Move pubkeys in ./machines

This is required by the current krops setup.
This commit is contained in:
gabriel-doriath-dohler 2022-08-15 23:59:59 +00:00
parent ba5086a237
commit c5aa20dffa
11 changed files with 13 additions and 13 deletions

View file

@ -76,9 +76,9 @@
# Enable the OpenSSH daemon.
services.openssh.enable = true;
users.users.root.openssh.authorizedKeys.keyFiles = [
../../pubkeys/gdd.keys
../../pubkeys/raito.keys
../../pubkeys/mrf.keys
../pubkeys/gdd.keys
../pubkeys/raito.keys
../pubkeys/mrf.keys
];
# Open ports in the firewall.

View file

@ -13,8 +13,8 @@ let
# Enable sshd wich gets disabled by netboot-minimal.nix
systemd.services.sshd.wantedBy = mkOverride 0 [ "multi-user.target" ];
users.users.root.openssh.authorizedKeys.keyFiles = [
../../pubkeys/gdd.keys
../../pubkeys/raito.keys
../pubkeys/gdd.keys
../pubkeys/raito.keys
];
programs.mosh.enable = true;

View file

@ -1,7 +1,7 @@
let
pkgs = import <nixpkgs> {};
lib = pkgs.lib;
readPubkeys = user: builtins.filter (k: k != "") (lib.splitString "\n" (builtins.readFile (../../../pubkeys + "/${user}.keys")));
readPubkeys = user: builtins.filter (k: k != "") (lib.splitString "\n" (builtins.readFile (../../pubkeys + "/${user}.keys")));
superadmins = (readPubkeys "raito") ++ (readPubkeys "gdd") ++ (readPubkeys "mrf");
core-services-01 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILrnZxP4OUGDzd1uykMghzFNLH0Fg42hH+0qxif6O6oU";
systems = [ core-services-01 ];

View file

@ -45,9 +45,9 @@
# Enable the OpenSSH daemon.
services.openssh.enable = true;
users.users.root.openssh.authorizedKeys.keyFiles = [
../../pubkeys/gdd.keys
../../pubkeys/raito.keys
../../pubkeys/mrf.keys
../pubkeys/gdd.keys
../pubkeys/raito.keys
../pubkeys/mrf.keys
];
system.stateVersion = "21.05";

View file

@ -1,7 +1,7 @@
let
pkgs = import <nixpkgs> {};
lib = pkgs.lib;
readPubkeys = user: builtins.filter (k: k != "") (lib.splitString "\n" (builtins.readFile (../../../pubkeys + "/${user}.keys")));
readPubkeys = user: builtins.filter (k: k != "") (lib.splitString "\n" (builtins.readFile (../../pubkeys + "/${user}.keys")));
superadmins = (readPubkeys "raito") ++ (readPubkeys "gdd");
public-cof = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDUe/w7e3+KIa1YPFH9FGapDWM/sWOvOCcYXNlnIWypg";
systems = [ public-cof ];

View file

@ -62,9 +62,9 @@
# Enable the OpenSSH daemon.
services.openssh.enable = true;
users.users.root.openssh.authorizedKeys.keyFiles = [
../../pubkeys/gdd.keys
../../pubkeys/raito.keys
../../pubkeys/remote-builders.keys
../pubkeys/gdd.keys
../pubkeys/raito.keys
../pubkeys/remote-builders.keys
];
# Open ports in the firewall.