···2626### Fixed
27272828- A non-existant key owner user/group would not default to gid/uid `0`.
2929+- Keys can now be deployed to localhost.
29303031## [0.2.0] - 2025-04-21
3132
···33 snakeOil,
44 wire-small,
55 config,
66+ pkgs,
67 ...
78}:
89let
···3132 systemd.tmpfiles.rules = [
3233 "C+ /root/.ssh/id_ed25519 600 - - - ${snakeOil.snakeOilEd25519PrivateKey}"
3334 ];
3434- environment.systemPackages = [ wire-small ];
3535+ environment.systemPackages = [
3636+ wire-small
3737+ pkgs.ripgrep
3838+ ];
3539 # It's important to note that you should never ever use this configuration
3640 # for production. You are risking a MITM attack with this!
3741 programs.ssh.extraConfig = ''
···4044 UserKnownHostsFile /dev/null
4145 '';
42464747+ # owner user used to test keys on the deployer.
4848+ # here instead of in the test case hive because we lose the wire binary when
4949+ # applying to deployer.
5050+ users.groups."owner" = { };
5151+ users.users."owner" = {
5252+ group = "owner";
5353+ isNormalUser = true;
5454+ };
4355 })
4456 (mkIf cfg.receiver {
4557 services.openssh.enable = true;