This commit is contained in:
Peder Bergebakken Sundt 2024-10-19 20:41:39 +02:00
parent 527eccd87a
commit 12ac06d18c
8 changed files with 21 additions and 16 deletions

View File

@ -88,17 +88,17 @@
nix.settings.min-free = 3 * 1024 * 1024 * 1024; # starts cg
nix.settings.max-free = 20 * 1024 * 1024 * 1024; # condition to end gc triggered by min-free
services.thermald.enable = lib.mkIf (lib.all (x: x) [
(config.nixpkgs.system == "x86_64-linux")
(!config.boot.isContainer or false)
]) true;
services.thermald.enable = lib.all (x: x) [
(config.nixpkgs.system == "x86_64-linux")
(!config.boot.isContainer or false)
];
# no acme in VM mode:
virtualisation.vmVariant = {
/* users.users.root.initialPassword = "root"; */
security.acme.defaults.server = "https://127.0.0.1";
security.acme.preliminarySelfsigned = true;
};
/* users.users.root.initialPassword = "root"; */
security.acme.defaults.server = "https://127.0.0.1";
security.acme.preliminarySelfsigned = true;
};
# System fonts
# Nice to have when X-forwading on headless machines

View File

@ -5,7 +5,7 @@
nix.settings.allowed-users = [ "adrlau" ];
nix.settings.trusted-users = [ "adrlau" ];
users.users.adrlau = {
users.users."adrlau" = {
isNormalUser = true;
uid = 1007;
description = "Adrian";

View File

@ -4,7 +4,7 @@
nix.settings.allowed-users = [ "bartvbl" ];
nix.settings.trusted-users = [ "bartvbl" ];
users.users.bartvbl = {
users.users."bartvbl" = {
isNormalUser = true;
uid = 1004;
description = "Bart Iver van Blokland";

View File

@ -5,7 +5,7 @@
nix.settings.allowed-users = [ "daniel" ];
nix.settings.trusted-users = [ "daniel" ];
users.users.daniel = {
users.users."daniel" = {
isNormalUser = true;
uid = 1003;
description = "daniel";

View File

@ -5,7 +5,7 @@
nix.settings.allowed-users = [ "eirikwit" ];
nix.settings.trusted-users = [ "eirikwit" ];
users.users.eirikwit = {
users.users."eirikwit" = {
isNormalUser = true;
uid = 1005;
description = "eirik";

View File

@ -5,7 +5,7 @@
nix.settings.allowed-users = [ "h7x4" ];
nix.settings.trusted-users = [ "h7x4" ];
users.users.h7x4 = {
users.users."h7x4" = {
isNormalUser = true;
uid = 1006;
description = "Øystein";

View File

@ -5,7 +5,7 @@
nix.settings.allowed-users = [ "jornane" ];
nix.settings.trusted-users = [ "jornane" ];
users.users.jornane = {
users.users."jornane" = {
isNormalUser = true;
uid = 1002;
description = "jornane";

View File

@ -34,8 +34,8 @@
nix.settings.allowed-users = [ "pbsds" ];
nix.settings.trusted-users = [ "pbsds" ];
users.groups.pbsds.gid = 1001; # TODO: remove this, add a uid map to NFS instead
users.users.pbsds = {
users.groups."pbsds".gid = 1001; # TODO: remove this, add a uid map to NFS instead
users.users."pbsds" = {
isNormalUser = true;
uid = 1001; # TODO: uid mapping be done at nfs-mount level? That way we can enforce
description = "pbsds";
@ -82,4 +82,9 @@
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILocbYCqu63RT2+mE0l+ZWWw9RVHNcydtLXbLklg6oPe pederbs@pvv"
];
};
#virtualisation.vmVariant = {
# users.users."pbsds".initialHashedPassword = "TODO";
#}
}