nixos-config/modules/secrets/secrets.nix

39 lines
1.8 KiB
Nix
Raw Normal View History

2022-01-17 21:56:41 +01:00
let
alarsyo = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIH3rrF3VSWI4n4cpguvlmLAaU3uftuX4AVV/39S/8GO9 alarsyo@thinkpad";
2022-04-10 11:54:58 +02:00
users = [alarsyo];
2022-01-17 21:56:41 +01:00
boreal = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAagal1aqZh52wEmgsw7fkCzO41o4Cx+nV4wJGZuX1RP root@boreal";
2022-06-10 16:56:15 +02:00
hades = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMxw8CtKUPAiPdKDEnuS7UyRrZN5BkUwsy5UPVF8V+lt root@hades";
2022-01-17 21:56:41 +01:00
poseidon = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKYhZYMbWQG9TSQ2qze8GgFo2XrZzgu/GuSOGwenByJo root@poseidon";
zephyrus = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILU4JfIADH9MXUnVe+3ezYK9WXsqy/jJcm1zFkmL4aSU root@zephyrus";
2022-06-10 16:56:15 +02:00
machines = [boreal hades poseidon zephyrus];
2022-01-17 21:56:41 +01:00
all = users ++ machines;
2022-04-10 11:54:58 +02:00
in {
"gandi/api-key.age".publicKeys = [alarsyo hades poseidon];
2022-03-11 17:10:44 +01:00
"lohr/shared-secret.age".publicKeys = [alarsyo poseidon];
2022-03-11 17:26:54 +01:00
2022-06-12 20:17:08 +02:00
"matrix-synapse/secret-config.age".publicKeys = [alarsyo hades];
2022-03-11 17:42:16 +01:00
"miniflux/admin-credentials.age".publicKeys = [alarsyo hades];
2022-03-11 18:47:53 +01:00
2022-10-27 12:25:33 +02:00
"nextcloud/admin-pass.age".publicKeys = [alarsyo hades];
2022-11-05 16:15:33 +01:00
"paperless/admin-password.age".publicKeys = [alarsyo hades];
"paperless/secret-key.age".publicKeys = [alarsyo hades];
2022-04-10 11:54:58 +02:00
"restic-backup/boreal-password.age".publicKeys = [alarsyo boreal];
"restic-backup/boreal-credentials.age".publicKeys = [alarsyo boreal];
2022-06-12 15:33:59 +02:00
"restic-backup/hades-password.age".publicKeys = [alarsyo hades];
"restic-backup/hades-credentials.age".publicKeys = [alarsyo hades];
2022-04-10 11:54:58 +02:00
"restic-backup/poseidon-password.age".publicKeys = [alarsyo poseidon];
"restic-backup/poseidon-credentials.age".publicKeys = [alarsyo poseidon];
"restic-backup/zephyrus-password.age".publicKeys = [alarsyo zephyrus];
"restic-backup/zephyrus-credentials.age".publicKeys = [alarsyo zephyrus];
"users/root-hashed-password.age".publicKeys = machines;
2022-04-10 11:54:58 +02:00
"users/alarsyo-hashed-password.age".publicKeys = machines ++ [alarsyo];
2022-01-17 21:56:41 +01:00
}