pwntie: init
This commit is contained in:
parent
1749fc237a
commit
5b61f1d7f6
@ -180,6 +180,7 @@
|
|||||||
nixos-hardware.nixosModules.framework
|
nixos-hardware.nixosModules.framework
|
||||||
talon.nixosModules.talon
|
talon.nixosModules.talon
|
||||||
] "europa";
|
] "europa";
|
||||||
|
pwntie = buildSys "x86_64-linux" unstable [ ] "pwntie";
|
||||||
stan = buildSys "x86_64-linux" unstable [ ] "stan";
|
stan = buildSys "x86_64-linux" unstable [ ] "stan";
|
||||||
weather = buildSys "aarch64-linux" stable
|
weather = buildSys "aarch64-linux" stable
|
||||||
[ nixos-hardware.nixosModules.raspberry-pi-4 ] "weather";
|
[ nixos-hardware.nixosModules.raspberry-pi-4 ] "weather";
|
||||||
|
64
hosts/pwntie/default.nix
Normal file
64
hosts/pwntie/default.nix
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{ config, pkgs, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
pubKeys = [
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO7v+/xS8832iMqJHCWsxUZ8zYoMWoZhjj++e26g1fLT europa"
|
||||||
|
];
|
||||||
|
in {
|
||||||
|
_module.args.isUnstable = true;
|
||||||
|
imports = [ ./hardware-configuration.nix ];
|
||||||
|
|
||||||
|
# Bootloader.
|
||||||
|
boot.loader.systemd-boot.enable = true;
|
||||||
|
boot.loader.efi.canTouchEfiVariables = true;
|
||||||
|
boot.loader.efi.efiSysMountPoint = "/boot/efi";
|
||||||
|
|
||||||
|
networking = {
|
||||||
|
hostName = "pwntie";
|
||||||
|
networkmanager.enable = true;
|
||||||
|
firewall = {
|
||||||
|
enable = true;
|
||||||
|
allowedTCPPorts = [ 22 ];
|
||||||
|
checkReversePath = "loose";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
virtualisation.libvirtd.enable = true;
|
||||||
|
|
||||||
|
environment.sessionVariables = {
|
||||||
|
XDG_BIN_HOME = "\${HOME}/.local/bin";
|
||||||
|
XDG_CACHE_HOME = "\${HOME}/.cache";
|
||||||
|
XDG_CONFIG_HOME = "\${HOME}/.config";
|
||||||
|
XDG_DATA_HOME = "\${HOME}/.local/share";
|
||||||
|
|
||||||
|
STEAM_EXTRA_COMPAT_TOOLS_PATHS =
|
||||||
|
"\${HOME}/.steam/root/compatibilitytools.d";
|
||||||
|
PATH = [ "\${XDG_BIN_HOME}" ];
|
||||||
|
};
|
||||||
|
|
||||||
|
kde.enable = true;
|
||||||
|
users.users.qbit.extraGroups = [ "dialout" "libvirtd" "docker" ];
|
||||||
|
|
||||||
|
nixpkgs.config.allowUnfree = true;
|
||||||
|
|
||||||
|
programs = {
|
||||||
|
steam.enable = true;
|
||||||
|
_1password.enable = true;
|
||||||
|
_1password-gui = {
|
||||||
|
enable = true;
|
||||||
|
polkitPolicyOwners = [ "qbit" ];
|
||||||
|
};
|
||||||
|
dconf.enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
environment.systemPackages = with pkgs; [ neovim nixfmt jq ];
|
||||||
|
|
||||||
|
services.openssh = {
|
||||||
|
enable = true;
|
||||||
|
permitRootLogin = "prohibit-password";
|
||||||
|
};
|
||||||
|
|
||||||
|
users.users.root = { openssh.authorizedKeys.keys = pubKeys; };
|
||||||
|
|
||||||
|
system.stateVersion = "22.11";
