1
0
Fork 0
dotfiles/system/hosts/sail.nix

51 lines
1.6 KiB
Nix
Raw Normal View History

2022-07-30 18:19:21 +00:00
{ pkgs, ... }:
2022-07-30 16:19:49 +00:00
2022-07-30 20:55:19 +00:00
let
secret = import ../../secret/hosts/sail.nix;
in
2022-07-30 16:19:49 +00:00
{
imports = [
../../hardware/hosts/sail.nix
2022-07-30 17:49:04 +00:00
../nixos/ssh.nix
../nixos/git.nix
2022-07-30 18:17:39 +00:00
../nixos/arion.nix
2022-07-30 19:19:14 +00:00
../../container/webserver.nix
2022-07-30 16:19:49 +00:00
];
nix = {
package = pkgs.nixFlakes;
binaryCaches = [
"https://nix-community.cachix.org"
];
binaryCachePublicKeys = [
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
];
extraOptions = ''
experimental-features = nix-command flakes
keep-derivations = true
keep-outputs = true
auto-optimise-store = true
'';
};
boot.cleanTmpDir = true;
zramSwap.enable = true;
2022-07-30 20:55:19 +00:00
networking = {
hostName = "sail";
interfaces.enp1s0.ipv6.addresses = secret.networking.interfaces.enp1s0.ipv6.addresses;
defaultGateway6 = { address = "fe80::1"; interface = "enp1s0"; };
};
2022-07-30 16:19:49 +00:00
users.users.root.openssh.authorizedKeys.keys = [
"ssh-rsa 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"
];
}