1
0
Fork 0
dotfiles/secrets.nix

133 lines
5.1 KiB
Nix
Raw Normal View History

2023-02-05 16:51:04 +00:00
let
user-daniel = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA1UfCIu7jUe64iQmp2UUyAgqZ3IYdMOo/Me6hRTnKoG";
system-tanker = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILpnogLd3Ttmz/At0dXveaG1xF37vV7lz34ojDTIuCOi";
2023-04-13 14:45:01 +00:00
system-mediaserver = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDlB0cL5CtTOyARWSE2yUsNU4JHUPmr71710mZHzsmbX";
2023-06-07 18:40:27 +00:00
system-argon = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPP9ygczyi6g8abvj1I0eAj7N2Rli9UMlkC8VT6SnWLU";
system-neon = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA5Ht4KaRUvuGFmYLznTkVSnn6isjrcVplz1kKWkrnRQ";
2023-02-05 16:51:04 +00:00
tanker = [ user-daniel system-tanker ];
2023-04-13 14:45:01 +00:00
mediaserver = [ user-daniel system-mediaserver ];
2023-06-07 18:40:27 +00:00
argon = [ user-daniel system-argon ];
neon = [ user-daniel system-neon ];
all-systems = [ user-daniel system-tanker system-mediaserver system-argon system-neon ];
2023-02-05 16:51:04 +00:00
in
{
2023-09-24 16:10:08 +00:00
# all
"agenix/hosts/all/nix/netrc.age".publicKeys = all-systems;
# tanker
"agenix/hosts/tanker/user/danielPassword.age".publicKeys = tanker;
2023-03-05 22:02:49 +00:00
"agenix/hosts/tanker/acme/credentials.age".publicKeys = tanker;
2023-04-04 13:05:39 +00:00
"agenix/hosts/tanker/tailscale/authkey.age".publicKeys = tanker;
2023-02-05 19:32:19 +00:00
2023-06-23 18:08:22 +00:00
"agenix/hosts/tanker/msmtp/password.age".publicKeys = tanker;
"agenix/hosts/tanker/atticd/environment.age".publicKeys = tanker;
"agenix/hosts/tanker/fedifetcher/config.age".publicKeys = tanker;
2023-03-25 13:08:09 +00:00
2023-09-12 22:00:21 +00:00
"agenix/hosts/tanker/forgejo-actions/token.age".publicKeys = tanker;
"agenix/hosts/tanker/headscale/dbPassword.age".publicKeys = tanker;
"agenix/hosts/tanker/headscale/acls.age".publicKeys = tanker;
2023-09-12 22:00:21 +00:00
"agenix/hosts/tanker/mastodon/databasePassword.age".publicKeys = tanker;
"agenix/hosts/tanker/mastodon/smtpPassword.age".publicKeys = tanker;
"agenix/hosts/tanker/mastodon/otpSecret.age".publicKeys = tanker;
"agenix/hosts/tanker/mastodon/secretKeyBase.age".publicKeys = tanker;
"agenix/hosts/tanker/mastodon/vapidPrivateKey.age".publicKeys = tanker;
"agenix/hosts/tanker/mastodon/vapidPublicKey.age".publicKeys = tanker;
"agenix/hosts/tanker/mastodon/extraConfig.age".publicKeys = tanker;
2023-03-17 20:58:31 +00:00
"agenix/hosts/tanker/miniflux/credentials.age".publicKeys = tanker;
2023-02-27 16:51:39 +00:00
"agenix/hosts/tanker/mosquitto/passwordWeewxProxy.age".publicKeys = tanker;
"agenix/hosts/tanker/mosquitto/passwordWeewx.age".publicKeys = tanker;
2023-02-13 18:44:04 +00:00
"agenix/hosts/tanker/anonymous-overflow/config.age".publicKeys = tanker;
2023-03-05 18:22:15 +00:00
"agenix/hosts/tanker/invidious/databasePassword.age".publicKeys = tanker;
"agenix/hosts/tanker/invidious/extraSettings.age".publicKeys = tanker;
2023-02-28 13:55:57 +00:00
2023-06-25 10:05:52 +00:00
"agenix/hosts/tanker/linkding/environment.age".publicKeys = tanker;
"agenix/hosts/tanker/proxitok/environment.age".publicKeys = tanker;
2023-04-04 12:35:49 +00:00
"agenix/hosts/tanker/synapse/extraConfig.age".publicKeys = tanker;
