about summary refs log tree commit diff stats
diff options
context:
space:
mode:
authorBenedikt Peetz <benedikt.peetz@b-peetz.de>2025-07-06 21:16:14 +0200
committerBenedikt Peetz <benedikt.peetz@b-peetz.de>2025-07-06 21:16:14 +0200
commit79da51b99cdd18322fcf44555589156e02180d98 (patch)
tree9a423eafd70a8c941bd6fcc7faed56fce7722471
parentflake.lock: Update (diff)
downloadnixos-server-79da51b99cdd18322fcf44555589156e02180d98.zip
modules/users: Apply new formatting
Diffstat (limited to '')
-rw-r--r--modules/by-name/us/users/module.nix60
1 files changed, 29 insertions, 31 deletions
diff --git a/modules/by-name/us/users/module.nix b/modules/by-name/us/users/module.nix
index 4be3f41..6011204 100644
--- a/modules/by-name/us/users/module.nix
+++ b/modules/by-name/us/users/module.nix
@@ -3,32 +3,29 @@
   lib,
   pkgs,
   ...
-}:
-let
+}: let
   cfg = config.vhack.users;
 
-  mkUser =
-    {
-      name,
-      password,
-      uid,
-      sshKey,
-    }:
-    {
-      inherit name;
-      value = {
-        inherit name uid;
-        isNormalUser = true;
-        home = "/home/${name}";
-        hashedPassword = password;
-        extraGroups = [
-          "wheel"
-        ];
-        openssh.authorizedKeys.keys = [
-          sshKey
-        ];
-      };
+  mkUser = {
+    name,
+    password,
+    uid,
+    sshKey,
+  }: {
+    inherit name;
+    value = {
+      inherit name uid;
+      isNormalUser = true;
+      home = "/home/${name}";
+      hashedPassword = password;
+      extraGroups = [
+        "wheel"
+      ];
+      openssh.authorizedKeys.keys = [
+        sshKey
+      ];
     };
+  };
 
   extraUsers = lib.listToAttrs (
     builtins.map mkUser [
@@ -46,8 +43,7 @@ let
       }
     ]
   );
-in
-{
+in {
   options.vhack.users = {
     enable = lib.mkEnableOption "user setup";
   };
@@ -57,12 +53,14 @@ in
       mutableUsers = false;
       defaultUserShell = pkgs.bashInteractive;
 
-      users = {
-        root = {
-          hashedPassword = lib.mkForce null; # to lock root
-          openssh.authorizedKeys.keys = lib.mkForce [ ];
-        };
-      } // extraUsers;
+      users =
+        {
+          root = {
+            hashedPassword = lib.mkForce null; # to lock root
+            openssh.authorizedKeys.keys = lib.mkForce [];
+          };
+        }
+        // extraUsers;
 
       # TODO(@bpeetz): Is this still relevant?
       #                If it is, it should be moved to a separate module. <2024-12-24>