chore: only add agenix-rekey and nix-import-encrypted persistent folders to dev machines

This commit is contained in:
oddlama 2023-10-02 20:07:27 +02:00
parent 2710a1be16
commit e33476a7f5
No known key found for this signature in database
GPG key ID: 14EFE510775FE39A
2 changed files with 9 additions and 6 deletions

View file

@ -90,16 +90,11 @@ in {
hideMounts = true; hideMounts = true;
directories = directories =
[ [
{
directory = "/var/tmp/agenix-rekey";
mode = "1777";
}
"/var/tmp/nix-import-encrypted" # Decrypted repo-secrets can be kept
"/var/lib/systemd" "/var/lib/systemd"
"/var/log" "/var/log"
"/var/spool"
#{ directory = "/tmp"; mode = "1777"; } #{ directory = "/tmp"; mode = "1777"; }
#{ directory = "/var/tmp"; mode = "1777"; } #{ directory = "/var/tmp"; mode = "1777"; }
"/var/spool"
] ]
++ optionals config.networking.wireless.iwd.enable [ ++ optionals config.networking.wireless.iwd.enable [
{ {

View file

@ -18,6 +18,14 @@ lib.optionalAttrs (!minimal) {
# Add the agenix-rekey sandbox path permanently to avoid adding myself to trusted-users # Add the agenix-rekey sandbox path permanently to avoid adding myself to trusted-users
nix.settings.extra-sandbox-paths = ["/var/tmp/agenix-rekey"]; nix.settings.extra-sandbox-paths = ["/var/tmp/agenix-rekey"];
environment.persistence."/state".directories = [
{
directory = "/var/tmp/agenix-rekey";
mode = "1777";
}
"/var/tmp/nix-import-encrypted" # Decrypted repo-secrets can be kept
];
services.nixseparatedebuginfod = { services.nixseparatedebuginfod = {
enable = true; enable = true;
# We need a system-level user to be able to use nix.settings.allowed-users with it. # We need a system-level user to be able to use nix.settings.allowed-users with it.