8
flake.lock
generated
8
flake.lock
generated
@@ -262,11 +262,11 @@
|
||||
"secrets": {
|
||||
"flake": false,
|
||||
"locked": {
|
||||
"lastModified": 1753359848,
|
||||
"narHash": "sha256-sTO5BL/2UxnAv27mEOgRh1zKpe/uBN/rJssBBrjF8Cc=",
|
||||
"lastModified": 1753365453,
|
||||
"narHash": "sha256-ZGYHuyEqpA8RC3pDRTbGb3fJv/qT52wHBnKPygznFyI=",
|
||||
"ref": "refs/heads/main",
|
||||
"rev": "cf03864221a2082aa766f79022de0a2284c10e6b",
|
||||
"revCount": 20,
|
||||
"rev": "821a1bad7b6a0359e362830c8454f66b60980ef6",
|
||||
"revCount": 21,
|
||||
"type": "git",
|
||||
"url": "https://git.karaolidis.com/karaolidis/nix-secrets.git"
|
||||
},
|
||||
|
@@ -31,7 +31,7 @@ in
|
||||
"10.0.0.2/32"
|
||||
"${jupiterPublicIPv4}/32"
|
||||
];
|
||||
publicKey = "l0V4syZrk7HkGNa7l0cq1a4taJcdo8nKGuZt9sq3FgE=";
|
||||
publicKey = builtins.readFile "${inputs.secrets}/hosts/jupiter/wireguard_key.pub";
|
||||
}
|
||||
];
|
||||
};
|
||||
|
@@ -30,7 +30,7 @@
|
||||
|
||||
environment.impermanence.enable = lib.mkForce false;
|
||||
|
||||
users.users.root.openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEWDA5vnIB7KE2VG28Ovg5rXtQqxFwMXsfozLsH0BNZS nick@karaolidis.com"
|
||||
users.users.root.openssh.authorizedKeys.keyFiles = [
|
||||
"${inputs.secrets}/personal/id_ed25519.pub"
|
||||
];
|
||||
}
|
||||
|
@@ -42,7 +42,7 @@ in
|
||||
{
|
||||
name = "jupiter-vps";
|
||||
allowedIPs = [ "0.0.0.0/0" ];
|
||||
publicKey = "dRUBz0AZFp30zXqWyTDRe7UyNioc5lV5QE2xYJCc6yU=";
|
||||
publicKey = builtins.readFile "${inputs.secrets}/hosts/jupiter-vps/wireguard_key.pub";
|
||||
endpoint = "${jupiterVpsPublicIPv4}:${builtins.toString wireguardPort}";
|
||||
persistentKeepalive = 25;
|
||||
}
|
||||
|
@@ -62,7 +62,7 @@
|
||||
"v /mnt/storage/private 0755 root root - -"
|
||||
];
|
||||
|
||||
users.users.root.openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEWDA5vnIB7KE2VG28Ovg5rXtQqxFwMXsfozLsH0BNZS nick@karaolidis.com"
|
||||
users.users.root.openssh.authorizedKeys.keyFiles = [
|
||||
"${inputs.secrets}/personal/id_ed25519.pub"
|
||||
];
|
||||
}
|
||||
|
@@ -62,8 +62,8 @@ in
|
||||
];
|
||||
linger = true;
|
||||
uid = lib.strings.toInt (builtins.readFile ./uid);
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEWDA5vnIB7KE2VG28Ovg5rXtQqxFwMXsfozLsH0BNZS nick@karaolidis.com"
|
||||
openssh.authorizedKeys.keyFiles = [
|
||||
"${inputs.secrets}/personal/id_ed25519.pub"
|
||||
];
|
||||
};
|
||||
|
||||
|
@@ -2,6 +2,7 @@
|
||||
{
|
||||
config,
|
||||
inputs,
|
||||
lib,
|
||||
pkgs,
|
||||
system,
|
||||
...
|
||||
@@ -31,9 +32,9 @@ in
|
||||
let
|
||||
authorizedKeys = pkgs.writeTextFile {
|
||||
name = "authorized_keys";
|
||||
text = ''
|
||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEWDA5vnIB7KE2VG28Ovg5rXtQqxFwMXsfozLsH0BNZS nick@karaolidis.com
|
||||
'';
|
||||
text = lib.strings.concatStringsSep "\n" [
|
||||
(builtins.readFile "${inputs.secrets}/personal/id_ed25519.pub")
|
||||
];
|
||||
};
|
||||
in
|
||||
[
|
||||
|
@@ -53,8 +53,8 @@ in
|
||||
group = user;
|
||||
autoSubUidGidRange = true;
|
||||
useDefaultShell = true;
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEWDA5vnIB7KE2VG28Ovg5rXtQqxFwMXsfozLsH0BNZS nick@karaolidis.com"
|
||||
openssh.authorizedKeys.keyFiles = [
|
||||
"${inputs.secrets}/personal/id_ed25519.pub"
|
||||
];
|
||||
};
|
||||
|
||||
|
2
secrets
2
secrets
Submodule secrets updated: cf03864221...821a1bad7b
Reference in New Issue
Block a user