forked from DGNum/liminix
add authorized keys to bordervm
You don't often need this because it has autologin, but sometimes you want to do antics involving sshing through it to the wan port of a test device. Note that you probably wanted to start bordervm with funny qemu options to even make that possible nix-shell --run "QEMU_NET_OPTS=hostfwd=tcp::10022-:22 run-border-vm"
This commit is contained in:
parent
e249f48cff
commit
5a3646cb29
1 changed files with 5 additions and 0 deletions
|
@ -4,6 +4,10 @@ let
|
||||||
inherit (lib) mkOption mkEnableOption mdDoc types optional optionals;
|
inherit (lib) mkOption mkEnableOption mdDoc types optional optionals;
|
||||||
in {
|
in {
|
||||||
options.bordervm = {
|
options.bordervm = {
|
||||||
|
keys = mkOption {
|
||||||
|
type = types.listOf types.str;
|
||||||
|
default = [];
|
||||||
|
};
|
||||||
l2tp = {
|
l2tp = {
|
||||||
host = mkOption {
|
host = mkOption {
|
||||||
description = mdDoc ''
|
description = mdDoc ''
|
||||||
|
@ -122,6 +126,7 @@ in {
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
uid = 1000;
|
uid = 1000;
|
||||||
extraGroups = [ "wheel"];
|
extraGroups = [ "wheel"];
|
||||||
|
openssh.authorizedKeys.keys = cfg.keys;
|
||||||
};
|
};
|
||||||
services.getty.autologinUser = "liminix";
|
services.getty.autologinUser = "liminix";
|
||||||
};
|
};
|
||||||
|
|
Loading…
Reference in a new issue