ssh: move to seperate file
This commit is contained in:
@@ -45,6 +45,8 @@
|
|||||||
./services/caddy_senior_project.nix
|
./services/caddy_senior_project.nix
|
||||||
|
|
||||||
./services/graphing-calculator.nix
|
./services/graphing-calculator.nix
|
||||||
|
|
||||||
|
./services/ssh.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
services.kmscon.enable = true;
|
services.kmscon.enable = true;
|
||||||
@@ -122,19 +124,6 @@
|
|||||||
# Set your time zone.
|
# Set your time zone.
|
||||||
time.timeZone = "America/New_York";
|
time.timeZone = "America/New_York";
|
||||||
|
|
||||||
# Enable the OpenSSH daemon.
|
|
||||||
services.openssh = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
AllowUsers = [
|
|
||||||
username
|
|
||||||
"root"
|
|
||||||
];
|
|
||||||
PasswordAuthentication = false;
|
|
||||||
PermitRootLogin = "yes"; # for deploying configs
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
hardware.graphics = {
|
hardware.graphics = {
|
||||||
enable = true;
|
enable = true;
|
||||||
extraPackages = with pkgs; [
|
extraPackages = with pkgs; [
|
||||||
@@ -236,20 +225,9 @@
|
|||||||
"render"
|
"render"
|
||||||
service_configs.media_group
|
service_configs.media_group
|
||||||
];
|
];
|
||||||
|
|
||||||
# TODO! use proper secrets management
|
|
||||||
hashedPasswordFile = config.age.secrets.hashedPass.path;
|
hashedPasswordFile = config.age.secrets.hashedPass.path;
|
||||||
|
|
||||||
openssh.authorizedKeys.keys = [
|
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO4jL6gYOunUlUtPvGdML0cpbKSsPNqQ1jit4E7U1RyH" # laptop
|
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBJjT5QZ3zRDb+V6Em20EYpSEgPW5e/U+06uQGJdraxi" # desktop
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
|
|
||||||
# used for deploying configs to server
|
|
||||||
users.users.root.openssh.authorizedKeys.keys =
|
|
||||||
config.users.users.${username}.openssh.authorizedKeys.keys;
|
|
||||||
|
|
||||||
# https://nixos.wiki/wiki/Fish#Setting_fish_as_your_shell
|
# https://nixos.wiki/wiki/Fish#Setting_fish_as_your_shell
|
||||||
programs.fish.enable = true;
|
programs.fish.enable = true;
|
||||||
programs.bash = {
|
programs.bash = {
|
||||||
|
|||||||
35
services/ssh.nix
Normal file
35
services/ssh.nix
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
username,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
{
|
||||||
|
# Enable the OpenSSH daemon.
|
||||||
|
services.openssh = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
AllowUsers = [
|
||||||
|
username
|
||||||
|
"root"
|
||||||
|
];
|
||||||
|
PasswordAuthentication = false;
|
||||||
|
PermitRootLogin = "yes"; # for deploying configs
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.tmpfiles.rules = [
|
||||||
|
"Z /etc/ssh 755 root root"
|
||||||
|
];
|
||||||
|
|
||||||
|
users.users.${username}.openssh.authorizedKeys.keys = [
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO4jL6gYOunUlUtPvGdML0cpbKSsPNqQ1jit4E7U1RyH" # laptop
|
||||||
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBJjT5QZ3zRDb+V6Em20EYpSEgPW5e/U+06uQGJdraxi" # desktop
|
||||||
|
];
|
||||||
|
|
||||||
|
# used for deploying configs to server
|
||||||
|
users.users.root.openssh.authorizedKeys.keys =
|
||||||
|
config.users.users.${username}.openssh.authorizedKeys.keys;
|
||||||
|
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user