refactor(ops): use ops.users for ssh keys consistently
Add other keys used in the snix-cache VM to //ops/users, and drop the `all` alias. Change-Id: I030d0d49e8a6d9e3d8f1e1c2fc19f17ecb7ecb93 Reviewed-on: https://cl.snix.dev/c/snix/+/30165 Autosubmit: Florian Klink <flokli@flokli.de> Tested-by: besadii Reviewed-by: Ryan Lahfa <masterancpp@gmail.com>
This commit is contained in:
		
							parent
							
								
									ae4d967288
								
							
						
					
					
						commit
						3bd4674179
					
				
					 6 changed files with 27 additions and 23 deletions
				
			
		|  | @ -96,7 +96,7 @@ in | ||||||
| 
 | 
 | ||||||
|   services.openssh.enable = true; |   services.openssh.enable = true; | ||||||
|   time.timeZone = "UTC"; |   time.timeZone = "UTC"; | ||||||
|   users.users.root.openssh.authorizedKeys.keys = depot.ops.users.all; |   users.users.root.openssh.authorizedKeys.keys = depot.ops.users.edef ++ depot.ops.users.flokli ++ depot.ops.users.raito; | ||||||
|   users.groups.kvm = { }; |   users.groups.kvm = { }; | ||||||
|   users.users.root.extraGroups = [ "kvm" ]; |   users.users.root.extraGroups = [ "kvm" ]; | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
|  | @ -110,7 +110,7 @@ in | ||||||
|       createHome = true; |       createHome = true; | ||||||
|       home = "/var/lib/git"; |       home = "/var/lib/git"; | ||||||
|     }; |     }; | ||||||
|     users.root.openssh.authorizedKeys.keys = depot.ops.users.all; |     users.root.openssh.authorizedKeys.keys = depot.ops.users.edef ++ depot.ops.users.flokli ++ depot.ops.users.raito; | ||||||
|   }; |   }; | ||||||
| 
 | 
 | ||||||
|   boot.initrd.systemd.enable = true; |   boot.initrd.systemd.enable = true; | ||||||
|  |  | ||||||
|  | @ -134,9 +134,7 @@ in | ||||||
|   # Required for prometheus to be able to scrape stats |   # Required for prometheus to be able to scrape stats | ||||||
|   services.nginx.statusPage = true; |   services.nginx.statusPage = true; | ||||||
| 
 | 
 | ||||||
|   users = { |   users.users.root.openssh.authorizedKeys.keys = depot.ops.users.edef ++ depot.ops.users.flokli ++ depot.ops.users.raito; | ||||||
|     users.root.openssh.authorizedKeys.keys = depot.ops.users.all; |  | ||||||
|   }; |  | ||||||
| 
 | 
 | ||||||
|   boot.initrd.systemd.enable = true; |   boot.initrd.systemd.enable = true; | ||||||
|   zramSwap.enable = true; |   zramSwap.enable = true; | ||||||
|  |  | ||||||
|  | @ -187,7 +187,7 @@ in | ||||||
|   # Required for prometheus to be able to scrape stats |   # Required for prometheus to be able to scrape stats | ||||||
|   services.nginx.statusPage = true; |   services.nginx.statusPage = true; | ||||||
| 
 | 
 | ||||||
|   users.users.root.openssh.authorizedKeys.keys = depot.ops.users.all; |   users.users.root.openssh.authorizedKeys.keys = depot.ops.users.edef ++ depot.ops.users.flokli ++ depot.ops.users.raito; | ||||||
| 
 | 
 | ||||||
|   boot.initrd.systemd.enable = true; |   boot.initrd.systemd.enable = true; | ||||||
|   zramSwap.enable = true; |   zramSwap.enable = true; | ||||||
|  |  | ||||||
|  | @ -1,4 +1,4 @@ | ||||||
| { pkgs, lib, ... }: # readTree options | { depot, pkgs, lib, ... }: # readTree options | ||||||
| { config, ... }: # passed by module system | { config, ... }: # passed by module system | ||||||
| 
 | 
 | ||||||
| let | let | ||||||
|  | @ -51,20 +51,14 @@ in | ||||||
| 
 | 
 | ||||||
|     # Enable SSH and add some keys |     # Enable SSH and add some keys | ||||||
|     services.openssh.enable = true; |     services.openssh.enable = true; | ||||||
|     users.users.root.openssh.authorizedKeys.keys = [ | 
 | ||||||
|       # edef | 
 | ||||||
|       "cert-authority ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCvb/7ojfcbKvHIyjnrNUOOgzy44tCkgXY9HLuyFta1jQOE9pFIK19B4dR9bOglPKf145CCL0mSFJNNqmNwwavU2uRn+TQrW+U1dQAk8Gt+gh3O49YE854hwwyMU+xD6bIuUdfxPr+r5al/Ov5Km28ZMlHOs3FoAP0hInK+eAibioxL5rVJOtgicrOVCkGoXEgnuG+LRbOYTwzdClhRUxiPjK8alCbcJQ53AeZHO4G6w9wTr+W5ILCfvW4OmUXCX01sKzaBiQuuFCF6M/H4LlnsPWLMra2twXxkOIhZblwC+lncps9lQaUgiD4koZeOCORvHW00G0L39ilFbbnVcL6Itp/m8RRWm/xRxS4RMnsdV/AhvpRLrhL3lfQ7E2oCeSM36v1S9rdg6a47zcnpL+ahG76Gz39Y7KmVRQciNx7ezbwxj3Q5lZtFykgdfGIAN+bT8ijXMO6m68g60i9Bz4IoMZGkiJGqMYLTxMQ+oRgR3Ro5lbj7E11YBHyeimoBYXYGHMkiuxopQZ7lIj3plxIzhmUlXJBA4jMw9KGHdYaLhaicIYhvQmCTAjrkt2HvxEe6lU8iws2Qv+pB6tAGundN36RVVWAckeQPZ4ZsgDP8V2FfibZ1nsrQ+zBKqaslYMAHs01Cf0Hm0PnCqagf230xaobu0iooNuXx44QKoDnB+w== edef" |     users.users.root.openssh.authorizedKeys.keys = | ||||||
