nixos-config/base.nix

74 lines
1.5 KiB
Nix
Raw Normal View History

2023-01-20 20:21:16 +01:00
{ config, lib, pkgs, inputs, values, ... }:
{
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
networking = {
domain = "home.feal.no";
useDHCP = false;
};
time.timeZone = "Europe/Oslo";
i18n.defaultLocale = "en_US.UTF-8";
console = {
font = "Lat2-Terminus16";
keyMap = "no";
};
nix = {
gc = {
automatic = true;
options = "--delete-older-than 2d";
};
settings.experimental-features = ["nix-command" "flakes"];
registry= {
nixpkgs.flake = inputs.nixpkgs;
};
nixPath = [ "nixpkgs=${inputs.nixpkgs}" ];
};
2023-06-07 21:10:31 +02:00
programs.zsh.enable = true;
2023-04-16 16:49:08 +02:00
environment.systemPackages = with pkgs; [
wget
git
tree
rsync
bottom
ripgrep
];
2023-01-20 20:21:16 +01:00
services.openssh = {
enable = true;
2023-06-07 21:10:31 +02:00
settings = {
PermitRootLogin = "no";
PasswordAuthentication = false;
KbdInteractiveAuthentication = false;
};
extraConfig = ''
AllowTcpForwarding yes
X11Forwarding no
AllowAgentForwarding yes
AuthenticationMethods publickey
'';
2023-01-20 20:21:16 +01:00
};
users.users.felixalb = {
isNormalUser = true;
extraGroups = [ "wheel" ];
2023-04-16 16:49:08 +02:00
uid = 1000;
2023-01-20 20:21:16 +01:00
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDKzPICGew7uN0cmvRmbwkwTCodTBUgEhkoftQnZuO4Q felixalbrigtsen@gmail.com"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHkLmJIkBM6AMbYM/hYm27Flgya81UiGqh9/owYWmrbZ home.feal.no"
];
};
sops.age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
2023-01-20 20:21:16 +01:00
}