{ config, lib, pkgs, inputs, values, ... }: { boot.loader.systemd-boot.enable = true; boot.loader.efi.canTouchEfiVariables = true; networking = { domain = "home.feal.no"; nameservers = [ "192.168.10.3" "192.168.11.100" "1.1.1.1" ]; useDHCP = lib.mkDefault false; }; time.timeZone = "Europe/Oslo"; i18n.defaultLocale = "en_US.UTF-8"; console = { font = "Lat2-Terminus16"; keyMap = lib.mkDefault "no"; }; nix = { gc = { automatic = true; options = "--delete-older-than 2d"; }; settings = { experimental-features = ["nix-command" "flakes"]; trusted-users = [ "felixalb" ]; builders-use-substitutes = true; }; registry= { nixpkgs.flake = inputs.nixpkgs; }; nixPath = [ "nixpkgs=${inputs.nixpkgs}" ]; }; programs.zsh.enable = true; environment.systemPackages = with pkgs; [ bat bottom unstable.eza git gnugrep gnutar ripgrep rsync tree wget ]; services.openssh = { enable = true; settings = { PermitRootLogin = "no"; PasswordAuthentication = false; KbdInteractiveAuthentication = false; }; extraConfig = '' AllowTcpForwarding yes X11Forwarding no AllowAgentForwarding yes AuthenticationMethods publickey ''; }; networking.firewall.allowedTCPPorts = [ 22 ]; users.users.felixalb = { isNormalUser = true; extraGroups = [ "wheel" ]; uid = 1000; openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDKzPICGew7uN0cmvRmbwkwTCodTBUgEhkoftQnZuO4Q felixalbrigtsen@gmail.com" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBTXSL0w7OUcz1LzEt1T3I3K5RgyNV+MYz0x/1RbpDHQ felixalb@worf" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFiPHhj0YbklJnJNcxD0IlzPxLTGfv095H5zyS/1Wb64 felixalb@edison.home.feal.no" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIH5M7hYl3saBNMAo6sczgfUvASEJWFHuERB7xvf4gxst nix-builder-voyager-worf" ]; shell = pkgs.zsh; }; sops.age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ]; }