forked from aylac.top/nixcfg
this repo has no description

lalalala

aylac.top c0d0a665 f91ebb1b

verified
Changed files
+14 -6
hosts
modules
+3 -3
flake.lock
···
"secrets": {
"flake": false,
"locked": {
-
"lastModified": 1756518813,
-
"narHash": "sha256-tuhglLbJSQzfWeOYYMnbx4XhwFQp8cF1GdtmznPiKTQ=",
"owner": "ayla6",
"repo": "secrets",
-
"rev": "646cbc68c306569c502e78a31be22e6c2919b5ae",
"type": "github"
},
"original": {
···
"secrets": {
"flake": false,
"locked": {
+
"lastModified": 1756878317,
+
"narHash": "sha256-pEVF9/ZjyENenEUUqrKGO3qNngqRP1EaLf7mOS/4ol4=",
"owner": "ayla6",
"repo": "secrets",
+
"rev": "9cf93253fccc51a8a22c8fe944d80a50a24d7404",
"type": "github"
},
"original": {
+1 -1
hosts/morgana/default.nix
···
myUsers = {
ayla = {
enable = true;
-
password = "REDACTED";
};
};
···
myUsers = {
ayla = {
enable = true;
+
passwordFile = config.age.secrets.aylaPassword.path;
};
};
+1
hosts/morgana/secrets.nix
···
{self, ...}: {
age.secrets = {
tailscaleAuthKey.file = "${self.inputs.secrets}/tailscale/auth.age";
syncthingCert.file = "${self.inputs.secrets}/ayla/syncthing/morgana/cert.age";
syncthingKey.file = "${self.inputs.secrets}/ayla/syncthing/morgana/key.age";
···
{self, ...}: {
age.secrets = {
+
aylaPassword.file = "${self.inputs.secrets}/ayla/passwordHash.age";
tailscaleAuthKey.file = "${self.inputs.secrets}/tailscale/auth.age";
syncthingCert.file = "${self.inputs.secrets}/ayla/syncthing/morgana/cert.age";
syncthingKey.file = "${self.inputs.secrets}/ayla/syncthing/morgana/key.age";
+1 -1
hosts/nanpi/default.nix
···
myUsers = {
ayla = {
enable = true;
-
password = "REDACTED";
};
};
···
myUsers = {
ayla = {
enable = true;
+
passwordFile = config.age.secrets.aylaPassword.path;
};
};
+1
hosts/nanpi/secrets.nix
···
{self, ...}: {
age.secrets = {
pds.file = "${self.inputs.secrets}/pds.age";
resticPassword.file = "${self.inputs.secrets}/restic-passwd.age";
rclone.file = "${self.inputs.secrets}/rclone.age";
···
{self, ...}: {
age.secrets = {
+
aylaPassword.file = "${self.inputs.secrets}/ayla/passwordHash.age";
pds.file = "${self.inputs.secrets}/pds.age";
resticPassword.file = "${self.inputs.secrets}/restic-passwd.age";
rclone.file = "${self.inputs.secrets}/rclone.age";
+1 -1
modules/users/ayla/default.nix
···
description = "Ayla";
isNormalUser = true;
extraGroups = config.myUsers.defaultGroups;
-
hashedPassword = config.myUsers.ayla.password;
openssh.authorizedKeys.keyFiles =
lib.map (file: "${self.inputs.secrets}/publicKeys/${file}")
···
description = "Ayla";
isNormalUser = true;
extraGroups = config.myUsers.defaultGroups;
+
hashedPasswordFile = config.myUsers.ayla.passwordFile;
openssh.authorizedKeys.keyFiles =
lib.map (file: "${self.inputs.secrets}/publicKeys/${file}")
+6
modules/users/options.nix
···
description = "Hashed password for ${user}.";
type = lib.types.nullOr lib.types.str;
};
};
in {
defaultGroups = lib.mkOption {
···
description = "Hashed password for ${user}.";
type = lib.types.nullOr lib.types.str;
};
+
+
passwordFile = lib.mkOption {
+
default = null;
+
description = "Hashed password file for ${user}.";
+
type = lib.types.nullOr lib.types.path;
+
};
};
in {
defaultGroups = lib.mkOption {