@@ -30,7 +30,5 @@
|
||||
|
||||
environment.impermanence.enable = lib.mkForce false;
|
||||
|
||||
users.users.root.openssh.authorizedKeys.keyFiles = [
|
||||
"${inputs.secrets}/personal/id_ed25519.pub"
|
||||
];
|
||||
users.users.root.openssh.authorizedKeys.keyFiles = [ "${inputs.secrets}/personal/id_ed25519.pub" ];
|
||||
}
|
||||
|
@@ -62,7 +62,5 @@
|
||||
"v /mnt/storage/private 0755 root root - -"
|
||||
];
|
||||
|
||||
users.users.root.openssh.authorizedKeys.keyFiles = [
|
||||
"${inputs.secrets}/personal/id_ed25519.pub"
|
||||
];
|
||||
users.users.root.openssh.authorizedKeys.keyFiles = [ "${inputs.secrets}/personal/id_ed25519.pub" ];
|
||||
}
|
||||
|
@@ -62,9 +62,7 @@ in
|
||||
];
|
||||
linger = true;
|
||||
uid = lib.strings.toInt (builtins.readFile ./uid);
|
||||
openssh.authorizedKeys.keyFiles = [
|
||||
"${inputs.secrets}/personal/id_ed25519.pub"
|
||||
];
|
||||
openssh.authorizedKeys.keyFiles = [ "${inputs.secrets}/personal/id_ed25519.pub" ];
|
||||
};
|
||||
|
||||
home-manager.users.${user}.home = {
|
||||
|
@@ -53,9 +53,7 @@ in
|
||||
group = user;
|
||||
autoSubUidGidRange = true;
|
||||
useDefaultShell = true;
|
||||
openssh.authorizedKeys.keyFiles = [
|
||||
"${inputs.secrets}/personal/id_ed25519.pub"
|
||||
];
|
||||
openssh.authorizedKeys.keyFiles = [ "${inputs.secrets}/personal/id_ed25519.pub" ];
|
||||
};
|
||||
|
||||
groups.${user}.gid = lib.strings.toInt (builtins.readFile ./uid);
|
||||
|
Reference in New Issue
Block a user