forked from raito/shared-public-infra
66 lines
2.7 KiB
Nix
66 lines
2.7 KiB
Nix
{ ... }:
|
|
let
|
|
trustedFriendGroups = [
|
|
"production-hydra-db"
|
|
];
|
|
in
|
|
{
|
|
users.users = {
|
|
# Raito: unused since a while, it was made for working on the production database of Hydra.
|
|
ninjatrappeur = {
|
|
isNormalUser = true;
|
|
home = "/home/ninjatrappeur";
|
|
shell = "/run/current-system/sw/bin/zsh";
|
|
uid = 2000;
|
|
extraGroups = trustedFriendGroups;
|
|
expires = "2024-01-01";
|
|
openssh.authorizedKeys.keyFiles = [ ./keys/ninjatrappeur.keys ];
|
|
};
|
|
linus = {
|
|
isNormalUser = true;
|
|
home = "/home/linus";
|
|
shell = "/run/current-system/sw/bin/zsh";
|
|
uid = 2001;
|
|
# Raito: I allowed linus to be root to get some stuff done
|
|
# on behalf of me.
|
|
extraGroups = [ "wheel" ] ++ trustedFriendGroups;
|
|
openssh.authorizedKeys.keyFiles = [ ./keys/linus.keys ];
|
|
};
|
|
niklas = {
|
|
isNormalUser = true;
|
|
home = "/home/niklas";
|
|
shell = "/run/current-system/sw/bin/zsh";
|
|
uid = 2002;
|
|
extraGroups = trustedFriendGroups;
|
|
openssh.authorizedKeys.keyFiles = [ ./keys/niklas.keys ];
|
|
};
|
|
# Raito: Temporary account for flokli, disable when he's done with it.
|
|
flokli = {
|
|
isNormalUser = true;
|
|
home = "/home/flokli";
|
|
shell = "/run/current-system/sw/bin/zsh";
|
|
uid = 2003;
|
|
expires = "2024-02-01";
|
|
extraGroups = trustedFriendGroups;
|
|
openssh.authorizedKeys.keys = [
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPTVTXOutUZZjXLB0lUSgeKcSY/8mxKkC0ingGK1whD2 flokli"
|
|
];
|
|
};
|
|
# Raito: Temporary account for jade, for benchmarking stuff.
|
|
jade = {
|
|
isNormalUser = true;
|
|
home = "/home/jade";
|
|
shell = "/run/current-system/sw/bin/zsh";
|
|
uid = 2004;
|
|
expires = "2024-04-01";
|
|
extraGroups = trustedFriendGroups;
|
|
openssh.authorizedKeys.keys = [
|
|
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNldAg4t13/i69TD786The+U3wbiNUdW2Kc9KNWvEhgpf4y4x4Sft0oYfkPw5cjX4H3APqfD+b7ItAG0GCbwHw6KMYPoVMNK08zBMJUqt1XExbqGeFLqBaeqDsmEAYXJRbjMTAorpOCtgQdoCKK/DvZ51zUWXxT8UBNHSl19Ryv5Ry5VVdbAE35rqs57DQ9+ma6htXnsBEmmnC+1Zv1FE956m/OpBTId50mor7nS2FguAtPZnDPpTd5zl9kZmJEuWCrmy6iinw5V4Uy1mLeZkQv+/FtozbyifCRCvps9nHpv4mBSU5ABLgnRRvXs+D41Jx7xloNADr1nNgpsNrYaTh hed-bot-ssh-tpm-rsa"
|
|
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIKYljH8iPMrH00lOb3ETxRrZimdKzPPEdsJQ5D5ovtOwAAAACnNzaDpzc2hrZXk= ssh:sshkey"
|
|
"ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBO4idMfdJxDJuBNOid60d4I+qxj09RHt+YkCYV2eXt6tGrEXg+S8hTQusy/SqooiXUH9pt4tea2RuBPN9+UwrH0= type-a yubikey slot 9a"
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHGIBMfUypLctmorlRz9xIzXRgmtqDMxF5T5Fxy4JxNb root@tail-bot"
|
|
];
|
|
};
|
|
};
|
|
}
|