nix/hosts/arr/default.nix

67 lines
1.7 KiB
Nix

{ config, pkgs, ... }:
let
# parameters = import ./parameters.nix { };
# GID = 888;
# user = "rtorrent";
# passwordHash = "$y$j9T$dA94KVg1/jYLqclQQbTDk.$cnfxBWUN8P4shr8Kkipv5bU/RCtQNoAwYFDZ0X/BYs5";
timeZone = "Europe/Rome";
defaultLocale = "en_US.UTF-8";
in
{
proxmox.enable = true;
download-pod = {
enable = true;
proxy.enable = true;
};
# Extra packages
# environment.systemPackages = with pkgs; [ ];
services = {
openssh.enable = true;
# tailscale = {
# enable = false;
# useRoutingFeatures = "both";
# extraUpFlags = [ "--exit-node=${parameters.tailscaleExitNodeIP}" ];
# authKeyFile = builtins.toFile "authKey" ''${parameters.tailscaleAuthKey}'';
# };
};
time.timeZone = timeZone;
users = {
# If set to false, the contents of the user and group files will simply
# be replaced on system activation.
# This also holds for the user passwords.
# All changed passwords will be reset according
# to the `users.users` configuration on activation.
mutableUsers = false;
users.root = {
hashedPassword = "!";
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDhiGLc/whCY3lCmDiRlYnMJOLiO/gvcRj/sKVEFVAhQ pazpi@deadbeef"
];
};
users.pazpi = {
isNormalUser = true;
hashedPassword = "$y$j9T$oWLCV1hnGPyOGabMfAS3p1$/iwouRZGwQXcv6IHnLuT3I9.pmeXNpcHxq.b8xfitr1";
shell = pkgs.bash;
extraGroups = [ "wheel" ];
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDhiGLc/whCY3lCmDiRlYnMJOLiO/gvcRj/sKVEFVAhQ pazpi@deadbeef"
];
};
};
system.stateVersion = "24.05";
}