Compare commits

..

8 Commits

52 changed files with 307 additions and 375 deletions

1
.envrc
View File

@@ -1 +0,0 @@
use flake

3
.gitignore vendored
View File

@@ -9,5 +9,4 @@ result-*
nixos-efi-vars.fd nixos-efi-vars.fd
.direnv/ /.pre-commit-config.yaml
.pre-commit-config.yaml

View File

@@ -8,25 +8,24 @@ let
utils = import ../utils { inherit lib; }; utils = import ../utils { inherit lib; };
hostDirNames = utils.dirNames ../hosts; hostDirNames = utils.dirNames ../hosts;
mkNode = hostname: tags: { mkNode = hostname: meta: {
imports = [ ../hosts/${hostname} ]; imports = [ ../hosts/${hostname} ];
deployment = { deployment = {
targetHost = self.nixosConfigurations.${hostname}.config.ssh.publicHostname; inherit (meta.deployment) targetHost targetUser tags;
targetUser = self.nixosConfigurations.${hostname}.config.ssh.username; buildOnTarget = builtins.any (t: t != "local" && t != "arm") meta.deployment.tags;
buildOnTarget = builtins.any (t: t != "local" && t != "arm") tags;
inherit tags;
}; };
}; };
nodes = lib.genAttrs hostDirNames ( nodes = lib.genAttrs hostDirNames (hostname: mkNode hostname (utils.hostMeta ../hosts/${hostname}));
hostname: mkNode hostname (utils.hostMeta ../hosts/${hostname}).deployment.tags
);
in in
inputs.colmena.lib.makeHive ( inputs.colmena.lib.makeHive (
{ {
meta = { meta = {
nixpkgs = import inputs.nixpkgs { localSystem = "x86_64-linux"; }; nixpkgs = import inputs.nixpkgs {
localSystem = "x86_64-linux";
};
nodeNixpkgs = builtins.mapAttrs (_: v: v.pkgs) self.nixosConfigurations;
specialArgs = { specialArgs = {
inherit inputs; inherit inputs;
outputs = self; outputs = self;

24
flake.lock generated
View File

@@ -121,11 +121,11 @@
}, },
"locked": { "locked": {
"dir": "pkgs/firefox-addons", "dir": "pkgs/firefox-addons",
"lastModified": 1776657773, "lastModified": 1776398575,
"narHash": "sha256-GgExKCDspgASVM6sRH0VcVyixQznxuR4tjiAA7MfKxs=", "narHash": "sha256-WArU6WOdWxzbzGqYk4w1Mucg+bw/SCl6MoSp+/cZMio=",
"owner": "rycee", "owner": "rycee",
"repo": "nur-expressions", "repo": "nur-expressions",
"rev": "986236cd6fad0979233ae5e73456a365f79ff198", "rev": "05815686caf4e3678f5aeb5fd36e567886ab0d30",
"type": "gitlab" "type": "gitlab"
}, },
"original": { "original": {
@@ -342,11 +342,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1776701552, "lastModified": 1776373306,
"narHash": "sha256-CCRzOEFg6JwCdZIR5dLD0ypah5/e2JQVuWQ/l3rYrPY=", "narHash": "sha256-iAJIzHngGZeLIkjzuuWI6VBsYJ1n89a/Esq0m8R1vjs=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "c81775b640d4507339d127f5adb4105f6015edf2", "rev": "d401492e2acd4fea42f7705a3c266cea739c9c36",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -398,10 +398,10 @@
"nix-secrets": { "nix-secrets": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1776716353, "lastModified": 1776422417,
"narHash": "sha256-4gmunPEtk1oOK/77YP7M5N0rO9mSPYPrEZbELMKkZDE=", "narHash": "sha256-9R4MePj/UT0tqkWEq4Afg7Lp/zdfYHkW+qmpVGchKIs=",
"ref": "main", "ref": "main",
"rev": "13b5d656e0bef196f40d1be8581a97569f7a7eb9", "rev": "75759a14e8d46421fca4306393a38b5ad5240f09",
"shallow": true, "shallow": true,
"type": "git", "type": "git",
"url": "ssh://git@github.com/hektor/nix-secrets" "url": "ssh://git@github.com/hektor/nix-secrets"
@@ -467,11 +467,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1776548001, "lastModified": 1776169885,
"narHash": "sha256-ZSK0NL4a1BwVbbTBoSnWgbJy9HeZFXLYQizjb2DPF24=", "narHash": "sha256-l/iNYDZ4bGOAFQY2q8y5OAfBBtrDAaPuRQqWaFHVRXM=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "b12141ef619e0a9c1c84dc8c684040326f27cdcc", "rev": "4bd9165a9165d7b5e33ae57f3eecbcb28fb231c9",
"type": "github" "type": "github"
}, },
"original": { "original": {

