mirror of
https://github.com/foo-dogsquared/nixos-config.git
synced 2025-02-07 06:19:00 +00:00
hosts: update plover and admin user
This commit is contained in:
parent
98a0837731
commit
9b4c5607d4
@ -13,7 +13,6 @@ in
|
|||||||
openssh.authorizedKeys.keyFiles = [
|
openssh.authorizedKeys.keyFiles = [
|
||||||
../../../home-manager/foo-dogsquared/files/ssh-key.pub
|
../../../home-manager/foo-dogsquared/files/ssh-key.pub
|
||||||
../../../home-manager/foo-dogsquared/files/ssh-key-2.pub
|
../../../home-manager/foo-dogsquared/files/ssh-key-2.pub
|
||||||
../../ni/files/ssh-key.pub
|
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -33,9 +32,4 @@ in
|
|||||||
|
|
||||||
# This is also a trusted user for the Nix daemon.
|
# This is also a trusted user for the Nix daemon.
|
||||||
nix.settings.trusted-users = [ name ];
|
nix.settings.trusted-users = [ name ];
|
||||||
|
|
||||||
# Allow the user to easily enter into several services such as the database
|
|
||||||
# services to allowing some debugging.
|
|
||||||
services.postgresql.ensureUsers = [{ inherit name; }];
|
|
||||||
services.mysql.ensureUsers = [{ inherit name; }];
|
|
||||||
}
|
}
|
||||||
|
@ -8,20 +8,22 @@ in
|
|||||||
{
|
{
|
||||||
users.users.${user} = {
|
users.users.${user} = {
|
||||||
home = "/home/${user}";
|
home = "/home/${user}";
|
||||||
hashedPassword = "$6$gpgBrL3.RAGa9NBp$93Ac5ZW53KcgbA9q4awVKA.bVArP7Hw1NbyakT30Mav.7obIuN17WWijT.EaBSJU6ArvdXTehC3xZ9/9oZPDR0";
|
hashedPassword = "$y$j9T$43ExH5GLbEGwgnNGhmcTD/$qXoZE5Cm9O2Z3zMM/VyCZ18qN2Hc9.KvCnVz6tmjVVD";
|
||||||
extraGroups = [ "wheel" "wireshark" ];
|
extraGroups = [ "wheel" ];
|
||||||
useDefaultShell = true;
|
useDefaultShell = true;
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
description = "The go-to user for server systems.";
|
description = "The go-to user for server systems.";
|
||||||
|
|
||||||
|
openssh.authorizedKeys.keys = [
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGo3tfNQjWZ5pxlqREfBgQJxdNzGHKJIy5hDS9Z+Hpth plover.foodogsquared.one"
|
||||||
|
];
|
||||||
|
|
||||||
openssh.authorizedKeys.keyFiles = [
|
openssh.authorizedKeys.keyFiles = [
|
||||||
../../../home-manager/foo-dogsquared/files/ssh-key.pub
|
../../../home-manager/foo-dogsquared/files/ssh-key.pub
|
||||||
../../../home-manager/foo-dogsquared/files/ssh-key-2.pub
|
../../../home-manager/foo-dogsquared/files/ssh-key-2.pub
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
programs.wireshark.enable = true;
|
|
||||||
|
|
||||||
home-manager.users.${user} = {
|
home-manager.users.${user} = {
|
||||||
imports = [ homeManagerUser ];
|
imports = [ homeManagerUser ];
|
||||||
};
|
};
|
||||||
|
Loading…
Reference in New Issue
Block a user