nixcfg/systems/x86_64-linux/nixtee1/default.nix
Harald Hoyer 43f72bf1ad feat(security): disable TPM2 support in nixtee1
- Disabled `security.tpm2.enable` and `security.tpm2.abrmd.enable` options.
- Ensures TPM2-related services are not active on the system for this configuration.
2025-11-14 07:44:38 +01:00

68 lines
1.3 KiB
Nix

{
pkgs,
lib,
...
}:
{
imports = [ ./hardware-configuration.nix ];
boot.kernelPackages = lib.mkOverride 0 pkgs.linuxPackages_latest;
boot.loader.systemd-boot.enable = false;
# Bootloader.
boot.loader.grub.enable = true;
boot.loader.grub.device = "/dev/vda";
boot.loader.grub.useOSProber = true;
security.tpm2.enable = false;
security.tpm2.abrmd.enable = false;
metacfg = {
base.enable = true;
nix-ld.enable = true;
nix.enable = true;
podman.enable = true;
user.extraGroups = [
"docker"
"sgx"
];
tools = {
direnv.enable = true;
};
};
virtualisation = {
docker.enable = true;
podman.dockerCompat = false;
};
system.autoUpgrade = {
enable = true;
operation = "switch";
allowReboot = true;
};
networking.wireless.enable = false; # Enables wireless support via wpa_supplicant.
networking.firewall.allowPing = true;
powerManagement.cpuFreqGovernor = "ondemand";
systemd.user.extraConfig = "DefaultLimitNOFILE=32768";
security.pam.loginLimits = [
{
domain = "*";
item = "nofile";
type = "-";
value = "32768";
}
{
domain = "*";
item = "memlock";
type = "-";
value = "32768";
}
];
system.stateVersion = "25.05";
}