cleanup
This commit is contained in:
parent
527eccd87a
commit
12ac06d18c
16
base.nix
16
base.nix
|
@ -88,17 +88,17 @@
|
|||
nix.settings.min-free = 3 * 1024 * 1024 * 1024; # starts cg
|
||||
nix.settings.max-free = 20 * 1024 * 1024 * 1024; # condition to end gc triggered by min-free
|
||||
|
||||
services.thermald.enable = lib.mkIf (lib.all (x: x) [
|
||||
(config.nixpkgs.system == "x86_64-linux")
|
||||
(!config.boot.isContainer or false)
|
||||
]) true;
|
||||
services.thermald.enable = lib.all (x: x) [
|
||||
(config.nixpkgs.system == "x86_64-linux")
|
||||
(!config.boot.isContainer or false)
|
||||
];
|
||||
|
||||
# no acme in VM mode:
|
||||
virtualisation.vmVariant = {
|
||||
/* users.users.root.initialPassword = "root"; */
|
||||
security.acme.defaults.server = "https://127.0.0.1";
|
||||
security.acme.preliminarySelfsigned = true;
|
||||
};
|
||||
/* users.users.root.initialPassword = "root"; */
|
||||
security.acme.defaults.server = "https://127.0.0.1";
|
||||
security.acme.preliminarySelfsigned = true;
|
||||
};
|
||||
|
||||
# System fonts
|
||||
# Nice to have when X-forwading on headless machines
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
nix.settings.allowed-users = [ "adrlau" ];
|
||||
nix.settings.trusted-users = [ "adrlau" ];
|
||||
|
||||
users.users.adrlau = {
|
||||
users.users."adrlau" = {
|
||||
isNormalUser = true;
|
||||
uid = 1007;
|
||||
description = "Adrian";
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
nix.settings.allowed-users = [ "bartvbl" ];
|
||||
nix.settings.trusted-users = [ "bartvbl" ];
|
||||
|
||||
users.users.bartvbl = {
|
||||
users.users."bartvbl" = {
|
||||
isNormalUser = true;
|
||||
uid = 1004;
|
||||
description = "Bart Iver van Blokland";
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
nix.settings.allowed-users = [ "daniel" ];
|
||||
nix.settings.trusted-users = [ "daniel" ];
|
||||
|
||||
users.users.daniel = {
|
||||
users.users."daniel" = {
|
||||
isNormalUser = true;
|
||||
uid = 1003;
|
||||
description = "daniel";
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
nix.settings.allowed-users = [ "eirikwit" ];
|
||||
nix.settings.trusted-users = [ "eirikwit" ];
|
||||
|
||||
users.users.eirikwit = {
|
||||
users.users."eirikwit" = {
|
||||
isNormalUser = true;
|
||||
uid = 1005;
|
||||
description = "eirik";
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
nix.settings.allowed-users = [ "h7x4" ];
|
||||
nix.settings.trusted-users = [ "h7x4" ];
|
||||
|
||||
users.users.h7x4 = {
|
||||
users.users."h7x4" = {
|
||||
isNormalUser = true;
|
||||
uid = 1006;
|
||||
description = "Øystein";
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
nix.settings.allowed-users = [ "jornane" ];
|
||||
nix.settings.trusted-users = [ "jornane" ];
|
||||
|
||||
users.users.jornane = {
|
||||
users.users."jornane" = {
|
||||
isNormalUser = true;
|
||||
uid = 1002;
|
||||
description = "jornane";
|
||||
|
|
|
@ -34,8 +34,8 @@
|
|||
nix.settings.allowed-users = [ "pbsds" ];
|
||||
nix.settings.trusted-users = [ "pbsds" ];
|
||||
|
||||
users.groups.pbsds.gid = 1001; # TODO: remove this, add a uid map to NFS instead
|
||||
users.users.pbsds = {
|
||||
users.groups."pbsds".gid = 1001; # TODO: remove this, add a uid map to NFS instead
|
||||
users.users."pbsds" = {
|
||||
isNormalUser = true;
|
||||
uid = 1001; # TODO: uid mapping be done at nfs-mount level? That way we can enforce
|
||||
description = "pbsds";
|
||||
|
@ -82,4 +82,9 @@
|
|||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILocbYCqu63RT2+mE0l+ZWWw9RVHNcydtLXbLklg6oPe pederbs@pvv"
|
||||
];
|
||||
};
|
||||
|
||||
#virtualisation.vmVariant = {
|
||||
# users.users."pbsds".initialHashedPassword = "TODO";
|
||||
#}
|
||||
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue