added password for remote user
This commit is contained in:
parent
72b62bed37
commit
1217959d6d
21
README.md
21
README.md
|
@ -1,7 +1,6 @@
|
||||||
|
# Hosts
|
||||||
|
|
||||||
Build Command:
|
## Host Map
|
||||||
`sudo nixos-rebuild switch --flake .#hostname`
|
|
||||||
|
|
||||||
| Hostname | Device Description | Primary User | Role |
|
| Hostname | Device Description | Primary User | Role |
|
||||||
| :---------: | :------------------------: | :--------------: | :-------: |
|
| :---------: | :------------------------: | :--------------: | :-------: |
|
||||||
| `twilight` | Desktop Computer | Leyla | Desktop |
|
| `twilight` | Desktop Computer | Leyla | Desktop |
|
||||||
|
@ -9,3 +8,19 @@ Build Command:
|
||||||
| `defiant` | NAS Server | Leyla | Service |
|
| `defiant` | NAS Server | Leyla | Service |
|
||||||
| `emergent` | Desktop Computer | Eve | Laptop |
|
| `emergent` | Desktop Computer | Eve | Laptop |
|
||||||
| `threshold` | Laptop | Eve | Desktop |
|
| `threshold` | Laptop | Eve | Desktop |
|
||||||
|
|
||||||
|
|
||||||
|
### Rebuild current machine to match target host:
|
||||||
|
`sudo nixos-rebuild switch --flake .#hostname`
|
||||||
|
|
||||||
|
### Rebuild current machine maintaining current target
|
||||||
|
`./rebuild.sh`
|
||||||
|
|
||||||
|
# New machine setup
|
||||||
|
keys for decrypting password secrets for each users located at ~/.config/sops/age/keys.txt
|
||||||
|
|
||||||
|
updating passwords: `sops secrets/secrets.yaml`
|
||||||
|
|
||||||
|
> how the current config was set up https://www.youtube.com/watch?v=G5f6GC7SnhU
|
||||||
|
|
||||||
|
> look into this? https://technotim.live/posts/rotate-sops-encryption-keys/
|
||||||
|
|
|
@ -19,6 +19,9 @@ in
|
||||||
(
|
(
|
||||||
if cfg.isNormalUser then {
|
if cfg.isNormalUser then {
|
||||||
# extraGroups = [ "wheel" ];
|
# extraGroups = [ "wheel" ];
|
||||||
|
|
||||||
|
hashedPasswordFile = config.sops.secrets."passwords/remote".path;
|
||||||
|
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
openssh.authorizedKeys.keys = [];
|
openssh.authorizedKeys.keys = [];
|
||||||
} else {
|
} else {
|
||||||
|
|
Loading…
Reference in a new issue