2024-06-15 18:29:36 -03:00
|
|
|
{
|
|
|
|
|
config,
|
|
|
|
|
inputs,
|
|
|
|
|
lib,
|
|
|
|
|
pkgs,
|
|
|
|
|
...
|
2025-09-13 11:29:15 -03:00
|
|
|
}:
|
|
|
|
|
with lib; {
|
2024-06-15 18:29:36 -03:00
|
|
|
imports = [
|
|
|
|
|
inputs.sops-nix.nixosModules.sops
|
|
|
|
|
];
|
|
|
|
|
|
2025-09-13 11:29:15 -03:00
|
|
|
environment.systemPackages = with pkgs; [
|
|
|
|
|
sops
|
|
|
|
|
];
|
2024-06-15 18:29:36 -03:00
|
|
|
|
2025-09-13 11:29:15 -03:00
|
|
|
sops.defaultSopsFile = ./secrets.yaml;
|
|
|
|
|
sops.defaultSopsFormat = "yaml";
|
2024-06-15 18:29:36 -03:00
|
|
|
|
2025-09-13 11:29:15 -03:00
|
|
|
sops.secrets = {
|
|
|
|
|
"cloudflared/tunnel-env" = {};
|
2025-04-01 10:07:35 -03:00
|
|
|
|
2025-09-17 22:26:17 -03:00
|
|
|
"forgejo/anubis/hexFile" = {
|
|
|
|
|
owner = config.services.anubis.instances."forgejo".user;
|
|
|
|
|
};
|
|
|
|
|
"forgejo/git-password" = mkIf config.services.forgejo.enable {
|
2024-06-15 18:29:36 -03:00
|
|
|
owner = config.services.forgejo.user;
|
|
|
|
|
};
|
2025-09-17 22:26:17 -03:00
|
|
|
"forgejo/s3/key" = mkIf config.services.forgejo.enable {
|
2024-06-15 18:29:36 -03:00
|
|
|
owner = config.services.forgejo.user;
|
|
|
|
|
};
|
2025-09-17 22:26:17 -03:00
|
|
|
"forgejo/s3/secret" = mkIf config.services.forgejo.enable {
|
2024-06-15 18:29:36 -03:00
|
|
|
owner = config.services.forgejo.user;
|
|
|
|
|
};
|
2025-09-25 14:53:50 -03:00
|
|
|
"forgejo/actions/token" = mkIf config.services.forgejo.enable {
|
2025-09-17 22:26:17 -03:00
|
|
|
owner = config.services.forgejo.user;
|
2025-04-05 17:22:44 -03:00
|
|
|
};
|
|
|
|
|
|
2025-09-16 16:16:35 -03:00
|
|
|
"garage/admin_key" = mkIf config.services.garage.enable {
|
|
|
|
|
owner = config.systemd.services.garage.serviceConfig.User;
|
|
|
|
|
};
|
|
|
|
|
"garage/admin_secret" = mkIf config.services.garage.enable {
|
|
|
|
|
owner = config.systemd.services.garage.serviceConfig.User;
|
|
|
|
|
};
|
|
|
|
|
"garage/admin_token" = mkIf config.services.garage.enable {
|
|
|
|
|
owner = config.systemd.services.garage.serviceConfig.User;
|
|
|
|
|
};
|
|
|
|
|
"garage/metrics_token" = mkIf config.services.garage.enable {
|
|
|
|
|
owner = config.systemd.services.garage.serviceConfig.User;
|
|
|
|
|
};
|
|
|
|
|
"garage/rpc_secret" = mkIf config.services.garage.enable {
|
|
|
|
|
owner = config.systemd.services.garage.serviceConfig.User;
|
|
|
|
|
};
|
|
|
|
|
|
2025-09-13 11:29:15 -03:00
|
|
|
"guz/password" = {
|
|
|
|
|
owner = config.users.users."guz".name;
|
2025-04-05 17:22:44 -03:00
|
|
|
};
|
2024-06-15 18:29:36 -03:00
|
|
|
|
2025-09-13 11:29:15 -03:00
|
|
|
"keiko/env-file" = {
|
|
|
|
|
owner = config.services.keikos.web.user;
|
|
|
|
|
};
|
2024-10-03 16:24:14 -03:00
|
|
|
|
2025-09-16 16:18:06 -03:00
|
|
|
"nextcloud/adminpass" = mkIf config.services.nextcloud.enable {
|
|
|
|
|
owner = "nextcloud";
|
|
|
|
|
};
|
|
|
|
|
"nextcloud/s3/secret" = mkIf config.services.nextcloud.enable {
|
|
|
|
|
owner = "nextcloud";
|
|
|
|
|
};
|
|
|
|
|
"nextcloud/s3/sseC" = mkIf config.services.nextcloud.enable {
|
|
|
|
|
owner = "nextcloud";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
"pgadmin/password" = mkIf config.services.pgadmin.enable {
|
|
|
|
|
owner = config.systemd.services.pgadmin.serviceConfig.User;
|
|
|
|
|
};
|
|
|
|
|
|
2025-09-13 11:29:15 -03:00
|
|
|
"medama/anubis/hexFile" = {
|
|
|
|
|
owner = config.services.anubis.instances."medama".user;
|
|
|
|
|
};
|
2024-06-15 18:29:36 -03:00
|
|
|
};
|
2025-09-13 11:29:15 -03:00
|
|
|
|
|
|
|
|
sops.age.keyFile = "/home/guz/.config/sops/age/keys.txt";
|
2024-06-15 18:29:36 -03:00
|
|
|
}
|