Update bootstrap modules/packages.nix modules/secrets.nix modules/services.nix modules/workspace/misc.nix modules/workspace/ssh.nix result-bin

This commit is contained in:
Alexander Bantyev 2020-02-28 11:44:12 +03:00
parent 93ee418a11
commit 89c2cc0725
Signed by: balsoft
GPG Key ID: E081FF12ADCB4AD5
7 changed files with 24 additions and 35 deletions

View File

@ -40,7 +40,7 @@ read
umount -l /nix/.rw-store || echo "RW-store is not mounted." umount -l /nix/.rw-store || echo "RW-store is not mounted."
mount --rbind /mnt/nix /nix mount --rbind /mnt/nix /nix
nix-build /tmp/nixpkgs/nixos -A system --substituters "https://cache.balsoft.ru https://cache.nixos.org" --no-require-sigs nix build -f /tmp/nixpkgs/nixos system --substituters "https://cache.balsoft.ru https://cache.nixos.org" --no-require-sigs
nixos-install --system ./result nixos-install --system ./result
cd /mnt/home/balsoft cd /mnt/home/balsoft
chmod 777 -R . chmod 777 -R .

View File

@ -155,16 +155,6 @@ in { pkgs, config, lib, ... }: {
config.firefox.enablePlasmaBrowserIntegration = true; config.firefox.enablePlasmaBrowserIntegration = true;
} // config.nixpkgs.config; } // config.nixpkgs.config;
systemd.services.setup_root = {
serviceConfig.User = "root";
script = ''
mkdir -p /root/.ssh
cat << EOF > /root/.ssh/id_rsa
${config.secrets.id_rsa}
EOF
chmod 100 /root/.ssh/id_rsa
'';
};
environment.etc.nixpkgs.source = imports.nixpkgs; environment.etc.nixpkgs.source = imports.nixpkgs;
nix = rec { nix = rec {
nixPath = lib.mkForce [ nixPath = lib.mkForce [

View File

@ -62,10 +62,6 @@ in rec {
type = nullOr str; type = nullOr str;
description = "Rclone config"; description = "Rclone config";
}; };
id_rsa = mkOption {
type = nullOr str;
description = "SSH RSA private key";
};
ssl = rec { ssl = rec {
cert = mkOption { cert = mkOption {
type = nullOr str; type = nullOr str;

View File

@ -1,7 +1,6 @@
{ config, lib, pkgs, ... }: { { config, lib, pkgs, ... }: {
services.acpid.enable = true; services.acpid.enable = true;
programs.ssh.startAgent = true;
services.apcupsd = { enable = config.device == "AMD-Workstation"; }; services.apcupsd = { enable = config.device == "AMD-Workstation"; };

View File

@ -23,16 +23,6 @@
after = [ ]; after = [ ];
data = "rm -f /home/balsoft/.config/mimeapps.list"; data = "rm -f /home/balsoft/.config/mimeapps.list";
}; };
programs.gpg.enable = true;
services.gpg-agent = {
enable = true;
extraConfig = ''
pinentry-program ${pkgs.pinentry}/bin/pinentry
allow-emacs-pinentry
allow-loopback-pinentry
'';
enableSshSupport = true;
};
services.udiskie.enable = true; services.udiskie.enable = true;
programs.git = { programs.git = {
enable = true; enable = true;

View File

@ -4,24 +4,37 @@
passwordAuthentication = false; passwordAuthentication = false;
permitRootLogin = "no"; permitRootLogin = "no";
forwardX11 = true; forwardX11 = true;
ports = [ 22 13722 ]; ports = [ 22 ];
}; };
users.users.balsoft.openssh.authorizedKeys.keys = users.users.balsoft.openssh.authorizedKeys.keys =
["ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDd2OdcSHUsgezuV+cpFqk9+Svtup6PxIolv1zokVZdqvS8qxLsA/rwYmQgTnuq4/zK/GIxcUCH4OxYlW6Or4M4G7qrDKcLAUrRPWkectqEooWRflZXkfHduMJhzeOAsBdMfYZQ9024GwKr/4yriw2BGa8GbbAnQxiSeTipzvXHoXuRME+/2GsMFAfHFvxzXRG7dNOiLtLaXEjUPUTcw/fffKy55kHtWxMkEvvcdyR53/24fmO3kLVpEuoI+Mp1XFtX3DvRM9ulgfwZUn8/CLhwSLwWX4Xf9iuzVi5vJOJtMOktQj/MwGk4tY/NPe+sIk+nAUKSdVf0y9k9JrJT98S/ comment"]; ["ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDd2OdcSHUsgezuV+cpFqk9+Svtup6PxIolv1zokVZdqvS8qxLsA/rwYmQgTnuq4/zK/GIxcUCH4OxYlW6Or4M4G7qrDKcLAUrRPWkectqEooWRflZXkfHduMJhzeOAsBdMfYZQ9024GwKr/4yriw2BGa8GbbAnQxiSeTipzvXHoXuRME+/2GsMFAfHFvxzXRG7dNOiLtLaXEjUPUTcw/fffKy55kHtWxMkEvvcdyR53/24fmO3kLVpEuoI+Mp1XFtX3DvRM9ulgfwZUn8/CLhwSLwWX4Xf9iuzVi5vJOJtMOktQj/MwGk4tY/NPe+sIk+nAUKSdVf0y9k9JrJT98S/ comment"];
home-manager.users.balsoft.programs.ssh = services.udev.packages = [ pkgs.yubikey-personalization ];
if (!isNull config.secrets.id_rsa) then {
environment.shellInit = ''
export GPG_TTY="$(tty)"
gpg-connect-agent /bye
export SSH_AUTH_SOCK="/run/user/$UID/gnupg/S.gpg-agent.ssh"
'';
programs = {
ssh.startAgent = false;
gnupg.agent = {
enable = true;
enableSSHSupport = true;
};
};
home-manager.users.balsoft.home.file.".gnupg/scdaemon.conf".text = "reader-port Yubico Yubi";
home-manager.users.balsoft.programs.ssh = {
enable = true; enable = true;
matchBlocks = { matchBlocks = {
"*" = { "*" = {
identityFile = toString (pkgs.writeTextFile {
name = "id_rsa";
text = config.secrets.id_rsa;
});
compression = false; compression = false;
}; };
}; };
} else };
{ };
} }

1
result-bin Symbolic link
View File

@ -0,0 +1 @@
/nix/store/fwban0fhsglbyn83inds5si719b2qjdd-libxml2-2.9.10-bin