infra/nix/os/devices/steveej-t480s-work/system.nix

81 lines
1.8 KiB
Nix
Raw Normal View History

2018-11-05 00:05:45 +01:00
{ pkgs
, lib
, config
2018-11-05 00:05:45 +01:00
, ... }:
let
keys = import ../../../variables/keys.nix;
in {
2018-11-05 00:05:45 +01:00
# TASK: new device
networking.hostName = "steveej-t480s-work"; # Define your hostname.
# Used for testing local Openshift clusters
2018-11-05 00:05:45 +01:00
environment.etc."NetworkManager/dnsmasq.d/tectonic.conf".text = ''
server=/openshift.testing/192.168.126.1
2018-11-05 00:05:45 +01:00
'';
networking.firewall.enable = lib.mkForce false;
networking.firewall.checkReversePath = false;
networking.bridges."virbr1".interfaces = [];
networking.interfaces."virbr1".ipv4.addresses = [
{ address = "10.254.254.254"; prefixLength = 24; }
];
services.printing = {
enable = true;
drivers = with pkgs; [
hplip
cups-kyodialog3
mfcj6510dwlpr
mfcj6510dw-cupswrapper
mfcl3770cdw.driver
mfcl3770cdw.cupswrapper
2018-11-05 00:05:45 +01:00
];
};
services.fprintd.enable = true;
security.pam.services = {
login.fprintAuth = true;
sudo.fprintAuth = true;
};
2018-11-05 00:05:45 +01:00
# Kubernetes
# services.kubernetes.roles = ["master" "node"];
# virtualization
virtualisation = {
libvirtd = {
enable = true;
extraOptions = [
"--listen"
];
extraConfig = ''
listen_tls = 0
listen_tcp = 1
auth_tcp="none"
tcp_port = "16509"
'';
};
2018-11-05 00:05:45 +01:00
virtualbox.host.enable = true;
virtualbox.host.addNetworkInterface = true;
docker.enable = true;
};
boot.initrd.network = {
enable = true;
useDHCP = true;
udhcpc.extraArgs = [ "-x hostname:${config.networking.hostName}" ];
ssh = {
enable = true;
authorizedKeys = keys.users.steveej.openssh;
};
};
security.pki.certificateFiles = [
"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"
../../../../certificates/sat-r220-02.lab.eng.rdu2.redhat.com.crt
];
2018-11-05 00:05:45 +01:00
}