{ pkgs, username, ... }: { imports = [ ./hardware-configuration.nix ./disk-config.nix ./post-install ]; system.stateVersion = "24.05"; boot.loader.grub = { # no need to set devices, disko will add all devices that have a # EF02 partition to the list already # devices = [ ]; efiSupport = true; efiInstallAsRemovable = true; }; environment.systemPackages = with pkgs; [ podman-tui # status of containers in the terminal podman-compose ]; networking = { # Open ports in the firewall. firewall.allowedTCPPorts = [ 22 # ssh 80 # http to local Nginx 443 # https to local Nginx ]; # firewall.allowedUDPPorts = [ ... ]; # Or disable the firewall altogether. # firewall.enable = false; hostId = "85d0e6cb"; # head -c4 /dev/urandom | od -A none -t x4 networkmanager.enable = true; }; programs.mtr.enable = true; services = { fail2ban.enable = true; postgresql = { enable = true; package = pkgs.postgresql_16; }; uptime-kuma = { enable = true; settings = { UPTIME_KUMA_HOST = "127.0.0.1"; #UPTIME_KUMA_PORT = "3001"; }; }; }; systemd.network = { enable = true; networks."10-wan" = { matchConfig.Name = "enp1s0"; address = [ "5.161.244.95/32" "2a01:4ff:f0:977c::1/64" ]; dns = [ "185.12.64.1" "185.12.64.2" "2a01:4ff:ff00::add:1" "2a01:4ff:ff00::add:2" ]; routes = [ { routeConfig = { Destination = "172.31.1.1"; }; } { routeConfig = { Gateway = "172.31.1.1"; GatewayOnLink = true; }; } { routeConfig.Gateway = "fe80::1"; } ]; # make the routes on this interface a dependency for network-online.target linkConfig.RequiredForOnline = "routable"; }; }; users.users.${username} = { isNormalUser = true; description = "Gene Liverman"; extraGroups = [ "networkmanager" "wheel" ]; linger = true; openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBjigwV0KnnaTnFmKjjvnULa5X+hvsy2FAlu+lUUY59f gene@rainbow-planet" ]; }; }