System : Add fsight.

This commit is contained in:
Dmitry Voronin 2024-02-07 20:54:14 +03:00
parent a34131dbe6
commit c87b82bd63
4 changed files with 64 additions and 13 deletions

View file

@ -14,6 +14,7 @@
./module/common/Nix.nix
./module/common/Package.nix
./module/common/Root.nix
./module/common/Sshd.nix
./module/common/Swap.nix
./module/common/Users.nix
];
@ -29,7 +30,6 @@
./module/Gnome.nix
./module/PowersaveIntel.nix
./module/Print.nix
./module/Sshd.nix
];
specialArgs.inputs = inputs;
system = "x86_64-linux";
@ -45,7 +45,6 @@
./module/Gnome.nix
./module/PowersaveAmd.nix
./module/Print.nix
./module/Sshd.nix
./module/VirtManager.nix
./module/Voronind.nix
];
@ -53,6 +52,16 @@
system = "x86_64-linux";
};
nixosConfigurations.fsight = nixpkgs.lib.nixosSystem {
modules = [
self.nixosModules.common
./host/fsight/Configuration.nix
./module/Docker.nix
];
specialArgs.inputs = inputs;
system = "x86_64-linux";
};
nixosConfigurations.home = nixpkgs.lib.nixosSystem {
modules = [
self.nixosModules.common
@ -63,7 +72,6 @@
./module/Ftpd.nix
./module/Gnome.nix
./module/PowersaveAmd.nix
./module/Sshd.nix
./module/Voronind.nix
];
specialArgs.inputs = inputs;
@ -81,7 +89,6 @@
./module/Gnome.nix
./module/PowersaveAmd.nix
./module/Print.nix
./module/Sshd.nix
./module/Voronind.nix
];
specialArgs.inputs = inputs;
@ -98,7 +105,6 @@
./module/PowersaveIntel.nix
./module/Powerlimit.nix
./module/Print.nix
./module/Sshd.nix
./module/Voronind.nix
];
specialArgs.inputs = inputs;

View file

@ -0,0 +1,16 @@
{ config, pkgs, lib, ... }:
{
imports = [
./HardwareConfiguration.nix
];
# Root password.
users.users.root.hashedPassword = lib.mkForce "$y$j9T$d4HfwutZr.eNHuLJYRuro/$7swZfgCNS6jEXHFCxsW5um/68jX9BRiiZD1BYcm/gD/";
# Network.
networking.hostName = "fsight";
# Do not touch ever.
system.stateVersion = "23.11";
}

View file

@ -0,0 +1,29 @@
# Do not modify this file! It was generated by ‘nixos-generate-config’
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports = [ ];
boot.initrd.availableKernelModules = [ "ata_piix" "mptspi" "sd_mod" "sr_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/a0a14d13-561e-4182-8a9a-4ef2c5be1b8b";
fsType = "ext4";
};
swapDevices = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.ens32.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
}

View file

@ -13,22 +13,22 @@
];
settings = {
AllowUsers = [ "root" ];
PermitRootLogin = "yes";
LoginGraceTime = "1m";
StrictModes = false;
MaxAuthTries = 1;
MaxSessions = 10;
PermitRootLogin = "yes";
StrictModes = false;
UsePAM = true;
UseDns = false;
UsePAM = true;
PasswordAuthentication = true;
GSSAPIAuthentication = false;
HostbasedAuthentication = false;
KbdInteractiveAuthentication = true;
KerberosAuthentication = false;
PasswordAuthentication = true;
PermitEmptyPasswords = false;
PubkeyAuthentication = false;
HostbasedAuthentication = false;
KerberosAuthentication = false;
GSSAPIAuthentication = false;
};
};
}