forked from jan-leila/nix-config
		
	added password for remote user
This commit is contained in:
		
							parent
							
								
									72b62bed37
								
							
						
					
					
						commit
						1217959d6d
					
				
					 2 changed files with 21 additions and 3 deletions
				
			
		
							
								
								
									
										21
									
								
								README.md
									
										
									
									
									
								
							
							
						
						
									
										21
									
								
								README.md
									
										
									
									
									
								
							|  | @ -1,7 +1,6 @@ | ||||||
|  | # Hosts | ||||||
| 
 | 
 | ||||||
| Build Command: | ## Host Map | ||||||
| `sudo nixos-rebuild switch --flake .#hostname` |  | ||||||
| 
 |  | ||||||
| |   Hostname  |      Device Description    |   Primary User   |    Role   | | |   Hostname  |      Device Description    |   Primary User   |    Role   | | ||||||
| | :---------: | :------------------------: | :--------------: | :-------: | | | :---------: | :------------------------: | :--------------: | :-------: | | ||||||
| |  `twilight` |      Desktop Computer      |      Leyla       |  Desktop  | | |  `twilight` |      Desktop Computer      |      Leyla       |  Desktop  | | ||||||
|  | @ -9,3 +8,19 @@ Build Command: | ||||||
| |  `defiant`  |         NAS Server         |      Leyla       |  Service  | | |  `defiant`  |         NAS Server         |      Leyla       |  Service  | | ||||||
| |  `emergent` |      Desktop Computer      |       Eve        |  Laptop   | | |  `emergent` |      Desktop Computer      |       Eve        |  Laptop   | | ||||||
| | `threshold` |           Laptop           |       Eve        |  Desktop  | | | `threshold` |           Laptop           |       Eve        |  Desktop  | | ||||||
|  | 
 | ||||||
|  | 
 | ||||||
|  | ### Rebuild current machine to match target host: | ||||||
|  | `sudo nixos-rebuild switch --flake .#hostname` | ||||||
|  | 
 | ||||||
|  | ### Rebuild current machine maintaining current target | ||||||
|  | `./rebuild.sh` | ||||||
|  | 
 | ||||||
|  | # New machine setup | ||||||
|  | keys for decrypting password secrets for each users located at ~/.config/sops/age/keys.txt | ||||||
|  | 
 | ||||||
|  | updating passwords: `sops secrets/secrets.yaml` | ||||||
|  | 
 | ||||||
|  | > how the current config was set up https://www.youtube.com/watch?v=G5f6GC7SnhU | ||||||
|  | 
 | ||||||
|  | > look into this? https://technotim.live/posts/rotate-sops-encryption-keys/ | ||||||
|  |  | ||||||
|  | @ -19,6 +19,9 @@ in | ||||||
|       ( |       ( | ||||||
|         if cfg.isNormalUser then { |         if cfg.isNormalUser then { | ||||||
|           # extraGroups = [ "wheel" ]; |           # extraGroups = [ "wheel" ]; | ||||||
|  | 
 | ||||||
|  |           hashedPasswordFile = config.sops.secrets."passwords/remote".path; | ||||||
|  | 
 | ||||||
|           isNormalUser = true; |           isNormalUser = true; | ||||||
|           openssh.authorizedKeys.keys = []; |           openssh.authorizedKeys.keys = []; | ||||||
|         } else { |         } else { | ||||||
|  |  | ||||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue