Compare commits
2 commits
0589894ec6
...
a83c9a4644
Author | SHA1 | Date | |
---|---|---|---|
Antoine Martin | a83c9a4644 | ||
Antoine Martin | e5d6210912 |
|
@ -5,10 +5,10 @@ in
|
||||||
{
|
{
|
||||||
users.mutableUsers = false;
|
users.mutableUsers = false;
|
||||||
users.users.root = {
|
users.users.root = {
|
||||||
hashedPassword = secrets.shadow-hashed-password-root;
|
passwordFile = config.age.secrets."users/root-hashed-password".path;
|
||||||
};
|
};
|
||||||
users.users.alarsyo = {
|
users.users.alarsyo = {
|
||||||
hashedPassword = secrets.shadow-hashed-password-alarsyo;
|
passwordFile = config.age.secrets."users/alarsyo-hashed-password".path;
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
extraGroups = [
|
extraGroups = [
|
||||||
"media"
|
"media"
|
||||||
|
|
|
@ -3,9 +3,6 @@
|
||||||
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
||||||
|
|
||||||
{ config, lib, pkgs, ... }:
|
{ config, lib, pkgs, ... }:
|
||||||
let
|
|
||||||
secrets = config.my.secrets;
|
|
||||||
in
|
|
||||||
{
|
{
|
||||||
imports =
|
imports =
|
||||||
[ # Include the results of the hardware scan.
|
[ # Include the results of the hardware scan.
|
||||||
|
|
|
@ -13,4 +13,7 @@ in
|
||||||
{
|
{
|
||||||
"restic-backup/zephyrus-password.age".publicKeys = [ alarsyo zephyrus ];
|
"restic-backup/zephyrus-password.age".publicKeys = [ alarsyo zephyrus ];
|
||||||
"restic-backup/zephyrus-credentials.age".publicKeys = [ alarsyo zephyrus ];
|
"restic-backup/zephyrus-credentials.age".publicKeys = [ alarsyo zephyrus ];
|
||||||
|
|
||||||
|
"users/root-hashed-password.age".publicKeys = machines;
|
||||||
|
"users/alarsyo-hashed-password.age".publicKeys = machines ++ [ alarsyo ];
|
||||||
}
|
}
|
||||||
|
|
BIN
modules/secrets/users/alarsyo-hashed-password.age
Normal file
BIN
modules/secrets/users/alarsyo-hashed-password.age
Normal file
Binary file not shown.
BIN
modules/secrets/users/root-hashed-password.age
Normal file
BIN
modules/secrets/users/root-hashed-password.age
Normal file
Binary file not shown.
|
@ -11,7 +11,6 @@ let
|
||||||
;
|
;
|
||||||
|
|
||||||
cfg = config.my.services.restic-backup;
|
cfg = config.my.services.restic-backup;
|
||||||
secrets = config.my.secrets;
|
|
||||||
excludeArg = "--exclude-file=" + (pkgs.writeText "excludes.txt" (concatStringsSep "\n" cfg.exclude));
|
excludeArg = "--exclude-file=" + (pkgs.writeText "excludes.txt" (concatStringsSep "\n" cfg.exclude));
|
||||||
makePruneOpts = pruneOpts:
|
makePruneOpts = pruneOpts:
|
||||||
attrsets.mapAttrsToList (name: value: "--keep-${name} ${toString value}") pruneOpts;
|
attrsets.mapAttrsToList (name: value: "--keep-${name} ${toString value}") pruneOpts;
|
||||||
|
|
|
@ -10,9 +10,6 @@
|
||||||
# Service definitions
|
# Service definitions
|
||||||
./services
|
./services
|
||||||
|
|
||||||
# Configuration secrets
|
|
||||||
./secrets
|
|
||||||
|
|
||||||
# Host-specific config
|
# Host-specific config
|
||||||
./hosts/zephyrus
|
./hosts/zephyrus
|
||||||
];
|
];
|
||||||
|
|
Loading…
Reference in a new issue