-{ pkgs, lib, ... }:
+{ pkgs, lib, config, name, ... }:
{
config = {
services.duplyBackup.profiles.system = {
- /var/lib
'';
};
- nixpkgs.overlays = builtins.attrValues (import ../../overlays);
+ nixpkgs.overlays = builtins.attrValues (import ../../overlays) ++ [
+ (self: super: { postgresql = self.postgresql_pam; }) # don’t put it as generic overlay for home-manager
+ ];
_module.args = {
pkgsNext = import <nixpkgsNext> {};
pkgsPrevious = import <nixpkgsPrevious> {};
MaxRetentionSec="1year"
'';
+ users.users =
+ builtins.listToAttrs (map (x: lib.attrsets.nameValuePair x.name ({
+ isNormalUser = true;
+ home = "/home/${x.name}";
+ createHome = true;
+ linger = true;
+ } // x)) (config.hostEnv.users pkgs))
+ // {
+ root.packages = let
+ nagios-cli = pkgs.writeScriptBin "nagios-cli" ''
+ #!${pkgs.stdenv.shell}
+ sudo -u naemon ${pkgs.nagios-cli}/bin/nagios-cli -c ${./monitoring/nagios-cli.cfg}
+ '';
+ in
+ [
+ pkgs.telnet
+ pkgs.htop
+ pkgs.iftop
+ pkgs.bind.dnsutils
+ pkgs.httpie
+ pkgs.iotop
+ pkgs.whois
+ pkgs.ngrep
+ pkgs.tcpdump
+ pkgs.tshark
+ pkgs.tcpflow
+ pkgs.mitmproxy
+ pkgs.nmap
+ pkgs.p0f
+ pkgs.socat
+ pkgs.lsof
+ pkgs.psmisc
+ pkgs.openssl
+ pkgs.wget
+
+ pkgs.cnagios
+ nagios-cli
+ ];
+ };
+
users.mutableUsers = false;
- users.users.root.packages = [
- pkgs.telnet
- pkgs.htop
- pkgs.iftop
- pkgs.bind.dnsutils
- pkgs.httpie
- pkgs.iotop
- pkgs.whois
- pkgs.ngrep
- pkgs.tcpdump
- pkgs.tshark
- pkgs.tcpflow
- pkgs.mitmproxy
- pkgs.nmap
- pkgs.p0f
- pkgs.socat
- pkgs.lsof
- pkgs.psmisc
- pkgs.wget
- ];
+ environment.etc.cnagios.source = "${pkgs.cnagios}/share/doc/cnagios";
environment.systemPackages = [
+ pkgs.git
pkgs.vim
- ];
-
+ ] ++
+ (lib.optional (builtins.length (config.hostEnv.users pkgs) > 0) pkgs.home-manager);
};
}