@@ -30,7 +30,5 @@
|
|||||||
|
|
||||||
environment.impermanence.enable = lib.mkForce false;
|
environment.impermanence.enable = lib.mkForce false;
|
||||||
|
|
||||||
users.users.root.openssh.authorizedKeys.keyFiles = [
|
users.users.root.openssh.authorizedKeys.keyFiles = [ "${inputs.secrets}/personal/id_ed25519.pub" ];
|
||||||
"${inputs.secrets}/personal/id_ed25519.pub"
|
|
||||||
];
|
|
||||||
}
|
}
|
||||||
|
@@ -62,7 +62,5 @@
|
|||||||
"v /mnt/storage/private 0755 root root - -"
|
"v /mnt/storage/private 0755 root root - -"
|
||||||
];
|
];
|
||||||
|
|
||||||
users.users.root.openssh.authorizedKeys.keyFiles = [
|
users.users.root.openssh.authorizedKeys.keyFiles = [ "${inputs.secrets}/personal/id_ed25519.pub" ];
|
||||||
"${inputs.secrets}/personal/id_ed25519.pub"
|
|
||||||
];
|
|
||||||
}
|
}
|
||||||
|
@@ -62,9 +62,7 @@ in
|
|||||||
];
|
];
|
||||||
linger = true;
|
linger = true;
|
||||||
uid = lib.strings.toInt (builtins.readFile ./uid);
|
uid = lib.strings.toInt (builtins.readFile ./uid);
|
||||||
openssh.authorizedKeys.keyFiles = [
|
openssh.authorizedKeys.keyFiles = [ "${inputs.secrets}/personal/id_ed25519.pub" ];
|
||||||
"${inputs.secrets}/personal/id_ed25519.pub"
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
|
|
||||||
home-manager.users.${user}.home = {
|
home-manager.users.${user}.home = {
|
||||||
|
@@ -53,9 +53,7 @@ in
|
|||||||
group = user;
|
group = user;
|
||||||
autoSubUidGidRange = true;
|
autoSubUidGidRange = true;
|
||||||
useDefaultShell = true;
|
useDefaultShell = true;
|
||||||
openssh.authorizedKeys.keyFiles = [
|
openssh.authorizedKeys.keyFiles = [ "${inputs.secrets}/personal/id_ed25519.pub" ];
|
||||||
"${inputs.secrets}/personal/id_ed25519.pub"
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
|
|
||||||
groups.${user}.gid = lib.strings.toInt (builtins.readFile ./uid);
|
groups.${user}.gid = lib.strings.toInt (builtins.readFile ./uid);
|
||||||
|
@@ -194,7 +194,7 @@ EOF
|
|||||||
sed -i "/nixosConfigurations = {/a\\
|
sed -i "/nixosConfigurations = {/a\\
|
||||||
$host = mkNixosConfiguration inputs system [ ./hosts/$host ];\n" flake.nix
|
$host = mkNixosConfiguration inputs system [ ./hosts/$host ];\n" flake.nix
|
||||||
|
|
||||||
sed -i "/knownHosts = {/a\\ $host.publicKeyFile = \"${inputs.secrets}/$host/ssh_host_ed25519_key.pub\";" ./hosts/common/configs/system/ssh/default.nix
|
sed -i "/knownHosts = {/a\\ $host.publicKeyFile = \"\${inputs.secrets}/$host/ssh_host_ed25519_key.pub\";" ./hosts/common/configs/system/ssh/default.nix
|
||||||
|
|
||||||
new_entry="| \`$host\` | [hosts/$host/README.md](./hosts/$host/README.md) |"
|
new_entry="| \`$host\` | [hosts/$host/README.md](./hosts/$host/README.md) |"
|
||||||
last_table_line=$(grep -n "^| " README.md | tail -n 1 | cut -d: -f1)
|
last_table_line=$(grep -n "^| " README.md | tail -n 1 | cut -d: -f1)
|
||||||
|
Reference in New Issue
Block a user