View File

@@ -76,7 +76,7 @@
nixpkgs.lib.nixosSystem { nixpkgs.lib.nixosSystem {
modules = [ modules = [
./hosts/${host} ./hosts/${host}
{ nixpkgs.hostPlatform = import ./hosts/${host}/system.nix; } { nixpkgs.hostPlatform = (myUtils.hostMeta ./hosts/${host}).system; }
]; ];
specialArgs = { specialArgs = {
inherit inherit

View File

@@ -25,7 +25,6 @@
../../modules/nvim ../../modules/nvim
../../modules/pandoc ../../modules/pandoc
../../modules/photography ../../modules/photography
../../modules/secrets
../../modules/shell ../../modules/shell
../../modules/ssh ../../modules/ssh
../../modules/taskwarrior ../../modules/taskwarrior

View File

@@ -5,9 +5,6 @@
... ...
}: }:
let
username = "hektor";
in
{ {
imports = [ imports = [
inputs.sops-nix.homeManagerModules.sops inputs.sops-nix.homeManagerModules.sops
@@ -57,8 +54,8 @@ in
home = { home = {
stateVersion = "25.05"; stateVersion = "25.05";
inherit username; username = "hektor";
homeDirectory = "/home/${username}"; homeDirectory = "/home/${config.home.username}";
}; };
targets.genericLinux.nixGL = { targets.genericLinux.nixGL = {

View File

@@ -13,12 +13,10 @@ let
standalone = osConfig == null; standalone = osConfig == null;
in in
lib.optionalAttrs standalone { lib.optionalAttrs standalone {
sops.secrets = myUtils.mkSopsSecrets "${toString inputs.nix-secrets}/secrets" null { sops.secrets = myUtils.mkSopsSecrets "${toString inputs.nix-secrets}/secrets" "anki" [
anki = [
"sync-user" "sync-user"
"sync-key" "sync-key"
]; ] { };
};
} }
// { // {
warnings = lib.optional ( warnings = lib.optional (

View File

@@ -3,6 +3,7 @@
let let
terminal = "kitty"; terminal = "kitty";
browser = config.browser.primary; browser = config.browser.primary;
font = "${config.stylix.fonts.monospace.name} ${toString config.stylix.fonts.sizes.applications}";
in in
{ {
dconf.settings = { dconf.settings = {
@@ -40,9 +41,9 @@ in
clock-show-weekday = true; clock-show-weekday = true;
color-scheme = "prefer-dark"; color-scheme = "prefer-dark";
enable-hot-corners = false; enable-hot-corners = false;
font-name = "Iosevka Term SS08 12"; font-name = font;
locate-pointer = true; locate-pointer = true;
monospace-font-name = "Iosevka Term SS08 12"; monospace-font-name = font;
}; };
"org/gnome/desktop/wm/keybindings" = { "org/gnome/desktop/wm/keybindings" = {

View File

@@ -6,13 +6,19 @@
}: }:
{ {
options.nixgl.wrap = lib.mkOption { options = {
host.username = lib.mkOption {
type = lib.types.str;
default = config.home.username;
};
nixgl.wrap = lib.mkOption {
type = lib.types.functionTo lib.types.package; type = lib.types.functionTo lib.types.package;
default = if config.lib ? nixGL then config.lib.nixGL.wrap else lib.id; default = if config.lib ? nixGL then config.lib.nixGL.wrap else lib.id;
readOnly = true; readOnly = true;
}; };
options.wrapApp = lib.mkOption { wrapApp = lib.mkOption {
type = lib.types.raw; type = lib.types.raw;
default = default =
pkg: flags: pkg: flags:
@@ -27,4 +33,5 @@
pkg; pkg;
readOnly = true; readOnly = true;
}; };
};
} }

