mrflos-nixos-config-fork/machines/ThinkCentre-M710q-zoro-configuration.nix

61 lines
1.7 KiB
Nix
Raw Normal View History

2024-09-11 16:07:33 +00:00
{ config, lib, pkgs, ... }:
{
2024-09-11 17:41:18 +00:00
imports = [
./ThinkCentre-M710q-zoro-hardware-configuration.nix
../modules/minimal-server.nix
];
2024-09-11 16:07:33 +00:00
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
networking = {
hostName = "zoro";
domain = "mrflos.pw";
nameservers = ["80.67.169.12" "2001:910:800::12" "80.67.169.40" "2001:910:800::40"];
wg-quick.interfaces = {
wg0 = {
2024-09-16 10:27:20 +00:00
address = [ "10.42.0.3/32"];
2024-09-11 16:07:33 +00:00
dns = ["80.67.169.12" "2001:910:800::12" "80.67.169.40" "2001:910:800::40"];
privateKeyFile = "/etc/wireguard_private_key";
peers = [
{
publicKey = "2MZzEGJzA3HrwkHf91TaKJEHwCNyVvsTLWoIYHrCxhY=";
presharedKeyFile = "/etc/wireguard_preshared_key";
2024-09-16 10:28:23 +00:00
allowedIPs = [ "10.42.0.0/24" ];
2024-09-11 16:07:33 +00:00
endpoint = "195.201.63.240:8098";
persistentKeepalive = 15;
}
];
};
};
};
time.timeZone = "Europe/Moscow";
i18n.defaultLocale = "en_US.UTF-8";
users.users.optisseur = {
isNormalUser = true;
extraGroups = [ "wheel" ];
initialPassword = "ACHANGER";
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBBM+2TwkopAQF7splTWjORQoxjcp67VhodwzvTMlL8g florian@florian-LinuxMint-MBP"
2024-09-13 08:02:44 +00:00
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILRG0CyeeMMrrjTTm/PHgRXD/I4lH/bBPBCGUiL+cBdq douzeb@tux-12"
];
};
2024-09-11 16:07:33 +00:00
services.openssh.enable = true;
services.openssh.ports = [ 4222 ];
services.openssh.settings = {
PermitRootLogin = "no";
PasswordAuthentication = false;
KbdInteractiveAuthentication = false;
};
2024-09-11 16:07:33 +00:00
networking.firewall.allowedTCPPorts = [ 80 443 4222 ];
2024-09-11 16:07:33 +00:00
system.stateVersion = "24.05";
2024-09-11 16:07:33 +00:00
}