update commonUsers and refactor system config
This commit is contained in:
parent
a1f42a13a1
commit
3b7a80ef03
8 changed files with 131 additions and 104 deletions
|
@ -6,8 +6,6 @@
|
||||||
, ...
|
, ...
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
passwords = import ../../../variables/passwords.crypt.nix;
|
|
||||||
|
|
||||||
localTcpPorts = [
|
localTcpPorts = [
|
||||||
22
|
22
|
||||||
|
|
||||||
|
@ -30,6 +28,7 @@ in
|
||||||
../../snippets/nix-settings-holo-chain.nix
|
../../snippets/nix-settings-holo-chain.nix
|
||||||
../../snippets/radicale.nix
|
../../snippets/radicale.nix
|
||||||
../../snippets/sway-desktop.nix
|
../../snippets/sway-desktop.nix
|
||||||
|
../../snippets/timezone.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
nix.settings = {
|
nix.settings = {
|
||||||
|
@ -64,6 +63,8 @@ in
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
|
|
||||||
|
networking.networkmanager.enable = true;
|
||||||
|
|
||||||
networking.extraHosts = ''
|
networking.extraHosts = ''
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
@ -122,8 +123,6 @@ in
|
||||||
|
|
||||||
services.xserver.videoDrivers = lib.mkForce [ "amdgpu" ];
|
services.xserver.videoDrivers = lib.mkForce [ "amdgpu" ];
|
||||||
|
|
||||||
time.timeZone = lib.mkForce passwords.timeZone.stefan;
|
|
||||||
|
|
||||||
hardware.ledger.enable = true;
|
hardware.ledger.enable = true;
|
||||||
|
|
||||||
# services.zerotierone = {
|
# services.zerotierone = {
|
||||||
|
|
|
@ -1,16 +1,17 @@
|
||||||
{
|
{ config
|
||||||
config,
|
, pkgs
|
||||||
pkgs,
|
, lib
|
||||||
lib,
|
, ...
|
||||||
...
|
}:
|
||||||
}: let
|
let
|
||||||
keys = import ../../../variables/keys.nix;
|
keys = import ../../../variables/keys.nix;
|
||||||
inherit (pkgs.callPackage ../../lib/default.nix { }) mkUser;
|
inherit (pkgs.callPackage ../../lib/default.nix { }) mkUser;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
users.extraUsers.steveej2 = mkUser {
|
users.extraUsers.steveej2 = mkUser {
|
||||||
uid = 1001;
|
uid = 1001;
|
||||||
openssh.authorizedKeys.keys = keys.users.steveej.openssh;
|
openssh.authorizedKeys.keys = keys.users.steveej.openssh;
|
||||||
passwordFile = config.sops.secrets.sharedUsers-steveej.path;
|
hashedPasswordFile = config.sops.secrets.sharedUsers-steveej.path;
|
||||||
};
|
};
|
||||||
|
|
||||||
nix.settings.trusted-users = [ "steveej" ];
|
nix.settings.trusted-users = [ "steveej" ];
|
||||||
|
|
|
@ -45,12 +45,11 @@
|
||||||
# sops.defaultSopsFile = ../../../../secrets/${nodeName}/secrets.yaml;
|
# sops.defaultSopsFile = ../../../../secrets/${nodeName}/secrets.yaml;
|
||||||
# sops.defaultSopsFormat = "yaml";
|
# sops.defaultSopsFormat = "yaml";
|
||||||
|
|
||||||
# users.commonUsers = {
|
users.commonUsers = {
|
||||||
# enable = true;
|
enable = true;
|
||||||
# enableNonRoot = true;
|
enableNonRoot = true;
|
||||||
# };
|
installPassword = "install";
|
||||||
|
};
|
||||||
users.users.root.initialPassword = "install";
|
|
||||||
}
|
}
|
||||||
|
|
||||||
nodeFlake.inputs.home-manager.nixosModules.home-manager
|
nodeFlake.inputs.home-manager.nixosModules.home-manager
|
||||||
|
@ -66,14 +65,9 @@
|
||||||
bluetoothMac = "65:9e:7a:8b:86:28";
|
bluetoothMac = "65:9e:7a:8b:86:28";
|
||||||
};
|
};
|
||||||
|
|
||||||
networking = {
|
networking.hostName = nodeName;
|
||||||
