blob: 23d82708c26911ecc16b43e95e22316ace4faef1 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
|
{ me, util, config, lib, pkgs, ... }:
{
imports = [
./nix.nix
./user.nix
./locale.nix
./nix-ld.nix
];
boot.kernelPackages = pkgs.linuxPackages_latest;
users.motd = ''
/^ /^
\ ' ' 7 < Hi, I'm ${util.titleCase me}
/ \
'';
networking = {
hostName = me;
firewall = {
enable = true;
allowedTCPPorts = [ 80 443 ];
trustedInterfaces = [ "tailscale0" ];
};
};
services.envfs.enable = true;
virtualisation = {
docker.enable = true;
oci-containers.backend = "docker";
};
services = {
openssh = {
enable = true;
settings = {
PasswordAuthentication = false;
KbdInteractiveAuthentication = false;
PermitRootLogin = "no";
};
};
tailscale = {
enable = true;
useRoutingFeatures = "both";
extraUpFlags = [ "--ssh" ];
};
# sometimes needed for gnupg
pcscd.enable = true;
};
programs = {
vim = {
defaultEditor = true;
package = pkgs.vim_configurable.customize {
vimrcFile = ../configs/.vimrc;
};
};
fish.enable = true;
git.enable = true;
tmux.enable = true;
gnupg.agent = {
enable = true;
enableSSHSupport = true;
pinentryPackage = pkgs.pinentry-curses;
};
};
environment.systemPackages = (with pkgs; [
file unzip jq dig htop glances wget gnupg pinentry-curses
inetutils pciutils lshw inxi iw
tcpdump
ffmpeg_7-headless
qemu_full virtiofsd
openvpn openvpn3 update-resolv-conf
ripgrep gnumake gdb gcc clang
go gopls delve go-task
meson cmake
nil direnv
wineWowPackages.stagingFull
borgbackup
]);
environment.etc.openvpn.source = "${pkgs.update-resolv-conf}/libexec/openvpn";
}
|