1
0
Fork 0
dotfiles/system/hosts/adsb-antenna.nix

97 lines
1.9 KiB
Nix
Raw Normal View History

2022-08-09 18:54:07 +00:00
args@{ pkgs, lib, ... }:
2022-08-01 20:39:14 +00:00
let
2022-08-09 18:54:07 +00:00
inherit (lib) optionals;
2022-08-01 20:39:14 +00:00
secret = import ../../secret/hosts/adsb-antenna.nix;
ssh-keys = import ../shared/ssh-keys.nix;
in
{
imports = [
../../hardware/hosts/adsb-antenna.nix
../nixos/ssh.nix
../nixos/git.nix
2022-08-02 16:44:26 +00:00
../nixos/arion.nix
../../container/adsb
2022-08-01 20:39:14 +00:00
];
nix = {
package = pkgs.nixFlakes;
2022-08-05 09:37:45 +00:00
settings = {
auto-optimise-store = true;
2022-08-01 20:39:14 +00:00
2022-08-05 09:37:45 +00:00
substituters = [
"https://nix-community.cachix.org"
2022-08-06 09:17:13 +00:00
"https://nifoc.cachix.org"
2022-08-09 18:54:07 +00:00
] ++ optionals secret.nix-cache.nifoc.enabled [
secret.nix-cache.nifoc.s3Url
2022-08-05 09:37:45 +00:00
];
trusted-public-keys = [
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
2022-08-06 09:17:13 +00:00
"nifoc.cachix.org-1:ymuftq7RgN/lf/iWXFK8gpwDSAGFaGBeliWe9u6q8II="
2022-08-09 18:54:07 +00:00
] ++ optionals secret.nix-cache.nifoc.enabled [
secret.nix-cache.nifoc.publicKeyValue
2022-08-05 09:37:45 +00:00
];
2022-08-09 19:10:52 +00:00
2022-08-18 21:12:16 +00:00
cores = 3;
2022-08-09 19:10:52 +00:00
max-jobs = 1;
2022-08-05 09:37:45 +00:00
};
2022-08-01 20:39:14 +00:00
2022-08-18 21:12:16 +00:00
gc = {
automatic = true;
dates = "weekly";
options = "--delete-older-than 14d";
};
2022-08-01 20:39:14 +00:00
extraOptions = ''
experimental-features = nix-command flakes
keep-derivations = true
keep-outputs = true
'';
};
boot = {
loader = {
grub.enable = false;
generic-extlinux-compatible.enable = true;
};
cleanTmpDir = true;
};
networking = {
hostName = "adsb-antenna";
dhcpcd.denyInterfaces = [ "veth*" ];
timeServers = [
"ntp1.hetzner.de"
"ntp2.hetzner.com"
"ntp3.hetzner.net"
"time.cloudflare.com"
];
};
programs.fish.enable = true;
users.users = {
root = {
openssh.authorizedKeys.keys = [ ssh-keys.LAN ];
};
daniel = {
hashedPassword = secret.users.daniel.hashedPassword;
isNormalUser = true;
home = "/home/daniel";
description = "Daniel";
extraGroups = [ "wheel" ];
shell = pkgs.fish;
openssh.authorizedKeys.keys = [ ssh-keys.LAN ];
};
};
}