|       # flokli |       depot.ops.users.edef | ||||||
|       "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPTVTXOutUZZjXLB0lUSgeKcSY/8mxKkC0ingGK1whD2 flokli" |       ++ depot.ops.users.flokli | ||||||
|       # mic92 |       ++ depot.ops.users.mic92 | ||||||
|       "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKbBp2dH2X3dcU1zh+xW3ZsdYROKpJd3n13ssOP092qE" |       ++ depot.ops.users.padraic | ||||||
|       "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBCsjXKHCkpQT4LhWIdT0vDM/E/3tw/4KHTQcdJhyqPSH0FnwC8mfP2N9oHYFa2isw538kArd5ZMo5DD1ujL5dLk= ssh@secretive.Joerg’s-Laptop.local" |       ++ depot.ops.users.zimbatm; | ||||||
|       # padraic |  | ||||||
|       "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEFlro/QUDlDpaA1AQxdWIqBg9HSFJf9Cb7CPdsh0JN7" |  | ||||||
|       # zimbatm |  | ||||||
|       "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOuiDoBOxgyer8vGcfAIbE6TC4n4jo8lhG9l01iJ0bZz zimbatm@no1" |  | ||||||
|       "sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAINwWC6CJ/E6o3WGeZxbZMajC4roXnzVi8fOo1JYJSE6YAAAABHNzaDo= zimbatm@nixos" |  | ||||||
|     ]; |  | ||||||
| 
 | 
 | ||||||
|     environment.systemPackages = [ |     environment.systemPackages = [ | ||||||
|       pkgs.helix |       pkgs.helix | ||||||
|  |  | ||||||
|  | @ -1,4 +1,4 @@ | ||||||
| { ... }: rec { | { ... }: { | ||||||
|   flokli = [ |   flokli = [ | ||||||
|     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPTVTXOutUZZjXLB0lUSgeKcSY/8mxKkC0ingGK1whD2 flokli" |     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPTVTXOutUZZjXLB0lUSgeKcSY/8mxKkC0ingGK1whD2 flokli" | ||||||
|     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE6a15p9HLSrawsMTd2UQGAiM7r7VdyrfSRyzwRYTgWT flokli@m2air" |     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE6a15p9HLSrawsMTd2UQGAiM7r7VdyrfSRyzwRYTgWT flokli@m2air" | ||||||
|  | @ -8,10 +8,22 @@ | ||||||
|     "cert-authority ssh-rsa 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 openpgp:0x803010E7" |     "cert-authority ssh-rsa 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 openpgp:0x803010E7" | ||||||
|   ]; |   ]; | ||||||
| 
 | 
 | ||||||
|  |   mic92 = [ | ||||||
|  |     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKbBp2dH2X3dcU1zh+xW3ZsdYROKpJd3n13ssOP092qE" | ||||||
|  |     "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBCsjXKHCkpQT4LhWIdT0vDM/E/3tw/4KHTQcdJhyqPSH0FnwC8mfP2N9oHYFa2isw538kArd5ZMo5DD1ujL5dLk= ssh@secretive.Joerg’s-Laptop.local" | ||||||
|  |   ]; | ||||||
|  | 
 | ||||||
|  |   padraic = [ | ||||||
|  |     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEFlro/QUDlDpaA1AQxdWIqBg9HSFJf9Cb7CPdsh0JN7" | ||||||
|  |   ]; | ||||||
|  | 
 | ||||||
|   raito = [ |   raito = [ | ||||||
|     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICaw9ihTG7ucB8P38XdalEWev8+q96e2yNm4B+/I9IJp" |     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICaw9ihTG7ucB8P38XdalEWev8+q96e2yNm4B+/I9IJp" | ||||||
|     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKiXXYkhRh+s7ixZ8rvG8ntIqd6FELQ9hh7HoaHQJRPU" |     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKiXXYkhRh+s7ixZ8rvG8ntIqd6FELQ9hh7HoaHQJRPU" | ||||||
|   ]; |   ]; | ||||||
| 
 | 
 | ||||||
|   all = flokli ++ edef ++ raito; |   zimbatm = [ | ||||||
|  |     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOuiDoBOxgyer8vGcfAIbE6TC4n4jo8lhG9l01iJ0bZz zimbatm@no1" | ||||||
|  |     "sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAINwWC6CJ/E6o3WGeZxbZMajC4roXnzVi8fOo1JYJSE6YAAAABHNzaDo= zimbatm@nixos" | ||||||
|  |   ]; | ||||||
| } | } | ||||||
|  |  | ||||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue