diff --git a/hosts/arr/default.nix b/hosts/arr/default.nix new file mode 100644 index 0000000..354e7c0 --- /dev/null +++ b/hosts/arr/default.nix @@ -0,0 +1,71 @@ +{ config, pkgs, ... }: + +let + + # parameters = import ./parameters.nix { }; + + # GID = 888; + # user = "rtorrent"; + # passwordHash = "$y$j9T$dA94KVg1/jYLqclQQbTDk.$cnfxBWUN8P4shr8Kkipv5bU/RCtQNoAwYFDZ0X/BYs5"; + + timeZone = "Europe/Rome"; + defaultLocale = "en_US.UTF-8"; +in +{ + + # imports = [ + # + # ]; + + proxmox.enable = true; + + download-pod = { + enable = true; + proxy.enable = true; + }; + + # Extra packages + # environment.systemPackages = with pkgs; [ ]; + + services = { + openssh.enable = true; + # tailscale = { + # enable = false; + # useRoutingFeatures = "both"; + # extraUpFlags = [ "--exit-node=${parameters.tailscaleExitNodeIP}" ]; + # authKeyFile = builtins.toFile "authKey" ''${parameters.tailscaleAuthKey}''; + # }; + }; + + time.timeZone = timeZone; + + users = { + + # If set to false, the contents of the user and group files will simply + # be replaced on system activation. + # This also holds for the user passwords. + # All changed passwords will be reset according + # to the `users.users` configuration on activation. + mutableUsers = false; + + users.root = { + hashedPassword = "!"; + openssh.authorizedKeys.keys = [ + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDhiGLc/whCY3lCmDiRlYnMJOLiO/gvcRj/sKVEFVAhQ pazpi@deadbeef" + ]; + }; + + users.pazpi = { + isNormalUser = true; + hashedPassword = "$y$j9T$oWLCV1hnGPyOGabMfAS3p1$/iwouRZGwQXcv6IHnLuT3I9.pmeXNpcHxq.b8xfitr1"; + shell = pkgs.bash; + extraGroups = [ "wheel" ]; + openssh.authorizedKeys.keys = [ + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDhiGLc/whCY3lCmDiRlYnMJOLiO/gvcRj/sKVEFVAhQ pazpi@deadbeef" + ]; + }; + + }; + + system.stateVersion = "24.05"; +}