From 84eb51b3aa61e190cf06442eed52acff2ff9c934 Mon Sep 17 00:00:00 2001 From: uttarayan21 Date: Sun, 9 Mar 2025 02:49:53 +0530 Subject: [PATCH] feat: Added new ssh public key --- darwin/shiro/configuration.nix | 10 ++++++++-- home/programs/default.nix | 4 ++-- home/programs/neomutt.nix | 2 +- nixos/deoxys/configuration.nix | 5 ++++- nixos/mirai/configuration.nix | 10 ++++++++-- nixos/ryu/configuration.nix | 9 ++++++++- secrets/id_ios.pub | 1 + 7 files changed, 32 insertions(+), 9 deletions(-) create mode 100644 secrets/id_ios.pub diff --git a/darwin/shiro/configuration.nix b/darwin/shiro/configuration.nix index c0415b43..7cdaf178 100644 --- a/darwin/shiro/configuration.nix +++ b/darwin/shiro/configuration.nix @@ -37,7 +37,10 @@ users.users.servius = { # isNormalUser = true; - openssh.authorizedKeys.keyFiles = [../../secrets/id_ed25519.pub]; + openssh.authorizedKeys.keyFiles = [ + ../../secrets/id_ed25519.pub + ../../secrets/id_ios.pub + ]; }; users.users.remotebuilder = { name = "remotebuilder"; @@ -45,7 +48,10 @@ home = "/var/lib/remotebuilder"; createHome = true; shell = "/bin/bash"; - openssh.authorizedKeys.keyFiles = [../../secrets/id_ed25519.pub]; + openssh.authorizedKeys.keyFiles = [ + ../../secrets/id_ed25519.pub + ../../secrets/id_ios.pub + ]; }; # security.pam.enableSudoTouchIdAuth = true; diff --git a/home/programs/default.nix b/home/programs/default.nix index dbd18346..001d6c8b 100644 --- a/home/programs/default.nix +++ b/home/programs/default.nix @@ -17,8 +17,8 @@ ./git.nix ./goread.nix ./helix.nix - ./ncmpcpp.nix - ./neomutt.nix + # ./ncmpcpp.nix + # ./neomutt.nix # ./newsboat.nix ./nix-index.nix ./nushell.nix diff --git a/home/programs/neomutt.nix b/home/programs/neomutt.nix index b64fb20e..00f36e42 100644 --- a/home/programs/neomutt.nix +++ b/home/programs/neomutt.nix @@ -1,6 +1,6 @@ {pkgs, ...}: { programs.neomutt = { - enable = true; + enable = false; vimKeys = true; editor = "nvim"; # sidebar = { diff --git a/nixos/deoxys/configuration.nix b/nixos/deoxys/configuration.nix index 6ce3d115..723c2e2d 100644 --- a/nixos/deoxys/configuration.nix +++ b/nixos/deoxys/configuration.nix @@ -89,7 +89,10 @@ description = "servius"; extraGroups = ["networkmanager" "wheel"]; packages = with pkgs; []; - openssh.authorizedKeys.keyFiles = [../../secrets/id_ed25519.pub]; + openssh.authorizedKeys.keyFiles = [ + ../../secrets/id_ed25519.pub + ../../secrets/id_ios.pub + ]; }; # Allow unfree packages diff --git a/nixos/mirai/configuration.nix b/nixos/mirai/configuration.nix index 39e5d0d2..2a6df6b6 100644 --- a/nixos/mirai/configuration.nix +++ b/nixos/mirai/configuration.nix @@ -58,11 +58,17 @@ users.users.fs0c131y = { isNormalUser = true; extraGroups = ["wheel" "docker" "media"]; - openssh.authorizedKeys.keyFiles = [../../secrets/id_ed25519.pub]; + openssh.authorizedKeys.keyFiles = [ + ../../secrets/id_ed25519.pub + ../../secrets/id_ios.pub + ]; }; users.users.remotebuilder = { isNormalUser = true; - openssh.authorizedKeys.keyFiles = [../../secrets/id_ed25519.pub]; + openssh.authorizedKeys.keyFiles = [ + ../../secrets/id_ed25519.pub + ../../secrets/id_ios.pub + ]; }; users.groups.media = {}; diff --git a/nixos/ryu/configuration.nix b/nixos/ryu/configuration.nix index ce2e89f8..6c94beb5 100644 --- a/nixos/ryu/configuration.nix +++ b/nixos/ryu/configuration.nix @@ -83,7 +83,10 @@ users.users.servius = { isNormalUser = true; extraGroups = ["wheel" "audio" "i2c" "media"]; - openssh.authorizedKeys.keyFiles = [../../secrets/id_ed25519.pub]; + openssh.authorizedKeys.keyFiles = [ + ../../secrets/id_ed25519.pub + ../../secrets/id_ios.pub + ]; }; users.groups.i2c = {}; users.groups.media = {}; @@ -180,6 +183,10 @@ services.openssh.enable = true; networking = { + interfaces.eno1.wakeOnLan = { + policy = ["magic"]; + enable = true; + }; hostName = "ryu"; # Define your hostname. # nameservers = ["1.1.1.1" "8.8.8.8"]; nameservers = ["1.1.1.1#one.one.one.one" "1.0.0.1#one.one.one.one"]; diff --git a/secrets/id_ios.pub b/secrets/id_ios.pub new file mode 100644 index 00000000..d57759a0 --- /dev/null +++ b/secrets/id_ios.pub @@ -0,0 +1 @@ +ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI0q/Zj40mRRARqawIFmR1GGRhPAXmHUehkbMrFLUTsHzeDvrzc+l0ezD1a0RJhnRfMrFn2IkWUXQQPXqKYkAso=