2023-07-24 10:27:16 +00:00
"agenix/hosts/tanker/synapse/slidingSyncConfig.age".publicKeys = tanker;
2023-04-04 13:05:39 +00:00
"agenix/hosts/tanker/mautrix-signal/config.age".publicKeys = tanker;
2023-04-04 20:05:11 +00:00
"agenix/hosts/tanker/mautrix-whatsapp/config.age".publicKeys = tanker;
"agenix/hosts/tanker/weewx/config.age".publicKeys = tanker;
"agenix/hosts/tanker/weewx/skin.age".publicKeys = tanker;
2023-04-13 14:45:01 +00:00
# mediaserver
"agenix/hosts/mediaserver/user/danielPassword.age".publicKeys = mediaserver;
2023-04-13 16:16:44 +00:00
"agenix/hosts/mediaserver/smb/havenCredentials.age".publicKeys = mediaserver;
2023-04-14 13:20:51 +00:00
"agenix/hosts/mediaserver/acme/credentials.age".publicKeys = mediaserver;
2023-04-13 16:16:44 +00:00
"agenix/hosts/mediaserver/tailscale/authkey.age".publicKeys = mediaserver;
2023-04-13 18:56:25 +00:00
2023-04-13 20:46:32 +00:00
"agenix/hosts/mediaserver/wireguard/config.age".publicKeys = mediaserver;
2023-04-20 13:02:34 +00:00
2024-07-27 21:49:54 +00:00
"agenix/hosts/mediaserver/controld/config.age".publicKeys = mediaserver;
2023-04-20 13:02:34 +00:00
"agenix/hosts/mediaserver/tubearchivist/environmentTA.age".publicKeys = mediaserver;
"agenix/hosts/mediaserver/tubearchivist/environmentES.age".publicKeys = mediaserver;
2023-04-26 11:53:36 +00:00
"agenix/hosts/mediaserver/aria2/config.age".publicKeys = mediaserver;
2023-05-21 21:14:53 +00:00
2023-10-08 10:49:01 +00:00
"agenix/hosts/mediaserver/recyclarr/config.age".publicKeys = mediaserver;
2023-05-21 21:14:53 +00:00
"agenix/hosts/mediaserver/unpackerr/config.age".publicKeys = mediaserver;
2023-06-07 18:40:27 +00:00
# argon
"agenix/hosts/argon/user/danielPassword.age".publicKeys = argon;
"agenix/hosts/argon/acme/credentials.age".publicKeys = argon;
2024-06-12 07:59:24 +00:00
"agenix/hosts/argon/cfdyndns/apiToken.age".publicKeys = argon;
2024-07-27 21:49:54 +00:00
"agenix/hosts/argon/controld/config.age".publicKeys = argon;
"agenix/hosts/argon/forgejo-actions/token.age".publicKeys = argon;
2024-08-09 18:24:24 +00:00
"agenix/hosts/argon/mosquitto/passwordWeewxProxy.age".publicKeys = argon;
"agenix/hosts/argon/mosquitto/passwordHomeAssistant.age".publicKeys = argon;
2023-06-07 18:40:27 +00:00
"agenix/hosts/argon/tailscale/authkey.age".publicKeys = argon;
2023-06-10 18:48:07 +00:00
"agenix/hosts/argon/adguardhome-sync/environment.age".publicKeys = argon;
2024-09-06 08:54:21 +00:00
"agenix/hosts/argon/ups/primaryPassword.age".publicKeys = argon;
2023-06-07 18:40:27 +00:00
"agenix/hosts/argon/weewx-proxy/environment.age".publicKeys = argon;
2023-06-14 19:55:35 +00:00
# neon
"agenix/hosts/neon/user/danielPassword.age".publicKeys = neon;
2023-06-14 19:55:35 +00:00
2024-03-21 20:23:04 +00:00
"agenix/hosts/neon/tailscale/authkey.age".publicKeys = neon;
2024-07-27 10:53:55 +00:00
"agenix/hosts/neon/controld/config.age".publicKeys = neon;
"agenix/hosts/neon/forgejo-actions/token.age".publicKeys = neon;
"agenix/hosts/neon/mosquitto/passwordWeewxProxy.age".publicKeys = neon;
2024-08-09 18:24:24 +00:00
"agenix/hosts/neon/mosquitto/passwordHomeAssistant.age".publicKeys = neon;
2024-07-14 14:02:19 +00:00
"agenix/hosts/neon/deye-mqtt/config.age".publicKeys = neon;
# Styx
"agenix/hosts/Styx/git/maintenance.age".publicKeys = [ user-daniel ];
2023-02-05 16:51:04 +00:00
}