Files
spacestation/secrets.nix

84 lines
2.3 KiB
Nix
Raw Normal View History

{
config,
inputs,
lib,
pkgs,
...
2025-09-13 11:29:15 -03:00
}:
with lib; {
imports = [
inputs.sops-nix.nixosModules.sops
];
2025-09-13 11:29:15 -03:00
environment.systemPackages = with pkgs; [
sops
];
2025-09-13 11:29:15 -03:00
sops.defaultSopsFile = ./secrets.yaml;
sops.defaultSopsFormat = "yaml";
2025-09-13 11:29:15 -03:00
sops.secrets = {
"cloudflared/tunnel-env" = {};
2025-04-01 10:07:35 -03:00
2025-09-13 11:29:15 -03:00
"forgejo/user1/name" = mkIf config.services.forgejo.enable {
owner = config.services.forgejo.user;
};
2025-09-13 11:29:15 -03:00
"forgejo/user1/password" = mkIf config.services.forgejo.enable {
owner = config.services.forgejo.user;
};
2025-09-13 11:29:15 -03:00
"forgejo/user1/email" = mkIf config.services.forgejo.enable {
owner = config.services.forgejo.user;
};
2025-09-13 11:29:15 -03:00
"forgejo/git-password" = mkIf config.services.forgejo.enable {
owner = config.services.forgejo.user;
};
2025-09-13 11:29:15 -03:00
"forgejo/anubis/hexFile" = {
2025-04-05 17:22:44 -03:00
owner = config.services.anubis.instances."forgejo".user;
};
"garage/admin_key" = mkIf config.services.garage.enable {
owner = config.systemd.services.garage.serviceConfig.User;
};
"garage/admin_secret" = mkIf config.services.garage.enable {
owner = config.systemd.services.garage.serviceConfig.User;
};
"garage/admin_token" = mkIf config.services.garage.enable {
owner = config.systemd.services.garage.serviceConfig.User;
};
"garage/metrics_token" = mkIf config.services.garage.enable {
owner = config.systemd.services.garage.serviceConfig.User;
};
"garage/rpc_secret" = mkIf config.services.garage.enable {
owner = config.systemd.services.garage.serviceConfig.User;
};
2025-09-13 11:29:15 -03:00
"guz/password" = {
owner = config.users.users."guz".name;
2025-04-05 17:22:44 -03:00
};
2025-09-13 11:29:15 -03:00
"keiko/env-file" = {
owner = config.services.keikos.web.user;
};
2025-09-16 16:18:06 -03:00
"nextcloud/adminpass" = mkIf config.services.nextcloud.enable {
owner = "nextcloud";
};
"nextcloud/s3/secret" = mkIf config.services.nextcloud.enable {
owner = "nextcloud";
};
"nextcloud/s3/sseC" = mkIf config.services.nextcloud.enable {
owner = "nextcloud";
};
"pgadmin/password" = mkIf config.services.pgadmin.enable {
owner = config.systemd.services.pgadmin.serviceConfig.User;
};
2025-09-13 11:29:15 -03:00
"medama/anubis/hexFile" = {
owner = config.services.anubis.instances."medama".user;
};
};
2025-09-13 11:29:15 -03:00
sops.age.keyFile = "/home/guz/.config/sops/age/keys.txt";
}