diff --git a/flake.nix b/flake.nix index b524043..31ff636 100644 --- a/flake.nix +++ b/flake.nix @@ -87,6 +87,10 @@ inherit system; modules = [ ./nix/dev-vm.nix ]; }; + demo-server = nixpkgs.lib.nixosSystem { + inherit system; + modules = [ ./nix/demo-server.nix ]; + }; }); formatter = forAllSystems ( diff --git a/nix/demo-server/default.nix b/nix/demo-server/default.nix new file mode 100644 index 0000000..9269586 --- /dev/null +++ b/nix/demo-server/default.nix @@ -0,0 +1,48 @@ +{ pkgs, ... }: +{ + boot = { + loader = { + systemd-boot.enable = true; + efi.canTouchEfiVariables = true; + }; + kernelPackages = pkgs.linuxPackages_latest; + }; + + nix.settings.experimental-features = [ + "nix-command" + "flakes" + ]; + + time.timeZone = "Europe/Amsterdam"; + + nixpkgs.config.allowUnfree = true; + + networking.networkmanager.enable = true; + + networking.hostName = "archtika-demo-server"; + + users = { + mutableUsers = false; + users = { + root.hashedPassword = "$y$j9T$MuWDs5Ind6VPEM78u5VTy/$XAuRCaOPtS/8Vj8XgpxB/XX2ygftNLql2VrFWcC/sq7"; + thiloho = { + isNormalUser = true; + extraGroups = [ + "wheel" + "networkmanager" + ]; + hashedPassword = "$y$j9T$Y0ffzVb7wrZSdCKbiYHin0$oahgfFqH/Eep6j6f4iKPETEfGZSOkgu74UT2eyG2uI1"; + openssh.authorizedKeys.keys = [ + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBj6+r+vMXJyy5wvQTLyfd2rIw62WCg9eIpwsciHg4ym thiloho@pc" + ]; + }; + }; + }; + + services.openssh = { + enable = true; + settings.PasswordAuthentication = false; + }; + + system.stateVersion = "24.11"; +} diff --git a/nix/module.nix b/nix/module.nix index da328bf..63265a3 100644 --- a/nix/module.nix +++ b/nix/module.nix @@ -128,7 +128,7 @@ in recommendedProxySettings = true; recommendedTlsSettings = true; - virtualHosts."_" = { + virtualHosts."archtika" = { listen = [ { addr = "0.0.0.0";