Move pubkeys in ./machines
This is required by the current krops setup.
This commit is contained in:
parent
ba5086a237
commit
c5aa20dffa
11 changed files with 13 additions and 13 deletions
|
@ -76,9 +76,9 @@
|
|||
# Enable the OpenSSH daemon.
|
||||
services.openssh.enable = true;
|
||||
users.users.root.openssh.authorizedKeys.keyFiles = [
|
||||
../../pubkeys/gdd.keys
|
||||
../../pubkeys/raito.keys
|
||||
../../pubkeys/mrf.keys
|
||||
../pubkeys/gdd.keys
|
||||
../pubkeys/raito.keys
|
||||
../pubkeys/mrf.keys
|
||||
];
|
||||
|
||||
# Open ports in the firewall.
|
||||
|
|
|
@ -13,8 +13,8 @@ let
|
|||
# Enable sshd wich gets disabled by netboot-minimal.nix
|
||||
systemd.services.sshd.wantedBy = mkOverride 0 [ "multi-user.target" ];
|
||||
users.users.root.openssh.authorizedKeys.keyFiles = [
|
||||
../../pubkeys/gdd.keys
|
||||
../../pubkeys/raito.keys
|
||||
../pubkeys/gdd.keys
|
||||
../pubkeys/raito.keys
|
||||
];
|
||||
programs.mosh.enable = true;
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
let
|
||||
pkgs = import <nixpkgs> {};
|
||||
lib = pkgs.lib;
|
||||
readPubkeys = user: builtins.filter (k: k != "") (lib.splitString "\n" (builtins.readFile (../../../pubkeys + "/${user}.keys")));
|
||||
readPubkeys = user: builtins.filter (k: k != "") (lib.splitString "\n" (builtins.readFile (../../pubkeys + "/${user}.keys")));
|
||||
superadmins = (readPubkeys "raito") ++ (readPubkeys "gdd") ++ (readPubkeys "mrf");
|
||||
core-services-01 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILrnZxP4OUGDzd1uykMghzFNLH0Fg42hH+0qxif6O6oU";
|
||||
systems = [ core-services-01 ];
|
||||
|
|
|
@ -45,9 +45,9 @@
|
|||
# Enable the OpenSSH daemon.
|
||||
services.openssh.enable = true;
|
||||
users.users.root.openssh.authorizedKeys.keyFiles = [
|
||||
../../pubkeys/gdd.keys
|
||||
../../pubkeys/raito.keys
|
||||
../../pubkeys/mrf.keys
|
||||
../pubkeys/gdd.keys
|
||||
../pubkeys/raito.keys
|
||||
../pubkeys/mrf.keys
|
||||
];
|
||||
|
||||
system.stateVersion = "21.05";
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
let
|
||||
pkgs = import <nixpkgs> {};
|
||||
lib = pkgs.lib;
|
||||
readPubkeys = user: builtins.filter (k: k != "") (lib.splitString "\n" (builtins.readFile (../../../pubkeys + "/${user}.keys")));
|
||||
readPubkeys = user: builtins.filter (k: k != "") (lib.splitString "\n" (builtins.readFile (../../pubkeys + "/${user}.keys")));
|
||||
superadmins = (readPubkeys "raito") ++ (readPubkeys "gdd");
|
||||
public-cof = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDUe/w7e3+KIa1YPFH9FGapDWM/sWOvOCcYXNlnIWypg";
|
||||
systems = [ public-cof ];
|
||||
|
|
|
@ -62,9 +62,9 @@
|
|||
# Enable the OpenSSH daemon.
|
||||
services.openssh.enable = true;
|
||||
users.users.root.openssh.authorizedKeys.keyFiles = [
|
||||
../../pubkeys/gdd.keys
|
||||
../../pubkeys/raito.keys
|
||||
../../pubkeys/remote-builders.keys
|
||||
../pubkeys/gdd.keys
|
||||
../pubkeys/raito.keys
|
||||
../pubkeys/remote-builders.keys
|
||||
];
|
||||
|
||||
# Open ports in the firewall.
|
||||
|
|
Loading…
Reference in a new issue