Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixops
  Commit: 93bea39bf259e3be82e855b8448e3175a396b545
      
https://github.com/NixOS/nixops/commit/93bea39bf259e3be82e855b8448e3175a396b545
  Author: aszlig <[email protected]>
  Date:   2015-10-21 (Wed, 21 Oct 2015)

  Changed paths:
    M nixops/backends/hetzner.py

  Log Message:
  -----------
  hetzner: Don't create /root/.ssh/authorized_keys.

I have no idea why I didn't use
users.extraUsers.root.openssh.authorizedKeys.keys in the first place,
but since NixOS/nixpkgs@6e76765 it's necessary to do so with
users.mutableUsers set to false.

This is good, because now we shouldn't have cruft like
.ssh/authorized_keys laying around just for NixOps to work.

However, I didn't look into the other backends whether they work with
mutableUsers = false, because I'm not able to properly test them.

Also, please note that we still have to users.extraUsers instead of
users.users, because we want to retain backwards-compatibility.

Signed-off-by: aszlig <[email protected]>


  Commit: 13a1d2744dc37ab7ece3974bff4bc08d395fe0d7
      
https://github.com/NixOS/nixops/commit/13a1d2744dc37ab7ece3974bff4bc08d395fe0d7
  Author: Eelco Dolstra <[email protected]>
  Date:   2015-10-26 (Mon, 26 Oct 2015)

  Changed paths:
    M nixops/backends/hetzner.py

  Log Message:
  -----------
  Merge pull request #349 from aszlig/hetzner-mutable-users

hetzner: Don't create /root/.ssh/authorized_keys.


Compare: https://github.com/NixOS/nixops/compare/98b4edd51935...13a1d2744dc3
_______________________________________________
nix-commits mailing list
[email protected]
http://lists.science.uu.nl/mailman/listinfo/nix-commits

Reply via email to