{ lib, inputs, pkgs, config, myUtils, ... }: let cfg = config.secrets; inherit (cfg) sopsDir; owner = config.users.users.${cfg.username}.name; mkSopsSecrets = myUtils.mkSopsSecrets sopsDir; in { imports = [ inputs.sops-nix.nixosModules.sops ]; options = { secrets = { username = lib.mkOption { type = lib.types.str; }; sopsDir = lib.mkOption { type = lib.types.str; default = "${toString inputs.nix-secrets}/secrets"; }; nixSigningKey = { enable = lib.mkEnableOption "nix signing key configuration"; name = lib.mkOption { type = lib.types.str; default = "${config.host.name}-nix-signing-key"; }; }; yubikey = { enable = lib.mkEnableOption "set up Yubikey"; }; }; }; config = { sops = { # for yubikey, generate as follows: # ``` # age-plugin-yubikey --identity > # ``` age.keyFile = "/home/${cfg.username}/.config/sops/age/keys.txt"; secrets = lib.mkMerge [ (mkSopsSecrets "email" [ "personal" "work" ] { inherit owner; }) (lib.mkIf cfg.nixSigningKey.enable { ${cfg.nixSigningKey.name} = { sopsFile = "${sopsDir}/${cfg.nixSigningKey.name}.yaml"; inherit owner; }; }) ]; }; nix.settings.secret-key-files = lib.mkIf cfg.nixSigningKey.enable [ config.sops.secrets.${cfg.nixSigningKey.name}.path ]; services = { pcscd.enable = true; # needed for age-plugin-yubikey? udev.packages = lib.mkIf cfg.yubikey.enable [ pkgs.yubikey-personalization pkgs.libfido2 ]; }; }; }