diff options
| author | seth <[email protected]> | 2024-02-28 07:31:21 -0500 |
|---|---|---|
| committer | seth <[email protected]> | 2024-02-28 07:31:21 -0500 |
| commit | 4caa14d0416c8ac14e0ac617a1eec22b9df830f6 (patch) | |
| tree | ab2a295461a046118841c046fc1d6a3b6bbf7c38 /modules/nixos/server/host-user.nix | |
| parent | ed23d606f190aa20e620063ab65e78caf613b67c (diff) | |
nixos: remove root password
Diffstat (limited to 'modules/nixos/server/host-user.nix')
| -rw-r--r-- | modules/nixos/server/host-user.nix | 40 |
1 files changed, 40 insertions, 0 deletions
diff --git a/modules/nixos/server/host-user.nix b/modules/nixos/server/host-user.nix new file mode 100644 index 0000000..5aa1ce5 --- /dev/null +++ b/modules/nixos/server/host-user.nix @@ -0,0 +1,40 @@ +{ + config, + lib, + secretsDir, + ... +}: let + cfg = config.server.hostUser; + inherit (config.networking) hostName; +in { + options.server.hostUser = { + enable = lib.mkEnableOption "${hostName} user configuration" // {default = config.server.enable;}; + + manageSecrets = + lib.mkEnableOption "automatic secrets management" + // { + default = config.traits.secrets.enable; + }; + }; + + config = lib.mkIf cfg.enable ( + lib.mkMerge [ + { + users.users.${hostName} = { + isNormalUser = true; + extraGroups = ["wheel"]; + }; + } + + (lib.mkIf cfg.manageSecrets { + age.secrets = { + userPassword.file = secretsDir + "/userPassword.age"; + }; + + users.users.${hostName} = { + hashedPasswordFile = config.age.secrets.userPassword.path; + }; + }) + ] + ); +} |
