100931cca6
We should really have the user set it, or at least have a warning.
33 lines
954 B
Nix
33 lines
954 B
Nix
{ pkgs, modulesPath, ... }:
|
|
|
|
let username = "azurenixosuser";
|
|
in
|
|
{
|
|
imports = [
|
|
"${modulesPath}/virtualisation/azure-common.nix"
|
|
"${modulesPath}/virtualisation/azure-image.nix"
|
|
];
|
|
|
|
## NOTE: This is just an example of how to hard-code a user.
|
|
## The normal Azure agent IS included and DOES provision a user based
|
|
## on the information passed at VM creation time.
|
|
users.users."${username}" = {
|
|
isNormalUser = true;
|
|
home = "/home/${username}";
|
|
description = "Azure NixOS Test User";
|
|
openssh.authorizedKeys.keys = [ (builtins.readFile ~/.ssh/id_ed25519.pub) ];
|
|
};
|
|
nix.settings.trusted-users = [ username ];
|
|
|
|
virtualisation.azureImage.diskSize = 2500;
|
|
|
|
boot.kernelPackages = pkgs.linuxPackages_latest;
|
|
|
|
# test user doesn't have a password
|
|
services.openssh.passwordAuthentication = false;
|
|
security.sudo.wheelNeedsPassword = false;
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
git file htop wget curl
|
|
];
|
|
}
|