hostName = nodeName;
|
networking.firewall.enable = true;
|
||||||
|
networking.networkmanager.enable = true;
|
||||||
firewall.enable = true;
|
|
||||||
|
|
||||||
# useNetworkd = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
|
|
||||||
nixpkgs.config.allowUnfree = true;
|
nixpkgs.config.allowUnfree = true;
|
||||||
|
|
||||||
|
|
|
@ -6,8 +6,7 @@ let
|
||||||
keys = import ../../variables/keys.nix;
|
keys = import ../../variables/keys.nix;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
mkUser = args: (
|
mkUser = args: lib.mkMerge [
|
||||||
lib.attrsets.recursiveUpdate
|
|
||||||
{
|
{
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
extraGroups = [
|
extraGroups = [
|
||||||
|
@ -34,7 +33,7 @@ in
|
||||||
# ];
|
# ];
|
||||||
}
|
}
|
||||||
args
|
args
|
||||||
);
|
];
|
||||||
|
|
||||||
disk = rec {
|
disk = rec {
|
||||||
# TODO: verify the GPT PARTLABEL cap at 36 chars
|
# TODO: verify the GPT PARTLABEL cap at 36 chars
|
||||||
|
|
|
@ -1,9 +1,8 @@
|
||||||
{
|
{ config
|
||||||
config,
|
, pkgs
|
||||||
pkgs,
|
, lib
|
||||||
lib,
|
, nodeName
|
||||||
nodeName,
|
, ...
|
||||||
...
|
|
||||||
}: {
|
}: {
|
||||||
networking.hostName = builtins.elemAt (builtins.split "\\." nodeName) 0; # Define your hostname.
|
networking.hostName = builtins.elemAt (builtins.split "\\." nodeName) 0; # Define your hostname.
|
||||||
networking.domain = builtins.elemAt (builtins.split "(^[^\\.]+\.)" nodeName) 2;
|
networking.domain = builtins.elemAt (builtins.split "(^[^\\.]+\.)" nodeName) 2;
|
||||||
|
@ -15,7 +14,7 @@
|
||||||
'';
|
'';
|
||||||
|
|
||||||
# Fonts, I18N, Date ...
|
# Fonts, I18N, Date ...
|
||||||
fonts.fonts = [pkgs.corefonts];
|
fonts.packages = [ pkgs.corefonts ];
|
||||||
|
|
||||||
console.font = "lat9w-16";
|
console.font = "lat9w-16";
|
||||||
|
|
||||||
|
|
|
@ -1,9 +1,9 @@
|
||||||
{
|
{ config
|
||||||
config,
|
, pkgs
|
||||||
pkgs,
|
, lib
|
||||||
lib,
|
, ...
|
||||||
...
|
}:
|
||||||
}: let
|
let
|
||||||
keys = import ../../../variables/keys.nix;
|
keys = import ../../../variables/keys.nix;
|
||||||
inherit
|
inherit
|
||||||
(import ../../lib/default.nix {
|
(import ../../lib/default.nix {
|
||||||
|
@ -16,7 +16,8 @@
|
||||||
inherit (lib) types;
|
inherit (lib) types;
|
||||||
|
|
||||||
cfg = config.users.commonUsers;
|
cfg = config.users.commonUsers;
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
options.users.commonUsers = {
|
options.users.commonUsers = {
|
||||||
enable = lib.mkOption {
|
enable = lib.mkOption {
|
||||||
default = true;
|
default = true;
|
||||||
|
@ -32,8 +33,14 @@ in {
|
||||||
default = config.sops.secrets.sharedUsers-root.path;
|
default = config.sops.secrets.sharedUsers-root.path;
|
||||||
type = types.path;
|
type = types.path;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
installPassword = lib.mkOption {
|
||||||
|
default = "";
|
||||||
|
type = types.str;
|
||||||
};
|
};
|
||||||
config = lib.mkIf cfg.enable {
|
};
|
||||||
|
config = lib.mkIf cfg.enable (lib.mkMerge [
|
||||||
|
(lib.mkIf (cfg.installPassword == "") {
|
||||||
sops.secrets.sharedUsers-root = {
|
sops.secrets.sharedUsers-root = {
|
||||||
sopsFile = ../../../../secrets/shared-users.yaml;
|
sopsFile = ../../../../secrets/shared-users.yaml;
|
||||||
neededForUsers = true;
|
neededForUsers = true;
|
||||||
|
@ -51,22 +58,39 @@ in {
