Better deployment keys separation
This commit is contained in:
parent
9b026f8a05
commit
2a46d9d455
7 changed files with 46 additions and 29 deletions
|
|
@ -272,6 +272,14 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
odin = {
|
||||||
|
hostname = "odin.local";
|
||||||
|
profiles.system = {
|
||||||
|
user = "root";
|
||||||
|
path = deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.odin;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
loki = {
|
loki = {
|
||||||
hostname = "loki.local";
|
hostname = "loki.local";
|
||||||
profiles.system = {
|
profiles.system = {
|
||||||
|
|
|
||||||
|
|
@ -60,12 +60,9 @@ with lib; {
|
||||||
|
|
||||||
networking = {
|
networking = {
|
||||||
hostName = "loki";
|
hostName = "loki";
|
||||||
interfaces = {
|
interfaces.eno1.useDHCP = true;
|
||||||
eno1.useDHCP = true;
|
# networkmanager.enable = true;
|
||||||
wlp7s0.useDHCP = true;
|
# useDHCP = false;
|
||||||
};
|
|
||||||
networkmanager.enable = true;
|
|
||||||
useDHCP = false;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
time.timeZone = "Europe/Rome";
|
time.timeZone = "Europe/Rome";
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,8 @@
|
||||||
{
|
{
|
||||||
|
security.sudo.wheelNeedsPassword = false;
|
||||||
nix.settings = {
|
nix.settings = {
|
||||||
|
trusted-users = [ "root" "@wheel" ];
|
||||||
|
|
||||||
trusted-public-keys = [
|
trusted-public-keys = [
|
||||||
"thor:yRx3HglIxjUYocp4/jAP9dPWxWBEpgP6hqj1ofEfn1A="
|
"thor:yRx3HglIxjUYocp4/jAP9dPWxWBEpgP6hqj1ofEfn1A="
|
||||||
"odin:ClRXzxmDZl2Y94SG4YlWXGiJDY4L9DgZq/3OLR5+i6k="
|
"odin:ClRXzxmDZl2Y94SG4YlWXGiJDY4L9DgZq/3OLR5+i6k="
|
||||||
|
|
|
||||||
|
|
@ -9,6 +9,7 @@
|
||||||
openssh.authorizedKeys.keys = [
|
openssh.authorizedKeys.keys = [
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAhxOjo9Ac9hVd3eOR56F6sClUMUh1m7VpcmzA18dslj bertof@odin"
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAhxOjo9Ac9hVd3eOR56F6sClUMUh1m7VpcmzA18dslj bertof@odin"
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO7mcf8fbMo1eXqSJeVFWaweB+JOU+67dFuf8laZKZZG bertof@thor"
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO7mcf8fbMo1eXqSJeVFWaweB+JOU+67dFuf8laZKZZG bertof@thor"
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKp1Rfb2acLM/5TDUahu+AdV/HVw+hoOTdQIeQIjV5p8"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
system.stateVersion = "22.11";
|
system.stateVersion = "22.11";
|
||||||
|
|
|
||||||
|
|
@ -1,12 +1,13 @@
|
||||||
{ config, ... }: {
|
{
|
||||||
services.openssh = {
|
services.openssh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
|
|
||||||
permitRootLogin = "prohibit-password";
|
permitRootLogin = "prohibit-password";
|
||||||
passwordAuthentication = false;
|
passwordAuthentication = false;
|
||||||
kbdInteractiveAuthentication = false;
|
kbdInteractiveAuthentication = false;
|
||||||
};
|
};
|
||||||
|
|
||||||
users.users.root.openssh.authorizedKeys.keys = config.users.users.bertof.openssh.authorizedKeys.keys or [ ];
|
users.users.root.openssh.authorizedKeys.keys = [
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKp1Rfb2acLM/5TDUahu+AdV/HVw+hoOTdQIeQIjV5p8"
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,17 +1,17 @@
|
||||||
let
|
let
|
||||||
# bertof_baldur = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKbG791lSOl8Rqoy+KkdKiOJnOMRg02+HZ/VrlrWMYAX";
|
bertof_baldur = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKbG791lSOl8Rqoy+KkdKiOJnOMRg02+HZ/VrlrWMYAX";
|
||||||
bertof_odin = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAhxOjo9Ac9hVd3eOR56F6sClUMUh1m7VpcmzA18dslj";
|
bertof_odin = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAhxOjo9Ac9hVd3eOR56F6sClUMUh1m7VpcmzA18dslj";
|
||||||
bertof_thor = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO7mcf8fbMo1eXqSJeVFWaweB+JOU+67dFuf8laZKZZG";
