Add yubikey-agent overlay, update to latest git

commit, add nix-autobahn
This commit is contained in:
teutat3s 2022-03-23 11:06:17 +01:00
parent 72637fba7b
commit 7bbdc0c4f7
Signed by: teutat3s
GPG key ID: 4FA1D3FA524F22C1
3 changed files with 26 additions and 1 deletions

View file

@ -47,6 +47,9 @@
tritonshell.url = "git+https://git.greenbaum.cloud/dev/tritonshell?ref=main&dir=template"; tritonshell.url = "git+https://git.greenbaum.cloud/dev/tritonshell?ref=main&dir=template";
tritonshell.inputs.nixpkgs.follows = "latest"; tritonshell.inputs.nixpkgs.follows = "latest";
nix-autobahn.url = "github:wucke13/nix-autobahn";
nix-autobahn.inputs.nixpkgs.follows = "latest";
}; };
outputs = outputs =
@ -61,6 +64,7 @@
, nvfetcher , nvfetcher
, deploy , deploy
, tritonshell , tritonshell
, nix-autobahn
, ... , ...
} @ inputs: } @ inputs:
digga.lib.mkFlake digga.lib.mkFlake

View file

@ -0,0 +1,18 @@
final: prev: {
yubikey-agent-master =
let
version = "unstable-2022-03-17";
src = prev.fetchFromGitHub {
owner = "FiloSottile";
repo = "yubikey-agent";
rev = "205a7ef2554625c7494038600d963123d6311873";
sha256 = "sha256-wJpN63KY5scmez6yYFsIr3JLEUB+YSl/XvoatIIeRI0=";
};
in
(prev.yubikey-agent.override rec {
buildGoModule = args: prev.buildGoModule.override { go = prev.go_1_17; } (args // {
inherit src version;
vendorSha256 = "sha256-SnjbkDPVjAnCbM2nLqBsuaPZwOmvDTKiUbi/93BlWVQ=";
});
});
}

View file

@ -4,6 +4,7 @@ let
psCfg = config.pub-solar; psCfg = config.pub-solar;
xdg = config.home-manager.users."${psCfg.user.name}".xdg; xdg = config.home-manager.users."${psCfg.user.name}".xdg;
tritonshell = inputs.tritonshell; tritonshell = inputs.tritonshell;
nix-autobahn = inputs.nix-autobahn;
in in
{ {
imports = [ imports = [
@ -39,6 +40,8 @@ in
vault vault
veracrypt veracrypt
waypoint waypoint
yubikey-agent-master
nix-autobahn.packages.${pkgs.system}.nix-autobahn
]; ];
@ -49,7 +52,7 @@ in
}; };
Service = { Service = {
ExecStart = "${pkgs.yubikey-agent}/bin/yubikey-agent -l %t/yubikey-agent/yubikey-agent.sock"; ExecStart = "${pkgs.yubikey-agent-master}/bin/yubikey-agent -l %t/yubikey-agent/yubikey-agent.sock";
ExecReload = "/bin/kill -HUP $MAINPID"; ExecReload = "/bin/kill -HUP $MAINPID";
IPAddressDeny = "any"; IPAddressDeny = "any";
RestrictAddressFamilies = "AF_UNIX"; RestrictAddressFamilies = "AF_UNIX";