../../members/julm.nix
];
-nix.trustedUsers = [
- users."julm".name
-];
-
networking.nftables.ruleset = ''
add rule inet filter fw2net tcp dport {25,465} skuid ${users.julm.name} counter accept comment "SMTP"
add rule inet filter fw2net tcp dport 43 skuid ${users.julm.name} counter accept comment "Whois"
root = {
openssh.authorizedKeys.keys = [
(readFile (inputs.secrets + "/machines/losurdo/ssh/root.ssh-ed25519.pub"))
- ] ++ users."julm".openssh.authorizedKeys.keys;
- };
- };
- groups = {
- wheel = {
- members = [
- users."julm".name
];
};
};
{ inputs, pkgs, lib, config, wireguard, ... }:
let
inherit (builtins) readFile;
+ inherit (config.users) users;
userLib = import ./lib.nix { inherit lib; };
in
{
uid = 1000;
#uid = userLib.mkUid "julm";
};
+nix.trustedUsers = [ users."julm".name ];
+users.users.root = {
+ openssh.authorizedKeys.keys = users."julm".openssh.authorizedKeys.keys;
+};
+users.groups.wheel.members = [ users."julm".name ];
+environment.systemPackages = [
+ pkgs.neomutt # hack until neomutt becomes installable by home-manager again
+];
/*
networking.wireguard.interfaces."wg-intra".peers = [
{ allowedIPs = [ "192.168.42.3/32" ];