{ pkgs, ... }: { imports = [ ./deploy.nix ./flake-inputs.nix ./reboot.nix ./telegraf.nix ./upgrade-diff.nix ../../shared/nix-daemon.nix ]; # TODO: refactor this to share /users with nixos # if user is removed the keys need to be removed manually from /etc/ssh/authorized_keys.d users.users = { hetzner.openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKbBp2dH2X3dcU1zh+xW3ZsdYROKpJd3n13ssOP092qE" # mic92 "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOuiDoBOxgyer8vGcfAIbE6TC4n4jo8lhG9l01iJ0bZz" # zimbatm "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFbCYwWByGE46XHH4Q0vZgQ5sOUgbH50M8KO2xhBC4m/" # zowoq "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtr+rcxCZBAAqt8ocvhEEdBWfnRBCljjQPtC6Np24Y3H/HMe3rugsu3OhPscRV1k5hT+UlA2bpN8clMFAfK085orYY7DMUrgKQzFB7GDnOvuS1CqE1PRw7/OHLcWxDwf3YLpa8+ZIwMHFxR2gxsldCLGZV/VukNwhEvWs50SbXwVrjNkwA9LHy3Or0i6sAzU711V3B2heB83BnbT8lr3CKytF3uyoTEJvDE7XMmRdbvZK+c48bj6wDaqSmBEDrdNncsqnReDjScdNzXgP1849kMfIUwzXdhEF8QRVfU8n2A2kB0WRXiGgiL4ba5M+N9v1zLdzSHcmB0veWGgRyX8tN cardno:FF7F00" # adisbladis ]; }; services.nix-daemon.enable = true; programs.zsh.enable = true; documentation.enable = false; programs.info.enable = false; nix.settings.trusted-users = [ "@admin" ]; # shouldn't need to set this for a nix multi-user install nix.gc.user = "root"; # srvos nix.settings.builders-use-substitutes = true; # srvos nix.settings.experimental-features = [ "nix-command" "flakes" ]; environment.systemPackages = with pkgs; [ htop ]; # disable application layer firewall, telegraf needs an incoming connection system.defaults.alf.globalstate = 0; # srvos services.openssh.authorizedKeysFiles = pkgs.lib.mkForce [ "/etc/ssh/authorized_keys.d/%u" ]; # srvos environment.etc."ssh/sshd_config.d/darwin.conf".text = '' KbdInteractiveAuthentication no PasswordAuthentication no StrictModes no ''; time.timeZone = "GMT"; }