{ pkgs, lib, machine, disko, agenix, ... }: { imports = [ ./modules ./globals.nix machine.nixosModule disko.nixosModules.disko agenix.nixosModules.default ] ++ lib.lists.optional machine.isPhysical ./physical.nix ++ lib.lists.optional machine.isVirtual ./virtual; config = { time.timeZone = "Europe/Amsterdam"; i18n = { defaultLocale = "en_US.UTF-8"; extraLocaleSettings = let extraLocale = "nl_NL.UTF-8"; in { LC_ADDRESS = extraLocale; LC_IDENTIFICATION = extraLocale; LC_MEASUREMENT = extraLocale; LC_MONETARY = extraLocale; LC_NAME = extraLocale; LC_NUMERIC = extraLocale; LC_PAPER = extraLocale; LC_TELEPHONE = extraLocale; LC_TIME = extraLocale; }; }; services = { openssh = { enable = true; openFirewall = true; settings = { PasswordAuthentication = false; KbdInteractiveAuthentication = false; }; }; xserver = { layout = "us"; xkbVariant = ""; }; }; users.users.root.openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOodpLr+FDRyKyHjucHizNLVFHZ5AQmE9GmxMnOsSoaw pimkunis@thinkpadpim" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINUZp4BCxf7uLa1QWonx/Crf8tYZ5MKIZ+EuaBa82LrV user@user-laptop" ]; programs = { ssh = { knownHosts = { dmz = { hostNames = [ "*.dmz" ]; publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAX2IhgHNxC6JTvLu9cej+iWuG+uJFMXn4AiRro9533x"; certAuthority = true; }; hypervisors = { hostNames = [ "*.hyp" ]; publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFzRkH3d/KVJQouswY/DMpenWbDFVOnI3Vut0xR0e1tb"; certAuthority = true; }; }; }; neovim = { enable = true; vimAlias = true; viAlias = true; }; }; environment.systemPackages = with pkgs; [ neofetch wget git btop htop ripgrep dig tree file tcpdump lsof parted radvd minicom socat ]; nixpkgs.overlays = [ (final: prev: { lib = prev.lib // (import ./net.nix prev); }) ]; }; }