user updates
This commit is contained in:
@@ -1,4 +1,9 @@
|
|||||||
{ lib, config, namespace, ... }:
|
{
|
||||||
|
lib,
|
||||||
|
config,
|
||||||
|
namespace,
|
||||||
|
...
|
||||||
|
}:
|
||||||
with lib;
|
with lib;
|
||||||
let
|
let
|
||||||
cfg = config.${namespace}.services.free-games-claimer;
|
cfg = config.${namespace}.services.free-games-claimer;
|
||||||
|
|||||||
@@ -1,4 +1,9 @@
|
|||||||
{ lib, config, namespace, ... }:
|
{
|
||||||
|
lib,
|
||||||
|
config,
|
||||||
|
namespace,
|
||||||
|
...
|
||||||
|
}:
|
||||||
with lib;
|
with lib;
|
||||||
let
|
let
|
||||||
cfg = config.${namespace}.services.manyfold;
|
cfg = config.${namespace}.services.manyfold;
|
||||||
|
|||||||
@@ -1,4 +1,9 @@
|
|||||||
{ lib, config, namespace, ... }:
|
{
|
||||||
|
lib,
|
||||||
|
config,
|
||||||
|
namespace,
|
||||||
|
...
|
||||||
|
}:
|
||||||
with lib;
|
with lib;
|
||||||
let
|
let
|
||||||
cfg = config.${namespace}.services.mongodb;
|
cfg = config.${namespace}.services.mongodb;
|
||||||
|
|||||||
@@ -1,4 +1,9 @@
|
|||||||
{ lib, config, namespace, ... }:
|
{
|
||||||
|
lib,
|
||||||
|
config,
|
||||||
|
namespace,
|
||||||
|
...
|
||||||
|
}:
|
||||||
with lib;
|
with lib;
|
||||||
let
|
let
|
||||||
cfg = config.${namespace}.services.tdarr;
|
cfg = config.${namespace}.services.tdarr;
|
||||||
|
|||||||
@@ -1,4 +1,9 @@
|
|||||||
{ lib, config, namespace, ... }:
|
{
|
||||||
|
lib,
|
||||||
|
config,
|
||||||
|
namespace,
|
||||||
|
...
|
||||||
|
}:
|
||||||
with lib;
|
with lib;
|
||||||
let
|
let
|
||||||
cfg = config.${namespace}.services.your_spotify;
|
cfg = config.${namespace}.services.your_spotify;
|
||||||
|
|||||||
@@ -4,7 +4,10 @@ with lib;
|
|||||||
options.${namespace}.hardware.disko = {
|
options.${namespace}.hardware.disko = {
|
||||||
enable = mkEnableOption "enable disko";
|
enable = mkEnableOption "enable disko";
|
||||||
filesystem = mkOption {
|
filesystem = mkOption {
|
||||||
type = types.enum [ "bcachefs" "btrfs" ];
|
type = types.enum [
|
||||||
|
"bcachefs"
|
||||||
|
"btrfs"
|
||||||
|
];
|
||||||
default = "btrfs";
|
default = "btrfs";
|
||||||
description = "Filesystem to use for the root partition";
|
description = "Filesystem to use for the root partition";
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,4 +1,9 @@
|
|||||||
{ config, lib, namespace, ... }:
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
namespace,
|
||||||
|
...
