nix-config/modules/config/system.nix

73 lines
2.2 KiB
Nix
Raw Normal View History

{
inputs,
lib,
pkgs,
2023-08-26 14:01:58 +02:00
config,
...
}: {
age.rekey = {
inherit
2023-05-27 07:12:18 +02:00
(inputs.self.secretsConfig)
masterIdentities
extraEncryptionPubkeys
;
forceRekeyOnSystem = builtins.extraBuiltins.unsafeCurrentSystem;
hostPubkey = let
2023-08-26 14:01:58 +02:00
pubkeyPath = config.node.secretsDir + "/host.pub";
in
2023-08-26 14:01:58 +02:00
lib.mkIf (lib.pathExists pubkeyPath || lib.trace "Missing pubkey for ${config.node.name}: ${toString pubkeyPath} not found, using dummy replacement key for now." false)
pubkeyPath;
2023-09-20 21:49:49 +02:00
generatedSecretsDir = config.node.secretsDir + "/generated/";
};
security.sudo.enable = false;
2023-09-20 21:49:49 +02:00
security.tpm2 = {
enable = true;
pkcs11.enable = true;
};
2023-09-21 01:43:10 +02:00
# Just before switching, remove the agenix directory if it exists.
# This can happen when a secret is used in the initrd because it will
# then be copied to the initramfs under the same path. This materializes
# /run/agenix as a directory which will cause issues when the actual system tries
# to create a link called /run/agenix. Agenix should probably fail in this case,
# but doesn't and instead puts the generation link into the existing directory.
# TODO See https://github.com/ryantm/agenix/pull/187.
system.activationScripts.removeAgenixLink.text = "[[ ! -L /run/agenix ]] && [[ -d /run/agenix ]] && rm -rf /run/agenix";
system.activationScripts.agenixNewGeneration.deps = ["removeAgenixLink"];
time.timeZone = lib.mkDefault "Europe/Berlin";
i18n.defaultLocale = "C.UTF-8";
services.xserver = {
layout = "de";
xkbVariant = "bone";
};
console = {
font = "ter-v28n";
packages = with pkgs; [terminus_font];
useXkbConfig = true; # use xkbOptions in tty.
keyMap = lib.mkDefault "de-latin1-nodeadkeys";
};
users.mutableUsers = false;
environment.systemPackages = with pkgs; [
wget
gcc
tree
rage
file
ripgrep
killall
fd
];
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
2023-05-27 07:12:18 +02:00
secrets.secretFiles = let
2023-08-26 14:01:58 +02:00
local = config.node.secretsDir + "/secrets.nix.age";
2023-05-27 07:12:18 +02:00
in
{
global = ../../secrets/secrets.nix.age;
2023-05-27 07:12:18 +02:00
}
2023-08-26 14:01:58 +02:00
// lib.optionalAttrs (config.node.name != null && lib.pathExists local) {inherit local;};
}