raito-shared-public-infra/modules/users/friends.nix

66 lines
2.7 KiB
Nix
Raw Normal View History

2023-08-17 21:37:18 +00:00
{ ... }:
let
trustedFriendGroups = [
"production-hydra-db"
];
in
{
2023-08-16 13:22:54 +00:00
users.users = {
# Raito: unused since a while, it was made for working on the production database of Hydra.
2023-08-16 13:22:54 +00:00
ninjatrappeur = {
isNormalUser = true;
home = "/home/ninjatrappeur";
shell = "/run/current-system/sw/bin/zsh";
uid = 2000;
2023-08-17 21:37:18 +00:00
extraGroups = trustedFriendGroups;
expires = "2024-01-01";
2023-08-16 13:22:54 +00:00
openssh.authorizedKeys.keyFiles = [ ./keys/ninjatrappeur.keys ];
};
2023-08-17 21:37:18 +00:00
linus = {
isNormalUser = true;
home = "/home/linus";
shell = "/run/current-system/sw/bin/zsh";
uid = 2001;
2023-09-18 07:59:14 +00:00
# Raito: I allowed linus to be root to get some stuff done
# on behalf of me.
extraGroups = [ "wheel" ] ++ trustedFriendGroups;
2023-08-17 21:37:18 +00:00
openssh.authorizedKeys.keyFiles = [ ./keys/linus.keys ];
};
2024-01-04 22:34:49 +00:00
niklas = {
2023-12-29 16:54:33 +00:00
isNormalUser = true;
2024-01-04 22:34:49 +00:00
home = "/home/niklas";
2023-12-29 16:54:33 +00:00
shell = "/run/current-system/sw/bin/zsh";
uid = 2002;
extraGroups = trustedFriendGroups;
openssh.authorizedKeys.keyFiles = [ ./keys/niklas.keys ];
};
# Raito: Temporary account for flokli, disable when he's done with it.
flokli = {
isNormalUser = true;
home = "/home/flokli";
shell = "/run/current-system/sw/bin/zsh";
uid = 2003;
expires = "2024-02-01";
extraGroups = trustedFriendGroups;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPTVTXOutUZZjXLB0lUSgeKcSY/8mxKkC0ingGK1whD2 flokli"
];
};
# Raito: Temporary account for jade, for benchmarking stuff.
jade = {
isNormalUser = true;
home = "/home/jade";
shell = "/run/current-system/sw/bin/zsh";
uid = 2004;
expires = "2024-04-01";
extraGroups = trustedFriendGroups;
openssh.authorizedKeys.keys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNldAg4t13/i69TD786The+U3wbiNUdW2Kc9KNWvEhgpf4y4x4Sft0oYfkPw5cjX4H3APqfD+b7ItAG0GCbwHw6KMYPoVMNK08zBMJUqt1XExbqGeFLqBaeqDsmEAYXJRbjMTAorpOCtgQdoCKK/DvZ51zUWXxT8UBNHSl19Ryv5Ry5VVdbAE35rqs57DQ9+ma6htXnsBEmmnC+1Zv1FE956m/OpBTId50mor7nS2FguAtPZnDPpTd5zl9kZmJEuWCrmy6iinw5V4Uy1mLeZkQv+/FtozbyifCRCvps9nHpv4mBSU5ABLgnRRvXs+D41Jx7xloNADr1nNgpsNrYaTh hed-bot-ssh-tpm-rsa"
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIKYljH8iPMrH00lOb3ETxRrZimdKzPPEdsJQ5D5ovtOwAAAACnNzaDpzc2hrZXk= ssh:sshkey"
"ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBO4idMfdJxDJuBNOid60d4I+qxj09RHt+YkCYV2eXt6tGrEXg+S8hTQusy/SqooiXUH9pt4tea2RuBPN9+UwrH0= type-a yubikey slot 9a"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHGIBMfUypLctmorlRz9xIzXRgmtqDMxF5T5Fxy4JxNb root@tail-bot"
];
};
2023-08-16 13:22:54 +00:00
};
}