sudo-rs, enable mtr, ipv6

This commit is contained in:
Ezri Zhu 2024-09-27 11:28:47 -04:00
parent ae332475fb
commit e76bfacc62
Signed by: ezri
SSH key fingerprint: SHA256:PjS2hKMfl3gJ5Furjjq+kXa4ZvS1c0gb4/djAxxAf6c
4 changed files with 17 additions and 118 deletions

View file

@ -19,8 +19,12 @@
git git
podman-tui podman-tui
]; ];
programs.mtr.enable = true;
programs.zsh.enable = true; programs.zsh.enable = true;
security.sudo.wheelNeedsPassword = false; security.sudo-rs = {
enable = true;
wheelNeedsPassword = false;
};
networking.firewall.enable = false; networking.firewall.enable = false;
services.openssh.enable = true; services.openssh.enable = true;
virtualisation.containers.enable = true; virtualisation.containers.enable = true;

View file

@ -3,7 +3,8 @@
Welcome to wolfgirl.systems! Welcome to wolfgirl.systems!
Join our Matrix chat: #wolfgirlsgen:envs.net Join our Matrix chat: #wolfgirlsgen:envs.net
Latest news Latest news
* Flakes now enabled * Stella: Flakes now enabled
* Web hosting now available, contact an admin to enable * Stella: Web hosting now available, contact an admin to enable
* Stella: ipv6 enabled
''; '';
} }

View file

@ -1,114 +0,0 @@
{ pkgs, ... }:
{
nix.settings.trusted-users = [ "@wheel" ];
nix.settings.allowed-users = [ "@users" ];
users.users.ezri = {
uid = 2000;
isNormalUser = true;
extraGroups = [ "wheel" ];
openssh.authorizedKeys.keys = [
"ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBHp8yRnahmUS7l8STsx0pH25O4xTWGYQyQEWeKWxeM7gbkTNPGpiUswmsHgN8Ng0+FwjIw0FHkjQeLSMH9OTSB4= ipad0esp"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJdN4a3yJUlKIaVezOe4hE8fRK9DkGSzwoZ9vfpsBsHh ide0"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICY1V1im0gnXKWdR/H0Q0tajQFQqnDXoNVG3X8/RseI3 lap0"
];
};
users.users.haylin = {
uid = 2001;
isNormalUser = true;
extraGroups = [ "wheel" ];
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHavg+rhFmR2p9wuWiO4VxKaIXpq1gOm17jCoZ9jMxvL"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDWQEngBdDZCuRK5DDSah140NECUd+pC/TH9/VgOFnaX"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEfRYvwhwGSd5c3tgvbMhhFT1nFeX4AGDMmOZJ4Humu1"
"ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMz23eokh1s5CdddEXezfN2O4cFw0IDdKlVVDmC+W6rMelp8cAhVhOFIIK4HvtVUxdwnYOGWwKFbjaD9blBsZgA="
];
};
users.users.void = {
uid = 2002;
isNormalUser = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBLS+zE1eW9LARG9iIliGGHbJmuY1ulGVOp9dvEfTKyb void@catboy-hackermaid"
];
};
users.users.azriel = {
uid = 2003;
isNormalUser = true;
shell = pkgs.zsh;
homeMode = "755";
openssh.authorizedKeys.keys = [
"ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBHp8yRnahmUS7l8STsx0pH25O4xTWGYQyQEWeKWxeM7gbkTNPGpiUswmsHgN8Ng0+FwjIw0FHkjQeLSMH9OTSB4= ipad0esp"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJdN4a3yJUlKIaVezOe4hE8fRK9DkGSzwoZ9vfpsBsHh ide0"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICY1V1im0gnXKWdR/H0Q0tajQFQqnDXoNVG3X8/RseI3 lap0"
];
};
users.users.melody = {
uid = 2004;
isNormalUser = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIYKXNjND84lbfPp5a27ldHNM3egH2tpcQhI3ie12ZJS melody@tilde.town"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAx1i+1WumVoGP1cjAhjDV6FJYNiwpwyAKM29Dc8ibm9 semibreve-ezricloud"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK2uPI6ubwHEBldvB8hRxEMzs/CCK+VcmfLueDxARtoI minim-laptop"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID6evFrnl/d7IVqD941lLZ6zgSyMpjZsqH70Kc+w5bl/ crotchet-steamdeck"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMCEZAUryY3xJwL/F7VorplZTcxf2aajGsLz1Bela6YI quaver-tablet"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDE6V1EgGF8pBR9qoYET7PQ3diy+RnlcVDjNVHXduFIE semiquaver-mobile"
];
};
users.users.gabe = {
uid = 2005;
isNormalUser = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILHEs4BLfJ9vniDJhrqcndDijv6ZIdUreZf2e+vQxGGa gbox"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIG8Aa9Q+Wf1YFi0XqG/5OK0RruJL7ItRQKLQtMVUsIIn gtop"
];
};
users.users.james = {
uid = 2006;
isNormalUser = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIH9UrLap0mk8rqCBVBvWFOzgrCSU1xPS3sqfCMtq0f/9"
];
};
users.users.marisa = {
uid = 2007;
isNormalUser = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIANqbfWfsTyTA8/5vHLqsyCSBtzXMl1gNakNsmYp6hJt"
];
};
users.users.spotlight = {
uid = 2008;
isNormalUser = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPQQO+c8ygVzRt55Z9qekqItSjYiw381cFPOqX+vGAGT"
];
};
users.users.mmerlin = {
uid = 2009;
isNormalUser = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAizK+YrRJ3ynDq682FRQ7gvOxVkqY3hvGMOSgiRqe6p mmerlin@stevens.edu"
];
};
users.users.emi = {
uid = 2010;
isNormalUser = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMT4AvwSptCu8SJcklx/6F8BgixB2C8Mlx1KXN23fe48"
];
};
users.users.kumi = {
uid = 2011;
isNormalUser = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJqdPDDRAxZG2YSlvJ98uYQli/Bpus4I2T2JOl9zcI23"
];
};
users.users.kitsu = {
uid = 2012;
isNormalUser = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBii/5J858CvRPBYjgCB96WKH3E/1z1NA77VOZbIm6YA kitsu_@kitsu-laptop"
];
};
}

View file

@ -27,18 +27,26 @@
networking = { networking = {
hostName = "stella"; hostName = "stella";
search = ["wolfgirl.systems"]; search = ["wolfgirl.systems"];
nameservers = [ "9.9.9.10" "149.112.112.10" ]; nameservers = [ "9.9.9.10" "149.112.112.10" "2620:fe::10" "2620:fe::fe:10"];
dhcpcd.enable = false; dhcpcd.enable = false;
interfaces = { interfaces = {
enp1s0.ipv4.addresses = [{ enp1s0.ipv4.addresses = [{
address = "198.8.59.4"; address = "198.8.59.4";
prefixLength = 27; prefixLength = 27;
}]; }];
enp1s0.ipv6.addresses = [{
address = "2a0f:85c1:31:e11a::";
prefixLength = 48;
}];
}; };
defaultGateway = { defaultGateway = {
address = "198.8.59.1"; address = "198.8.59.1";
interface = "enp1s0"; interface = "enp1s0";
}; };
defaultGateway6 = {
address = "2a0f:85c1:31::";
interface = "enp1s0";
};
}; };
time.timeZone = "America/New_York"; time.timeZone = "America/New_York";