infra/modules/darwin/common/default.nix
zowoq 5b4fc9aeed modules/darwin/common: disable StrictModes
needed for symlinked ssh keys
2023-10-28 23:23:19 +00:00

64 lines
1.5 KiB
Nix

{ pkgs, ... }:
{
imports = [
./deploy.nix
./flake-inputs.nix
./reboot.nix
./telegraf.nix
./upgrade-diff.nix
../../shared/nix-daemon.nix
];
# TODO: refactor this to share /users with nixos
# if user is removed the keys need to be removed manually from /etc/ssh/authorized_keys.d
users.users = {
hetzner.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKbBp2dH2X3dcU1zh+xW3ZsdYROKpJd3n13ssOP092qE" # mic92
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOuiDoBOxgyer8vGcfAIbE6TC4n4jo8lhG9l01iJ0bZz" # zimbatm
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFbCYwWByGE46XHH4Q0vZgQ5sOUgbH50M8KO2xhBC4m/" # zowoq
];
};
services.nix-daemon.enable = true;
programs.zsh.enable = true;
documentation.enable = false;
programs.info.enable = false;
nix.settings.trusted-users = [
"@admin"
];
# shouldn't need to set this for a nix multi-user install
nix.gc.user = "root";
# srvos
nix.settings.builders-use-substitutes = true;
# srvos
nix.settings.experimental-features = [
"nix-command"
"flakes"
];
environment.systemPackages = with pkgs; [
htop
];
# disable application layer firewall, telegraf needs an incoming connection
system.defaults.alf.globalstate = 0;
# srvos
services.openssh.authorizedKeysFiles = pkgs.lib.mkForce [ "/etc/ssh/authorized_keys.d/%u" ];
# srvos
environment.etc."ssh/sshd_config.d/darwin.conf".text = ''
KbdInteractiveAuthentication no
PasswordAuthentication no
StrictModes no
'';
time.timeZone = "GMT";
}