diff options
author | ene <ene@sils.li> | 2023-03-20 15:06:45 +0100 |
---|---|---|
committer | ene <ene@sils.li> | 2023-03-20 15:06:45 +0100 |
commit | 034bba88dd9e2e1099774dcb33f77a4c904627ba (patch) | |
tree | 7e48f79857dc58df67f6d8e0f809f693dbd09116 /system/users | |
parent | Merge branch 'server1_network' into server1_develop (diff) | |
parent | Fix(system/services/minecraft): Remove to make compile (diff) | |
download | nixos-server-034bba88dd9e2e1099774dcb33f77a4c904627ba.tar.gz nixos-server-034bba88dd9e2e1099774dcb33f77a4c904627ba.zip |
Merge branch 'server1_mail' into server1_develop
Diffstat (limited to 'system/users')
-rw-r--r-- | system/users/default.nix | 56 |
1 files changed, 56 insertions, 0 deletions
diff --git a/system/users/default.nix b/system/users/default.nix new file mode 100644 index 0000000..3555221 --- /dev/null +++ b/system/users/default.nix @@ -0,0 +1,56 @@ +{pkgs, ...}: { + users.mutableUsers = false; + users.defaultUserShell = pkgs.zsh; + + users.users = { + root = { + #uid = 0; + initialHashedPassword = null; # to lock root + openssh.authorizedKeys.keys = [ + ]; + }; + + sils = { + name = "sils"; + isNormalUser = true; + home = "/srv/home/sils"; + initialHashedPassword = "$y$jFT$KpFnahVCE9JbE.5P3us8o.$ZzSxCusWqe3sL7b6DLgOXNNUf114tiiptM6T8lDxtKC"; + uid = 1000; + extraGroups = [ + "wheel" + ]; + openssh.authorizedKeys.keys = [ + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIG63gxw8JePmrC8Fni0pLV4TnPBhCPmSV9FYEdva+6s7 sils" + ]; + }; + + soispha = { + name = "soispha"; + isNormalUser = true; + home = "/srv/home/soispha"; + initialHashedPassword = "$y$jFT$3.8XmUyukZvpExMUxDZkI.$IVrJgm8ysNDF/0vDD2kF6w73ozXgr1LMVRNN4Bq7pv1"; + uid = 1001; + extraGroups = [ + "wheel" + ]; + openssh.authorizedKeys.keys = [ + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGBFuTNNn71Rhfnop2cdz3r/RhWWlCePnSBOhTBbu2ME soispha" + ]; + }; + + nightingale = { + name = "nightingale"; + isNormalUser = true; + home = "/srv/home/nightingale"; + initialHashedPassword = null; # TODO CHANGE + uid = 1002; + extraGroups = [ + "wheel" + ]; + openssh.authorizedKeys.keys = [ + ]; + }; + }; +} +# vim: ts=2 + |