45 lines
1.1 KiB
Nix
45 lines
1.1 KiB
Nix
{ pkgs, modulesPath, ... }:
|
|
|
|
{
|
|
imports = [
|
|
(modulesPath + "/installer/cd-dvd/channel.nix")
|
|
];
|
|
|
|
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "e1000" "e1000e" "virtio_pci" "r8169" ];
|
|
boot.kernelParams = [
|
|
"panic=30" "boot.panic_on_fail" # reboot the machine upon fatal boot issues
|
|
"console=ttyS0,115200" # enable serial console
|
|
"console=tty1"
|
|
];
|
|
boot.kernel.sysctl."vm.overcommit_memory" = "1";
|
|
|
|
boot.kernelPackages = pkgs.linuxPackages_latest;
|
|
|
|
# hardware.enableAllFirmware = true;
|
|
# nixpkgs.config.allowUnfree = true;
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
cryptsetup
|
|
btrfs-progs
|
|
git git-lfs
|
|
wget
|
|
htop
|
|
dnsutils
|
|
pciutils
|
|
usbutils
|
|
lm_sensors
|
|
];
|
|
|
|
environment.variables.GC_INITIAL_HEAP_SIZE = "1M";
|
|
|
|
networking.useDHCP = true;
|
|
|
|
services.openssh = {
|
|
enable = true;
|
|
challengeResponseAuthentication = false;
|
|
passwordAuthentication = false;
|
|
};
|
|
|
|
services.getty.autologinUser = "root";
|
|
users.users.root.openssh.authorizedKeys.keys = (import ../../common/ssh.nix).users;
|
|
} |