|
||||||
|
}:
|
||||||
with lib;
|
with lib;
|
||||||
let
|
let
|
||||||
cfg = config.${namespace}.services.gitea;
|
cfg = config.${namespace}.services.gitea;
|
||||||
|
|||||||
@@ -1,4 +1,3 @@
|
|||||||
|
|
||||||
{
|
{
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
@@ -105,7 +104,9 @@ in
|
|||||||
{
|
{
|
||||||
assertion =
|
assertion =
|
||||||
if hasAttr "/" config.fileSystems then
|
if hasAttr "/" config.fileSystems then
|
||||||
config.fileSystems."/".fsType == "btrfs" || config.fileSystems."/".fsType == "bcachefs" || config.fileSystems."/".fsType == "tmpfs"
|
config.fileSystems."/".fsType == "btrfs"
|
||||||
|
|| config.fileSystems."/".fsType == "bcachefs"
|
||||||
|
|| config.fileSystems."/".fsType == "tmpfs"
|
||||||
else
|
else
|
||||||
false;
|
false;
|
||||||
message = "rootfs must be btrfs, bcachefs, or tmpfs; not " + config.fileSystems."/".fsType;
|
message = "rootfs must be btrfs, bcachefs, or tmpfs; not " + config.fileSystems."/".fsType;
|
||||||
@@ -113,7 +114,10 @@ in
|
|||||||
|
|
||||||
{
|
{
|
||||||
assertion =
|
assertion =
|
||||||
if hasAttr "/" config.fileSystems && (config.fileSystems."/".fsType == "btrfs" || config.fileSystems."/".fsType == "bcachefs") then
|
if
|
||||||
|
hasAttr "/" config.fileSystems
|
||||||
|
&& (config.fileSystems."/".fsType == "btrfs" || config.fileSystems."/".fsType == "bcachefs")
|
||||||
|
then
|
||||||
any (
|
any (
|
||||||
t: t == "subvol=root" || t == "subvol=/root" || t == "X-mount.subdir=subvolumes/root"
|
t: t == "subvol=root" || t == "subvol=/root" || t == "X-mount.subdir=subvolumes/root"
|
||||||
) config.fileSystems."/".options
|
) config.fileSystems."/".options
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
{
|
{
|
||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
|
||||||
namespace,
|
namespace,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
@@ -87,8 +86,7 @@ in
|
|||||||
config.sops.secrets.wifi.path
|
config.sops.secrets.wifi.path
|
||||||
];
|
];
|
||||||
|
|
||||||
profiles = mapAttrs
|
profiles = mapAttrs (name: profile: {
|
||||||
(name: profile: {
|
|
||||||
connection = {
|
connection = {
|
||||||
id = name;
|
id = name;
|
||||||
type = "wifi";
|
type = "wifi";
|
||||||
@@ -117,8 +115,7 @@ in
|
|||||||
key-mgmt = profile.keyMgmt;
|
key-mgmt = profile.keyMgmt;
|
||||||
psk = profile.psk;
|
psk = profile.psk;
|
||||||
};
|
};
|
||||||
})
|
}) cfg.wifi.profiles;
|
||||||
cfg.wifi.profiles;
|
|
||||||
};
|
};
|
||||||
})
|
})
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -109,7 +109,8 @@ with lib;
|
|||||||
description = "Whether to enable WiFi power saving.";
|
description = "Whether to enable WiFi power saving.";
|
||||||
};
|
};
|
||||||
profiles = mkOption {
|
profiles = mkOption {
|
||||||
type = types.attrsOf (types.submodule {
|
type = types.attrsOf (
|
||||||
|
types.submodule {
|
||||||
options = {
|
options = {
|
||||||
ssid = mkOption {
|
ssid = mkOption {
|
||||||
type = types.str;
|
type = types.str;
|
||||||
@@ -126,7 +127,8 @@ with lib;
|
|||||||
