forked from M-Labs/nix-scripts
nixops: update permissions
This commit is contained in:
parent
2ba53bff9c
commit
beee821588
|
@ -1,4 +1,8 @@
|
||||||
{ pkgs ? import <nixpkgs> {}}:
|
{ pkgs ? import <nixpkgs> {
|
||||||
|
overlays = [ (self: super: {
|
||||||
|
python3 = super.python3.overrideAttrs(oa: { configureFlags = oa.configureFlags ++ ["--enable-optimizations" "--with-lto"]; });
|
||||||
|
}) ];
|
||||||
|
}}:
|
||||||
with pkgs;
|
with pkgs;
|
||||||
let
|
let
|
||||||
pythonDeps = import ./pkgs/python-deps.nix { inherit (pkgs) stdenv fetchFromGitHub python3Packages; };
|
pythonDeps = import ./pkgs/python-deps.nix { inherit (pkgs) stdenv fetchFromGitHub python3Packages; };
|
||||||
|
|
|
@ -29,6 +29,7 @@
|
||||||
wireshark qrencode yosys symbiyosys yices z3 boolector cvc4 pavucontrol keepassx poppler_utils
|
wireshark qrencode yosys symbiyosys yices z3 boolector cvc4 pavucontrol keepassx poppler_utils
|
||||||
jq ark sublime3 rink qemu_kvm konsole
|
jq ark sublime3 rink qemu_kvm konsole
|
||||||
];
|
];
|
||||||
|
programs.wireshark.enable = true;
|
||||||
|
|
||||||
services.openssh.enable = true;
|
services.openssh.enable = true;
|
||||||
services.openssh.forwardX11 = true;
|
services.openssh.forwardX11 = true;
|
||||||
|
@ -81,7 +82,7 @@
|
||||||
};
|
};
|
||||||
users.extraUsers.harry = {
|
users.extraUsers.harry = {
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
extraGroups = ["plugdev" "dialout"];
|
extraGroups = ["plugdev" "dialout" "wireshark"];
|
||||||
};
|
};
|
||||||
security.sudo.wheelNeedsPassword = false;
|
security.sudo.wheelNeedsPassword = false;
|
||||||
services.udev.packages = [ pkgs.openocd pkgs.hackrf ];
|
services.udev.packages = [ pkgs.openocd pkgs.hackrf ];
|
||||||
|
|
|
@ -53,7 +53,7 @@ in
|
||||||
};
|
};
|
||||||
users.extraUsers.astro = {
|
users.extraUsers.astro = {
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
extraGroups = ["plugdev" "dialout" "wireshark"];
|
extraGroups = ["plugdev" "dialout" "wireshark" "wheel"];
|
||||||
openssh.authorizedKeys.keys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGJJTSJdpDh82486uPiMhhyhnci4tScp5uUe7156MBC8 a"];
|
openssh.authorizedKeys.keys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGJJTSJdpDh82486uPiMhhyhnci4tScp5uUe7156MBC8 a"];
|
||||||
};
|
};
|
||||||
users.extraUsers.harry = {
|
users.extraUsers.harry = {
|
||||||
|
@ -73,7 +73,7 @@ in
|
||||||
};
|
};
|
||||||
users.extraUsers.sjm = {
|
users.extraUsers.sjm = {
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
extraGroups = ["plugdev" "dialout"];
|
extraGroups = ["plugdev" "dialout" "wireshark" "wheel"];
|
||||||
openssh.authorizedKeys.keys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPqBya2nrq39Jl/eguA4LcfvT5ishB1gBE7ofkUbd/+Q sjm@fractalide.com"];
|
openssh.authorizedKeys.keys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPqBya2nrq39Jl/eguA4LcfvT5ishB1gBE7ofkUbd/+Q sjm@fractalide.com"];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue