nixos-config/nixos/users/kylekrein/default.nix

52 lines
1.5 KiB
Nix

{
pkgs,
config,
lib,
hwconfig,
inputs,
first-nixos-install,
...
}: let
username = "kylekrein";
in {
imports = [
];
users.users.${username} = {
isNormalUser = true;
description = "Aleksandr Lebedev";
extraGroups = ["networkmanager" "wheel" "input"];
#initialPassword = "1234";
hashedPasswordFile = config.sops.secrets."users/${username}".path;
packages = with pkgs; [];
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGMt3PWVvmEL6a0HHTsxL4KMq1UGKFdzgX5iIkm6owGQ kylekrein@kylekrein-mac"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFDdxZ5OyGcfD1JwEa4RWw86HWZ2dKFR0syrRckl7EvG kylekrein@kylekrein-homepc"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILt+CDDU4gDo12IO2dc50fceIWkn26/NuTq4j25hiGre kylekrein@kylekrein-framework12"
];
};
sops.secrets = {
"users/${username}" = {
neededForUsers = true;
};
};
nix.settings.trusted-users = [
"kylekrein"
];
home-manager.extraSpecialArgs = {
inherit username;
inherit inputs;
inherit first-nixos-install;
inherit hwconfig;
};
home-manager.users."${username}" = ../../home.nix;
kylekrein.services.autoUpgrade = {
#configDir = lib.mkForce "/home/${username}/nixos-config";
#user = lib.mkForce username;
};
programs.nh.flake = lib.mkForce "/home/${username}/nixos-config";
systemd.tmpfiles.rules =
if hwconfig.useImpermanence
then ["d /persist/home/${username} 0700 ${username} users -"]
else []; # /persist/home/<user> created, owned by that user
}