-{ pkgs, lib, config, ... }:
+{ inputs, pkgs, lib, config, wireguard, ... }:
let
inherit (builtins) readFile;
- #inherit (builtins.extraBuiltins) pass-chomp;
+ inherit (config.users) users;
userLib = import ./lib.nix { inherit lib; };
in
{
users.users.julm = {
openssh.authorizedKeys.keys = [
- (readFile ../../sec/ssh/julm.pub)
- (readFile ../../sec/ssh/julm-mob.pub)
- (readFile ../../sec/ssh/julm-losurdo.pub)
+ (readFile (inputs.secrets + "/members/ssh/julm.pub"))
+ (readFile (inputs.secrets + "/members/ssh/julm-mob.pub"))
+ (readFile (inputs.secrets + "/members/ssh/julm-mermet.pub"))
+ (readFile (inputs.secrets + "/members/ssh/julm-losurdo.pub"))
];
- #hashedPassword = pass-chomp "members/login/julm/hashedPassword";
useDefaultShell = true;
isNormalUser = true;
uid = 1000;
#uid = userLib.mkUid "julm";
};
+environment.systemPackages = [
+ pkgs.neomutt # hack until neomutt becomes installable by home-manager again
+];
+/*
+networking.wireguard.interfaces."wg-intra".peers = [
+ { allowedIPs = [ "192.168.42.3/32" ];
+ publicKey = "QV5rA6FU7PyTD7nvFI7H/X+zkjhjP5EzVHfODEpj+BM=";
+ persistentKeepalive = wireguard."wg-intra".persistentKeepalive;
+ }
+];
+*/
+home-manager.users.julm = {
+ imports = [ (inputs.julm-nix + "/homes/julm.nix") ];
+ host.name = config.networking.hostName;
+};
+systemd.services.home-manager-julm.postStart = ''
+ ${pkgs.nix}/bin/nix-env --delete-generations +1 --profile /nix/var/nix/profiles/per-user/julm/home-manager
+'';
}