From 9f9d513b2387745348f63b776b93637fdebcdd52 Mon Sep 17 00:00:00 2001 From: Fabrice Bellamy <12b@distrilab.fr> Date: Thu, 26 Dec 2024 11:20:26 +0100 Subject: [PATCH] access to arachnide server through the wireguard vpn --- krops.nix | 2 +- modules/users.nix | 11 +++++++++++ 2 files changed, 12 insertions(+), 1 deletion(-) diff --git a/krops.nix b/krops.nix index ebf77c9..b9c6a05 100644 --- a/krops.nix +++ b/krops.nix @@ -25,7 +25,7 @@ let arachnide = pkgs.krops.writeDeploy "deploy-server-arachnide" { source = source "arachnide"; - target = lib.mkTarget "douzeb@192.168.36.9" // { + target = lib.mkTarget "operator@192.168.12.2" // { port = "144"; sudo = true; }; diff --git a/modules/users.nix b/modules/users.nix index 4b4223e..bbef5ec 100644 --- a/modules/users.nix +++ b/modules/users.nix @@ -2,6 +2,17 @@ { config, pkgs, ... }: { # Define user accounts. Don't forget to set a password with 'passwd'. + users.users.operator = { + isNormalUser = true; + description = "douze baie"; + extraGroups = [ "wheel" ]; + packages = with pkgs; []; + openssh.authorizedKeys.keys = [ + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILRG0CyeeMMrrjTTm/PHgRXD/I4lH/bBPBCGUiL+cBdq douzeb@tux-12" + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBBM+2TwkopAQF7splTWjORQoxjcp67VhodwzvTMlL8g florian@florian-LinuxMint-MBP" + ]; + }; + users.users.douzeb = { isNormalUser = true; description = "douze baie";