From 8534d387bdde222991a1fa796cbbcef2a889c46a Mon Sep 17 00:00:00 2001 From: Grigory Shipunov Date: Thu, 2 Jan 2025 20:37:22 +0000 Subject: [PATCH] remove stale keys --- flake.nix | 3 +++ modules/binary-caches.nix | 3 +++ modules/server/default.nix | 3 --- modules/server/ssh.nix | 3 --- 4 files changed, 6 insertions(+), 6 deletions(-) diff --git a/flake.nix b/flake.nix index 6efad80..af524c2 100644 --- a/flake.nix +++ b/flake.nix @@ -77,6 +77,8 @@ ./hosts/cloud ./modules/basic-tools + ./modules/server + ./modules/binary-caches.nix ]; }; minime = nixpkgs-stable.lib.nixosSystem { @@ -88,6 +90,7 @@ ./hosts/minime ./modules/basic-tools ./modules/server + ./modules/binary-caches.nix ]; }; }; diff --git a/modules/binary-caches.nix b/modules/binary-caches.nix index 01ee320..8a2b5ac 100644 --- a/modules/binary-caches.nix +++ b/modules/binary-caches.nix @@ -14,18 +14,21 @@ "https://dump-dvb.cachix.org" "https://tlm-solutions.cachix.org" "https://nix-community.cachix.org" + "https://hydra.hq.c3d2.de" ]; trusted-substituters = [ "https://microvm.cachix.org" "https://dump-dvb.cachix.org" "https://tlm-solutions.cachix.org" "https://nix-community.cachix.org" + "https://hydra.hq.c3d2.de" ]; trusted-public-keys = [ "microvm.cachix.org-1:oXnBc6hRE3eX5rSYdRyMYXnfzcCxC7yKPTbZXALsqys=" "dump-dvb.cachix.org-1:+Dq7gqpQG4YlLA2X3xJsG1v3BrlUGGpVtUKWk0dTyUU=" "tlm-solutions.cachix.org-1:J7qT6AvoNWPSj+59ed5bNESj35DLJNaROqga1EjVIoA=" "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" + "hydra.hq.c3d2.de:KZRGGnwOYzys6pxgM8jlur36RmkJQ/y8y62e52fj1ps=" ]; }; }; diff --git a/modules/server/default.nix b/modules/server/default.nix index c20efcd..6122bfa 100644 --- a/modules/server/default.nix +++ b/modules/server/default.nix @@ -10,9 +10,6 @@ security.sudo.enable = true; users.users."0xa" = { openssh.authorizedKeys.keys = [ - "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHv82n6F6kwJ3/EMYlOoCc1/NaYFW7QHC5F8jKVzdlio gshipunov@toaster" - "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA3to/h8Myn+zXAkjboaRVqOfmtDz7VpIHhHbaRoYyPX g.shipunov@uva.nl" - "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICPPG1va3CG8uAXV+ACRFPdi8FicpdOyXqb7eSZJCPXx pixel" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJl9iYG5oHBq/poBn7Jf1/FGWWbAnbx+NKjs7qtT3uAK 0xa@toaster 2024-12-31" ]; extraGroups = [ diff --git a/modules/server/ssh.nix b/modules/server/ssh.nix index 1eefdd3..dd91843 100644 --- a/modules/server/ssh.nix +++ b/modules/server/ssh.nix @@ -10,9 +10,6 @@ networking.firewall.allowedTCPPorts = [ 22 2020 ]; users.users.root.openssh.authorizedKeys.keys = [ - "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHv82n6F6kwJ3/EMYlOoCc1/NaYFW7QHC5F8jKVzdlio gshipunov@toaster" - "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA3to/h8Myn+zXAkjboaRVqOfmtDz7VpIHhHbaRoYyPX g.shipunov@uva.nl" - "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAlRhs/h3zTfonh/8wTZPEHnLAWXtedpF3ulJOwDbTGL owner@pixel" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJl9iYG5oHBq/poBn7Jf1/FGWWbAnbx+NKjs7qtT3uAK 0xa@toaster 2024-12-31" ]; }