|
||||||
|
}
|
40
hosts/pwntie/hardware-configuration.nix
Normal file
40
hosts/pwntie/hardware-configuration.nix
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||||
|
# and may be overwritten by future invocations. Please make changes
|
||||||
|
# to /etc/nixos/configuration.nix instead.
|
||||||
|
{ config, lib, pkgs, modulesPath, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
|
||||||
|
|
||||||
|
boot.initrd.availableKernelModules =
|
||||||
|
[ "nvme" "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
|
||||||
|
boot.initrd.kernelModules = [ ];
|
||||||
|
boot.kernelModules = [ "kvm-amd" ];
|
||||||
|
boot.extraModulePackages = [ ];
|
||||||
|
|
||||||
|
fileSystems."/" = {
|
||||||
|
device = "/dev/disk/by-uuid/dd7f2225-4c7a-4f40-8452-0aebf1a75aec";
|
||||||
|
fsType = "ext4";
|
||||||
|
};
|
||||||
|
|
||||||
|
fileSystems."/boot/efi" = {
|
||||||
|
device = "/dev/disk/by-uuid/2079-D1CE";
|
||||||
|
fsType = "vfat";
|
||||||
|
};
|
||||||
|
|
||||||
|
swapDevices =
|
||||||
|
[{ device = "/dev/disk/by-uuid/e14ac85b-d7b0-4a76-b9ab-a2c61fd67a5d"; }];
|
||||||
|
|
||||||
|
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||||
|
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||||
|
# still possible to use this option, but it's recommended to use it in conjunction
|
||||||
|
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||||
|
networking.useDHCP = lib.mkDefault true;
|
||||||
|
# networking.interfaces.enp10s0.useDHCP = lib.mkDefault true;
|
||||||
|
|
||||||
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
|
hardware.cpu.amd.updateMicrocode =
|
||||||
|
lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||||
|
# high-resolution display
|
||||||
|
hardware.video.hidpi.enable = lib.mkDefault true;
|
||||||
|
}
|
45
modules/mu.nix
Normal file
45
modules/mu.nix
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
{ config, lib, pkgs, ... }:
|
||||||
|
let
|
||||||
|
cfg = config.muServer;
|
||||||
|
mu = "${pkgs.mu}/bin/mu";
|
||||||
|
muInitScript = pkgs.writeScriptBin "mu-init-script" ''
|
||||||
|
#!${pkgs.runtimeShell}
|
||||||
|
|
||||||
|
set -eu
|
||||||
|
|
||||||
|
while true; do
|
||||||
|
if [ ! -d ${cfg.muHome} ]; then
|
||||||
|
${mu} init --muhome="${cfg.muHome}" --maildir="${cfg.mailDir}" --my-address="${cfg.emailAddress}"
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
'';
|
||||||
|
in {
|
||||||
|
options = with lib; {
|
||||||
|
muServer = {
|
||||||
|
enable = lib.mkEnableOption "Enable mu server";
|
||||||
|
muHome = lib.mkOption {
|
||||||
|
type = types.path;
|
||||||
|
default = "~/.mu";
|
||||||
|
};
|
||||||
|
mailDir = lib.mkOption {
|
||||||
|
type = types.path;
|
||||||
|
default = "~/Maildir";
|
||||||
|
};
|
||||||
|
emailAddress = lib.mkOption {
|
||||||
|
type = types.string;
|
||||||
|
default = "";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf config.muServer.enable {
|
||||||
|
environment.systemPackages = [ muInitScript ];
|
||||||
|
systemd.user.services.mu-server = {
|
||||||
|
script = "${muInitScript}";
|
||||||
|
wantedBy = [ "graphical-session.target" ];
|
||||||
|
partOf = [ "graphical-session.target" ];
|
||||||
|
after = [ "graphical-session.target" ];
|
||||||
|
serviceConfig = { Restart = "on-failure"; };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user