os/secrets/secrets.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

58 lines
3.6 KiB
Nix
Raw Normal View History

let
# set ssh public keys here for your system and user
2022-08-21 20:53:41 +00:00
user_hensoko_nitrokey_1 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII/58A18EtxnLYHu63c/+AyTSkJQSso/VVdHUFGp1CTk cardno:FFFE34353135";
user_hensoko_harrison = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEbaQdxp7Flz6ttELe63rn+Nt9g43qJOLih6VCMP4gPb hensoko@harrison";
2023-02-25 13:45:21 +00:00
user_hensoko_norman = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAqkqMYgncrnczcW/0PY+Z+FmNXXpgw6D9JWTTwiainy hensoko@hensoko-tp-work";
2022-08-21 20:53:41 +00:00
2023-01-28 21:30:37 +00:00
system_giggles = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILwogNjatRZlft4qUFDFKg73kiYB1HNZZ0xGUwfyfTzP root@nixos";
system_cox = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMINORCNhrxSdo2z70GkKrV8vcge2elgNPYzdRve+hI5 root@nixos";
system_companion = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJu4u9Q36B8acRdBJi2RYU5pYpIMeCh+HKmtInR+IKQs root@nixos";
2022-08-21 20:53:41 +00:00
2023-04-01 13:47:37 +00:00
system_cube = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOSUke0r8PV35PWJ3BsGwFPtc2kWk2xbupbbdnJDc50x root@nixos";
2023-02-25 13:45:21 +00:00
system_chonk = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICt8I4z42DXGL3d6eju3WzSEnJMeaWPn3y+f/82oYBzy root@nixos";
2022-08-21 20:53:41 +00:00
system_ringo = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE5g8CfSiMxboEJT2U92JoYdnv0nsArBPW/vfTEsUWZO root@nixos";
2022-08-21 22:53:04 +00:00
system_harrison = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMGsY9APkK11hlcqKXER+iqaJZ/x5HNacQ8FXfLe2SA4 root@nixos";
system_norman = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDFePAtdXP/4J0UdChfRC78Tj/yBZaUNTNnbwXe9HJx6 root@nixos";
system_surfplace = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOAmim1CFeTPPDz/34sDYhF773NquhbqIS6v4mWM4qSd root@nixos";
2023-02-25 13:45:21 +00:00
users = [user_hensoko_nitrokey_1 user_hensoko_harrison user_hensoko_norman];
systems_email_accounts = [system_harrison system_norman system_surfplace];
systems_home_controller = [system_giggles system_cox system_companion system_cube system_ringo];
2022-08-21 20:53:41 +00:00
allKeys = users ++ systems_home_controller;
2023-02-25 13:45:21 +00:00
in {
2022-09-06 12:44:24 +00:00
"email_gssws_password.age".publicKeys = users ++ systems_email_accounts;
2023-02-25 13:45:21 +00:00
"home_controller_giggles_wireguard_key.age".publicKeys = users ++ [system_giggles];
"home_controller_cox_wireguard_key.age".publicKeys = users ++ [system_cox];
"home_controller_companion_wireguard_key.age".publicKeys = users ++ [system_companion];
"cox_backup_restic_htpasswd.age".publicKeys = users ++ [system_cox];
"home_controller_cube_wireguard_key.age".publicKeys = users ++ [system_cube];
"cube_nextcloud_admin_pass.age".publicKeys = users ++ [system_cube];
"cube_nextcloud_db_pass.age".publicKeys = users ++ [system_cube];
"cube_restic_ssh_private_key.age".publicKeys = users ++ [system_cube];
"cube_restic_repository_password.age".publicKeys = users ++ [system_cube];
"cube_drone_exec_runner_config.age".publicKeys = users ++ [system_cube];
"cube_invoiceplane_db_password.age".publicKeys = users ++ [system_cube];
"cube_restic_nextcloud_password.age".publicKeys = users ++ [system_cube];
"chonk_wireguard_key.age".publicKeys = users ++ [system_chonk];
"chonk_nextcloud_admin_pass.age".publicKeys = users ++ [system_chonk];
"chonk_nextcloud_db_pass.age".publicKeys = users ++ [system_chonk];
"chonk_restic_ssh_private_key.age".publicKeys = users ++ [system_chonk];
"chonk_restic_repository_password.age".publicKeys = users ++ [system_chonk];
"chonk_drone_exec_runner_config.age".publicKeys = users ++ [system_chonk];
"chonk_invoiceplane_db_password.age".publicKeys = users ++ [system_chonk];
"chonk_restic_nextcloud_password.age".publicKeys = users ++ [system_chonk];
"chonk_nix_builder_private_key.age".publicKeys = users ++ [system_chonk];
"chonk_invidious_db_password.age".publicKeys = users ++ [system_chonk];
"home_controller_ringo_wireguard_key.age".publicKeys = users ++ [system_ringo];
2022-08-21 20:53:41 +00:00
"home_controller_k3s_server_token.age".publicKeys = users ++ systems_home_controller;
}