nix/nixos/rascal.nix

67 lines
1.5 KiB
Nix
Raw Normal View History

2023-10-03 11:52:44 -05:00
{
2023-10-04 13:49:48 -05:00
inputs,
2023-10-03 11:52:44 -05:00
config,
modulesPath,
...
}: {
2023-09-05 23:51:32 -05:00
imports = [
2023-10-04 13:49:48 -05:00
inputs.hardware.nixosModules.common-cpu-amd
2023-09-05 23:51:32 -05:00
(modulesPath + "/installer/scan/not-detected.nix")
];
2023-09-05 21:46:55 -05:00
2023-10-03 11:52:44 -05:00
boot.initrd.availableKernelModules = ["xhci_pci" "ahci" "ehci_pci" "usbhid" "uas" "sd_mod"];
boot.kernelModules = ["kvm-amd"];
2023-09-05 21:46:55 -05:00
2023-09-05 23:51:32 -05:00
fileSystems."/" = {
device = "/dev/disk/by-uuid/2e2ad73a-6264-4a7b-8439-9c05295d903d";
fsType = "f2fs";
};
2023-09-05 21:46:55 -05:00
2024-05-31 10:18:37 -05:00
fileSystems."/storage" = {
device = "/dev/disk/by-uuid/410fa651-4918-447c-9337-97cc12ff6d2a";
fsType = "ext4";
};
2023-09-05 23:51:32 -05:00
boot.loader.grub = {
enable = true;
device = "/dev/sda";
};
2023-09-05 21:46:55 -05:00
2024-05-31 10:18:37 -05:00
users.users = {
beefcake = {
# used for restic backups
isNormalUser = true;
openssh.authorizedKeys.keys =
config.users.users.daniel.openssh.authorizedKeys.keys
++ [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK7HrojwoyHED+A/FzRjYmIL0hzofwBd9IYHH6yV0oPO root@beefcake"
];
};
daniel = {
# used for restic backups
isNormalUser = true;
extraGroups = ["users" "wheel" "video" "dialout" "uucp"];
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAPLXOjupz3ScYjgrF+ehrbp9OvGAWQLI6fplX6w9Ijb daniel@lyte.dev"
];
};
root = {
openssh.authorizedKeys.keys = config.users.users.daniel.openssh.authorizedKeys.keys;
};
};
2023-09-05 23:51:32 -05:00
networking = {
hostName = "rascal";
networkmanager.enable = true;
2024-05-31 10:18:37 -05:00
firewall = {
enable = true;
allowPing = true;
allowedTCPPorts = [22];
};
2023-09-05 21:46:55 -05:00
};
2023-09-05 23:51:32 -05:00
system.stateVersion = "22.05";
2023-09-05 21:46:55 -05:00
}