This commit is contained in:
foglar 2024-12-27 10:32:42 +01:00
parent d99d544813
commit 047d4fb2f4
4 changed files with 16 additions and 13 deletions

4
.gitignore vendored
View File

@ -1,2 +1,2 @@
kogami.qcow2
laptop.qcow2 ginoza.qcow2

View File

@ -72,8 +72,9 @@
# Basic programs to enable # Basic programs to enable
programs.kdeconnect.enable = true; programs.kdeconnect.enable = true;
programs.wireshark.enable = true; programs.wireshark.enable = true;
programs.auto-cpufreq.enable = true;
services.twingate.enable = true; #services.twingate.enable = true;
# Allow unfree packages # Allow unfree packages
nixpkgs.config.allowUnfree = true; nixpkgs.config.allowUnfree = true;
@ -81,14 +82,6 @@
# List packages installed in system profile. To search, run: # List packages installed in system profile. To search, run:
# $ nix search wget # $ nix search wget
# Some programs need SUID wrappers, can be configured further or are
# started in user sessions.
# programs.mtr.enable = true;
# programs.gnupg.agent = {
# enable = true;
# enableSSHSupport = true;
# };
# List services that you want to enable: # List services that you want to enable:
# Enable the OpenSSH daemon. # Enable the OpenSSH daemon.

View File

@ -1,4 +1,7 @@
{userSettings, ...}: { {
userSettings,
...
}: {
# Home manager configuration # Home manager configuration
home.username = "${userSettings.username}"; home.username = "${userSettings.username}";
home.homeDirectory = "/home/${userSettings.username}"; home.homeDirectory = "/home/${userSettings.username}";
@ -83,6 +86,7 @@
} }
''; '';
}; };
# Let Home Manager install and manage itself. # Let Home Manager install and manage itself.
programs.home-manager.enable = true; programs.home-manager.enable = true;
} }

View File

@ -19,6 +19,12 @@
}; };
users.users.${userSettings.username}.hashedPasswordFile = "${config.sops.secrets."${userSettings.hostname}/password-hash".path}"; users.users.${userSettings.username}.hashedPasswordFile = "${config.sops.secrets."${userSettings.hostname}/password-hash".path}";
security.pam.yubico.id = ["${config.sops.secrets.yubikey_id}".value]; security.pam.yubico.id =
[]
++ (
if config.program.yubikey.enable
then ["${config.sops.secrets.yubikey_id}".value]
else []
);
}; };
} }