2023-06-05 15:50:07 +00:00
|
|
|
{ config
|
|
|
|
, lib
|
|
|
|
, ...
|
|
|
|
}:
|
|
|
|
let
|
|
|
|
extraGroups = [ "wheel" "docker" "plugdev" "vboxusers" "adbusers" "input" ];
|
|
|
|
in
|
|
|
|
{
|
|
|
|
config = {
|
|
|
|
users.users = {
|
|
|
|
# Ryan Lahfa
|
|
|
|
raito = {
|
|
|
|
isNormalUser = true;
|
|
|
|
home = "/home/raito";
|
|
|
|
inherit extraGroups;
|
|
|
|
shell = "/run/current-system/sw/bin/zsh";
|
|
|
|
uid = 1000;
|
|
|
|
openssh.authorizedKeys.keyFiles = [ ./keys/raito.keys ];
|
|
|
|
};
|
|
|
|
|
|
|
|
# Julien Malka
|
|
|
|
luj = {
|
|
|
|
isNormalUser = true;
|
|
|
|
home = "/home/luj";
|
2023-09-11 17:56:06 +00:00
|
|
|
inherit (config.users.users.raito);
|
|
|
|
extraGroups = extraGroups ++ [ "production-hydra-db" ];
|
2023-06-05 15:50:07 +00:00
|
|
|
shell = "/run/current-system/sw/bin/zsh";
|
|
|
|
uid = 1001;
|
|
|
|
openssh.authorizedKeys.keyFiles = [ ./keys/luj.keys ];
|
|
|
|
};
|
|
|
|
|
|
|
|
# Gabriel Doriath Döhler
|
|
|
|
gdd = {
|
|
|
|
isNormalUser = true;
|
|
|
|
home = "/home/gdd";
|
|
|
|
inherit (config.users.users.raito) extraGroups;
|
|
|
|
shell = "/run/current-system/sw/bin/zsh";
|
|
|
|
uid = 1002;
|
|
|
|
openssh.authorizedKeys.keyFiles = [ ./keys/gdd.keys ];
|
|
|
|
};
|
|
|
|
|
|
|
|
# Samy Lahfa
|
|
|
|
akechi = {
|
|
|
|
isNormalUser = true;
|
|
|
|
home = "/home/akechi";
|
|
|
|
inherit (config.users.users.raito) extraGroups;
|
|
|
|
shell = "/run/current-system/sw/bin/zsh";
|
|
|
|
uid = 1003;
|
|
|
|
openssh.authorizedKeys.keyFiles = [ ./keys/akechi.keys ];
|
|
|
|
};
|
|
|
|
|
|
|
|
# Tom Hubrecht
|
|
|
|
tomate = {
|
|
|
|
isNormalUser = true;
|
|
|
|
home = "/home/tomate";
|
|
|
|
inherit (config.users.users.raito) extraGroups;
|
|
|
|
shell = "/run/current-system/sw/bin/zsh";
|
|
|
|
uid = 1004;
|
|
|
|
openssh.authorizedKeys.keyFiles = [ ./keys/tomate.keys ];
|
|
|
|
};
|
|
|
|
|
|
|
|
root = {
|
|
|
|
hashedPassword = "$y$j9T$LiCWsEVrg9FlcEwuDGsol.$ghfkPkQGoAt23hI6.vWNLrSdHDnVwxg8EE/2w2pRbT6";
|
|
|
|
# passwordFile = lib.mkIf config.users.withSops config.sops.secrets.root-password-hash.path;
|
|
|
|
openssh.authorizedKeys.keyFiles = lib.concatMap (user: config.users.users.${user}.openssh.authorizedKeys.keyFiles) [ "raito" "luj" "gdd" "akechi" "tomate" ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2024-03-27 15:33:35 +00:00
|
|
|
nix.settings.trusted-users = [ "raito" "luj" "gdd" "akechi" "tomate" "niklas" "jade" "winter" ];
|
2023-06-05 15:50:07 +00:00
|
|
|
};
|
|
|
|
}
|