View File

@@ -1,18 +1,15 @@
{ {
outputs, myUtils,
lib, lib,
pkgs, pkgs,
... ...
}: }:
let let
nixosConfigs = builtins.attrNames outputs.nixosConfigurations; hostDir = ../../hosts;
homeConfigs = map (n: lib.last (lib.splitString "@" n)) ( hostNames = myUtils.dirNames hostDir;
builtins.attrNames outputs.homeConfigurations
);
allHosts = lib.unique (homeConfigs ++ nixosConfigs);
hostsWithKeys = lib.filter ( hostsWithKeys = lib.filter (
hostname: builtins.pathExists ../../hosts/${hostname}/ssh_host.pub hostname: builtins.pathExists (hostDir + "/${hostname}/ssh_host.pub")
) allHosts; ) hostNames;
in in
{ {
home.packages = with pkgs; [ sshfs ]; home.packages = with pkgs; [ sshfs ];
@@ -25,15 +22,14 @@ in
lib.genAttrs hostsWithKeys ( lib.genAttrs hostsWithKeys (
hostname: hostname:
let let
hostConfig = outputs.nixosConfigurations.${hostname}.config; meta = myUtils.hostMeta (hostDir + "/${hostname}");
inherit (hostConfig.ssh) publicHostname username;
in in
{ {
host = hostname; host = hostname;
user = username; user = meta.deployment.targetUser;
} }
// lib.optionalAttrs (publicHostname != "") { // lib.optionalAttrs (meta.deployment.targetHost != "") {
hostname = publicHostname; hostname = meta.deployment.targetHost;
} }
) )
// { // {

View File

@@ -25,21 +25,6 @@ in
sansSerif = config.stylix.fonts.monospace; sansSerif = config.stylix.fonts.monospace;
emoji = config.stylix.fonts.monospace; emoji = config.stylix.fonts.monospace;
}; };
targets = { targets = import ../../../modules/stylix/targets.nix;
firefox = {
profileNames = [ "default" ];
colorTheme.enable = true;
};
librewolf = {
profileNames = [ "default" ];
colorTheme.enable = true;
};
gnome.enable = false;
gtk.enable = false;
kitty = {
variant256Colors = true;
};
nixvim.enable = false;
};
}; };
} }

View File

@@ -15,13 +15,11 @@ let
in in
lib.optionalAttrs standalone { lib.optionalAttrs standalone {
sops = { sops = {
secrets = myUtils.mkSopsSecrets "${toString inputs.nix-secrets}/secrets" null { secrets = myUtils.mkSopsSecrets "${toString inputs.nix-secrets}/secrets" "taskwarrior" [
taskwarrior = [
"sync-server-url" "sync-server-url"
"sync-server-client-id" "sync-server-client-id"
"sync-encryption-secret" "sync-encryption-secret"
]; ] { };
};
templates."taskrc.d/sync" = { templates."taskrc.d/sync" = {
content = '' content = ''

View File

@@ -51,32 +51,17 @@ in
../../modules/yubikey ../../modules/yubikey
]; ];
home-manager.users.${config.host.username} = import ../../home/hosts/andromache { home-manager.users.${config.host.username} = import ../../home/hosts/andromache;
inherit
inputs
config
pkgs
lib
;
};
ssh.username = config.host.username;
ssh.authorizedHosts = [ "astyanax" ]; ssh.authorizedHosts = [ "astyanax" ];
secrets = { secrets.nixSigningKey.enable = true;
inherit (config.host) username;
nixSigningKey.enable = true;
};
restic-backup.enable = true;
tailscale.enable = true; tailscale.enable = true;
docker.user = config.host.username; docker.enable = true;
hcloud = { hcloud.enable = true;
enable = true;
inherit (config.host) username;
};
disko.devices = { disko.devices = {
disk.data = { disk.data = {
@@ -108,7 +93,6 @@ in
my.yubikey = { my.yubikey = {
enable = false; enable = false;
inherit (config.host) username;
keys = [ keys = [
{ {
handle = "<KeyHandle1>"; handle = "<KeyHandle1>";

View File

@@ -1,4 +1,9 @@
{ {
deployment.tags = [ "local" ]; system = "x86_64-linux";
deployment = {
tags = [ "local" ];
targetHost = "";
targetUser = "h";
};
role = "desktop"; role = "desktop";
} }

View File

@@ -1 +0,0 @@
"x86_64-linux"

View File

@@ -47,27 +47,15 @@ in
../../modules/yubikey ../../modules/yubikey
]; ];
home-manager.users.${config.host.username} = import ../../home/hosts/astyanax { home-manager.users.${config.host.username} = import ../../home/hosts/astyanax;
inherit
inputs
config
pkgs
lib
;
};
ssh.username = config.host.username;
ssh.authorizedHosts = [ "andromache" ]; ssh.authorizedHosts = [ "andromache" ];
secrets = { secrets.nixSigningKey.enable = true;
inherit (config.host) username;
nixSigningKey.enable = true;
};
restic-backup.enable = true;
tailscale.enable = true; tailscale.enable = true;
docker.user = config.host.username; docker.enable = true;
nfc.user = config.host.username; nfc.enable = true;
desktop.ly.enable = true; desktop.ly.enable = true;
audio.automation.enable = true; audio.automation.enable = true;

