Compare commits

...

3 commits

Author SHA1 Message Date
e12fc523d6 fix(attic): remove unused $PSQL alias in postStart script
- Replace `$PSQL` with `psql` to use the correct PostgreSQL CLI directly.
- Ensures compatibility and prevents potential runtime issues in the systemd service.
2026-03-25 10:19:44 +01:00
2ca35ba38d feat(attic): switch to systemd-networkd for networking
- Replace `dhcpcd` with `systemd-networkd` by setting `networking.useDHCP` to `false` and `networking.useNetworkd` to `true`.
- Add a static IPv6 configuration and routes for `enp1s0` in `30-wan`.
- Ensures a more streamlined and customizable network configuration.
2026-03-25 10:19:38 +01:00
179dd93a5b feat(attic): disable sudo password for wheel group
- Set `security.sudo.wheelNeedsPassword` to `false` in `default.nix`.
- Simplifies sudo access for users in the wheel group and aligns with system usage patterns.
2026-03-25 10:07:08 +01:00
2 changed files with 11 additions and 2 deletions

View file

@ -12,7 +12,7 @@
}; };
systemd.services.postgresql.postStart = lib.mkAfter '' systemd.services.postgresql.postStart = lib.mkAfter ''
$PSQL -tAc 'ALTER DATABASE "attic" OWNER TO "atticd"' psql -tAc 'ALTER DATABASE "attic" OWNER TO "atticd"'
''; '';
environment.systemPackages = with pkgs; [ attic-client ]; environment.systemPackages = with pkgs; [ attic-client ];

View file

@ -29,11 +29,20 @@
boot.loader.efi.canTouchEfiVariables = lib.mkForce false; boot.loader.efi.canTouchEfiVariables = lib.mkForce false;
boot.loader.grub.enable = true; boot.loader.grub.enable = true;
security.sudo.wheelNeedsPassword = false;
security.tpm2.enable = false; security.tpm2.enable = false;
security.tpm2.abrmd.enable = false; security.tpm2.abrmd.enable = false;
networking.wireless.enable = false; networking.wireless.enable = false;
networking.dhcpcd.IPv6rs = true; networking.useDHCP = false;
networking.useNetworkd = true;
systemd.network.networks."30-wan" = {
matchConfig.Name = "enp1s0";
networkConfig.DHCP = "ipv4";
address = [ "2a01:4f9:c014:619::1/64" ];
routes = [{ Gateway = "fe80::1"; }];
};
networking.firewall.allowedTCPPorts = [ 8080 ]; networking.firewall.allowedTCPPorts = [ 8080 ];
networking.firewall.allowPing = true; networking.firewall.allowPing = true;