feat: secureboot on laptop
This commit is contained in:
parent
c07f768854
commit
4b24d829e3
|
@ -11,6 +11,7 @@
|
||||||
|
|
||||||
../../modules/optional/xserver.nix
|
../../modules/optional/xserver.nix
|
||||||
../../modules/optional/wayland.nix
|
../../modules/optional/wayland.nix
|
||||||
|
../../modules/optional/secureboot.nix
|
||||||
|
|
||||||
../../modules/hardware/bluetooth.nix
|
../../modules/hardware/bluetooth.nix
|
||||||
../../modules/hardware/laptop.nix
|
../../modules/hardware/laptop.nix
|
||||||
|
|
BIN
hosts/patricknix/secrets/secureboot.tar.age
Normal file
BIN
hosts/patricknix/secrets/secureboot.tar.age
Normal file
Binary file not shown.
|
@ -18,10 +18,13 @@
|
||||||
];
|
];
|
||||||
directories =
|
directories =
|
||||||
[
|
[
|
||||||
"/var/tmp/agenix-rekey"
|
|
||||||
"/var/log"
|
"/var/log"
|
||||||
"/var/lib/systemd"
|
"/var/lib/systemd"
|
||||||
"/var/lib/nixos"
|
"/var/lib/nixos"
|
||||||
|
{
|
||||||
|
directory = "/var/tmp/agenix-rekey";
|
||||||
|
mode = "0777";
|
||||||
|
}
|
||||||
]
|
]
|
||||||
++ lib.lists.optionals config.hardware.bluetooth.enable [
|
++ lib.lists.optionals config.hardware.bluetooth.enable [
|
||||||
"/var/lib/bluetooth"
|
"/var/lib/bluetooth"
|
||||||
|
|
|
@ -4,6 +4,30 @@
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
|
# HOW TO: Add secureboot to new systems
|
||||||
|
# generate keys with `sbct create-keys'
|
||||||
|
# tar the resulting folder using
|
||||||
|
# `tar cvf secureboot.tar -C /etc/secureboot .
|
||||||
|
# Copy the tar to local using scp
|
||||||
|
# and encrypt it using rage
|
||||||
|
# safe the encrypted archive to hosts/<host>/secrets/secureboot.tar.age
|
||||||
|
# DO NOT forget to delete the unecrypted archives
|
||||||
|
# link /run/secureboot to /etc/secureboot
|
||||||
|
# This is necesarry since for the first
|
||||||
|
# apply the rekeyed keys are not yet available but needed for
|
||||||
|
# signing the boot files
|
||||||
|
# ensure the boot files are signed using
|
||||||
|
# `sbctl verify'
|
||||||
|
# Now reboot the computer into BIOS and
|
||||||
|
# enable secureboot, this may include
|
||||||
|
# removing old keys
|
||||||
|
# bootctl should now read
|
||||||
|
# `Secure Boot: disabled (setup)'
|
||||||
|
# you can now enroll your secureboot keys using
|
||||||
|
# `sbctl enroll-keys`
|
||||||
|
# If you want to be able to boot microsoft signed images append
|
||||||
|
# `--microsoft`
|
||||||
|
# Time to reboot and pray
|
||||||
environment.systemPackages = [
|
environment.systemPackages = [
|
||||||
# For debugging and troubleshooting Secure Boot.
|
# For debugging and troubleshooting Secure Boot.
|
||||||
(pkgs.sbctl.override
|
(pkgs.sbctl.override
|
||||||
|
|
Loading…
Reference in a new issue