nixos-config/base.nix

84 lines
1.8 KiB
Nix
Raw Normal View History

2023-01-20 20:21:16 +01:00
{ config, lib, pkgs, inputs, values, ... }:
{
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
networking = {
domain = "home.feal.no";
useDHCP = false;
};
time.timeZone = "Europe/Oslo";
i18n.defaultLocale = "en_US.UTF-8";
console = {
font = "Lat2-Terminus16";
keyMap = "no";
};
nix = {
gc = {
automatic = true;
options = "--delete-older-than 2d";
};
2023-09-13 23:21:28 +02:00
settings = {
experimental-features = ["nix-command" "flakes"];
trusted-users = [ "felixalb" ];
builders-use-substitutes = true;
};
2023-01-20 20:21:16 +01:00
registry= {
nixpkgs.flake = inputs.nixpkgs;
};
nixPath = [ "nixpkgs=${inputs.nixpkgs}" ];
};
2023-06-07 21:10:31 +02:00
programs.zsh.enable = true;
2023-04-16 16:49:08 +02:00
environment.systemPackages = with pkgs; [
2023-09-13 23:21:28 +02:00
bat
2023-04-16 16:49:08 +02:00
bottom
2023-09-13 23:40:50 +02:00
exa
2023-09-13 23:21:28 +02:00
git
gnugrep
gnutar
2023-04-16 16:49:08 +02:00
ripgrep
2023-09-13 23:21:28 +02:00
rsync
tree
wget
2023-04-16 16:49:08 +02:00
];
2023-01-20 20:21:16 +01:00
services.openssh = {
enable = true;
2023-06-07 21:10:31 +02:00
settings = {
PermitRootLogin = "no";
PasswordAuthentication = false;
KbdInteractiveAuthentication = false;
};
extraConfig = ''
AllowTcpForwarding yes
X11Forwarding no
AllowAgentForwarding yes
AuthenticationMethods publickey
'';
2023-01-20 20:21:16 +01:00
};
users.users.felixalb = {
isNormalUser = true;
extraGroups = [ "wheel" ];
2023-04-16 16:49:08 +02:00
uid = 1000;
2023-01-20 20:21:16 +01:00
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDKzPICGew7uN0cmvRmbwkwTCodTBUgEhkoftQnZuO4Q felixalbrigtsen@gmail.com"
2023-07-25 19:15:19 +02:00
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBTXSL0w7OUcz1LzEt1T3I3K5RgyNV+MYz0x/1RbpDHQ felixalb@worf"
2023-01-20 20:21:16 +01:00
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHkLmJIkBM6AMbYM/hYm27Flgya81UiGqh9/owYWmrbZ home.feal.no"
2023-09-13 23:21:28 +02:00
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIH5M7hYl3saBNMAo6sczgfUvASEJWFHuERB7xvf4gxst nix-builder-voyager-worf"
2023-01-20 20:21:16 +01:00
];
};
sops.age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
2023-01-20 20:21:16 +01:00
}