View File

@@ -1,4 +1,9 @@
{ {
deployment.tags = [ "local" ]; system = "x86_64-linux";
deployment = {
tags = [ "local" ];
targetHost = "";
targetUser = "h";
};
role = "laptop"; role = "laptop";
} }

View File

@@ -1 +0,0 @@
"x86_64-linux"

View File

@@ -12,8 +12,6 @@
]; ];
ssh = { ssh = {
inherit (config.host) username;
publicHostname = config.host.name;
authorizedHosts = [ authorizedHosts = [
"andromache" "andromache"
"astyanax" "astyanax"

View File

@@ -1,4 +1,9 @@
{ {
deployment.tags = [ "arm" ]; system = "aarch64-linux";
deployment = {
tags = [ "arm" ];
targetHost = "eetion-02";
targetUser = "h";
};
role = "embedded"; role = "embedded";
} }

View File

@@ -1 +0,0 @@
"aarch64-linux"

View File

@@ -9,15 +9,10 @@
./host.nix ./host.nix
../../modules/common ../../modules/common
../../modules/ssh ../../modules/ssh
../../modules/tailscale
# ../../modules/uptime-kuma # ../../modules/uptime-kuma
]; ];
tailscale.enable = true;
ssh = { ssh = {
inherit (config.host) username;
publicHostname = config.host.name;
authorizedHosts = [ authorizedHosts = [
"andromache" "andromache"
"astyanax" "astyanax"

View File

@@ -1,4 +1,9 @@
{ {
deployment.tags = [ "arm" ]; system = "aarch64-linux";
deployment = {
tags = [ "arm" ];
targetHost = "eetion";
targetUser = "h";
};
role = "embedded"; role = "embedded";
} }

View File

@@ -1 +0,0 @@
"aarch64-linux"

View File

@@ -19,15 +19,13 @@
networking.hostName = config.host.name; networking.hostName = config.host.name;
ssh = { ssh = {
inherit (config.host) username;
publicHostname = "server.hektormisplon.xyz";
authorizedHosts = [ authorizedHosts = [
"andromache" "andromache"
"astyanax" "astyanax"
]; ];
}; };
docker.user = config.host.username; docker.enable = true;
fileSystems."/" = { fileSystems."/" = {
device = "/dev/disk/by-label/nixos"; device = "/dev/disk/by-label/nixos";

View File

@@ -1,4 +1,9 @@
{ {
deployment.tags = [ "cloud" ]; system = "x86_64-linux";
deployment = {
tags = [ "cloud" ];
targetHost = "server.hektormisplon.xyz";
targetUser = "username";
};
role = "server"; role = "server";
} }

View File

@@ -1 +0,0 @@
"x86_64-linux"

View File

@@ -1,7 +1,6 @@
{ {
inputs, inputs,
config, config,
pkgs,
... ...
}: }:
{ {
@@ -29,13 +28,7 @@
../../modules/x ../../modules/x
]; ];
home-manager.users.${config.host.username} = import ../../home/hosts/vm { home-manager.users.${config.host.username} = import ../../home/hosts/vm;
inherit inputs config pkgs;
};
ssh.username = config.host.username;
secrets.username = config.host.username;
disko = { disko = {
devices.disk.main = { devices.disk.main = {

View File

@@ -1,4 +1,9 @@
{ {
deployment.tags = [ "local" ]; system = "x86_64-linux";
deployment = {
tags = [ "local" ];
targetHost = "";
targetUser = "h";
};
role = "vm"; role = "vm";
} }

View File

@@ -1 +0,0 @@
"x86_64-linux"

View File

@@ -12,10 +12,15 @@ let
in in
{ {
imports = [ imports = [
../modules/common/host.nix
../modules/ssh ../modules/ssh
]; ];
ssh.username = username; host = {
inherit username;
name = "orange-pi";
};
ssh.authorizedHosts = [ ssh.authorizedHosts = [
"andromache" "andromache"
"astyanax" "astyanax"

View File

@@ -12,10 +12,15 @@ let
in in
{ {
imports = [ imports = [
../modules/common/host.nix
../modules/ssh ../modules/ssh
]; ];
ssh.username = username; host = {
inherit username;
name = "raspberry-pi";
};
ssh.authorizedHosts = [ ssh.authorizedHosts = [
"andromache" "andromache"
"astyanax" "astyanax"

