{ inputs, pkgs, lib, config, wireguard, ... }: let inherit (builtins) readFile; inherit (config.users) users; userLib = import ./lib.nix { inherit lib; }; in { users.users.julm = { openssh.authorizedKeys.keys = [ (readFile (inputs.secrets + "/members/ssh/julm.pub")) (readFile (inputs.secrets + "/members/ssh/julm-mob.pub")) (readFile (inputs.secrets + "/members/ssh/julm-mermet.pub")) (readFile (inputs.secrets + "/members/ssh/julm-losurdo.pub")) ]; useDefaultShell = true; isNormalUser = true; uid = 1000; #uid = userLib.mkUid "julm"; }; nix.trustedUsers = [ users."julm".name ]; users.users.root = { openssh.authorizedKeys.keys = users."julm".openssh.authorizedKeys.keys; }; users.groups.wheel.members = [ users."julm".name ]; environment.systemPackages = [ pkgs.neomutt # hack until neomutt becomes installable by home-manager again ]; /* networking.wireguard.interfaces."wg-intra".peers = [ { allowedIPs = [ "192.168.42.3/32" ]; publicKey = "QV5rA6FU7PyTD7nvFI7H/X+zkjhjP5EzVHfODEpj+BM="; persistentKeepalive = wireguard."wg-intra".persistentKeepalive; } ]; */ }