nixos/machines/_base.nix

70 lines
1.4 KiB
Nix
Raw Normal View History

2023-01-25 11:48:44 +00:00
{ pkgs, modulesPath, ... }:
{
imports = [
(modulesPath + "/virtualisation/proxmox-lxc.nix")
];
# flakes are essensial
nix.settings.experimental-features = [ "nix-command" "flakes" ];
system.stateVersion = "22.11";
services.openssh = {
enable = true;
permitRootLogin = "prohibit-password";
};
users.users.root = {
initialHashedPassword = "";
openssh.authorizedKeys.keys = [
# no obligation to have name attached to keys
# Root account
2023-01-25 11:48:44 +00:00
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK6DjXTAxesXpQ65l659iAjzEb6VpRaWKSg4AXxifPw9 Skynet Admin"
# Brendan Golden
2023-01-25 11:48:44 +00:00
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEHNLroAjCVR9Tx382cqdxPZ5KY32r/yoQH1mgsYNqpm Silver_Laptop_WSL_Deb"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKjaKI97NY7bki07kxAvo95196NXCaMvI1Dx7dMW05Q1 thenobrainer"
2023-01-25 11:48:44 +00:00
];
};
networking = {
2023-04-20 23:53:25 +00:00
# every sever needs to be accessable over ssh for admin use at least
firewall.allowedTCPPorts = [22];
# explisitly stating this is good
defaultGateway = "193.1.99.65";
# cannot use our own it seems?
nameservers = [
# ns2
2023-04-23 03:22:01 +00:00
"193.1.99.109"
# ns1
2023-04-23 03:22:01 +00:00
"193.1.99.120"
# Cloudflare
2023-04-23 03:22:01 +00:00
#"1.1.1.1"
# Google
2023-04-23 03:22:01 +00:00
#"8.8.8.8"
# Quad9
2023-04-23 03:22:01 +00:00
#"9.9.9.9"
];
};
2023-01-25 11:48:44 +00:00
environment.systemPackages = [
# for flakes
pkgs.git
# useful tools
pkgs.ncdu_2
pkgs.htop
pkgs.nano
pkgs.nmap
2023-04-19 19:42:00 +00:00
pkgs.bind
2023-01-25 11:48:44 +00:00
];
}