chore: add user mutability hash for winters

This commit is contained in:
Swarsel 2024-09-23 23:13:58 +02:00
parent 035c42b170
commit c8c3ecdc72
Signed by: swarsel
GPG key ID: 26A54C31F2A4FD84
4 changed files with 8 additions and 4 deletions

View file

@ -5166,6 +5166,8 @@ This ensures that all user-configuration happens here in the config file.
#+begin_src nix :tangle profiles/common/nixos/users.nix #+begin_src nix :tangle profiles/common/nixos/users.nix
{ pkgs, config, lib, ... }: { pkgs, config, lib, ... }:
{ {
sops.secrets.swarseluser = { neededForUsers = true; };
users = { users = {
mutableUsers = lib.mkIf (!config.swarselsystems.initialSetup) false; mutableUsers = lib.mkIf (!config.swarselsystems.initialSetup) false;
users.swarsel = { users.swarsel = {
@ -5641,7 +5643,6 @@ I use sops-nix to handle secrets that I want to have available on my machines at
validateSopsFiles = false; validateSopsFiles = false;
secrets = { secrets = {
swarseluser = { neededForUsers = true; };
ernest = { }; ernest = { };
frauns = { }; frauns = { };
hotspot = { }; hotspot = { };

View file

@ -14,7 +14,6 @@ in
validateSopsFiles = false; validateSopsFiles = false;
secrets = { secrets = {
swarseluser = { neededForUsers = true; };
ernest = { }; ernest = { };
frauns = { }; frauns = { };
hotspot = { }; hotspot = { };

View file

@ -1,5 +1,7 @@
{ pkgs, config, lib, ... }: { pkgs, config, lib, ... }:
{ {
sops.secrets.swarseluser = { neededForUsers = true; };
users = { users = {
mutableUsers = lib.mkIf (!config.swarselsystems.initialSetup) false; mutableUsers = lib.mkIf (!config.swarselsystems.initialSetup) false;
users.swarsel = { users.swarsel = {

View file

@ -29,6 +29,8 @@ vpnpass: ENC[AES256_GCM,data:fnnvxcRXM5AsnA==,iv:OP4A1qyyUc73zUB4+5wJ4yk+xff4WEF
rpcpass: ENC[AES256_GCM,data:2kHNLnsSsndOZ6xaKFY0QQFD3i43NOt2,iv:8IQEIgPdRT6gqkPZsrs5c5D0iamUaZGrWNag4fDoUkU=,tag:R5d1uMGwvxFt0i2Y1DPmbA==,type:str] rpcpass: ENC[AES256_GCM,data:2kHNLnsSsndOZ6xaKFY0QQFD3i43NOt2,iv:8IQEIgPdRT6gqkPZsrs5c5D0iamUaZGrWNag4fDoUkU=,tag:R5d1uMGwvxFt0i2Y1DPmbA==,type:str]
vpnprot: ENC[AES256_GCM,data:/NV2,iv:wVvlcdisq2PdLeNpaxE7cwBsKEJgoi/MAmWoTgHFMbQ=,tag:9wZXcI1AsSH/mHUFwiwRGw==,type:str] vpnprot: ENC[AES256_GCM,data:/NV2,iv:wVvlcdisq2PdLeNpaxE7cwBsKEJgoi/MAmWoTgHFMbQ=,tag:9wZXcI1AsSH/mHUFwiwRGw==,type:str]
vpnloc: ENC[AES256_GCM,data:U8ModKho4vSHnMo9BOE978V6ZlMeQEoLaFW/,iv:Sw06YsWSZ4tGt/TRhRGkU4KdLBcmZTCY4mGqQbpEh7Q=,tag:kDoTkpzXZKEUIa1CSh3Pwg==,type:str] vpnloc: ENC[AES256_GCM,data:U8ModKho4vSHnMo9BOE978V6ZlMeQEoLaFW/,iv:Sw06YsWSZ4tGt/TRhRGkU4KdLBcmZTCY4mGqQbpEh7Q=,tag:kDoTkpzXZKEUIa1CSh3Pwg==,type:str]
#ENC[AES256_GCM,data:yp7ApA4YLSk=,iv:O/SQxKe9EWqExHbeKsTXvbst0pjCxy3yiOjmeCVjmdY=,tag:RMkAOLOLCodnPSDEuImwRw==,type:comment]
swarseluser: ENC[AES256_GCM,data:XvmOHYFNhb/bAYAZ/kmUWbbmRy/WrxSYri/Y5k+SH4N7ZIjuZDHOkWk93ERFuTb77HvhbPX/NRQraUoJoFsxGGg5co/gJnyfRg==,iv:J50PeDcC4PM3+yQ/YQNb8TW4kubwi2kjjSFU0RVFM30=,tag:ydLYkz1YKyguGZZZD/JcLA==,type:str]
sops: sops:
kms: [] kms: []
gcp_kms: [] gcp_kms: []
@ -44,8 +46,8 @@ sops:
SHJMUFJSeGRQcTIyU1U5RXkvQi9NMzQKm8SP9jQ4fuIuddzqP+m6EJg7+zkX53jz SHJMUFJSeGRQcTIyU1U5RXkvQi9NMzQKm8SP9jQ4fuIuddzqP+m6EJg7+zkX53jz
bHaMPuLTaIHaaSDlVYe5stpyPDlZQ0NSGWV+HaIXkLZNfNM71hWYBQ== bHaMPuLTaIHaaSDlVYe5stpyPDlZQ0NSGWV+HaIXkLZNfNM71hWYBQ==
-----END AGE ENCRYPTED FILE----- -----END AGE ENCRYPTED FILE-----
lastmodified: "2024-09-23T20:07:49Z" lastmodified: "2024-09-23T21:13:49Z"
mac: ENC[AES256_GCM,data:8scpO11i5qitF6V5f6lNf0PDiCBJUZnkZfdFAZXZTMYm+RUOwKC8Eo9Z853NV8edZtdHZKOBiLrOnFkitixqJvj/wRMsiuZAwIoZ3AnkTbtjBbqb4nT1TeuUMZaqCmehNi1GemN6wpH2Ow5QmVhkR0zvPF/sefOKuqrglDKyVL4=,iv:itAikiGBts1WJP3a8Jh4wzXScAHuzmc79QLGHbdnxS8=,tag:v4COFzBoKSIZs9utZxICzA==,type:str] mac: ENC[AES256_GCM,data:hGFaU+Z0rZHg6XeyVhaqinBmjjvBeaFaUG4McJgHrL2BarfJnYfvFd4DYzsGrrulVR1C3Zh/xGtrFwMi0Mtg4vxsnGIam/boy8erlYUJwwuh739LPKlxVGy8DjTlJAeSCZKWzeXskUZN9Uqt033Gx1Ve+aeyZ2qTWSg2Y52HAFY=,iv:hLmsb+yRf6Ab9D/tMzZCmtaxh9STHtew5ZQQZM/PQ58=,tag:MpKLamoJ/LHD0zUfkpLBMg==,type:str]
pgp: pgp:
- created_at: "2024-09-23T20:03:08Z" - created_at: "2024-09-23T20:03:08Z"
enc: |- enc: |-