nixlab/secrets/secrets.nix
2025-06-18 21:41:53 +01:00

21 lines
1 KiB
Nix

# Used by the agenix cli and our module to generate all of the secret entries into the agenix module (see ./default.nix)
let
# host-key.pub
amy = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDTbclOyOwIAPgVE/v5lIuf0P+Tq/Qkw3+GFa4YuRaCC amy@nixon";
users = [ amy ];
# /etc/ssh/ssh_host_ed25519_key.pub on each host
nixos = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILMAy1iKOrL2yBCWljLnuwo29G5plDblI41jJ4Woy1el root@nixos";
nix01 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBQfwok81BymeM9zW8D/LPZxRX6HGLkeTi1hS7GjPoZF root@nix01";
nix02 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGFJBDr16y8BAhtLfbc2WYJLwtgrxEyrpJx0zJpHPn/Z root@nix02";
systems = [ nixos nix01 nix02 ];
in
{
"atticd.env.age".publicKeys = users ++ systems;
"blog.dbpass.age".publicKeys = users ++ systems;
"pgadmin.password.age".publicKeys = users ++ systems;
"sharkey.dbpass.age".publicKeys = users ++ systems;
"sharkey.redispass.age".publicKeys = users ++ systems;
"authentik.env.age".publicKeys = users ++ systems;
"forgejo.dbpass.age".publicKeys = users ++ systems;
}