2019-10-24 02:20:38 +02:00
|
|
|
# References:
|
|
|
|
# * https://github.com/drduh/YubiKey-Guide
|
|
|
|
# * https://nixos.wiki/wiki/Yubikey
|
2021-09-25 15:17:07 +02:00
|
|
|
{ config, pkgs, ... }: {
|
2020-01-15 09:29:01 +01:00
|
|
|
|
2019-10-24 02:20:38 +02:00
|
|
|
services.pcscd.enable = true;
|
|
|
|
services.udev.packages = [
|
|
|
|
|
|
|
|
pkgs.yubikey-personalization
|
|
|
|
|
|
|
|
# additional services, but I just want gpg
|
|
|
|
# pkgs.libu2f-host
|
|
|
|
|
|
|
|
];
|
|
|
|
|
|
|
|
environment.systemPackages = [
|
|
|
|
|
|
|
|
# for `gpg --export $keyid | hokey lint` to check keys
|
2019-10-26 13:46:37 +02:00
|
|
|
#pkgs.haskellPackages.hopenpgp-tools
|
2019-10-24 02:20:38 +02:00
|
|
|
|
|
|
|
# for otp keys (but I use pass otp)
|
|
|
|
# pkgs.yubioath-desktop
|
|
|
|
|
|
|
|
(pkgs.writers.writeDashBin "gpg-reset-yubikey-id" ''
|
|
|
|
echo "reset gpg to make new key available"
|
|
|
|
set -x
|
|
|
|
set -e
|
|
|
|
${pkgs.psmisc}/bin/killall gpg-agent
|
|
|
|
rm -r ~/.gnupg/private-keys-v1.d/
|
2023-10-20 08:01:09 +02:00
|
|
|
${pkgs.gnupg}/bin/gpg --card-status
|
2019-10-24 02:20:38 +02:00
|
|
|
echo "now the new key should work"
|
|
|
|
'')
|
|
|
|
|
|
|
|
];
|
|
|
|
|
2023-12-14 08:21:39 +01:00
|
|
|
## managed by home-manager now
|
|
|
|
#environment.shellInit = ''
|
|
|
|
# export GPG_TTY="$(tty)"
|
|
|
|
# gpg-connect-agent /bye
|
|
|
|
# export SSH_AUTH_SOCK="/run/user/$UID/gnupg/S.gpg-agent.ssh"
|
|
|
|
#'';
|
|
|
|
#programs = {
|
|
|
|
# ssh.startAgent = false;
|
|
|
|
# gnupg.agent = {
|
|
|
|
# enable = true;
|
|
|
|
# enableSSHSupport = true;
|
|
|
|
# };
|
|
|
|
#};
|
|
|
|
|
|
|
|
## managed by home-manager now
|
|
|
|
#security.pam.u2f.enable = true;
|
|
|
|
#security.pam.u2f.authFile = toString config.sops.secrets.yubikey_u2fAuthFile.path;
|
|
|
|
#sops.secrets.yubikey_u2fAuthFile = { };
|
2021-09-25 15:17:07 +02:00
|
|
|
|
2019-10-24 02:20:38 +02:00
|
|
|
}
|