blob: ae4c54dcb1ce76be380dcfc7310ae60aaac682eb (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
|
{
modulesPath,
lib,
pkgs,
sops,
config,
...
}@args:
{
imports = [
./disk-config.nix
];
boot.loader.systemd-boot.enable = true;
system.stateVersion = "25.05";
networking.hostName = "kj-laptop01";
networking.networkmanager.enable = true;
sops = {
defaultSopsFile = ./secrets.yaml;
age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
age.generateKey = false;
secrets = {
luks_passphrase = { };
kj_hashed_password = {
neededForUsers = true;
};
ssh_host_key_ed25519 = { };
ssh_host_key_rsa = { };
};
};
security.sudo.enable = true;
users.mutableUsers = false;
users.groups.kjtsanaktsidis = {};
users.users = {
kjtsanaktsidis = {
createHome = true;
isNormalUser = true;
description = "KJ Tsanaktsidis";
group = "kjtsanaktsidis";
extraGroups = [ "wheel" "networkmanager" ];
hashedPasswordFile = config.sops.secrets.kj_hashed_password.path;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAC/BtvW1c1RbBI8eeGo7oOH2y9byBaxWVDHsErgaE+s kjtsanaktsidis@KJMacbookGroq.local"
];
};
};
services.openssh = {
enable = true;
hostKeys = [
{
type = "ed25519";
path = config.sops.secrets.ssh_host_key_ed25519.path;
}
{
type = "rsa";
path = config.sops.secrets.ssh_host_key_rsa.path;
}
];
};
nix = {
extraOptions = ''
experimental-features = ca-derivations nix-command flakes
'';
settings = {
substituters = [
"https://cache.nixos.org"
"https://cache.ngi0.nixos.org/"
];
trusted-public-keys = [
"cache.ngi0.nixos.org-1:KqH5CBLNSyX184S9BKZJo1LxrxJ9ltnY2uAs5c/f1MA="
];
};
};
swapDevices = [
{
device = "/swap/swapfile";
size = 32768;
}
];
}
|