dotfiles/roles/workstation.nix

52 lines
1.4 KiB
Nix
Raw Normal View History

2017-02-02 16:31:19 +01:00
{ config, lib, pkgs, ... }:
{
imports = [
2018-03-11 19:21:08 +01:00
<yori-nix/roles/graphical.nix>
2017-02-02 16:31:19 +01:00
];
users.extraUsers.yorick.extraGroups = ["input"];
services.redshift = {
enable = true;
latitude = "51.8";
longitude = "5.8";
temperature = {
day = 6500;
night = 5500;
};
};
services.printing = {
enable = true;
drivers = [ pkgs.gutenprint ];
};
2018-03-11 18:28:25 +01:00
environment.systemPackages = [pkgs.ghostscript pkgs.yubikey-manager];
2018-05-12 18:14:28 +02:00
nix.gc.automatic = pkgs.lib.mkOverride 30 false;
#services.xserver.displayManager.sessionCommands = ''
# gpg-connect-agent /bye
# unset SSH_AGENT_PID
# export SSH_AUTH_SOCK="''${XDG_RUNTIME_DIR}/gnupg/S.gpg-agent.ssh"
#'';
2017-02-02 16:31:19 +01:00
virtualisation.virtualbox.host.enable = true;
yorick.support32bit = true;
2018-02-27 16:31:16 +01:00
nix.gc.automatic = pkgs.lib.mkOverride 30 false;
2018-03-10 17:15:37 +01:00
# yubikey
hardware.u2f.enable = true;
services.pcscd.enable = true;
2018-03-11 18:28:25 +01:00
#environment.systemPackages = [pkgs.yubikey-manager];
2017-02-02 16:31:19 +01:00
}
2018-05-12 18:13:48 +02:00
nix = {
gc.automatic = pkgs.lib.mkOverride 30 false;
binaryCaches = [
"https://cache.nixos.org"
];
trustedBinaryCaches = config.nix.binaryCaches ++ [
"https://builder.serokell.io"
"https://cache.lumi.guide"
];
binaryCachePublicKeys = [
"serokell:ic/49yTkeFIk4EBX1CZ/Wlt5fQfV7yCifaJyoM+S3Ss="
"cache.lumi.guide-1:z813xH+DDlh+wvloqEiihGvZqLXFmN7zmyF8wR47BHE="
];
#extraOptions = ''
# netrc-file = ${nixnetrc}
#'';
};