Files
archtika/nix/demo-server/default.nix

73 lines
1.6 KiB
Nix
Raw Normal View History

2024-08-13 18:27:43 +02:00
{ pkgs, localArchtikaPackage, ... }:
2024-08-11 18:46:32 +02:00
{
2024-08-13 18:27:43 +02:00
imports = [
./hardware-configuration.nix
../module.nix
];
2024-08-11 18:46:32 +02:00
boot = {
loader = {
systemd-boot.enable = true;
efi.canTouchEfiVariables = true;
};
kernelPackages = pkgs.linuxPackages_latest;
};
nix.settings.experimental-features = [
"nix-command"
"flakes"
];
time.timeZone = "Europe/Amsterdam";
nixpkgs.config.allowUnfree = true;
2024-08-13 18:27:43 +02:00
networking = {
hostName = "archtika-demo-server";
networkmanager.enable = true;
firewall = {
allowedTCPPorts = [
10000
15000
];
};
};
2024-08-11 18:46:32 +02:00
2024-08-11 22:40:11 +02:00
security.pam = {
sshAgentAuth.enable = true;
services.sudo.sshAgentAuth = true;
};
2024-08-11 22:32:41 +02:00
2024-08-11 18:46:32 +02:00
users = {
mutableUsers = false;
users = {
root.hashedPassword = "$y$j9T$MuWDs5Ind6VPEM78u5VTy/$XAuRCaOPtS/8Vj8XgpxB/XX2ygftNLql2VrFWcC/sq7";
thiloho = {
isNormalUser = true;
extraGroups = [
"wheel"
"networkmanager"
];
hashedPassword = "$y$j9T$Y0ffzVb7wrZSdCKbiYHin0$oahgfFqH/Eep6j6f4iKPETEfGZSOkgu74UT2eyG2uI1";
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBj6+r+vMXJyy5wvQTLyfd2rIw62WCg9eIpwsciHg4ym thiloho@pc"
2024-08-13 11:36:32 +02:00
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIgfOa8N46PBUO2gj8UeyrV0R+MRZFnJqUzG132UjaFS thiloho@laptop"
2024-08-11 18:46:32 +02:00
];
};
};
};
services.openssh = {
enable = true;
settings.PasswordAuthentication = false;
};
2024-08-13 18:27:43 +02:00
services.archtika = {
enable = true;
package = localArchtikaPackage;
jwtSecret = "a42kVyAhTImYxZeebZkApoAZLmf0VtDA";
};
2024-08-11 18:46:32 +02:00
system.stateVersion = "24.11";
}