Use keyfiles

Signed-off-by: Nikolaos Karaolidis <nick@karaolidis.com>
This commit is contained in:
2025-07-24 15:16:29 +01:00
parent 247897643c
commit b7c7023ff0
9 changed files with 19 additions and 18 deletions

8
flake.lock generated
View File

@@ -262,11 +262,11 @@
"secrets": {
"flake": false,
"locked": {
"lastModified": 1753359848,
"narHash": "sha256-sTO5BL/2UxnAv27mEOgRh1zKpe/uBN/rJssBBrjF8Cc=",
"lastModified": 1753365453,
"narHash": "sha256-ZGYHuyEqpA8RC3pDRTbGb3fJv/qT52wHBnKPygznFyI=",
"ref": "refs/heads/main",
"rev": "cf03864221a2082aa766f79022de0a2284c10e6b",
"revCount": 20,
"rev": "821a1bad7b6a0359e362830c8454f66b60980ef6",
"revCount": 21,
"type": "git",
"url": "https://git.karaolidis.com/karaolidis/nix-secrets.git"
},

View File

@@ -31,7 +31,7 @@ in
"10.0.0.2/32"
"${jupiterPublicIPv4}/32"
];
publicKey = "l0V4syZrk7HkGNa7l0cq1a4taJcdo8nKGuZt9sq3FgE=";
publicKey = builtins.readFile "${inputs.secrets}/hosts/jupiter/wireguard_key.pub";
}
];
};

View File

@@ -30,7 +30,7 @@
environment.impermanence.enable = lib.mkForce false;
users.users.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEWDA5vnIB7KE2VG28Ovg5rXtQqxFwMXsfozLsH0BNZS nick@karaolidis.com"
users.users.root.openssh.authorizedKeys.keyFiles = [
"${inputs.secrets}/personal/id_ed25519.pub"
];
}

View File

@@ -42,7 +42,7 @@ in
{
name = "jupiter-vps";
allowedIPs = [ "0.0.0.0/0" ];
publicKey = "dRUBz0AZFp30zXqWyTDRe7UyNioc5lV5QE2xYJCc6yU=";
publicKey = builtins.readFile "${inputs.secrets}/hosts/jupiter-vps/wireguard_key.pub";
endpoint = "${jupiterVpsPublicIPv4}:${builtins.toString wireguardPort}";
persistentKeepalive = 25;
}

View File

@@ -62,7 +62,7 @@
"v /mnt/storage/private 0755 root root - -"
];
users.users.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEWDA5vnIB7KE2VG28Ovg5rXtQqxFwMXsfozLsH0BNZS nick@karaolidis.com"
users.users.root.openssh.authorizedKeys.keyFiles = [
"${inputs.secrets}/personal/id_ed25519.pub"
];
}

View File

@@ -62,8 +62,8 @@ in
];
linger = true;
uid = lib.strings.toInt (builtins.readFile ./uid);
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEWDA5vnIB7KE2VG28Ovg5rXtQqxFwMXsfozLsH0BNZS nick@karaolidis.com"
openssh.authorizedKeys.keyFiles = [
"${inputs.secrets}/personal/id_ed25519.pub"
];
};

View File

@@ -2,6 +2,7 @@
{
config,
inputs,
lib,
pkgs,
system,
...
@@ -31,9 +32,9 @@ in
let
authorizedKeys = pkgs.writeTextFile {
name = "authorized_keys";
text = ''
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEWDA5vnIB7KE2VG28Ovg5rXtQqxFwMXsfozLsH0BNZS nick@karaolidis.com
'';
text = lib.strings.concatStringsSep "\n" [
(builtins.readFile "${inputs.secrets}/personal/id_ed25519.pub")
];
};
in
[

View File

@@ -53,8 +53,8 @@ in
group = user;
autoSubUidGidRange = true;
useDefaultShell = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEWDA5vnIB7KE2VG28Ovg5rXtQqxFwMXsfozLsH0BNZS nick@karaolidis.com"
openssh.authorizedKeys.keyFiles = [
"${inputs.secrets}/personal/id_ed25519.pub"
];
};

Submodule secrets updated: cf03864221...821a1bad7b