nixConfig/nixos/roles/admins.nix

35 lines
981 B
Nix
Raw Normal View History

2023-11-07 23:47:14 +00:00
{lib, ...}:
with lib; let
admins = {
nerf = {
2023-11-07 23:47:14 +00:00
hashedPassword = "$y$j9T$SJcjUIcs3JYuM5oyxfEQa/$tUBQT07FK4cb9xm.A6ZKVnFIPNOYMOKC6Dt6hadCuJ7";
keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEdA4LpEGUUmN8esFyrNZXFb2GiBID9/S6zzhcnofQuP nerf@nerflap2"
];
};
2023-10-18 15:22:13 +00:00
gonne = {
2023-11-07 23:47:14 +00:00
hashedPassword = "$6$EtGpHEcFkOi0yUWp$slXf0CvIUrhdqaoCrQ5YwtYu2IVuE1RGGst4fnDPRLWVm.lYx0ruvSAF2/vw/sLbW37ORJjlb0NHQ.kSG7cVY/";
keys = [
2024-04-26 16:10:24 +00:00
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIAhwkSDISCWLN2GhHfxdZsVkK4J7JoEcPwtNbAesb+BZAAAABHNzaDo= Gonne"
2023-11-07 23:47:14 +00:00
];
2023-10-18 15:22:13 +00:00
};
};
2023-11-07 23:47:14 +00:00
mkAdmin = name: {
hashedPassword,
keys,
}: {
"${name}" = {
isNormalUser = true;
createHome = true;
2023-11-07 23:47:14 +00:00
extraGroups = ["wheel"];
group = "users";
home = "/home/${name}";
2023-11-07 23:47:14 +00:00
openssh.authorizedKeys = {inherit keys;};
inherit hashedPassword;
};
};
in {
users.users = mkMerge (mapAttrsToList mkAdmin admins);
}