{ config, pkgs, self, ... }: { imports = [ ./hardware-configuration.nix ./cachix.nix ./miniflux.nix ./nginx.nix ./prometheus.nix ]; _module.args.nixinate = { host = "atlas"; sshUser = "root"; buildOn = "remote"; substituteOnTarget = true; hermetic = false; }; age.secrets.authGH = { file = "${self}/secrets/hosts/${config.networking.hostName}/authGH.age"; mode = "440"; owner = config.users.users.root.name; group = config.users.groups.wheel.name; }; boot = { binfmt.emulatedSystems = ["x86_64-linux" "i686-linux"]; cleanTmpDir = true; loader.systemd-boot.enable = true; loader.efi.canTouchEfiVariables = true; }; getchoo.server = { secrets.enable = true; }; networking = { domain = "mydadleft.me"; hostName = "atlas"; }; nix = { extraOptions = '' !include ${config.age.secrets.authGH.path} ''; settings.trusted-users = ["bob"]; }; system.stateVersion = "22.11"; users.users = let openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMPV9wiDwXVyoVh347CAulkdGzG7+1m/rZ1aV5fk3BHM atlas getchoo@tuta.io" ]; in { root = {inherit openssh;}; atlas = { extraGroups = ["wheel"]; isNormalUser = true; shell = pkgs.bash; passwordFile = config.age.secrets.userPassword.path; inherit openssh; }; bob = { isNormalUser = true; shell = pkgs.bash; openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOtbxHjDADxqsG+AgCoiDq0uCsgcnJCIH+9rB6K5pIi9 p-body@p-body" "ssh-ed25519 aaaac3nzac1lzdi1nte5aaaaimpv9widwxvyovh347caulkdgzg7+1m/rz1av5fk3bhm atlas getchoo@tuta.io" ]; }; }; zramSwap.enable = true; }