{ lib, pkgs, ... }: { services.openssh = { enable = true; settings = { PermitRootLogin = lib.mkForce "no"; PasswordAuthentication = false; }; }; users.users.nixos = { isNormalUser = true; extraGroups = [ "wheel" ]; shell = pkgs.zsh; openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAwfb2jpKrBnCw28aevnH8HbE5YbcMXpdaVv2KmueDu6 torjus@gunter" ]; }; security.sudo.wheelNeedsPassword = false; programs.zsh.enable = true; homelab.dns.enable = false; homelab.monitoring.enable = false; homelab.host.labels.ansible = "false"; fileSystems."/" = { device = "/dev/disk/by-label/nixos"; fsType = "ext4"; autoResize = true; }; boot.loader.grub.enable = true; boot.loader.grub.device = "/dev/vda"; networking.hostName = "nrec-nixos01"; networking.useNetworkd = true; networking.useDHCP = false; services.resolved.enable = true; systemd.network.enable = true; systemd.network.networks."ens3" = { matchConfig.Name = "ens3"; networkConfig.DHCP = "ipv4"; linkConfig.RequiredForOnline = "routable"; }; time.timeZone = "Europe/Oslo"; networking.firewall.enable = true; networking.firewall.allowedTCPPorts = [ 22 80 443 ]; nix.settings.substituters = [ "https://cache.nixos.org" ]; nix.settings.trusted-public-keys = [ "cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=" ]; services.caddy = { enable = true; virtualHosts."nrec-nixos01.t-juice.club" = { extraConfig = '' reverse_proxy 127.0.0.1:3000 ''; }; }; zramSwap.enable = true; system.stateVersion = "25.11"; }