1
1
Fork 0
mirror of https://gitlab.archlinux.org/archlinux/infrastructure.git synced 2024-04-27 15:15:00 +02:00
infrastructure/group_vars/all/root_access.yml

50 lines
1.8 KiB
YAML
Raw Normal View History

# deploy tag 'sudo' when this changes
sudo_users:
2019-10-10 23:48:50 +02:00
- root
- foutrelis
2020-11-15 15:22:15 +01:00
- freswa
- heftig
2019-10-10 23:48:50 +02:00
- jelle
- svenstaro
- anthraxx
2021-06-02 16:17:31 +02:00
- klausenbusk
2023-01-30 07:03:04 +01:00
- artafinde
2024-02-11 22:24:33 +01:00
- gromit
# deploy tag 'root_ssh' when this changes
2016-05-27 22:46:00 +02:00
root_ssh_keys:
- key: foutrelis.pub
- key: freswa.pub
- key: heftig_nitrokey.pub
- key: jelle.pub
- key: svenstaro.pub
- key: anthraxx.pub
- key: klausenbusk.pub
- key: artafinde.pub
- key: gromit.pub
# run 'playbooks/tasks/reencrypt-vault-{super,default}-key.yml' when this
# changes; before doing so, make sure to 'gpg --lsign-key' all keys from both
# sets (or if you use TOFU, `gpg --tofu-policy good`) before committing the
# re-encrypted password file, then test that both vaults are working using
# `ansible-vault view misc/vaults/vault_{hetzner,hcloud}.yml`
# NOTE: adding a key to this list gives access to both default and super vaults
vault_super_pgpkeys: &vault_super_pgpkeys
- 86CFFCA918CF3AF47147588051E8B148A9999C34 # foutrelis
- 05C7775A9E8B977407FE08E69D4C5AA15426DA0A # freswa
- 83BC8889351B5DEBBB68416EB8AC08600F108CDF # heftig
- E499C79F53C96A54E572FEE1C06086337C50773E # jelle
- 8FC15A064950A99DD1BD14DD39E4B877E62EB915 # svenstaro
- E240B57E2C4630BA768E2F26FC1B547C8D8172C8 # anthraxx
2021-06-02 16:17:31 +02:00
- DB650286BD9EAE39890D3FE6FE3DC1668CB24956 # klausenbusk
2023-01-30 07:03:04 +01:00
- B4B759625D4633430B74877059E43E106B247368 # artafinde
2024-02-11 22:24:33 +01:00
- F00B96D15228013FFC9C9D0393B11DAA4C197E3D # gromit
# run 'playbooks/tasks/reencrypt-vault-default-key.yml' when this changes;
# before doing so, make sure to 'gpg --lsign-key' all keys below (or if you use
# TOFU, `gpg --tofu-policy good`) before committing the re-encrypted password
# file, then test that the vault is working by running `ansible-vault view
# misc/vaults/vault_hcloud.yml`
vault_default_pgpkeys:
- *vault_super_pgpkeys