View File

@@ -1,13 +1,15 @@
{ config, ... }: { config, myUtils, ... }:
let let
inherit (config.secrets) username owner; inherit (config.secrets) sopsDir;
inherit (config.host) username;
owner = config.users.users.${username}.name;
in in
{ {
config = { config.sops = {
secrets.groups.opencode = [ "api-key" ]; secrets = myUtils.mkSopsSecrets sopsDir "opencode" [ "api-key" ] { inherit owner; };
sops.templates."opencode/auth.json" = { templates."opencode/auth.json" = {
inherit owner; inherit owner;
path = "/home/${username}/.local/share/opencode/auth.json"; path = "/home/${username}/.local/share/opencode/auth.json";
content = '' content = ''

View File

@@ -1,6 +1,12 @@
{ config, myUtils, ... }:
let
inherit (config.secrets) sopsDir;
inherit (config.host) username;
owner = config.users.users.${username}.name;
in
{ {
config.secrets.groups.anki = [ config.sops = {
"sync-user" secrets = myUtils.mkSopsSecrets sopsDir "anki" [ "sync-user" "sync-key" ] { inherit owner; };
"sync-key" };
];
} }

View File

@@ -1,16 +1,21 @@
{ {
lib, lib,
config, config,
myUtils,
... ...
}: }:
let let
cfg = config.restic-backup; cfg = config.restic-backup;
host = config.networking.hostName; inherit (config.secrets) sopsDir;
in in
{ {
options.restic-backup = { options = {
enable = lib.mkEnableOption "restic backups"; restic-backup = {
repository = lib.mkOption {
type = lib.types.str;
default = "b2:${config.sops.placeholder."backblaze-b2/bucket-name"}:${config.networking.hostName}";
};
passwordFile = lib.mkOption { passwordFile = lib.mkOption {
type = lib.types.str; type = lib.types.str;
@@ -22,32 +27,31 @@ in
default = [ "/home" ]; default = [ "/home" ];
}; };
}; };
};
config = lib.mkIf cfg.enable { config = {
secrets.groups = { sops = {
restic = [ "password" ]; secrets = lib.mkMerge [
backblaze-b2 = [ (myUtils.mkSopsSecrets sopsDir "restic" [ "password" ] { })
"bucket-name" (myUtils.mkSopsSecrets sopsDir "backblaze-b2" [ "bucket-name" "account-id" "account-key" ] { })
"account-id"
"account-key"
]; ];
templates = {
"restic/repo-${config.networking.hostName}" = {
content = "b2:${config.sops.placeholder."backblaze-b2/bucket-name"}:${config.networking.hostName}";
}; };
"restic/b2-env-${config.networking.hostName}" = {
sops.templates = {
"restic/repo-${host}" = {
content = "b2:${config.sops.placeholder."backblaze-b2/bucket-name"}:${host}";
};
"restic/b2-env-${host}" = {
content = '' content = ''
B2_ACCOUNT_ID=${config.sops.placeholder."backblaze-b2/account-id"} B2_ACCOUNT_ID=${config.sops.placeholder."backblaze-b2/account-id"}
B2_ACCOUNT_KEY=${config.sops.placeholder."backblaze-b2/account-key"} B2_ACCOUNT_KEY=${config.sops.placeholder."backblaze-b2/account-key"}
''; '';
}; };
}; };
};
services.restic.backups.home = { services.restic.backups.home = {
repositoryFile = config.sops.templates."restic/repo-${host}".path; repositoryFile = config.sops.templates."restic/repo-${config.networking.hostName}".path;
inherit (cfg) passwordFile paths; inherit (cfg) passwordFile;
inherit (cfg) paths;
timerConfig = { timerConfig = {
OnCalendar = "daily"; OnCalendar = "daily";
Persistent = true; Persistent = true;
@@ -60,7 +64,7 @@ in
"--keep-monthly 6" "--keep-monthly 6"
"--keep-yearly 1" "--keep-yearly 1"
]; ];
environmentFile = config.sops.templates."restic/b2-env-${host}".path; environmentFile = config.sops.templates."restic/b2-env-${config.networking.hostName}".path;
}; };
}; };
} }

View File

@@ -73,6 +73,11 @@ in
myUtils myUtils
; ;
}; };
sharedModules = [
{
host.username = lib.mkDefault config.host.username;
}
];
}; };
}; };
} }

