feat: add nixfiles-private and import host user config from there

This commit is contained in:
transcaffeine 2025-04-18 21:07:37 +02:00
parent f853cb93f1
commit ca77d2e0e9
Signed by: transcaffeine
GPG key ID: 03624C433676E465
3 changed files with 28 additions and 22 deletions

22
flake.lock generated
View file

@ -18,6 +18,27 @@
"type": "github" "type": "github"
} }
}, },
"nixfiles-private": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1745002185,
"narHash": "sha256-bdWS7dY1yUe+RfW9a3ySrorYq1S+pWJm4AE2J0yp3+I=",
"ref": "refs/tags/0.0.1",
"rev": "a0e92bad8feeb269f985a2d8112723bf5926528c",
"revCount": 2,
"type": "git",
"url": "ssh://forgejo@git.werkraum-karlsruhe.org/WRK/nixfiles-private"
},
"original": {
"ref": "refs/tags/0.0.1",
"type": "git",
"url": "ssh://forgejo@git.werkraum-karlsruhe.org/WRK/nixfiles-private"
}
},
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1743420942, "lastModified": 1743420942,
@ -68,6 +89,7 @@
"root": { "root": {
"inputs": { "inputs": {
"flake-parts": "flake-parts", "flake-parts": "flake-parts",
"nixfiles-private": "nixfiles-private",
"nixos-hardware": "nixos-hardware", "nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs" "nixpkgs": "nixpkgs"
} }

View file

@ -3,6 +3,10 @@
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.11"; nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.11";
nixos-hardware.url = "github:NixOS/nixos-hardware/master"; nixos-hardware.url = "github:NixOS/nixos-hardware/master";
flake-parts.url = "github:hercules-ci/flake-parts"; flake-parts.url = "github:hercules-ci/flake-parts";
nixfiles-private = {
url = "git+ssh://forgejo@git.werkraum-karlsruhe.org/WRK/nixfiles-private?ref=refs/tags/0.0.1";
inputs.nixpkgs.follows = "nixpkgs";
};
}; };
outputs = inputs: inputs.flake-parts.lib.mkFlake { inherit inputs; } { outputs = inputs: inputs.flake-parts.lib.mkFlake { inherit inputs; } {

View file

@ -1,9 +1,10 @@
{ config, lib, pkgs, ... }: { inputs, config, lib, pkgs, ... }:
{ {
imports = imports =
[ [
../../services/sshd ../../services/sshd
inputs.nixfiles-private.nixosModules.hosts.backstage
]; ];
# Set your time zone. # Set your time zone.
@ -24,27 +25,6 @@
htop htop
]; ];
users.users.root = {
openssh.authorizedKeys.keys = [
''ssh-rsa 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''
];
};
# Define a user account. Don't forget to set a password with passwd.
# users.users.alice = {
# isNormalUser = true;
# extraGroups = [ "wheel" ]; # Enable sudo for the user.
# packages = with pkgs; [
# tree
# ];
# };
# List services that you want to enable:
# Open ports in the firewall.
# networking.firewall.allowedTCPPorts = [ ... ];
# networking.firewall.allowedUDPPorts = [ ... ];
# Copy the NixOS configuration file and link it from the resulting system # Copy the NixOS configuration file and link it from the resulting system
# (/run/current-system/configuration.nix). This is useful in case you # (/run/current-system/configuration.nix). This is useful in case you
# accidentally delete configuration.nix. # accidentally delete configuration.nix.