infra/modules/nixos/community-builder/users.nix

283 lines
5.7 KiB
Nix
Raw Normal View History

{ config, pkgs, ... }:
2022-01-09 15:34:55 +01:00
let
users = [
# To add yourself:
# 1. Add an entry to this list.
# 2. Create a file in `keys` named your user name that contains your SSH key(s), separated by newlines.
{
name = "0x4A6F";
trusted = true;
keys = ./keys/0x4A6F;
}
{
name = "afh";
2024-07-16 09:17:29 +02:00
trusted = true;
keys = ./keys/afh;
}
{
name = "a-kenji";
trusted = true;
keys = ./keys/a-kenji;
}
{
name = "binarycat";
2024-03-11 13:17:51 -04:00
trusted = true;
keys = ./keys/binarycat;
}
{
name = "binarycat-untrusted";
trusted = false;
keys = ./keys/binarycat;
}
{
name = "bobby285271";
trusted = true;
keys = ./keys/bobby285271;
}
{
name = "ckie";
trusted = true;
keys = ./keys/ckie;
}
{
name = "dandellion";
trusted = true;
keys = ./keys/dandellion;
}
{
name = "fgaz";
trusted = true;
keys = ./keys/fgaz;
}
{
name = "flokli";
trusted = true;
keys = ./keys/flokli;
}
{
name = "fmzakari";
# github: @fzakaria
trusted = true;
keys = ./keys/fmzakari;
}
{
name = "glepage";
trusted = true;
shell = pkgs.fish;
keys = ./keys/glepage;
}
{
name = "hexchen";
trusted = true;
keys = ./keys/hexchen;
}
{
name = "janik";
trusted = true;
keys = ./keys/janik;
}
{
name = "jtojnar";
trusted = true;
keys = ./keys/jtojnar;
}
{
# lib.maintainers.katexochen, https://github.com/katexochen
name = "katexochen";
trusted = true;
keys = ./keys/katexochen;
}
{
# lib.maintainers.khaneliman, https://github.com/khaneliman
name = "khaneliman";
trusted = true;
keys = ./keys/khaneliman;
}
{
name = "lewo";
trusted = true;
keys = ./keys/lewo;
}
{
name = "lily";
trusted = true;
keys = ./keys/lily;
}
{
name = "linj";
2024-08-14 04:31:08 +08:00
# lib.maintainers.linj, https://github.com/jian-lin
trusted = true;
shell = pkgs.fish;
2024-08-14 04:31:08 +08:00
keys = ./keys/linj;
}
2025-01-12 17:37:27 +02:00
{
name = "misuzu";
# lib.maintainers.misuzu https://github.com/misuzu
trusted = true;
keys = ./keys/misuzu;
}
{
name = "mrcjkb";
# lib.maintainers.mrcjkb https://github.com/mrcjkb
trusted = true;
2024-11-23 14:23:32 +01:00
shell = pkgs.zsh;
keys = ./keys/mrcjkb;
}
{
name = "nicoo";
# lib.maintainers.nicoo, @nbraud on github.com
trusted = true;
keys = ./keys/nicoo;
}
{
name = "NobbZ";
trusted = true;
keys = ./keys/nobbz;
}
{
name = "raitobezarius";
trusted = true;
keys = ./keys/raitobezarius;
}
{
name = "networkexception";
trusted = true;
keys = ./keys/networkexception;
}
{
name = "pinpox";
2024-03-27 23:34:18 +01:00
trusted = true;
keys = ./keys/pinpox;
}
{
name = "perchun";
trusted = true;
keys = ./keys/perchun;
}
{
name = "raboof";
# lib.maintainers.raboof, https://github.com/raboof
trusted = true;
keys = ./keys/raboof;
}
{
name = "schmittlauch";
trusted = true;
keys = ./keys/schmittlauch;
}
{
name = "matthiasbeyer";
trusted = true;
keys = ./keys/matthiasbeyer;
}
{
name = "stephank";
trusted = true;
keys = ./keys/stephank;
}
{
name = "supinie";
trusted = true;
keys = ./keys/supinie;
}
{
name = "teto";
trusted = true;
keys = ./keys/teto;
}
{
name = "thecomputerguy";
2024-07-26 10:09:21 -07:00
trusted = true;
keys = ./keys/thecomputerguy;
}
{
name = "tomberek";
2024-07-27 23:53:53 -04:00
trusted = true;
keys = ./keys/tomberek;
}
{
name = "tomfitzhenry";
trusted = true;
keys = ./keys/tomfitzhenry;
}
{
name = "winter";
trusted = true;
keys = ./keys/winter;
}
2025-01-15 11:11:34 +01:00
{
# lib.maintainers.pbsds, https://github.com/pbsds
name = "pbsds";
trusted = true;
keys = ./keys/pbsds;
}
{
name = "matthewcroughan";
trusted = true;
keys = ./keys/matthewcroughan;
}
{
name = "emily";
# lib.maintainers.emily, https://github.com/emilazy
trusted = true;
keys = ./keys/emily;
}
{
name = "doronbehar";
# lib.maintainers.doronbehar, https://github.com/doronbehar
trusted = true;
keys = ./keys/doronbehar;
}
2024-11-06 07:33:01 +01:00
{
name = "fpletz";
# lib.maintainers.fpletz, https://github.com/fpletz
trusted = true;
keys = ./keys/fpletz;
}
2024-11-17 14:30:10 +10:00
{
# lib.maintainers.Enzime, https://github.com/Enzime
name = "enzime";
trusted = true;
keys = ./keys/enzime;
}
2025-01-07 18:31:38 +01:00
{
# lib.maintainers.hexa, https://github.com/mweinelt
name = "hexa";
trusted = true;
keys = ./keys/hexa;
}
{
# lib.maintainers.leona, https://github.com/leona-ya
name = "leona";
trusted = true;
keys = ./keys/leona;
}
{
name = "wolfgangwalther";
trusted = true;
keys = ./keys/wolfgangwalther;
}
2025-01-11 19:21:57 -08:00
{
# lib.maintainers.numinit, https://github.com/numinit
name = "numinit";
trusted = true;
keys = ./keys/numinit;
}
];
2022-08-14 16:49:30 +02:00
in
{
users.users = builtins.listToAttrs (
builtins.map (u: {
inherit (u) name;
value = {
isNormalUser = true;
extraGroups = if (u ? trusted && u.trusted) then [ "trusted" ] else [ ];
home = "/home/${u.name}";
createHome = true;
shell = u.shell or config.users.defaultUserShell;
openssh.authorizedKeys.keyFiles = [ u.keys ];
};
}) users
);
2022-01-09 15:34:55 +01:00
}