Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update README.md with a note for Impermanence Users #509

Merged
merged 2 commits into from
Mar 14, 2024
Merged

Update README.md with a note for Impermanence Users #509

merged 2 commits into from
Mar 14, 2024

Conversation

GameDungeon
Copy link
Contributor

A note was added to the "Setting a user's password" part of the Read-me to help people avoid a serious pitfall. Warns Impermanence Users to link to they keyfile through there persist instead of the normal way.

@byronogis
Copy link

I think there is a stright way to solve it.
Just set attr program.openssh.hostKeys by self, make sure the each hostKeys path are storage in you persist path.
(This also can let ssh key static, not change after reboot because of data clear.)
And everything is ok, sops-nix will auto use it by default.

Like this:

{
  program.openssh.hostKeys = [
    {
        bits = 4096;
        path = "/persist/etc/ssh/ssh_host_rsa_key";
        type = "rsa";
      }
      {
        path = "/persist/etc/ssh/ssh_host_ed25519_key";
        type = "ed25519";
      }
  ];
}

@GameDungeon
Copy link
Contributor Author

GameDungeon commented Mar 14, 2024

That might be a good additional thing to add, but it is essentially the same point except with ssh instead of key files. Moving the key files to the persist directory so they are available at boot time before impermanence has run.

If you are sure this works and think I should add it, I can do that. Maybe in a detail section so it doesn't take up much space.

@byronogis
Copy link

If you are sure this works

Yes, it is work. I build nixos and set user password with hashedPasswordFile with sops-nix.
That is my config

README.md Show resolved Hide resolved
@Mic92
Copy link
Owner

Mic92 commented Mar 14, 2024

@mergify queue

Copy link
Contributor

mergify bot commented Mar 14, 2024

queue

🛑 The pull request has been removed from the queue default

The pull request #509 has been manually updated.

You can take a look at Queue: Embarked in merge queue check runs for more details.

In case of a failure due to a flaky test, you should first retrigger the CI.
Then, re-embark the pull request into the merge queue by posting the comment
@mergifyio refresh on the pull request.

@Mic92 Mic92 merged commit ebbca93 into Mic92:master Mar 14, 2024
58 checks passed
@GameDungeon GameDungeon deleted the patch-1 branch March 14, 2024 22:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants