opened 10:45AM - 23 Sep 22 UTC
0.kind: bug
### Describe the bug
Adding a public key fingerprint to users.user."user".opens…sh.authorizedKeys.keys creates the /etc/ssh/authorized_keys.d/user file but is not read/works by the sshd daemon.
It does work if I use the traditional method of creating a ~/.ssh/authorized_keys file including the public key manually.
Maybe Im missunderstanding how this options should work?
### Steps To Reproduce
Steps to reproduce the behavior:
1. Add your ssh public key's fingerprint to the users.user."user".openssh.authorizedKeys.keys array
2. Rebuild
3. Try to login to your machine with ssh
4. Fail (denied publickey)
### Expected behavior
SSH public key login works
### Additional context
- NixOS unstable
- Using a gpg-agent "generated" ssh key
### Notify maintainers
@edolstra ?
### Metadata
Please run `nix-shell -p nix-info --run "nix-info -m"` and paste the result.
```console
[user@system:~]$ nix-shell -p nix-info --run "nix-info -m"
- system: `"x86_64-linux"`
- host os: `Linux 5.19.10-zen1, NixOS, 22.11 (Raccoon), 22.11.20220921.d6490a0`
- multi-user?: `yes`
- sandbox: `yes`
- version: `nix-env (Nix) 2.11.0`
- nixpkgs: `/nix/var/nix/profiles/per-user/root/channels/nixos`
```