1,4 @@  import <stockholm/lass/source.nix> { -  name = "archprism"; +  name = "littleT"; +  secure = true;  } diff --git a/lass/1systems/mors/config.nix b/lass/1systems/mors/config.nix index 6a61ce1fa..ad133802f 100644 --- a/lass/1systems/mors/config.nix +++ b/lass/1systems/mors/config.nix @@ -29,7 +29,7 @@ with import <stockholm/lib>;      <stockholm/lass/2configs/syncthing.nix>      <stockholm/lass/2configs/otp-ssh.nix>      <stockholm/lass/2configs/c-base.nix> -    <stockholm/tv/2configs/br.nix> +    <stockholm/lass/2configs/br.nix>      {        #risk of rain port        krebs.iptables.tables.filter.INPUT.rules = [ @@ -135,6 +135,8 @@ with import <stockholm/lib>;      macchanger      dpass + +    dnsutils    ];    #TODO: fix this shit @@ -177,7 +179,7 @@ with import <stockholm/lib>;          echo 'secrets are crypted' >&2          exit 23        else -        exec nix-shell -I stockholm="$PWD" --run 'deploy --system="$SYSTEM"' +        exec nix-shell -I stockholm="$PWD" --run 'deploy --diff --system="$SYSTEM"'        fi      '';      predeploy = pkgs.writeDash "predeploy" '' @@ -192,4 +194,8 @@ with import <stockholm/lib>;        exec nix-shell -I stockholm="$PWD" --run 'test --system="$SYSTEM" --target="$SYSTEM/var/test/" --force-populate'      '';    }; + +  #nix.package = pkgs.nixUnstable; +  programs.adb.enable = true; +  users.users.mainUser.extraGroups = [ "adbusers" ];  } diff --git a/lass/1systems/prism/config.nix b/lass/1systems/prism/config.nix index a0bc1b900..87270b8b8 100644 --- a/lass/1systems/prism/config.nix +++ b/lass/1systems/prism/config.nix @@ -67,6 +67,11 @@ in {          fsType = "ext4";        }; +      fileSystems."/bku" = { +        device = "/dev/pool/bku"; +        fsType = "ext4"; +      }; +        swapDevices = [          { label = "swap1"; }          { label = "swap2"; } @@ -220,8 +225,8 @@ in {          };          enableTun = true;          privateNetwork = true; -        hostAddress = "10.233.2.4"; -        localAddress = "10.233.2.5"; +        hostAddress = "10.233.2.5"; +        localAddress = "10.233.2.6";        };      }      <stockholm/lass/2configs/exim-smarthost.nix> @@ -280,6 +285,17 @@ in {          { predicate = "-p udp --dport 25565"; target = "ACCEPT"; }        ];      } +    <stockholm/krebs/2configs/reaktor-krebs.nix> +    <stockholm/lass/2configs/dcso-dev.nix> +    { +      krebs.git.rules = [ +        { +          user = [ config.krebs.users.jeschli ]; +          repo = [ config.krebs.git.repos.stockholm ]; +          perm = with git; push "refs/heads/staging/jeschli" [ fast-forward non-fast-forward create delete merge ]; +        } +      ]; +    }    ];    krebs.build.host = config.krebs.hosts.prism; diff --git a/lass/1systems/xerxes/config.nix b/lass/1systems/xerxes/config.nix new file mode 100644 index 000000000..0669748f5 --- /dev/null +++ b/lass/1systems/xerxes/config.nix @@ -0,0 +1,40 @@ +{ config, pkgs, ... }: + +{ +  imports = [ +    <stockholm/lass> +    <stockholm/lass/2configs/hw/gpd-pocket.nix> +    <stockholm/lass/2configs/boot/stock-x220.nix> + +    <stockholm/lass/2configs/retiolum.nix> +    <stockholm/lass/2configs/exim-retiolum.nix> +    <stockholm/lass/2configs/baseX.nix> +    <stockholm/lass/2configs/browsers.nix> +    <stockholm/lass/2configs/programs.nix> +    <stockholm/lass/2configs/fetchWallpaper.nix> +  ]; + +  krebs.build.host = config.krebs.hosts.xerxes; + +  services.udev.extraRules = '' +    SUBSYSTEM=="net", ATTR{address}=="b0:f1:ec:9f:5c:78", NAME="wl0" +  ''; + +  fileSystems."/" = { +    device = "/dev/disk/by-uuid/d227d88f-bd24-4e8a-aa14-9e966b471437"; +    fsType = "btrfs"; +  }; + +  fileSystems."/boot" = { +    device = "/dev/disk/by-uuid/16C8-D053"; +    fsType = "vfat"; +  }; + +  fileSystems."/home" = { +    device = "/dev/disk/by-uuid/1ec4193b-7f41-490d-8782-7677d437b358"; +    fsType = "btrfs"; +  }; + +  boot.initrd.luks.devices = [ { name = "luksroot"; device = "/dev/disk/by-uuid/d17f19a3-dcba-456d-b5da-e45cc15dc9c8"; } ]; +  networking.wireless.enable = true; +} diff --git a/lass/1systems/xerxes/source.nix b/lass/1systems/xerxes/source.nix new file mode 100644 index 000000000..11f5bf796 --- /dev/null +++ b/lass/1systems/xerxes/source.nix @@ -0,0 +1,11 @@ +with import <stockholm/lib>; +import <stockholm/lass/source.nix> { +  name = "xerxes"; +  secure = true; +  override = { +    nixpkgs.git = mkForce { +      url = https://github.com/lassulus/nixpkgs; +      ref = "3eccd0b"; +    }; +  }; +} | 