description = "Key management type (e.g., sae, wpa-psk).";
|
description = "Key management type (e.g., sae, wpa-psk).";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
});
|
}
|
||||||
|
);
|
||||||
default = { };
|
default = { };
|
||||||
description = "WiFi network profiles.";
|
description = "WiFi network profiles.";
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -8,6 +8,18 @@
|
|||||||
with lib;
|
with lib;
|
||||||
let
|
let
|
||||||
cfg = config.${namespace}.user;
|
cfg = config.${namespace}.user;
|
||||||
|
|
||||||
|
isRoot = (cfg.name == "root");
|
||||||
|
|
||||||
|
# Common SSH keys used across systems
|
||||||
|
commonSshKeys = [
|
||||||
|
# MacBook
|
||||||
|
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCw9zq8DLGByI5v2gAn95hKNyOsm3g61a2buxu2BBMFysQJgmZPCCLUqRJKhSM5Vm/JOgsAmdpRBRZQoHD+6S844CJHb4v4VIbjkyQgYCuM7Rst2IOZ5QybvsA2/D0nwytZ+HXQqDj2AagUYDbz0gyyIHkDQ5YGBMkvkWz/h1Vci6aoBM7VihEDM4KlWoTVuPeASGM8r5IZ2FS83Djbqo4ov6AYvLMrKB9Z7hmFgH6R3LE0gxOkzbGVXtSuvJyrjvgytoT22UhATjjxSQ9D+YJXXkQoB3lUdg8OoIquUPjMZpl4mR8ffvseWPfcvD1XlD5t+TOHFqKpESO547tlOBYhdpew+NSgAXpamCU6oyV8tDCywLQu2ucxHRn78u6WXzWHkDtffdhzmk6TZaPhWqVHuTGjR4higBgGqUfSaKOMszt+FDRZAr3HtuQ2+zJ8bowK9fW5OqilTtK2HtQqroD9ApegDNbqOz6kGy5IycSXvqPURy/M4lxZxbtBPuemcJs= mattjallen@MacBook-Pro.local"
|
||||||
|
# Desktop Windows
|
||||||
|
"ssh-rsa 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 mattl@Jallen-PC"
|
||||||
|
# Desktop NixOS
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPTBMydhOc6SnOdB5WrEd7X07DrboAtagCUgXiOJjLov matt@matt-nixos"
|
||||||
|
];
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options.${namespace}.user = with types; {
|
options.${namespace}.user = with types; {
|
||||||
@@ -41,11 +53,58 @@ in
|
|||||||
default = null;
|
default = null;
|
||||||
description = "Path to the password file for this user account";
|
description = "Path to the password file for this user account";
|
||||||
};
|
};
|
||||||
|
sshKeys = lib.mkOption {
|
||||||
|
type = listOf str;
|
||||||
|
default = [ ];
|
||||||
|
description = "List of SSH public keys for the user.";
|
||||||
|
};
|
||||||
|
enableCommonSshKeys = lib.mkOption {
|
||||||
|
type = bool;
|
||||||
|
default = true;
|
||||||
|
description = "Whether to include common SSH keys used across systems.";
|
||||||
|
};
|
||||||
|
uid = lib.mkOption {
|
||||||
|
type = int;
|
||||||
|
default = if isRoot then ids.uids.root else 1000;
|
||||||
|
description = "The user ID for the user account.";
|
||||||
|
};
|
||||||
|
packages = lib.mkOption {
|
||||||
|
type = listOf package;
|
||||||
|
default = [ ];
|
||||||
|
description = "List of packages to install for this user.";
|
||||||
|
};
|
||||||
|
linger = lib.mkOption {
|
||||||
|
type = bool;
|
||||||
|
default = false;
|
||||||
|
description = "Whether to enable systemd user service persistence.";
|
||||||
|
};
|
||||||
|
password = lib.mkOption {
|
||||||
|
type = nullOr str;
|
||||||
|
default = null;
|
||||||
|
description = "Plain text password for the user (development only).";
|
||||||
|
};
|
||||||
