2023-05-18 06:57:58 +02:00
|
|
|
{
|
|
|
|
inputs,
|
|
|
|
lib,
|
|
|
|
pkgs,
|
2023-08-26 14:01:58 +02:00
|
|
|
config,
|
2023-05-18 06:57:58 +02:00
|
|
|
...
|
|
|
|
}: {
|
2023-07-28 16:21:31 +02:00
|
|
|
age.rekey = {
|
2023-05-18 06:57:58 +02:00
|
|
|
inherit
|
2023-05-27 07:12:18 +02:00
|
|
|
(inputs.self.secretsConfig)
|
2023-05-18 06:57:58 +02:00
|
|
|
masterIdentities
|
|
|
|
extraEncryptionPubkeys
|
|
|
|
;
|
|
|
|
|
|
|
|
forceRekeyOnSystem = builtins.extraBuiltins.unsafeCurrentSystem;
|
|
|
|
hostPubkey = let
|
2023-08-26 14:01:58 +02:00
|
|
|
pubkeyPath = config.node.secretsDir + "/host.pub";
|
2023-05-18 06:57:58 +02:00
|
|
|
in
|
2023-08-26 14:01:58 +02:00
|
|
|
lib.mkIf (lib.pathExists pubkeyPath || lib.trace "Missing pubkey for ${config.node.name}: ${toString pubkeyPath} not found, using dummy replacement key for now." false)
|
2023-05-18 06:57:58 +02:00
|
|
|
pubkeyPath;
|
2023-09-20 21:49:49 +02:00
|
|
|
generatedSecretsDir = config.node.secretsDir + "/generated/";
|
2023-09-25 13:53:07 +02:00
|
|
|
cacheDir = "/var/tmp/agenix-rekey/\"$UID\"";
|
2023-05-18 06:57:58 +02:00
|
|
|
};
|
|
|
|
security.sudo.enable = false;
|
2023-09-20 21:49:49 +02:00
|
|
|
security.tpm2 = {
|
|
|
|
enable = true;
|
|
|
|
pkcs11.enable = true;
|
|
|
|
};
|
2023-09-21 01:43:10 +02:00
|
|
|
# Just before switching, remove the agenix directory if it exists.
|
|
|
|
# This can happen when a secret is used in the initrd because it will
|
|
|
|
# then be copied to the initramfs under the same path. This materializes
|
|
|
|
# /run/agenix as a directory which will cause issues when the actual system tries
|
|
|
|
# to create a link called /run/agenix. Agenix should probably fail in this case,
|
|
|
|
# but doesn't and instead puts the generation link into the existing directory.
|
|
|
|
# TODO See https://github.com/ryantm/agenix/pull/187.
|
|
|
|
system.activationScripts.removeAgenixLink.text = "[[ ! -L /run/agenix ]] && [[ -d /run/agenix ]] && rm -rf /run/agenix";
|
|
|
|
system.activationScripts.agenixNewGeneration.deps = ["removeAgenixLink"];
|
2023-05-18 06:57:58 +02:00
|
|
|
|
|
|
|
time.timeZone = lib.mkDefault "Europe/Berlin";
|
|
|
|
i18n.defaultLocale = "C.UTF-8";
|
|
|
|
console = {
|
|
|
|
font = "ter-v28n";
|
|
|
|
packages = with pkgs; [terminus_font];
|
|
|
|
useXkbConfig = true; # use xkbOptions in tty.
|
|
|
|
keyMap = lib.mkDefault "de-latin1-nodeadkeys";
|
|
|
|
};
|
|
|
|
|
|
|
|
users.mutableUsers = false;
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
|
|
wget
|
|
|
|
gcc
|
|
|
|
tree
|
|
|
|
rage
|
|
|
|
file
|
|
|
|
ripgrep
|
|
|
|
killall
|
|
|
|
fd
|
2023-09-25 13:53:07 +02:00
|
|
|
kitty.terminfo
|
2023-05-18 06:57:58 +02:00
|
|
|
];
|
|
|
|
|
|
|
|
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
|
2023-05-27 07:12:18 +02:00
|
|
|
|
|
|
|
secrets.secretFiles = let
|
2023-08-26 14:01:58 +02:00
|
|
|
local = config.node.secretsDir + "/secrets.nix.age";
|
2023-05-27 07:12:18 +02:00
|
|
|
in
|
|
|
|
{
|
2023-09-02 17:30:09 +02:00
|
|
|
global = ../../secrets/secrets.nix.age;
|
2023-05-27 07:12:18 +02:00
|
|
|
}
|
2023-08-26 14:01:58 +02:00
|
|
|
// lib.optionalAttrs (config.node.name != null && lib.pathExists local) {inherit local;};
|
2023-05-18 06:57:58 +02:00
|
|
|
}
|