|
bertof_thor = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO7mcf8fbMo1eXqSJeVFWaweB+JOU+67dFuf8laZKZZG";
|
||||||
# users = [ bertof_baldur bertof_odin bertof_thor ];
|
bertof_loki = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPbbgBCzRsIO6giIVCgTUMgBCrexgvHmq8pis5A4ievH";
|
||||||
|
users = [ bertof_odin bertof_thor bertof_loki bertof_baldur ];
|
||||||
|
|
||||||
dev_users = [ bertof_odin bertof_thor ];
|
baldur = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF9G8I75gOfB1QJhZU9z+UaYovWq05OfK2FVKtCb8Xxh";
|
||||||
# baldur = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF9G8I75gOfB1QJhZU9z+UaYovWq05OfK2FVKtCb8Xxh";
|
|
||||||
odin = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP8bfOYmFN+KRjnAOdt9IazGeaRKm5tvGyblHD7MUhtr";
|
odin = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP8bfOYmFN+KRjnAOdt9IazGeaRKm5tvGyblHD7MUhtr";
|
||||||
thor = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJbMiGx/QZ/RKgad3UNyEzgLfqRU0zBo8n0AU3s244Zw";
|
thor = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJbMiGx/QZ/RKgad3UNyEzgLfqRU0zBo8n0AU3s244Zw";
|
||||||
dev_systems = [ odin thor ];
|
loki = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICeomEH/27XFlOjQ/GTO2mo8qPMHTbzLIsX0dloxXfhb";
|
||||||
# systems = [ baldur odin thor ];
|
systems = [ odin thor baldur loki ];
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
# "oauth_proxy_client_credentials.age".publicKeys = users ++ systems;
|
# "oauth_proxy_client_credentials.age".publicKeys = users ++ systems;
|
||||||
"spotify_password.age".publicKeys = dev_users ++ dev_systems;
|
"spotify_password.age".publicKeys = users ++ systems;
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,14 +1,21 @@
|
||||||
age-encryption.org/v1
|
age-encryption.org/v1
|
||||||
-> ssh-ed25519 13iwjQ ihFwxfFgF+mEzpG0+4/V9sMSyghxxJvKCCvaoR78cX0
|
-> ssh-ed25519 13iwjQ 3FaFv6V6/c8+iC5ZUBFcTCh8f1nkUEi1jQo6f8Nj6EE
|
||||||
PIsBREW20MK11QAVjVlKiUFSIHgPY5Rh+RLIwa4972I
|
IagH9X5Lelr0+rU0hS6XPHAeAV4Uv6IpXa0wYGJbN2U
|
||||||
-> ssh-ed25519 7MB20A cuuRqdeYnRDTUqpSKy5GSX9z7fwuxmSyqPEGv7/4gy4
|
-> ssh-ed25519 7MB20A wBj0Sdvpex7glo7tKK/VtHaq8aVnzHSZJ5oAhnQ5RHE
|
||||||
fzVYk6+1LMe3BCZHrvrjXSEccvh9yloneKRtKKaY4HI
|
FoFkY+O+HKTUh5W5aUO0fyb9rDwkJZ4Kc3RhInpKKso
|
||||||
-> ssh-ed25519 IvyYug KH0Ar+DRAK01cn000DQ1jrVRnvi/IY38wH0+hio24Gk
|
-> ssh-ed25519 ieE3Vw X7kWcENcijldVFJpUqX8+W4CuKZgOlYuPGVZDD6WLTM
|
||||||
0jZLR6ArJk55Fa1pWs3jzzEidinOlFRQa+t/QpvbGoQ
|
sRibg3hzeyc7gf9jHJ7bE5p3FTebcOhN98E87c1CXbY
|
||||||
-> ssh-ed25519 v7O/FA Wzn2CDmBuSTQRsvijqxzggc8i6MQ9Sev/oYOsGE3SRY
|
-> ssh-ed25519 IBFs4A +e7hl3h3nQr/uW3OTT6nMDTiC2ePMLAByeqCtXNpyAg
|
||||||
SICT5z35r4VxlnWQimUqka0ZTsq6VaVEnw3cMW2XfI8
|
5J6VX1ph34fNlZ8NDhIgKIhiG0qhJvLJmDwtZYcr6YM
|
||||||
-> h#yDi>P-grease :C(yo\96
|
-> ssh-ed25519 IvyYug 3xIQyUD44gdZ2JEbK066RIF0xj0eFkwf2AUxgP38oRo
|
||||||
Z1rgHDuj00pfkwxbYNtCwj+KJHSz8oOi/Q
|
fEXw+SvhtXnMMgncloKYQhgRZom6tS16hJIrf68VxxQ
|
||||||
--- b0AXJG43DTS1dcH32SDOj71OoxQqtjA77VlbI+CQ+z8
|
-> ssh-ed25519 v7O/FA tNTXdS/Bs9k3iagAjaRmgboPLdUpGJqq6OKQrOujy2I
|
||||||
¹/E
|
KCmUPezLDYA6p3k0q+FEiP2KI1Bao3H3DIiuNVUlFLY
|
||||||
CÓ÷úu¼<S°ø¦[úž@PüUªw‡{é<> =ý-#ì2 Óã÷ZÆ`!
|
-> ssh-ed25519 HowkUg lAwKW9SMX2d5sGWkXwjq6R/Swyr//220wEYYc0Svclo
|
||||||
|
9cp96pse6QG32ScYf85D3cEqHffe0f2YKjYdKZ3i08o
|
||||||
|
-> ssh-ed25519 XgC3XA SsG1GtxJveRM5yGAawrs/Ez7hQyu/4zTJo3tRS3Oe0s
|
||||||
|
sm7snutfRmeR+B/0wRMaEqatzz7opZ4uA0WMAzvSH7I
|
||||||
|
-> {f-3Fh-grease NBm}: JZ!#"1q/ nE63"]%v 8Oi;D/Z|
|
||||||
|
UNGlf5emYkMaKI+WDQH1xfQLuePiqaf7LBseLu2f76/zad74Ur3mWZKbTvDrtA
|
||||||
|
--- ACYOrlmjOexIr0dagfb3W66gu3Sqk7Na5197wYBsTiI
|
||||||
|
h/wĄđĘKŮz4ťáČÔO;śé´Ď2gKç+ BŮ1vۤx+Ă0 ,xć_
|
||||||
Loading…
Add table
Add a link
Reference in a new issue