mirror of
https://github.com/oddlama/nix-config.git
synced 2025-10-11 07:10:39 +02:00
feat: change passwords and hide new hashes
This commit is contained in:
parent
aaa1d88d46
commit
f65b217a92
5 changed files with 13 additions and 7 deletions
|
@ -12,6 +12,7 @@ This is my personal nix config.
|
||||||
- `hardware/` configuration for various hardware components
|
- `hardware/` configuration for various hardware components
|
||||||
- `<something>.nix` commonly required configuration for `<something>`
|
- `<something>.nix` commonly required configuration for `<something>`
|
||||||
- `<hostname>/` configuration for `<hostname>`
|
- `<hostname>/` configuration for `<hostname>`
|
||||||
|
- `[microvms/]` configuration for microvms. This is optional even for existing microvms, since they can also be defined in-place.
|
||||||
- `secrets/` Local secrets for this host. Still theoretically accessible by other hosts, but owned by this one.
|
- `secrets/` Local secrets for this host. Still theoretically accessible by other hosts, but owned by this one.
|
||||||
- `local.nix.age` Repository-wide local secrets. Decrypted on import via `builtins.extraBuiltins.rageImportEncrypted`.
|
- `local.nix.age` Repository-wide local secrets. Decrypted on import via `builtins.extraBuiltins.rageImportEncrypted`.
|
||||||
- `[host.pub]` This host's public key. Used for agenix rekeying if it exists.
|
- `[host.pub]` This host's public key. Used for agenix rekeying if it exists.
|
||||||
|
@ -102,10 +103,10 @@ all commands using these extra parameters, or permanently add the following the
|
||||||
2. Run all commands with `--option plugin-files "$NIX_PLUGINS"/lib/nix/plugins --option extra-builtins-file ./nix/extra-builtins.nix`
|
2. Run all commands with `--option plugin-files "$NIX_PLUGINS"/lib/nix/plugins --option extra-builtins-file ./nix/extra-builtins.nix`
|
||||||
or permantently
|
or permantently
|
||||||
|
|
||||||
```ini
|
```ini
|
||||||
plugin-files = <copy path from $NIX_PLUGINS>/lib/nix/plugins
|
plugin-files = <copy path from $NIX_PLUGINS>/lib/nix/plugins
|
||||||
extra-builtins-file = /path/to/nix-config/nix/extra-builtins.nix
|
extra-builtins-file = /path/to/nix-config/nix/extra-builtins.nix
|
||||||
```
|
```
|
||||||
|
|
||||||
## Misc
|
## Misc
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
let
|
let
|
||||||
|
# IP addresses: ${"${interface} \e{halfbright}\4{${interface}}\e{reset} \e{halfbright}\6{${interface}}\e{reset}"}
|
||||||
issue_text = ''
|
issue_text = ''
|
||||||
\d \t
|
\d \t
|
||||||
This is \e{cyan}\n\e{reset} [\e{lightblue}\l\e{reset}] (\s \m \r)
|
This is \e{cyan}\n\e{reset} [\e{lightblue}\l\e{reset}] (\s \m \r)
|
||||||
|
|
Binary file not shown.
|
@ -5,12 +5,12 @@
|
||||||
stateVersion,
|
stateVersion,
|
||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
inherit (config.repo.secrets.global) myuser;
|
myuser = config.repo.secrets.global.myuser.name;
|
||||||
in {
|
in {
|
||||||
users.groups.${myuser}.gid = config.users.users.${myuser}.uid;
|
users.groups.${myuser}.gid = config.users.users.${myuser}.uid;
|
||||||
users.users.${myuser} = {
|
users.users.${myuser} = {
|
||||||
uid = 1000;
|
uid = 1000;
|
||||||
hashedPassword = "$6$YogAnKRz8qW2Gz.I$chgMKKrpPAfV0WuGN6ChOgUJistpCzFsHOT6mhHyj07mwI1kSfDJvnMB13frMvkpv2aGpXHVH.yxk5fYHeeET/";
|
inherit (config.repo.secrets.global.myuser) hashedPassword;
|
||||||
createHome = true;
|
createHome = true;
|
||||||
group = myuser;
|
group = myuser;
|
||||||
extraGroups =
|
extraGroups =
|
||||||
|
|
|
@ -6,7 +6,7 @@
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
users.users.root = {
|
users.users.root = {
|
||||||
hashedPassword = "$6$EBo/CaxB.dQoq2W8$lo2b5vKgJlLPdGGhEqa08q3Irf1Zd1PcFBCwJOrG8lqjwbABkn1DEhrMh1P3ezwnww2HusUBuZGDSMa4nvSQg1";
|
inherit (config.repo.secrets.global.root) hashedPassword;
|
||||||
openssh.authorizedKeys.keys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA5Uq+CDy5Pmt3If5M6d8K/Q7HArU6sZ7sgoj3T521Wm"];
|
openssh.authorizedKeys.keys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA5Uq+CDy5Pmt3If5M6d8K/Q7HArU6sZ7sgoj3T521Wm"];
|
||||||
shell = pkgs.zsh;
|
shell = pkgs.zsh;
|
||||||
};
|
};
|
||||||
|
@ -20,6 +20,10 @@
|
||||||
inherit stateVersion;
|
inherit stateVersion;
|
||||||
inherit (config.users.users.root) uid;
|
inherit (config.users.users.root) uid;
|
||||||
username = config.users.users.root.name;
|
username = config.users.users.root.name;
|
||||||
|
|
||||||
|
packages = with pkgs; [
|
||||||
|
wireguard-tools
|
||||||
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue