-{ config, pkgs, lib, inputs, private, hostName, ... }:
+{ config, pkgs, lib, inputs, hostName, ... }:
{
imports = [
#../nixos/profiles/debug.nix
# Lower kernel's security for better performances
boot.kernelParams = [ "mitigations=off" ];
-environment.etc.machine-id.source = ../private + "/hosts/${hostName}/root/machine-id";
+environment.etc.machine-id.source = aubergine/machine-id;
home-manager.users.julm = {
imports = [ ../homes/julm.nix ];
- # /sys/devices/virtual/dmi/id/product_name
- host.hardware = [ "apu6" ];
};
systemd.services.home-manager-julm.postStart = ''
${pkgs.nix}/bin/nix-env --delete-generations +1 --profile /nix/var/nix/profiles/per-user/julm/home-manager
uid = 1000;
# Put the hashedPassword in /nix/store, but it will also be in /etc/passwd
# which is already world readable.
- hashedPassword = lib.readFile ../private/world/julm/hashedPassword;
+ # printf %s $(mkpasswd -m md5crypt)
+ hashedPassword = lib.readFile aubergine/users/julm/login/hashedPassword.clear;
extraGroups = [
"adbusers"
"dialout"
# zfs set overlay=yes ${hostName}/home
createHome = true;
openssh.authorizedKeys.keys = map lib.readFile [
- ../private/shared/ssh/julm/losurdo.pub
- ../private/shared/ssh/julm/oignon.pub
- ../private/shared/ssh/julm/redmi.pub
+ ../users/root/ssh/losurdo.pub
+ ../users/julm/ssh/losurdo.pub
+ ../users/julm/ssh/oignon.pub
+ ../users/julm/ssh/redmi.pub
];
};
users.users.root = {
hashedPassword = "!";
- openssh.authorizedKeys.keys = map lib.readFile [
- ../private/shared/ssh/julm/losurdo.pub
- ../private/shared/ssh/julm/oignon.pub
- ../private/shared/ssh/julm/redmi.pub
- ];
+ openssh.authorizedKeys.keys =
+ config.users.users.julm.openssh.authorizedKeys.keys;
};
+#systemd.services.nix-daemon.serviceConfig.LoadCredentialEncrypted =
+# "secret-key-files:" + aubergine/nix/secret-key-files;
nix = {
extraOptions = ''
#secret-key-files = /run/credentials/nix-daemon.service/secret-key-files.pem
- secret-key-files = ${private}/${hostName}/nix/binary-cache/priv.pem
'';
settings = {
trusted-users = [ config.users.users."julm".name ];
substituters = [
#"http://nix-localcache.losurdo.wg"
#"ssh://nix-ssh@losurdo.wg?priority=30"
+ #"ssh://nix-ssh@oignon.wg?priority=30"
];
trusted-public-keys = map lib.readFile [
- #../private/shared/nix/losurdo.pub
+ ../users/root/nix/oignon.pub
];
};
nixPath = lib.mkForce [ "nixpkgs=${inputs.nixpkgs}" ];
nix.sshServe = {
enable = true;
keys = map lib.readFile [
- ../private/shared/ssh/julm/losurdo.pub
- ../private/shared/ssh/sevy/patate.pub
- ../private/shared/ssh/julm/oignon.pub
+ ../users/julm/ssh/losurdo.pub
+ ../users/sevy/ssh/patate.pub
+ ../users/julm/ssh/oignon.pub
];
};