Compare commits

..

No commits in common. "5607cad78ff1be89ae2999e6f1070ea3f40d2082" and "72e53ea17fc7c3cdc4202671fbaa8f98fc9cd890" have entirely different histories.

13 changed files with 18 additions and 40 deletions

View file

@ -29,7 +29,7 @@ jobs:
mkdir -p ~/.ssh mkdir -p ~/.ssh
echo "$DEPLOY_KEY" > ~/.ssh/id_ed25519 echo "$DEPLOY_KEY" > ~/.ssh/id_ed25519
chmod 600 ~/.ssh/id_ed25519 chmod 600 ~/.ssh/id_ed25519
ssh-keyscan -p 2299 -H cryodev.xyz >> ~/.ssh/known_hosts ssh-keyscan -H cryodev.xyz >> ~/.ssh/known_hosts
- name: Deploy with deploy-rs - name: Deploy with deploy-rs
run: nix run github:serokell/deploy-rs -- -s .#cryodev-main run: nix run github:serokell/deploy-rs -- -s .#cryodev-main

View file

@ -123,10 +123,6 @@
nodes = { nodes = {
cryodev-main = { cryodev-main = {
hostname = constants.domain; hostname = constants.domain;
sshOpts = [
"-p"
"2299"
];
profiles.system = { profiles.system = {
user = "root"; user = "root";
path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.cryodev-main; path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.cryodev-main;

View file

@ -9,9 +9,4 @@
]; ];
services.openssh.enable = true; services.openssh.enable = true;
# Root SSH key for deploy-rs (key-only, no password)
users.users.root.openssh.authorizedKeys.keyFiles = [
../deploy-key.pub
];
} }

View file

@ -4,7 +4,5 @@
imports = [ imports = [
outputs.nixosModules.normalUsers outputs.nixosModules.normalUsers
../../users/steffen ../../users/steffen
../../users/ralph
../../users/benjamin
]; ];
} }

View file

@ -4,5 +4,6 @@
imports = [ imports = [
outputs.nixosModules.normalUsers outputs.nixosModules.normalUsers
../../users/steffen ../../users/steffen
../../users/cryotherm
]; ];
} }

View file

@ -9,7 +9,7 @@ in
ports = mkDefault [ 2299 ]; ports = mkDefault [ 2299 ];
openFirewall = mkDefault true; openFirewall = mkDefault true;
settings = { settings = {
PermitRootLogin = mkDefault "prohibit-password"; PermitRootLogin = mkDefault "no";
PasswordAuthentication = mkDefault false; PasswordAuthentication = mkDefault false;
}; };
}; };

View file

@ -3,7 +3,7 @@
{ {
imports = [ imports = [
outputs.nixosModules.normalUsers outputs.nixosModules.normalUsers
# Add users here, e.g.: ../../users/steffen
# ../../users/<username> ../../users/cryotherm
]; ];
} }

View file

@ -3,7 +3,7 @@
{ {
imports = [ imports = [
outputs.nixosModules.normalUsers outputs.nixosModules.normalUsers
# Add users here, e.g.: ../../users/steffen
# ../../users/<username> ../../users/cryotherm
]; ];
} }

View file

@ -1,11 +0,0 @@
{
normalUsers.benjamin = {
extraGroups = [
"wheel"
];
sshKeyFiles = [
# TODO: Add benjamin's public key
# ./pubkeys/benjamin.pub
];
};
}

View file

@ -0,0 +1,7 @@
{
normalUsers.cryotherm = {
extraGroups = [ ];
# No sshKeyFiles, so password login only (if allowed) or local access
sshKeyFiles = [ ];
};
}

View file

@ -1,11 +0,0 @@
{
normalUsers.ralph = {
extraGroups = [
"wheel"
];
sshKeyFiles = [
# TODO: Add ralph's public key
# ./pubkeys/ralph.pub
];
};
}

View file

@ -5,6 +5,9 @@
extraGroups = [ extraGroups = [
"wheel" "wheel"
]; ];
sshKeyFiles = [ ./pubkeys/X670E.pub ]; sshKeyFiles = [
./pubkeys/X670E.pub
./pubkeys/forgejo-deploy.pub
];
}; };
} }