forest/common/generic.nix

66 lines
2 KiB
Nix
Raw Normal View History

2023-10-02 17:47:47 +00:00
{ pkgs, ... }: rec {
2023-10-03 22:13:57 +00:00
imports = [
./cachix.nix
];
2023-10-02 17:47:47 +00:00
nix.settings.experimental-features = [ "nix-command" "flakes" ];
2023-10-02 17:47:47 +00:00
boot.tmp.cleanOnBoot = true;
2023-10-06 15:16:48 +00:00
boot.supportedFilesystems = [ "ntfs" ];
2023-10-02 17:47:47 +00:00
nix.settings.auto-optimise-store = true;
services.journald.extraConfig = ''
SystemMaxUse=100M
MaxFileSec=7day
'';
programs.fish.enable = true;
programs.htop = {
enable = true;
settings = {
hide_kernel_threads = true;
hide_userland_threads = true;
2023-11-14 09:38:28 +00:00
"screen:Main" = "PID USER PRIORITY NICE M_VIRT M_RESIDENT M_SHARE STATE PERCENT_CPU PERCENT_MEM TIME IO_RATE Command";
column_meters_1 = "Tasks LoadAverage Uptime DiskIO NetworkIO Systemd";
2023-10-02 17:47:47 +00:00
};
};
users.users.ash = {
description = "Ashley";
isNormalUser = true;
shell = pkgs.fish;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKGLHqRBcN584SXXa7snrOs89Wy5Jjvsq+GlFXTTBYfp ash@ash-pc"
2024-06-04 20:35:09 +00:00
"sk-ecdsa-sha2-nistp256@openssh.com AAAAInNrLWVjZHNhLXNoYTItbmlzdHAyNTZAb3BlbnNzaC5jb20AAAAIbmlzdHAyNTYAAABBBKx0GvYviMXBGtGN/V3t0uPkT6tmpQhtGbd1GzDoNe75K9ZorsrZaBbJBjg39yCVMkWnWjWYGd7R7GcV3fKeLGoAAAAEc3NoOg== ash@fern"
"sk-ecdsa-sha2-nistp256@openssh.com AAAAInNrLWVjZHNhLXNoYTItbmlzdHAyNTZAb3BlbnNzaC5jb20AAAAIbmlzdHAyNTYAAABBBGnb4PwF+hL21JY0ytFpkk/WaYM19Xv9efYQGdeba5a2RcElFKoEtklU4SUh+uhwaOz4TP3lWJUMEnfDDpFnmlwAAAAEc3NoOg== ash@alex"
2023-10-02 17:47:47 +00:00
];
hashedPassword = "$y$j9T$YZw49GYsZi6pm5MH3W2gX1$BKPBL3g4jAWUJP0WY0lRrBLorxzcENVqGTG0dAly3v7";
2024-01-10 20:30:37 +00:00
extraGroups = [ "wheel" "audio" "dialout" "adbusers" ];
2023-10-02 17:47:47 +00:00
};
security.doas.enable = true;
security.doas.wheelNeedsPassword = false;
users.users.root.openssh.authorizedKeys.keys = users.users.ash.openssh.authorizedKeys.keys;
users.mutableUsers = false;
console.keyMap = "uk";
2023-10-03 00:15:19 +00:00
environment.systemPackages = with pkgs; [
git
helix
2023-11-14 09:39:33 +00:00
lsof
tmux
2023-10-03 00:15:19 +00:00
];
2023-12-27 13:21:55 +00:00
nixpkgs.config.permittedInsecurePackages = [
"electron-25.9.0"
];
services.prometheus.exporters = {
systemd.enable = true;
node.enable = true;
};
2023-10-02 17:47:47 +00:00
}