nixpkgs: update patches
[julm/julm-nix.git] / hosts / aubergine.nix
index 69f704c30ce636c61d813fd02c0545a9d0cad3f3..f7b78377ba8021ffd1bc9f793cc55e28274b74c3 100644 (file)
@@ -17,8 +17,6 @@ environment.etc.machine-id.source = aubergine/machine-id;
 
 home-manager.users.julm = {
   imports = [ ../homes/julm.nix ];
-  # /sys/devices/virtual/dmi/id/product_name
-  host.hardware = [ "apu6" ];
 };
 systemd.services.home-manager-julm.postStart = ''
   ${pkgs.nix}/bin/nix-env --delete-generations +1 --profile /nix/var/nix/profiles/per-user/julm/home-manager
@@ -29,7 +27,7 @@ users.users.julm = {
   # Put the hashedPassword in /nix/store, but it will also be in /etc/passwd
   # which is already world readable.
   # printf %s $(mkpasswd -m md5crypt)
-  hashedPassword = lib.readFile aubergine/users/julm/login/hashedPassword;
+  hashedPassword = lib.readFile aubergine/users/julm/login/hashedPassword.clear;
   extraGroups = [
     "adbusers"
     "dialout"
@@ -53,8 +51,8 @@ users.users.root = {
     config.users.users.julm.openssh.authorizedKeys.keys;
 };
 
-systemd.services.nix-daemon.serviceConfig.LoadCredentialEncrypted =
-  "secret-key-files:" + aubergine/nix/secret-key-files;
+#systemd.services.nix-daemon.serviceConfig.LoadCredentialEncrypted =
+#  "secret-key-files:" + aubergine/nix/secret-key-files;
 nix = {
   extraOptions = ''
     #secret-key-files = /run/credentials/nix-daemon.service/secret-key-files.pem
@@ -64,9 +62,10 @@ nix = {
     substituters = [
       #"http://nix-localcache.losurdo.wg"
       #"ssh://nix-ssh@losurdo.wg?priority=30"
+      #"ssh://nix-ssh@oignon.wg?priority=30"
     ];
     trusted-public-keys = map lib.readFile [
-      #../private/shared/nix/losurdo.pub
+      ../users/root/nix/oignon.pub
     ];
   };
   nixPath = lib.mkForce [ "nixpkgs=${inputs.nixpkgs}" ];
@@ -78,9 +77,9 @@ nix.settings.allowed-users = [ config.users.users."nix-ssh".name ];
 nix.sshServe = {
   enable = true;
   keys = map lib.readFile [
-    ../private/shared/ssh/julm/losurdo.pub
-    ../private/shared/ssh/sevy/patate.pub
-    ../private/shared/ssh/julm/oignon.pub
+    ../users/julm/ssh/losurdo.pub
+    ../users/sevy/ssh/patate.pub
+    ../users/julm/ssh/oignon.pub
   ];
 };