|
hashedPassword = lib.mkOption {
|
||||||
|
type = nullOr str;
|
||||||
|
default = null;
|
||||||
|
description = "Hashed password for the user.";
|
||||||
|
};
|
||||||
|
mutableUsers = lib.mkOption {
|
||||||
|
type = bool;
|
||||||
|
default = false;
|
||||||
|
description = "Whether users are mutable (can be modified after creation).";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
config = {
|
config = {
|
||||||
|
users.mutableUsers = cfg.mutableUsers;
|
||||||
|
|
||||||
users.users.${cfg.name} = {
|
users.users.${cfg.name} = {
|
||||||
inherit (cfg) name;
|
inherit (cfg)
|
||||||
|
name
|
||||||
|
uid
|
||||||
|
linger
|
||||||
|
packages
|
||||||
|
;
|
||||||
|
|
||||||
extraGroups = [
|
extraGroups = [
|
||||||
"wheel"
|
"wheel"
|
||||||
@@ -69,10 +128,21 @@ in
|
|||||||
|
|
||||||
group = "users";
|
group = "users";
|
||||||
home = "/home/${cfg.name}";
|
home = "/home/${cfg.name}";
|
||||||
isNormalUser = true;
|
isNormalUser = (!isRoot);
|
||||||
|
isSystemUser = isRoot;
|
||||||
shell = lib.mkForce pkgs.zsh;
|
shell = lib.mkForce pkgs.zsh;
|
||||||
uid = 1000;
|
|
||||||
hashedPasswordFile = cfg.passwordFile;
|
# SSH keys - combine user-specific and common keys
|
||||||
|
openssh.authorizedKeys.keys = cfg.sshKeys ++ (lib.optionals cfg.enableCommonSshKeys commonSshKeys);
|
||||||
|
|
||||||
|
# Authentication - priority: passwordFile > hashedPassword > password
|
||||||
|
hashedPasswordFile = lib.mkIf (cfg.passwordFile != null) cfg.passwordFile;
|
||||||
|
hashedPassword = lib.mkIf (
|
||||||
|
cfg.passwordFile == null && cfg.hashedPassword != null
|
||||||
|
) cfg.hashedPassword;
|
||||||
|
password = lib.mkIf (
|
||||||
|
cfg.passwordFile == null && cfg.hashedPassword == null && cfg.password != null
|
||||||
|
) cfg.password;
|
||||||
}
|
}
|
||||||
// cfg.extraOptions;
|
// cfg.extraOptions;
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -26,6 +26,25 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
${namespace} = {
|
${namespace} = {
|
||||||
|
user = {
|
||||||
|
name = "matt";
|
||||||
|
extraGroups = [
|
||||||
|
"ratbagd"
|
||||||
|
"input"
|
||||||
|
"scanner"
|
||||||
|
"lp"
|
||||||
|
"video"
|
||||||
|
"i2c"
|
||||||
|
];
|
||||||
|
packages = with pkgs; [
|
||||||
|
firefox
|
||||||
|
tree
|
||||||
|
git
|
||||||
|
box64
|
||||||
|
prismlauncher
|
||||||
|
distrobox
|
||||||
|
];
|
||||||
|
};
|
||||||
desktop = {
|
desktop = {
|
||||||
hyprland = {
|
hyprland = {
|
||||||
enable = true;
|
enable = true;
|
||||||
@@ -85,31 +104,6 @@ in
|
|||||||
|
|
||||||
nixpkgs.config.allowUnsupportedSystem = true;
|
nixpkgs.config.allowUnsupportedSystem = true;
|
||||||
|
|
||||||
# Define a user account. Don't forget to set a password with ‘passwd’.
|
|
||||||
users.users.matt = {
|
|
||||||
isNormalUser = true;
|
|
||||||
extraGroups = [
|
|
||||||
"wheel"
|
|
||||||
"keys"
|
|
||||||
"networkmanager"
|
|
||||||
"ratbagd"
|
|
||||||
"input"
|
|
||||||
"scanner"
|
|
||||||
"lp"
|
|
||||||
"video"
|
|
||||||
"i2c"
|
|
||||||
]; # Enable ‘sudo’ for the user.
