stockholm/old/modules/cloudkrebs/default.nix

72 lines
1.3 KiB
Nix
Raw Normal View History

{ config, pkgs, ... }:
{
imports = [
../tv/base-cac-CentOS-7-64bit.nix
2015-07-13 11:39:49 +00:00
./retiolum.nix
2015-05-20 15:58:00 +00:00
./networking.nix
../../secrets/cloudkrebs-pw.nix
2015-05-19 20:28:56 +00:00
../lass/sshkeys.nix
../lass/base.nix
2015-05-20 15:58:00 +00:00
../common/nixpkgs.nix
];
2015-05-19 20:28:56 +00:00
nixpkgs = {
url = "https://github.com/Lassulus/nixpkgs";
rev = "b42ecfb8c61e514bf7733b4ab0982d3e7e27dacb";
};
nix.maxJobs = 1;
2015-07-13 11:39:49 +00:00
#tmpfiles Unknown group 'lock' workaround:
users.extraGroups = {
lock.gid = 10001;
};
#TODO move into modules
users.extraUsers = {
#main user
root = {
openssh.authorizedKeys.keys = [
2015-05-19 20:28:56 +00:00
config.sshKeys.lass.pub
];
};
2015-05-19 20:28:56 +00:00
mainUser = {
uid = 1337;
name = "lass";
#isNormalUser = true;
group = "users";
createHome = true;
home = "/home/lass";
useDefaultShell = true;
isSystemUser = false;
description = "lassulus";
extraGroups = [ "wheel" ];
openssh.authorizedKeys.keys = [
2015-05-19 20:28:56 +00:00
config.sshKeys.lass.pub
];
};
};
environment.systemPackages = with pkgs; [
];
services.openssh = {
enable = true;
hostKeys = [
# XXX bits here make no science
{ bits = 8192; type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; }
];
permitRootLogin = "yes";
};
networking.firewall = {
enable = true;
allowedTCPPorts = [
22
];
};
}