-{ pkgs, lib, config, wireguard, ... }:
+{ inputs, pkgs, lib, config, wireguard, ... }:
let
inherit (builtins) readFile;
+ inherit (config.users) users;
userLib = import ./lib.nix { inherit lib; };
in
{
users.users.julm = {
openssh.authorizedKeys.keys = [
- (readFile ../../sec/ssh/julm.pub)
- (readFile ../../sec/ssh/julm-mob.pub)
- (readFile ../../sec/ssh/julm-mermet.pub)
- (readFile ../../sec/ssh/julm-losurdo.pub)
+ (readFile (inputs.secrets + "/members/ssh/julm.pub"))
+ (readFile (inputs.secrets + "/members/ssh/julm-mob.pub"))
+ (readFile (inputs.secrets + "/members/ssh/julm-mermet.pub"))
+ (readFile (inputs.secrets + "/members/ssh/julm-losurdo.pub"))
];
useDefaultShell = true;
isNormalUser = true;
uid = 1000;
#uid = userLib.mkUid "julm";
};
-networking.wireguard.interfaces."wg-intranet".peers = [
+environment.systemPackages = [
+ pkgs.neomutt # hack until neomutt becomes installable by home-manager again
+];
+/*
+networking.wireguard.interfaces."wg-intra".peers = [
{ allowedIPs = [ "192.168.42.3/32" ];
publicKey = "QV5rA6FU7PyTD7nvFI7H/X+zkjhjP5EzVHfODEpj+BM=";
- persistentKeepalive = wireguard."wg-intranet".persistentKeepalive;
+ persistentKeepalive = wireguard."wg-intra".persistentKeepalive;
}
];
+*/
}