Compare commits
4 commits
8d1b7584f3
...
436c1785a8
| Author | SHA1 | Date | |
|---|---|---|---|
| 436c1785a8 | |||
| 2f0230c401 | |||
| a1f41b6295 | |||
| 8a8b69b79b |
5 changed files with 39 additions and 10 deletions
17
flake.lock
generated
17
flake.lock
generated
|
|
@ -411,9 +411,26 @@
|
||||||
"nixpkgs-unstable-raw": "nixpkgs-unstable-raw",
|
"nixpkgs-unstable-raw": "nixpkgs-unstable-raw",
|
||||||
"nur": "nur",
|
"nur": "nur",
|
||||||
"plasma-manager": "plasma-manager",
|
"plasma-manager": "plasma-manager",
|
||||||
|
"secrets": "secrets",
|
||||||
"vscode-extensions": "vscode-extensions"
|
"vscode-extensions": "vscode-extensions"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"secrets": {
|
||||||
|
"flake": false,
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1708347322,
|
||||||
|
"narHash": "sha256-30rLLNMGvVz8xbklqRpA3uE6UDneAUGFz7dCmH9YbA8=",
|
||||||
|
"ref": "refs/heads/main",
|
||||||
|
"rev": "409536f1d2b8ffe741fe47b8701ba28137f9de38",
|
||||||
|
"revCount": 3,
|
||||||
|
"type": "git",
|
||||||
|
"url": "http://git.everest.sable-pancake.ts.net/Toast/nix-secrets"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"type": "git",
|
||||||
|
"url": "http://git.everest.sable-pancake.ts.net/Toast/nix-secrets"
|
||||||
|
}
|
||||||
|
},
|
||||||
"systems": {
|
"systems": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1681028828,
|
"lastModified": 1681028828,
|
||||||
|
|
|
||||||
|
|
@ -2,6 +2,10 @@
|
||||||
description = "Configuration for Everest";
|
description = "Configuration for Everest";
|
||||||
|
|
||||||
inputs = {
|
inputs = {
|
||||||
|
secrets = {
|
||||||
|
url = "git+http://git.everest.sable-pancake.ts.net/Toast/nix-secrets";
|
||||||
|
flake = false;
|
||||||
|
};
|
||||||
nixpkgs-raw.url = "nixpkgs/nixos-23.11";
|
nixpkgs-raw.url = "nixpkgs/nixos-23.11";
|
||||||
nixpkgs-unstable-raw.url = "nixpkgs/nixos-unstable";
|
nixpkgs-unstable-raw.url = "nixpkgs/nixos-unstable";
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -43,12 +43,12 @@ in
|
||||||
fsType = "btrfs";
|
fsType = "btrfs";
|
||||||
options = [ "subvol=@" ];
|
options = [ "subvol=@" ];
|
||||||
};
|
};
|
||||||
/*"btrfs_boot" = {
|
"btrfs_persist" = {
|
||||||
mountPoint = "/boot";
|
mountPoint = "/persist";
|
||||||
label = ssdLabel;
|
label = ssdLabel;
|
||||||
fsType = "btrfs";
|
fsType = "btrfs";
|
||||||
options = [ "subvol=@boot" ];
|
options = [ "subvol=@persist" ];
|
||||||
};*/
|
};
|
||||||
"btrfs_home" = {
|
"btrfs_home" = {
|
||||||
mountPoint = "/home";
|
mountPoint = "/home";
|
||||||
label = ssdLabel;
|
label = ssdLabel;
|
||||||
|
|
|
||||||
|
|
@ -105,11 +105,7 @@
|
||||||
# Set up secrets
|
# Set up secrets
|
||||||
age = {
|
age = {
|
||||||
identityPaths = [
|
identityPaths = [
|
||||||
"/etc/ssh/ssh_host_rsa_key"
|
"/persist/id_host"
|
||||||
"/etc/ssh/ssh_host_ed25519_key"
|
|
||||||
# This key has a passcode, so if you need to use it you'll have to
|
|
||||||
# enter the password A LOT of times. Only on the first setup tho
|
|
||||||
"/tmp/id_ed25519_bootstrap"
|
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,19 @@
|
||||||
{ config, ... }:
|
{ config, flakeSelf, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
hostSecrets = "${flakeSelf.inputs.secrets}/" + config.networking.hostName;
|
||||||
|
in
|
||||||
|
|
||||||
{
|
{
|
||||||
|
# Get secrets
|
||||||
|
age.secrets = {
|
||||||
|
syncthingKey.file = hostSecrets + "/syncthingKey.age";
|
||||||
|
syncthingCert.file = hostSecrets + "/syncthingCert.age";
|
||||||
|
};
|
||||||
|
|
||||||
services.syncthing = {
|
services.syncthing = {
|
||||||
|
key = config.age.secrets.syncthingKey.path;
|
||||||
|
cert = config.age.secrets.syncthingCert.path;
|
||||||
overrideDevices = true;
|
overrideDevices = true;
|
||||||
overrideFolders = true;
|
overrideFolders = true;
|
||||||
openDefaultPorts = true;
|
openDefaultPorts = true;
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue