-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathsops.mod.nix
73 lines (64 loc) · 1.9 KB
/
sops.mod.nix
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
{sops-nix, ...}: {
universal.modules = [
sops-nix.nixosModules.sops
{
sops.defaultSopsFile = ./secrets.yaml;
sops.defaultSopsFormat = "yaml";
# sync ~/.ssh/sops out-of-band
# ssh-to-age -private-key -i ~/.ssh/sops > ~/.config/sops/age/keys.txt
sops.age.keyFile = "/home/sodiboo/.config/sops/age/keys.txt";
sops.secrets.access-token-prelude.mode = "0444";
}
({config, ...}: {
sops.secrets.wireguard-private-key = {
key = "wireguard-private-keys/${config.networking.hostName}";
};
sops.secrets.wgautomesh-gossip-secret = {};
sops.secrets.remote-build-ssh-id = {};
})
];
oxygen.modules = [
({
lib,
config,
...
}:
lib.mkIf config.services.sharkey.enable {
users.groups.sharkey-db-password = {};
users.users.sharkey.extraGroups = [config.users.groups.sharkey-db-password.name];
users.users.postgres.extraGroups = [config.users.groups.sharkey-db-password.name];
sops.secrets.sharkey-db-password = {
mode = "0440";
group = config.users.groups.sharkey-db-password.name;
};
sops.secrets.sharkey-redis-password.owner = config.users.users.sharkey.name;
sops.secrets.meili-master-key-env = {};
})
({
lib,
config,
...
}:
lib.mkIf config.services.writefreely.enable {
sops.secrets.writefreely-db-password.owner = config.users.users.writefreely.name;
})
];
iridium.modules = [
({config, ...}: {
sops.secrets.binary-cache-secret = {};
})
];
personal.modules = [
({config, ...}: {
sops.secrets."spotify/username".owner = config.users.users.sodiboo.name;
sops.secrets."spotify/password".owner = config.users.users.sodiboo.name;
})
];
universal.home_modules = [
({pkgs, ...}: {
home.packages = with pkgs; [
sops
];
})
];
}