Add option to mark host as untrusted

This can be used to deploy a host that does not have access to the main
sops secrets file, e.g. because it does not have an encrypted root
partition.
Simon Bruder 2021-09-08 20:01:15 +02:00
parent 9cec2e53ff
commit 46ab3dbab3
Signed by: simon
GPG Key ID: 8D3C82F9F309F8EC
2 changed files with 9 additions and 6 deletions

View File

@ -11,6 +11,7 @@
''; '';
default = true; default = true;
}; };
trusted = (lib.mkEnableOption "the trusted status of this machine (i.e. encrypted root)") // { default = true; };
gui.enable = lib.mkEnableOption "gui"; gui.enable = lib.mkEnableOption "gui";
}; };

View File

@ -20,10 +20,12 @@ let
}; };
in in
{ {
sops.secrets.binary-cache-secret-key = { }; sops.secrets = lib.mkIf config.sbruder.trusted {
sops.secrets.nix-netrc = { binary-cache-secret-key = { };
group = "wheel"; nix-netrc = {
mode = "0440"; group = "wheel";
mode = "0440";
};
}; };
nix = { nix = {
@ -52,11 +54,11 @@ in
# On-the-fly optimisation of nix store # On-the-fly optimisation of nix store
autoOptimiseStore = true; autoOptimiseStore = true;
extraOptions = '' extraOptions = ''
experimental-features = nix-command flakes
'' + lib.optionalString config.sbruder.trusted ''
# Binary cache upload # Binary cache upload
secret-key-files = ${config.sops.secrets.binary-cache-secret-key.path} secret-key-files = ${config.sops.secrets.binary-cache-secret-key.path}
netrc-file = ${config.sops.secrets.nix-netrc.path} netrc-file = ${config.sops.secrets.nix-netrc.path}
experimental-features = nix-command flakes
'' + lib.optionalString config.sbruder.full '' '' + lib.optionalString config.sbruder.full ''
# Keep output of derivations with gc root # Keep output of derivations with gc root
keep-outputs = true keep-outputs = true