|
|
||||||
shell = pkgs.zsh;
|
|
||||||
packages = with pkgs; [
|
|
||||||
firefox
|
|
||||||
tree
|
|
||||||
git
|
|
||||||
box64
|
|
||||||
prismlauncher
|
|
||||||
distrobox
|
|
||||||
];
|
|
||||||
};
|
|
||||||
|
|
||||||
virtualisation = {
|
virtualisation = {
|
||||||
containers.enable = true;
|
containers.enable = true;
|
||||||
podman.enable = true;
|
podman.enable = true;
|
||||||
|
|||||||
@@ -9,8 +9,6 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
user = "matt";
|
|
||||||
# password = config.sops.secrets."pi4/matt-password".path;
|
|
||||||
kernelBundle = pkgs.linuxAndFirmware.latest;
|
kernelBundle = pkgs.linuxAndFirmware.latest;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
@@ -23,6 +21,15 @@ in
|
|||||||
|
|
||||||
${namespace} = {
|
${namespace} = {
|
||||||
hardware.disko.enable = true;
|
hardware.disko.enable = true;
|
||||||
|
user = {
|
||||||
|
name = "matt";
|
||||||
|
password = "BogieDudie1";
|
||||||
|
mutableUsers = false;
|
||||||
|
extraGroups = [
|
||||||
|
"docker"
|
||||||
|
"video"
|
||||||
|
];
|
||||||
|
};
|
||||||
network = {
|
network = {
|
||||||
hostName = "pi4";
|
hostName = "pi4";
|
||||||
ipv4 = {
|
ipv4 = {
|
||||||
@@ -80,36 +87,12 @@ in
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
users = {
|
# Root user configuration - explicit to avoid conflicts with home-manager
|
||||||
mutableUsers = false;
|
users.users.root = {
|
||||||
users = {
|
|
||||||
"${user}" = {
|
|
||||||
isNormalUser = true;
|
|
||||||
# hashedPasswordFile = password;
|
|
||||||
password = lib.mkForce "BogieDudie1";
|
|
||||||
extraGroups = [
|
|
||||||
"wheel"
|
|
||||||
"docker"
|
|
||||||
"video"
|
|
||||||
];
|
|
||||||
shell = pkgs.zsh;
|
|
||||||
openssh.authorizedKeys.keys = [
|
|
||||||
# macBook
|
|
||||||
"ssh-rsa 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 mattjallen@MacBook-Pro.local"
|
|
||||||
# desktop windows
|
|
||||||
"ssh-rsa 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 mattl@Jallen-PC"
|
|
||||||
# desktop nixos
|
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPTBMydhOc6SnOdB5WrEd7X07DrboAtagCUgXiOJjLov matt@matt-nixos"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
|
|
||||||
root = {
|
|
||||||
isSystemUser = true;
|
isSystemUser = true;
|
||||||
isNormalUser = false;
|
isNormalUser = false;
|
||||||
shell = pkgs.zsh;
|
shell = pkgs.zsh;
|
||||||
};
|
};
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
programs = {
|
programs = {
|
||||||
kdeconnect.enable = false;
|
kdeconnect.enable = false;
|
||||||
|
|||||||
@@ -1,7 +1,4 @@
|
|||||||
{ lib, config, ... }:
|
{ lib, config, ... }:
|
||||||
let
|
|
||||||
hostname = "pi4";
|
|
||||||
in
|
|
||||||
{
|
{
|
||||||
# Networking configs
|
# Networking configs
|
||||||
networking = {
|
networking = {
|
||||||
|
|||||||
@@ -10,8 +10,6 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
user = "matt";
|
|
||||||
# password = config.sops.secrets."pi5/matt-password".path;
|
|
||||||
kernelBundle = pkgs.linuxAndFirmware.latest;
|
kernelBundle = pkgs.linuxAndFirmware.latest;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
@@ -25,6 +23,16 @@ in