|
||||||
# neededForUsers = true;
|
# neededForUsers = true;
|
||||||
format = "yaml";
|
format = "yaml";
|
||||||
};
|
};
|
||||||
|
})
|
||||||
|
|
||||||
|
{
|
||||||
users.mutableUsers = lib.mkForce false;
|
users.mutableUsers = lib.mkForce false;
|
||||||
|
|
||||||
users.extraUsers.root = {
|
users.users.root = lib.mkMerge [
|
||||||
passwordFile = cfg.rootPasswordFile;
|
{
|
||||||
openssh.authorizedKeys.keys = keys.users.steveej.openssh;
|
openssh.authorizedKeys.keys = keys.users.steveej.openssh;
|
||||||
|
}
|
||||||
# TODO: investigate why this secret cannot be found
|
|
||||||
# openssh.authorizedKeys.keyFiles = [
|
(lib.mkIf (cfg.installPassword != "") {
|
||||||
# config.sops.secrets.sharedSshKeys-steveej.path
|
password = cfg.installPassword;
|
||||||
# ];
|
})
|
||||||
};
|
|
||||||
|
(lib.mkIf (cfg.installPassword == "") {
|
||||||
users.extraUsers.steveej = lib.mkIf cfg.enableNonRoot (mkUser {
|
hashedPasswordFile = cfg.rootPasswordFile;
|
||||||
uid = 1000;
|
})
|
||||||
passwordFile = config.sops.secrets.sharedUsers-steveej.path;
|
];
|
||||||
});
|
|
||||||
};
|
|
||||||
|
users.users.steveej = lib.mkIf cfg.enableNonRoot (mkUser (lib.mkMerge [
|
||||||
|
{
|
||||||
|
uid = 1000;
|
||||||
|
}
|
||||||
|
|
||||||
|
(lib.mkIf (cfg.installPassword != "") {
|
||||||
|
password = cfg.installPassword;
|
||||||
|
})
|
||||||
|
|
||||||
|
(lib.mkIf (cfg.installPassword == "") {
|
||||||
|
hashedPasswordFile = config.sops.secrets.sharedUsers-steveej.path;
|
||||||
|
})
|
||||||
|
]));
|
||||||
|
}
|
||||||
|
]);
|
||||||
}
|
}
|
||||||
|
|
|
@ -35,6 +35,10 @@ in
|
||||||
# $ xdg-open "https://github.com/"
|
# $ xdg-open "https://github.com/"
|
||||||
# Error: GDBus.Error:org.freedesktop.DBus.Error.UnknownMethod: No such interface “org.freedesktop.portal.OpenURI” on object at path /org/freedesktop/portal/desktop
|
# Error: GDBus.Error:org.freedesktop.DBus.Error.UnknownMethod: No such interface “org.freedesktop.portal.OpenURI” on object at path /org/freedesktop/portal/desktop
|
||||||
xdgOpenUsePortal = false;
|
xdgOpenUsePortal = false;
|
||||||
|
|
||||||
|
# keep the behaviour in < 1.17, which uses the first portal implementation found in lexicographical order, use the following:
|
||||||
|
config.common.default = "*";
|
||||||
|
|
||||||
extraPortals = [
|
extraPortals = [
|
||||||
pkgs.xdg-desktop-portal-wlr
|
pkgs.xdg-desktop-portal-wlr
|
||||||
pkgs.xdg-desktop-portal-gtk
|
pkgs.xdg-desktop-portal-gtk
|
||||||
|
@ -59,8 +63,6 @@ in
|
||||||
#jack.enable = true;
|
#jack.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
networkmanager.enable = false;
|
|
||||||
|
|
||||||
security.pam.services.getty.enableGnomeKeyring = true;
|
security.pam.services.getty.enableGnomeKeyring = true;
|
||||||
services.gnome.gnome-keyring.enable = true;
|
services.gnome.gnome-keyring.enable = true;
|
||||||
# autologin steveej on tty1
|
# autologin steveej on tty1
|
||||||
|
|
9
nix/os/snippets/timezone.nix
Normal file
9
nix/os/snippets/timezone.nix
Normal file
|
@ -0,0 +1,9 @@
|
||||||
|
{ lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
passwords = import ../../../variables/passwords.crypt.nix;
|
||||||
|
|
||||||
|
in
|
||||||
|
{
|
||||||
|
time.timeZone = lib.mkDefault passwords.timeZone.stefan;
|
||||||
|
}
|
Loading…
Add table
Add a link
Reference in a new issue