View File

@@ -2,29 +2,17 @@
let let
cfg = config.docker; cfg = config.docker;
inherit (config.host) username;
in in
{ {
options.docker = { options.docker = {
enable = lib.mkEnableOption "docker";
rootless = lib.mkOption { rootless = lib.mkOption {
type = lib.types.bool; type = lib.types.bool;
default = false; default = false;
}; };
user = lib.mkOption {
type = lib.types.nullOr lib.types.str;
default = null;
};
}; };
config = lib.mkMerge [ config = lib.mkMerge [
{
warnings = lib.flatten [
(lib.optional (
cfg.rootless && cfg.user != null
) "'virtualisation.docker.user' is ignored when rootless mode is enabled")
(lib.optional (
!cfg.rootless && cfg.user == null
) "'virtualisation.docker.user' is not set (no user is added to the docker group)")
];
}
(lib.mkIf cfg.rootless { (lib.mkIf cfg.rootless {
virtualisation.docker = { virtualisation.docker = {
enable = false; enable = false;
@@ -34,11 +22,9 @@ in
}; };
}; };
}) })
(lib.mkIf (!cfg.rootless && cfg.user != null) { (lib.mkIf (cfg.enable && !cfg.rootless) {
virtualisation.docker = { virtualisation.docker.enable = true;
enable = true; users.users.${username}.extraGroups = [ "docker" ];
};
users.users.${cfg.user}.extraGroups = [ "docker" ];
}) })
]; ];
} }

View File

@@ -4,7 +4,7 @@
}: }:
let let
inherit (config.secrets) username; inherit (config.host) username;
owner = config.users.users.${username}.name; owner = config.users.users.${username}.name;
in in
{ {

View File

@@ -1,28 +1,28 @@
{ {
lib, lib,
config, config,
myUtils,
... ...
}: }:
let let
cfg = config.hcloud; cfg = config.hcloud;
inherit (config.secrets) owner; inherit (config.host) username;
inherit (config.secrets) sopsDir;
in in
{ {
options.hcloud = { options.hcloud = {
enable = lib.mkEnableOption "hcloud CLI configuration"; enable = lib.mkEnableOption "hcloud CLI configuration";
username = lib.mkOption {
type = lib.types.str;
description = "username for hcloud CLI configuration";
};
}; };
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
secrets.groups.hcloud = [ "api-token" ]; sops.secrets = myUtils.mkSopsSecrets sopsDir "hcloud" [ "api-token" ] {
owner = config.users.users.${username}.name;
};
sops.templates."hcloud/cli.toml" = { sops.templates."hcloud/cli.toml" = {
inherit owner; owner = config.users.users.${username}.name;
path = "/home/${cfg.username}/.config/hcloud/cli.toml"; path = "/home/${username}/.config/hcloud/cli.toml";
content = '' content = ''
active_context = "server" active_context = "server"

View File

@@ -2,15 +2,13 @@
let let
cfg = config.nfc; cfg = config.nfc;
inherit (config.host) username;
in in
{ {
options.nfc = { options.nfc = {
user = lib.mkOption { enable = lib.mkEnableOption "NFC device access";
type = lib.types.nullOr lib.types.str;
default = null;
}; };
}; config = lib.mkIf cfg.enable {
config = lib.mkIf (cfg.user != null) { users.users.${username}.extraGroups = [ "dialout" ];
users.users.${cfg.user}.extraGroups = [ "dialout" ];
}; };
} }

