feat: replace impermanence with preservation (#198)

* feat: replace impermanence with preservation

* fix: This module cannot be used with scripted initrd.

* fix: permission for /var/lib/private

* chore: boot.initrd.systemd.enable

* docs: boot.initrd.luks.devices.<name>.fallbackToPassword is implied by systemd stage 1

* fix: typo
This commit is contained in:
Ryan Yin
2025-06-29 13:02:36 +08:00
committed by GitHub
parent 763167ce0d
commit 8690978d7e
15 changed files with 382 additions and 219 deletions

View File

@@ -34,7 +34,7 @@
{
modules.desktop.wayland.enable = true;
modules.secrets.desktop.enable = true;
modules.secrets.impermanence.enable = true;
modules.secrets.preservation.enable = true;
}
]
++ base-modules.nixos-modules;

View File

@@ -39,7 +39,7 @@
modules.desktop.fonts.enable = true;
modules.desktop.wayland.enable = true;
modules.secrets.desktop.enable = true;
modules.secrets.impermanence.enable = true;
modules.secrets.preservation.enable = true;
}
]
++ base-modules.nixos-modules;

View File

@@ -26,7 +26,7 @@
++ [
{
modules.secrets.server.kubernetes.enable = true;
modules.secrets.impermanence.enable = true;
modules.secrets.preservation.enable = true;
}
];
# home-modules = map mylib.relativeToRoot [

View File

@@ -26,7 +26,7 @@
++ [
{
modules.secrets.server.kubernetes.enable = true;
modules.secrets.impermanence.enable = true;
modules.secrets.preservation.enable = true;
}
];
};

View File

@@ -26,7 +26,7 @@
++ [
{
modules.secrets.server.kubernetes.enable = true;
modules.secrets.impermanence.enable = true;
modules.secrets.preservation.enable = true;
}
];
};