diff options
author | Baitinq <manuelpalenzuelamerino@gmail.com> | 2022-09-23 01:47:03 +0200 |
---|---|---|
committer | Baitinq <manuelpalenzuelamerino@gmail.com> | 2022-09-23 12:30:09 +0200 |
commit | bf18fe6b60e4ba9451d2301168282e270c9a5fa9 (patch) | |
tree | ad578c156924990b0d6e6f4151529947f5ab4165 /hosts/configuration.nix | |
parent | Misc: Encrypt flake.lock (diff) | |
download | nixos-config-bf18fe6b60e4ba9451d2301168282e270c9a5fa9.tar.gz nixos-config-bf18fe6b60e4ba9451d2301168282e270c9a5fa9.tar.bz2 nixos-config-bf18fe6b60e4ba9451d2301168282e270c9a5fa9.zip |
SSH: Add own authorized_keys
Diffstat (limited to '')
-rw-r--r-- | hosts/configuration.nix | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/hosts/configuration.nix b/hosts/configuration.nix index 63a78c4..f8d6437 100644 --- a/hosts/configuration.nix +++ b/hosts/configuration.nix @@ -60,6 +60,9 @@ isNormalUser = true; extraGroups = [ "wheel" "audio" "video" ]; # Enable ‘sudo’ for the user. hashedPassword = secrets.baitinq.hashed_password; + openssh.authorizedKeys.keys = [ + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID99gQ/AgXhgwAjs+opsRXMbWpXFRT2aqAOUbN3DsrhQ (none)" + ]; }; environment.variables = { @@ -129,6 +132,9 @@ services = { openssh = { enable = true; + /* DOESNT WORK BECAUSE OF AUTHORIZEDKEYS BUG + passwordAuthentication = false; + kbdInteractiveAuthentication = false;*/ listenAddresses = [{ addr = "0.0.0.0"; port = 2222; |