2018-11-05 00:05:45 +01:00
|
|
|
{ pkgs
|
|
|
|
, lib
|
2018-11-12 20:20:36 +01:00
|
|
|
, config
|
2018-11-05 00:05:45 +01:00
|
|
|
, ... }:
|
|
|
|
|
2018-11-12 20:20:36 +01:00
|
|
|
let
|
|
|
|
keys = import ../../../variables/keys.nix;
|
|
|
|
in {
|
|
|
|
|
2018-11-05 00:05:45 +01:00
|
|
|
# TASK: new device
|
|
|
|
networking.hostName = "steveej-t480s-work"; # Define your hostname.
|
|
|
|
|
2018-12-17 13:15:21 +01:00
|
|
|
# Used for testing local Openshift clusters
|
2019-04-20 14:44:15 +02:00
|
|
|
environment.etc."NetworkManager/dnsmasq.d/openshift.conf".text =
|
|
|
|
let
|
|
|
|
openshiftClusterName = "openshift-steveej";
|
|
|
|
openshiftDomain = "openshift.testing";
|
|
|
|
openshiftSubnetBase = "192.168.126";
|
|
|
|
in ''
|
|
|
|
server=/${openshiftDomain}/${openshiftSubnetBase}.1
|
|
|
|
address=/.apps.${openshiftClusterName}.${openshiftDomain}/${openshiftSubnetBase}.51
|
2018-11-05 00:05:45 +01:00
|
|
|
'';
|
|
|
|
networking.firewall.enable = lib.mkForce false;
|
|
|
|
networking.firewall.checkReversePath = false;
|
|
|
|
|
|
|
|
networking.bridges."virbr1".interfaces = [];
|
|
|
|
networking.interfaces."virbr1".ipv4.addresses = [
|
|
|
|
{ address = "10.254.254.254"; prefixLength = 24; }
|
|
|
|
];
|
|
|
|
|
|
|
|
services.printing = {
|
|
|
|
enable = true;
|
|
|
|
drivers = with pkgs; [
|
|
|
|
hplip
|
|
|
|
cups-kyodialog3
|
|
|
|
mfcj6510dwlpr
|
|
|
|
mfcj6510dw-cupswrapper
|
2019-01-26 12:19:25 +01:00
|
|
|
mfcl3770cdw.driver
|
|
|
|
mfcl3770cdw.cupswrapper
|
2018-11-05 00:05:45 +01:00
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2018-12-17 13:18:49 +01:00
|
|
|
services.fprintd.enable = true;
|
|
|
|
security.pam.services = {
|
|
|
|
login.fprintAuth = true;
|
|
|
|
sudo.fprintAuth = true;
|
|
|
|
};
|
2018-11-05 00:05:45 +01:00
|
|
|
|
|
|
|
# Kubernetes
|
|
|
|
# services.kubernetes.roles = ["master" "node"];
|
|
|
|
|
|
|
|
# virtualization
|
|
|
|
virtualisation = {
|
2018-12-17 13:15:21 +01:00
|
|
|
libvirtd = {
|
|
|
|
enable = true;
|
|
|
|
};
|
2019-12-10 18:29:43 +01:00
|
|
|
|
|
|
|
virtualbox.host = {
|
|
|
|
enable = false ;
|
|
|
|
addNetworkInterface = false;
|
|
|
|
};
|
|
|
|
|
2019-10-30 21:30:50 +01:00
|
|
|
docker = {
|
|
|
|
enable = true;
|
|
|
|
extraOptions = "--experimental";
|
|
|
|
};
|
2018-11-05 00:05:45 +01:00
|
|
|
};
|
2018-11-12 20:20:36 +01:00
|
|
|
|
2019-10-30 21:30:50 +01:00
|
|
|
|
2018-11-12 20:20:36 +01:00
|
|
|
boot.initrd.network = {
|
|
|
|
enable = true;
|
|
|
|
useDHCP = true;
|
|
|
|
udhcpc.extraArgs = [ "-x hostname:${config.networking.hostName}" ];
|
|
|
|
|
|
|
|
ssh = {
|
|
|
|
enable = true;
|
|
|
|
authorizedKeys = keys.users.steveej.openssh;
|
|
|
|
};
|
|
|
|
};
|
2019-02-03 01:47:17 +01:00
|
|
|
|
|
|
|
security.pki.certificateFiles = [
|
|
|
|
"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"
|
|
|
|
../../../../certificates/sat-r220-02.lab.eng.rdu2.redhat.com.crt
|
|
|
|
];
|
2020-02-18 11:01:20 +01:00
|
|
|
|
|
|
|
services.xserver.videoDrivers = [ "modesetting" ];
|
2020-10-16 10:03:17 +02:00
|
|
|
services.xserver.serverFlagsSection = ''
|
|
|
|
Option "BlankTime" "0"
|
|
|
|
Option "StandbyTime" "0"
|
|
|
|
Option "SuspendTime" "0"
|
|
|
|
Option "OffTime" "0"
|
|
|
|
'';
|
2020-02-18 11:01:20 +01:00
|
|
|
boot.kernelPackages = lib.mkForce pkgs.linuxPackages;
|
2020-02-26 21:41:38 +01:00
|
|
|
|
|
|
|
krb5 = {
|
|
|
|
enable = true;
|
|
|
|
config = let
|
|
|
|
pkinit_crt = pkgs.fetchurl {
|
|
|
|
url = "https://password.corp.redhat.com/ipa.crt";
|
|
|
|
sha256 = "0cflhkb7szzlakjmz2rmw8l8j5jqsyy2rl7ciclmi5fdfjrrx1cd";
|
|
|
|
};
|
|
|
|
in ''
|
|
|
|
[libdefaults]
|
|
|
|
default_realm = IPA.REDHAT.COM
|
|
|
|
dns_lookup_realm = true
|
|
|
|
dns_lookup_kdc = true
|
|
|
|
rdns = false
|
|
|
|
dns_canonicalize_hostname = true
|
|
|
|
ticket_lifetime = 24h
|
|
|
|
forwardable = true
|
|
|
|
udp_preference_limit = 0
|
|
|
|
default_ccache_name = KEYRING:persistent:%{uid}
|
|
|
|
|
|
|
|
[realms]
|
|
|
|
REDHAT.COM = {
|
|
|
|
default_domain = redhat.com
|
|
|
|
dns_lookup_kdc = true
|
|
|
|
master_kdc = kerberos.corp.redhat.com
|
|
|
|
admin_server = kerberos.corp.redhat.com
|
|
|
|
}
|
|
|
|
|
|
|
|
#make sure to save the IPA CA cert
|
|
|
|
#mkdir /etc/ipa && curl -o /etc/ipa/ca.crt https://password.corp.redhat.com/ipa.crt
|
|
|
|
IPA.REDHAT.COM = {
|
|
|
|
pkinit_anchors = FILE:${pkinit_crt}
|
|
|
|
pkinit_pool = FILE:${pkinit_crt}
|
|
|
|
default_domain = ipa.redhat.com
|
|
|
|
dns_lookup_kdc = true
|
|
|
|
# Trust tickets issued by legacy realm on this host
|
|
|
|
auth_to_local = RULE:[1:$1@$0](.*@REDHAT\.COM)s/@.*//
|
|
|
|
auth_to_local = DEFAULT
|
|
|
|
}
|
|
|
|
'';
|
|
|
|
};
|
2018-11-05 00:05:45 +01:00
|
|
|
}
|