|
|||||||
${namespace} = {
|
${namespace} = {
|
||||||
hardware.disko.enable = true;
|
hardware.disko.enable = true;
|
||||||
desktop.hyprland.enable = false;
|
desktop.hyprland.enable = false;
|
||||||
|
user = {
|
||||||
|
name = "matt";
|
||||||
|
password = "BogieDudie1";
|
||||||
|
mutableUsers = false;
|
||||||
|
extraGroups = [ "docker" ];
|
||||||
|
sshKeys = [
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOTha0FbV1tkpnJr7xVH78S5MetJH+0o2YrEcuvhL692 root@jallen-nas"
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIwoHWOLSTGVif9hAhaMLl0qDA4roIzCNuyR6kyIXDOj admin@jallen-nas"
|
||||||
|
];
|
||||||
|
};
|
||||||
network = {
|
network = {
|
||||||
hostName = "pi5";
|
hostName = "pi5";
|
||||||
ipv4 = {
|
ipv4 = {
|
||||||
@@ -89,30 +97,8 @@ in
|
|||||||
|
|
||||||
hardware.graphics.enable32Bit = lib.mkForce false;
|
hardware.graphics.enable32Bit = lib.mkForce false;
|
||||||
|
|
||||||
users = {
|
# Root user configuration
|
||||||
mutableUsers = false;
|
users.users.root.shell = pkgs.zsh;
|
||||||
users."${user}" = {
|
|
||||||
isNormalUser = true;
|
|
||||||
# hashedPasswordFile = password;
|
|
||||||
password = lib.mkForce "BogieDudie1";
|
|
||||||
extraGroups = [
|
|
||||||
"wheel"
|
|
||||||
"docker"
|
|
||||||
];
|
|
||||||
openssh.authorizedKeys.keys = [
|
|
||||||
# macBook
|
|
||||||
"ssh-rsa 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 mattjallen@MacBook-Pro.local"
|
|
||||||
# desktop windows
|
|
||||||
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDZ2PYPjZddOzR8OJj16G88KcUhCDLkvrEmpUQP0wKHDUuA27HQQ2ORo66asadwGHY3k1VDZ1ei9l9H++SIIeKOaaUr5yZdktvj4POUNtbd9ZhcS7sZU7BSF+NMDM+h3tImh6z0S7mWvRQOUv3ZM+ZER+5xTWJVG1OOJEpb1drxJk6Qz0wbZKSR7TPNFBLLXlVy7hkNYf07RtDyhCCxNB3hJfa8c+oztnWumwDhDQWLqiUXWIU2QH6iRLGl/WYnujtNvVVaV/Hn3JJkS6MM9dnV3cpoIO0+J7+WfsN9rZ0wXt5yY3GhiGXwmcO5eYVli8lHlLWtK7aYSETyry6CBsLbojzOQO5rSqhpwfF2njAAFAQU0UjLc8PahisIuFKCwHH4iyXXOagiv5K1Mc/0Ak+WhhMPee6vV2p7NTyNpXRvouDbWy5cSRH31WgQ9fK5mIGe5v8nGGqtEhUubUkiOgP+H3UbT2V/nTv/TFKdJcKw+WmizvTrxBmaMjWALlkYl+s= mattl@Jallen-PC"
|
|
||||||
# desktop nixos
|
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPTBMydhOc6SnOdB5WrEd7X07DrboAtagCUgXiOJjLov matt@matt-nixos"
|
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOTha0FbV1tkpnJr7xVH78S5MetJH+0o2YrEcuvhL692 root@jallen-nas"
|
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIwoHWOLSTGVif9hAhaMLl0qDA4roIzCNuyR6kyIXDOj admin@jallen-nas"
|
|
||||||
];
|
|
||||||
shell = pkgs.zsh;
|
|
||||||
};
|
|
||||||
users.root.shell = pkgs.zsh;
|
|
||||||
};
|
|
||||||
|
|
||||||
programs = {
|
programs = {
|
||||||
kdeconnect.enable = false;
|
kdeconnect.enable = false;
|
||||||
|
|||||||
@@ -1,4 +1,9 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}:
|
||||||
let
|
let
|
||||||
configLimit = 50;
|
configLimit = 50;
|
||||||
kernel = pkgs.linuxPackages; # linuxPackages_latest;
|
kernel = pkgs.linuxPackages; # linuxPackages_latest;
|
||||||
|
|||||||
@@ -109,6 +109,7 @@
|
|||||||
};
|
};
|
||||||
user = {
|
user = {
|
||||||
name = "admin";
|
name = "admin";
|
||||||
|
linger = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user