View File

@@ -9,32 +9,21 @@
let let
cfg = config.secrets; cfg = config.secrets;
inherit (config.host) username;
inherit (cfg) sopsDir; inherit (cfg) sopsDir;
owner = config.users.users.${cfg.username}.name; owner = config.users.users.${username}.name;
mkSopsSecrets = myUtils.mkSopsSecrets sopsDir;
in in
{ {
imports = [ inputs.sops-nix.nixosModules.sops ]; imports = [ inputs.sops-nix.nixosModules.sops ];
options.secrets = { options = {
username = lib.mkOption { secrets = {
type = lib.types.str;
};
sopsDir = lib.mkOption { sopsDir = lib.mkOption {
type = lib.types.str; type = lib.types.str;
default = "${toString inputs.nix-secrets}/secrets"; default = "${toString inputs.nix-secrets}/secrets";
}; };
groups = lib.mkOption {
type = lib.types.attrsOf (lib.types.listOf lib.types.str);
default = { };
description = "Declarative secret groups: { group = [ key names ]; }";
};
owner = lib.mkOption {
type = lib.types.unspecified;
};
nixSigningKey = { nixSigningKey = {
enable = lib.mkEnableOption "nix signing key configuration"; enable = lib.mkEnableOption "nix signing key configuration";
}; };
@@ -43,30 +32,30 @@ in
enable = lib.mkEnableOption "set up Yubikey"; enable = lib.mkEnableOption "set up Yubikey";
}; };
}; };
};
config = { config = {
secrets = {
inherit owner;
groups = {
email = [
"personal"
"work"
];
nix = lib.optional cfg.nixSigningKey.enable "signing-key";
};
};
sops = { sops = {
# for yubikey, generate as follows: # for yubikey, generate as follows:
# ``` # ```
# age-plugin-yubikey --identity > <keyfile-path> # age-plugin-yubikey --identity > <keyfile-path>
# ``` # ```
age.keyFile = "/home/${cfg.username}/.config/sops/age/keys.txt"; age.keyFile = "/home/${username}/.config/sops/age/keys.txt";
secrets = myUtils.mkSopsSecrets sopsDir owner cfg.groups;
secrets = lib.mkMerge [
(mkSopsSecrets "email" [ "personal" "work" ] { inherit owner; })
(lib.mkIf cfg.nixSigningKey.enable {
nix-signing-key = {
sopsFile = "${sopsDir}/nix.yaml";
key = "signing-key";
inherit owner;
};
})
];
}; };
nix.settings.secret-key-files = lib.mkIf cfg.nixSigningKey.enable [ nix.settings.secret-key-files = lib.mkIf cfg.nixSigningKey.enable [
config.sops.secrets."nix/signing-key".path config.sops.secrets.nix-signing-key.path
]; ];
services = { services = {

View File

@@ -1,22 +1,18 @@
{ lib, config, ... }: { lib, config, ... }:
let
inherit (config.host) username;
in
{ {
options.ssh = { options.ssh = {
authorizedHosts = lib.mkOption { authorizedHosts = lib.mkOption {
type = lib.types.listOf lib.types.str; type = lib.types.listOf lib.types.str;
default = [ ]; default = [ ];
}; };
username = lib.mkOption {
type = lib.types.str;
default = "h";
};
publicHostname = lib.mkOption {
type = lib.types.str;
default = "";
};
}; };
# auto generate authorized_keys from `authorizedHosts` # auto generate authorized_keys from `authorizedHosts`
config.users.users.${config.ssh.username}.openssh.authorizedKeys.keys = lib.flatten ( config.users.users.${username}.openssh.authorizedKeys.keys = lib.flatten (
map ( map (
hostname: hostname:
let let

View File

@@ -1,6 +1,6 @@
{ lib, config, ... }: { lib, config, ... }:
let let
inherit (config.ssh) username; inherit (config.host) username;
in in
{ {
# auto extract SSH keys # auto extract SSH keys

View File

@@ -30,20 +30,7 @@ in
home-manager.sharedModules = [ home-manager.sharedModules = [
{ {
stylix.targets = { stylix.targets = import ./targets.nix;
firefox = {
profileNames = [ "default" ];
colorTheme.enable = true;
};
librewolf = {
profileNames = [ "default" ];
colorTheme.enable = true;
};
kitty.variant256Colors = true;
gnome.enable = false;
gtk.enable = false;
nixvim.enable = false;
};
} }
]; ];
} }

View File

@@ -0,0 +1,14 @@
{
firefox = {
profileNames = [ "default" ];
colorTheme.enable = true;
};
librewolf = {
profileNames = [ "default" ];
colorTheme.enable = true;
};
kitty.variant256Colors = true;
gnome.enable = false;
gtk.enable = false;
nixvim.enable = false;
}

View File

@@ -7,23 +7,18 @@
with lib; with lib;
let let
cfg = config.my.syncthing; inherit (config.host) username;
in in
{ {
options.my.syncthing.username = mkOption {
type = types.str;
default = "h";
};
config = { config = {
users.groups.${cfg.username} = { }; users.groups.${username} = { };
users.users.${cfg.username}.extraGroups = [ cfg.username ]; users.users.${username}.extraGroups = [ username ];
services.syncthing = { services.syncthing = {
enable = true; enable = true;
user = cfg.username; user = username;
group = cfg.username; group = username;
configDir = "/home/${cfg.username}/.local/state/syncthing"; configDir = "/home/${username}/.local/state/syncthing";
openDefaultPorts = true; openDefaultPorts = true;
}; };
}; };

