Compare commits

..

3 Commits

4 changed files with 8 additions and 2 deletions

View File

@@ -62,6 +62,8 @@ in
secrets.username = username; secrets.username = username;
docker.user = username; docker.user = username;
nix.settings.secret-key-files = [ config.sops.secrets.nix_signing_key_andromache.path ];
disko.devices = { disko.devices = {
disk.data = { disk.data = {
type = "disk"; type = "disk";
@@ -91,7 +93,7 @@ in
]; ];
my.yubikey = { my.yubikey = {
enable = false; enable = true;
inherit username; inherit username;
keys = [ keys = [
{ {

View File

@@ -61,6 +61,8 @@ in
nfc.user = username; nfc.user = username;
desktop.ly.enable = true; desktop.ly.enable = true;
nix.settings.secret-key-files = [ config.sops.secrets.nix_signing_key_astyanax.path ];
hardware = { hardware = {
cpu.intel.updateMicrocode = true; cpu.intel.updateMicrocode = true;
# https://wiki.nixos.org/wiki/Intel_Graphics # https://wiki.nixos.org/wiki/Intel_Graphics

View File

@@ -29,6 +29,8 @@ in
"anki_sync_user".owner = config.users.users.${cfg.username}.name; "anki_sync_user".owner = config.users.users.${cfg.username}.name;
"anki_sync_key".owner = config.users.users.${cfg.username}.name; "anki_sync_key".owner = config.users.users.${cfg.username}.name;
"hcloud".owner = config.users.users.${cfg.username}.name; "hcloud".owner = config.users.users.${cfg.username}.name;
"nix_signing_key_astyanax" = { };
"nix_signing_key_andromache" = { };
"opencode_api_key".owner = config.users.users.${cfg.username}.name; "opencode_api_key".owner = config.users.users.${cfg.username}.name;
# TODO: using shared secrets for now, but would be better to to per-host secrets # TODO: using shared secrets for now, but would be better to to per-host secrets
# To add per-host secrets: # To add per-host secrets:

View File

@@ -60,7 +60,7 @@ in
settings = { settings = {
interactive = true; interactive = true;
cue = true; cue = true;
inherit (cfg) origin; origin = cfg.origin;
authfile = pkgs.writeText "u2f-mappings" (authfileContent cfg.username cfg.keys); authfile = pkgs.writeText "u2f-mappings" (authfileContent cfg.username cfg.keys);
}; };
}; };