my nixos dotfiles :3 (git.koi.rip mirror) git.koi.rip/koi/dotfiles
linux dotfiles neovim nixos catppuccin

users: hi robin

+19 -10
+2 -1
modules/base/users/default.nix
··· 1 1 { 2 2 imports = [ 3 + ./root.nix 3 4 ./koi.nix 4 - ./root.nix 5 + ./robin.nix 5 6 ]; 6 7 7 8 config.users.mutableUsers = false;
+12
modules/base/users/robin.nix
··· 1 + { 2 + users.users.robin = { 3 + isNormalUser = true; 4 + hashedPassword = "$y$j9T$fjikoYmPQxjKqjobJ/vZC/$ULBf6ns9PS8EUHBeRbnd3QQbOSCtAe18JhK3UUy.nv2"; 5 + ignoreShellProgramCheck = true; 6 + openssh.authorizedKeys.keys = [ 7 + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKKxTuK2A7wbXnjkIhDrze4B5Uj2rnpmPAWGjPDMPiyk robin" 8 + ]; 9 + }; 10 + 11 + systemd.tmpfiles.rules = [ "d /var/boo 770 robin users -" ]; 12 + }
+5 -9
systems/seber/services/robin.nix
··· 1 + { lib, config, ... }: 2 + 1 3 let 2 4 tls = { 3 5 forceSSL = true; ··· 11 13 users = { 12 14 groups.robin = { }; 13 15 users.robin = { 14 - group = "robin"; 15 - home = "/var/robin"; 16 - createHome = false; 17 - isNormalUser = true; 18 - hashedPassword = "!"; 19 - openssh.authorizedKeys.keys = [ 16 + hashedPassword = lib.mkForce "!"; 17 + openssh.authorizedKeys.keys = lib.mkForce [ 20 18 "no-agent-forwarding,no-port-forwarding,no-pty,no-user-rc,no-X11-forwarding ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDeSHaoF0Qs1G8JO/enOo2vxzkvvOqAMZPG2DX7TgG8u" 21 19 ]; 22 20 }; 23 21 }; 24 - 25 - systemd.tmpfiles.rules = [ "d /var/robin 2755 robin robin -" ]; 26 22 27 23 systemd.user.services.maivi = { 28 24 description = "maivi :3"; ··· 31 27 32 28 unitConfig.ConditionUser = "robin"; 33 29 serviceConfig = { 34 - ExecStart = "/var/robin/maivi"; 30 + ExecStart = "${config.users.users.robin.home}/maivi"; 35 31 Restart = "on-failure"; 36 32 RestartSec = 20; 37 33 };