Compare commits

...

1 commit

Author SHA1 Message Date
73441141d0 Rename machine to Nyarlathotep 2025-02-26 14:38:49 +01:00
10 changed files with 11 additions and 11 deletions

View file

@ -5,7 +5,7 @@ keys:
- &nyarlathotep age1s99d0vlj5qlm287n98jratql5fypvjrxxal0k5jl2aw9dcc8kyvqw5yyt4
- &bragi age1lqvgpmlemyg9095ujck64u59ma29656zs7a4yxgz4s6u5cld2ccss69jwe
- &lobon age12nz7dtc0m5wasxm4r9crtkgwnzvauyfp0xh0n8z8jld0arn9ea9qe0agvn
- &kaalut age1ktwclxa640l89le6yecm8v2z6hmwr4lusd6x9gyzamhv57887szqtqp59a
- &nyarlathotep age1ktwclxa640l89le6yecm8v2z6hmwr4lusd6x9gyzamhv57887szqtqp59a
creation_rules:
- path_regex: nixos/machines/nyarlathotep/.*
@ -26,12 +26,12 @@ creation_rules:
- *nerf
- *gonne
- *lobon
- path_regex: nixos/machines/kaalut/.*
- path_regex: nixos/machines/nyarlathotep/.*
key_groups:
- age:
- *nerf
- *gonne
- *kaalut
- *nyarlathotep
# this is the catchall clause if nothing above machtes. Encrypt to users but not
# to machines
- key_groups:

View file

@ -37,7 +37,7 @@
];
};
networking.hostName = "kaalut";
networking.hostName = "nyarlathotep";
vmNetwork.ipv4 = "192.168.0.17";
system.stateVersion = "24.05";

View file

@ -76,13 +76,6 @@ in {
path = "/var/lib/backups/ithaqua";
allowSubRepos = true;
};
kaalut = {
authorizedKeysAppendOnly = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFcAJkEXcvrDEQf1zRhBXLe1CSHOTooM3qy0KMfS9oug Kaalut Backup"
];
path = "/var/lib/backups/kaalut";
allowSubRepos = true;
};
lobon = {
authorizedKeysAppendOnly = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICEptjf1UWRlo6DG9alAIRwkSDUAVHwDKkHC6/DeYKzi Lobon Backup"
@ -90,6 +83,13 @@ in {
path = "/var/lib/backups/lobon";
allowSubRepos = true;
};
nyarlathotep = {
authorizedKeysAppendOnly = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFcAJkEXcvrDEQf1zRhBXLe1CSHOTooM3qy0KMfS9oug nyarlathotep Backup"
];
path = "/var/lib/backups/nyarlathotep";
allowSubRepos = true;
};
sanctamariamaterdei = {
authorizedKeysAppendOnly = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIH9Le5OI4ympQ0mQKYHmxgxGF598rzpD5VVpWK1mGfd8 Sanctamariamaterdei Backupsystem"