arrange users marisa:spark and satori:bat
Signed-off-by: natto1784 <natto@weirdnatto.in>
This commit is contained in:
		@@ -1,4 +1,4 @@
 | 
			
		||||
{ config, ... }:
 | 
			
		||||
{ config, pkgs, network, ... }:
 | 
			
		||||
{
 | 
			
		||||
  imports = [
 | 
			
		||||
    ./networking.nix
 | 
			
		||||
@@ -7,6 +7,14 @@
 | 
			
		||||
    ./services.nix
 | 
			
		||||
  ];
 | 
			
		||||
 | 
			
		||||
  users.users.spark = {
 | 
			
		||||
    isNormalUser = true;
 | 
			
		||||
    shell = pkgs.zsh;
 | 
			
		||||
    home = "/home/spark";
 | 
			
		||||
    extraGroups = [ "wheel" ];
 | 
			
		||||
    openssh.authorizedKeys.keys = network.commonSSHKeys;
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  time.timeZone = "Asia/Kolkata";
 | 
			
		||||
  system.stateVersion = "21.05";
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -26,23 +26,22 @@
 | 
			
		||||
      enable = false;
 | 
			
		||||
      iwd.enable = true;
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    interfaces = {
 | 
			
		||||
      eth0 = {
 | 
			
		||||
        useDHCP = false;
 | 
			
		||||
        ipv4.addresses = [{
 | 
			
		||||
          prefixLength = 24;
 | 
			
		||||
          address = "192.168.1.159";
 | 
			
		||||
        }];
 | 
			
		||||
      };
 | 
			
		||||
      wlan0 = {
 | 
			
		||||
        useDHCP = false;
 | 
			
		||||
        ipv4.addresses = [{
 | 
			
		||||
          prefixLength = 24;
 | 
			
		||||
          address = "192.168.1.159";
 | 
			
		||||
        }];
 | 
			
		||||
      };
 | 
			
		||||
    };
 | 
			
		||||
    wireguard.interfaces.wg0 = with network.address.wireguard.ips; {
 | 
			
		||||
    wireguard.interfaces.wg0 = with network.addresses.wireguard.ips; {
 | 
			
		||||
      ips = [ marisa ];
 | 
			
		||||
      listenPort = 17840;
 | 
			
		||||
      privateKeyFile = "/var/secrets/wg.key";
 | 
			
		||||
 
 | 
			
		||||
@@ -38,14 +38,7 @@
 | 
			
		||||
      extraConfigFiles = lib.singleton "/run/consul/consul.json";
 | 
			
		||||
    };
 | 
			
		||||
  };
 | 
			
		||||
  users.users.root.openssh.authorizedKeys.keys = [
 | 
			
		||||
    "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJHingN2Aho+KGgEvBMjtoez+W1svl9uVoa4vG0d646j"
 | 
			
		||||
    "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPX1HDzWpoaOcU8GDEGuDzXgxkCpyeqxRR6gLs/8JgHw"
 | 
			
		||||
    "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOSQnDNrNP69tIK7U2D7qaMjycfIjpgx0at4U2D5Ufib"
 | 
			
		||||
    "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK5V/hdkTTQSkDLXaEwY8xb/T8+sWtw5c6UjYOPaTrO8"
 | 
			
		||||
    "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKFyKi0HYfkgvEDvjzmDRGwAq2z2KOkfv7scTVSnonBh"
 | 
			
		||||
  ];
 | 
			
		||||
  security.pki.certificateFiles = [ ../../cert.pem ../../consul-agent-ca.pem ];
 | 
			
		||||
 | 
			
		||||
  security.pki.certificateFiles = [ ../../cert.pem ../../consul-agent-ca.pem ];
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -6,7 +6,7 @@
 | 
			
		||||
      enable = true;
 | 
			
		||||
      extraRules = [
 | 
			
		||||
        {
 | 
			
		||||
          users = [ ];
 | 
			
		||||
          users = [ "wheel" ];
 | 
			
		||||
          keepEnv = true;
 | 
			
		||||
          persist = true;
 | 
			
		||||
        }
 | 
			
		||||
@@ -18,6 +18,7 @@
 | 
			
		||||
    git
 | 
			
		||||
    htop
 | 
			
		||||
    vim
 | 
			
		||||
    tmux
 | 
			
		||||
    wireguard-tools
 | 
			
		||||
    rnix-lsp
 | 
			
		||||
    nmap
 | 
			
		||||
 
 | 
			
		||||
@@ -1,4 +1,4 @@
 | 
			
		||||
{ config, pkgs, ... }:
 | 
			
		||||
{ config, pkgs, network, ... }:
 | 
			
		||||
{
 | 
			
		||||
  imports = [
 | 
			
		||||
    ./networking.nix
 | 
			
		||||
@@ -15,6 +15,7 @@
 | 
			
		||||
    shell = pkgs.zsh;
 | 
			
		||||
    home = "/home/bat";
 | 
			
		||||
    extraGroups = [ "wheel" ];
 | 
			
		||||
    openssh.authorizedKeys.keys = network.commonSSHKeys;
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  system.stateVersion = "21.11";
 | 
			
		||||
 
 | 
			
		||||
@@ -77,12 +77,6 @@ in
 | 
			
		||||
    };
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  users.users.root.openssh.authorizedKeys.keys = [
 | 
			
		||||
    "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJHingN2Aho+KGgEvBMjtoez+W1svl9uVoa4vG0d646j"
 | 
			
		||||
    "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILCH975XCps+VCzo8Fpp5BkbtiFmj9y3//FBVYlQ7/yo"
 | 
			
		||||
    "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMu+SbTrfE62nT7gkZCwiOVOlI2TkVz+RJQ49HbnHvnQ"
 | 
			
		||||
    "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKFyKi0HYfkgvEDvjzmDRGwAq2z2KOkfv7scTVSnonBh"
 | 
			
		||||
  ];
 | 
			
		||||
  security.acme = {
 | 
			
		||||
    acceptTerms = true;
 | 
			
		||||
    certs = {
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user