View File

@@ -1,17 +1,19 @@
{ config, ... }: { config, myUtils, ... }:
let let
inherit (config.secrets) owner; inherit (config.secrets) sopsDir;
inherit (config.host) username;
owner = config.users.users.${username}.name;
in in
{ {
config = { config.sops = {
secrets.groups.taskwarrior = [ secrets = myUtils.mkSopsSecrets sopsDir "taskwarrior" [
"sync-server-url" "sync-server-url"
"sync-server-client-id" "sync-server-client-id"
"sync-encryption-secret" "sync-encryption-secret"
]; ] { inherit owner; };
sops.templates."taskrc.d/sync" = { templates."taskrc.d/sync" = {
inherit owner; inherit owner;
content = '' content = ''
sync.server.url=${config.sops.placeholder."taskwarrior/sync-server-url"} sync.server.url=${config.sops.placeholder."taskwarrior/sync-server-url"}

View File

@@ -9,18 +9,14 @@ with lib;
let let
cfg = config.my.yubikey; cfg = config.my.yubikey;
inherit (config.host) username;
formatKey = key: ":${key.handle},${key.userKey},${key.coseType},${key.options}"; formatKey = key: ":${key.handle},${key.userKey},${key.coseType},${key.options}";
authfileContent = username: keys: username + lib.concatMapStrings formatKey keys; authfileContent = u: keys: u + lib.concatMapStrings formatKey keys;
in in
{ {
options.my.yubikey = { options.my.yubikey = {
enable = mkEnableOption "yubiKey U2F authentication"; enable = mkEnableOption "yubiKey U2F authentication";
username = mkOption {
type = types.str;
default = "h";
};
origin = mkOption { origin = mkOption {
type = types.str; type = types.str;
default = "pam://yubi"; default = "pam://yubi";
@@ -61,7 +57,7 @@ in
interactive = true; interactive = true;
cue = true; cue = true;
inherit (cfg) origin; inherit (cfg) origin;
authfile = pkgs.writeText "u2f-mappings" (authfileContent cfg.username cfg.keys); authfile = pkgs.writeText "u2f-mappings" (authfileContent username cfg.keys);
}; };
}; };
services = { services = {

View File

@@ -1,12 +1,41 @@
{ lib }: { lib }:
let
hosts = import ./hosts.nix;
secrets = import ./secrets.nix { inherit lib; };
in
{ {
dirNames = dirNames =
path: builtins.attrNames (lib.filterAttrs (_: type: type == "directory") (builtins.readDir path)); path: builtins.attrNames (lib.filterAttrs (_: type: type == "directory") (builtins.readDir path));
hostMeta =
hostDir:
if builtins.pathExists (hostDir + "/meta.nix") then
import (hostDir + "/meta.nix")
else
throw "meta.nix required in ${hostDir}";
mkSopsSecrets =
sopsDir: group: names: extraOpts:
let
file = "${group}.yaml";
in
lib.foldl' lib.mergeAttrs { } (
map (name: {
"${group}/${name}" = {
sopsFile = "${sopsDir}/${file}";
key = name;
}
// extraOpts;
}) names
);
sopsAvailability =
config: osConfig:
let
osSopsAvailable = osConfig != null && osConfig ? sops && osConfig.sops ? secrets;
hmSopsAvailable = config ? sops && config.sops ? secrets;
preferOs = osSopsAvailable;
in
{
available = osSopsAvailable || hmSopsAvailable;
secrets = if preferOs then osConfig.sops.secrets else config.sops.secrets;
templates = if preferOs then osConfig.sops.templates else config.sops.templates;
};
} }
// hosts
// secrets

View File

@@ -1,8 +0,0 @@
{
hostMeta =
hostDir:
if builtins.pathExists (hostDir + "/meta.nix") then
import (hostDir + "/meta.nix")
else
throw "meta.nix required in ${hostDir}";
}

View File

@@ -1,37 +0,0 @@
{ lib }:
{
mkSopsSecrets =
sopsDir: owner: groups:
let
opts = lib.optionalAttrs (owner != null) { inherit owner; };
mkGroup =
group: names:
let
file = "${group}.yaml";
in
lib.foldl' lib.mergeAttrs { } (
map (name: {
"${group}/${name}" = {
sopsFile = "${sopsDir}/${file}";
key = name;
}
// opts;
}) names
);
in
lib.foldl' lib.mergeAttrs { } (lib.mapAttrsToList mkGroup groups);
sopsAvailability =
config: osConfig:
let
osSopsAvailable = osConfig != null && osConfig ? sops && osConfig.sops ? secrets;
hmSopsAvailable = config ? sops && config.sops ? secrets;
preferOs = osSopsAvailable;
in
{
available = osSopsAvailable || hmSopsAvailable;
secrets = if preferOs then osConfig.sops.secrets else config.sops.secrets;
templates = if preferOs then osConfig.sops.templates else config.sops.templates;
};
}