mirror of
https://github.com/ItsDrike/nixdots
synced 2025-06-29 07:20:43 +00:00
Add secure-boot
This commit is contained in:
parent
fa6f2b49db
commit
cb968bdc07
12 changed files with 459 additions and 1 deletions
|
@ -4,6 +4,7 @@ in
|
|||
{
|
||||
imports = [
|
||||
./impermanence.nix
|
||||
./secure-boot.nix
|
||||
];
|
||||
|
||||
options.myOptions.system = {
|
||||
|
|
23
options/system/secure-boot.nix
Normal file
23
options/system/secure-boot.nix
Normal file
|
@ -0,0 +1,23 @@
|
|||
{ lib, ... }: with lib; let
|
||||
inherit (lib) mkEnableOption;
|
||||
in
|
||||
{
|
||||
options.myOptions.system.secure-boot = {
|
||||
enabled = mkEnableOption ''
|
||||
secure-boot using lanzaboote.
|
||||
|
||||
Note that you will need to have UEFI firmware, and the rebuild
|
||||
will report errors until you generate the secure boot keys with:
|
||||
```shell
|
||||
sudo sbctl create-keys
|
||||
````
|
||||
|
||||
Optionally (though enabling this is pointless otherwise), you should
|
||||
now enter secure-boot setup mode and enroll the keys:
|
||||
```shell
|
||||
sudo sbctl enroll-keys -m
|
||||
```
|
||||
Then reboot, and secure-boot should be enabled.
|
||||
'';
|
||||
};
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue