feat(ccl): init
This commit is contained in:
@@ -1,7 +1,6 @@
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
username,
|
||||
userfullname,
|
||||
useremail,
|
||||
@@ -27,11 +26,6 @@ lib.my.makeHomeProgramConfig {
|
||||
};
|
||||
extraConfig = {
|
||||
push.autoSetupRemote = true;
|
||||
gpg.ssh.allowedSignersFile =
|
||||
(pkgs.writeText "allowed_signers" ''
|
||||
imxyy1soope1@gmail.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOEFLUkyeaK8ZPPZdVNEmtx8zvoxi7xqS2Z6oxRBuUPO imxyy@imxyy-nix
|
||||
imxyy@imxyy.top ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOEFLUkyeaK8ZPPZdVNEmtx8zvoxi7xqS2Z6oxRBuUPO imxyy@imxyy-nix
|
||||
'').outPath;
|
||||
};
|
||||
};
|
||||
programs.lazygit = {
|
||||
|
||||
@@ -32,11 +32,6 @@ lib.my.makeHomeProgramConfig {
|
||||
backend = "ssh";
|
||||
behavior = "own";
|
||||
key = "/home/${username}/.ssh/id_ed25519";
|
||||
backends.backends.ssh.allowed-signers =
|
||||
(pkgs.writeText "allowed_signers" ''
|
||||
imxyy1soope1@gmail.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOEFLUkyeaK8ZPPZdVNEmtx8zvoxi7xqS2Z6oxRBuUPO imxyy@imxyy-nix
|
||||
imxyy@imxyy.top ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOEFLUkyeaK8ZPPZdVNEmtx8zvoxi7xqS2Z6oxRBuUPO imxyy@imxyy-nix
|
||||
'').outPath;
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
@@ -56,7 +56,7 @@ local extra_config = {
|
||||
},
|
||||
options = {
|
||||
nixos = {
|
||||
expr = '(builtins.getFlake ("git+file://" + toString ./.)).nixosConfigurations.imxyy-nix.options',
|
||||
expr = '(builtins.getFlake ("git+file://" + toString ./.)).nixosConfigurations.ccl-nix.options',
|
||||
},
|
||||
},
|
||||
},
|
||||
|
||||
@@ -49,14 +49,6 @@ lib.my.makeSwitch {
|
||||
];
|
||||
};
|
||||
|
||||
sops.secrets.nix-github-token = {
|
||||
sopsFile = secrets.nix-github-token;
|
||||
format = "binary";
|
||||
};
|
||||
nix.extraOptions = ''
|
||||
!include ${config.sops.secrets.nix-github-token.path}
|
||||
'';
|
||||
|
||||
# uncomment to enable auto gc
|
||||
/*
|
||||
nix.gc = {
|
||||
|
||||
@@ -16,7 +16,11 @@ in
|
||||
};
|
||||
sshKeyPath = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = "${config.my.persist.location}/home/${username}/.ssh/id_ed25519";
|
||||
default =
|
||||
if config.my.persist.enable then
|
||||
"${config.my.persist.location}/home/${username}/.ssh/id_ed25519"
|
||||
else
|
||||
"/home/${username}/.ssh/id_ed25519";
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
@@ -15,8 +15,8 @@ lib.my.makeSwitch {
|
||||
config' = {
|
||||
programs.zsh.enable = true;
|
||||
|
||||
sops.secrets.imxyy-nix-hashed-password = {
|
||||
sopsFile = secrets.imxyy-nix-hashed-password;
|
||||
sops.secrets.hashed-password = {
|
||||
sopsFile = secrets.hashed-password;
|
||||
format = "binary";
|
||||
neededForUsers = true;
|
||||
};
|
||||
@@ -30,11 +30,11 @@ lib.my.makeSwitch {
|
||||
username
|
||||
"wheel"
|
||||
];
|
||||
hashedPasswordFile = lib.mkDefault config.sops.secrets.imxyy-nix-hashed-password.path;
|
||||
hashedPasswordFile = lib.mkDefault config.sops.secrets.hashed-password.path;
|
||||
};
|
||||
groups.${username} = { };
|
||||
};
|
||||
users.users.root.hashedPasswordFile = lib.mkDefault config.sops.secrets.imxyy-nix-hashed-password.path;
|
||||
users.users.root.hashedPasswordFile = lib.mkDefault config.sops.secrets.hashed-password.path;
|
||||
|
||||
security.sudo.enable = false;
|
||||
security.doas = {
|
||||
|
||||
Reference in New Issue
Block a user