nix machine / user configurations

add secrets

Changed files
+13 -5
hosts
lib
+2
hosts/tkaronto/modules/secrets.nix
···
{
+
age.identityPaths = ["/etc/nixos/keys/ssh_key"];
+
age.secrets.nixGithubAccessToken.file = ../../../secrets/nixGithubAccessToken.age;
age.secrets.wgTkarontoKey.file = ../../../secrets/wgTkarontoKey.age;
}
+1
hosts/tkaronto/modules/wgWolumondeIp
···
+
23.88.101.188
+1
hosts/tkaronto/modules/wgWolumondeKey.pub
···
+
wua7uoPmmz0nXop3TKJOEUJ++LSmJdQxCRk9rNbPaAg=
+2 -2
hosts/tkaronto/modules/wireguard.nix
···
networking.wireguard.interfaces."wg0" = {
privateKeyFile = config.age.secrets.wgTkarontoKey.path;
peers = [{
-
publicKey = import ./wgWolumondeKey.pub;
+
publicKey = builtins.readFile ./wgWolumondeKey.pub;
allowedIPs = ["10.99.0.1/32"];
-
endpoint = "${import ./wgWolumondeIp}:51820";
+
endpoint = "${builtins.readFile ./wgWolumondeIp}:51820";
}];
};
}
+1 -1
hosts/wolumonde/modules/ssh.nix
···
passwordAuthentication = false;
};
users.users.root.openssh.authorizedKeys.keys = [
-
(builtins.readFile "${inputs.self}/secrets/ssh-key.pub")
+
(builtins.readFile "${inputs.self}/secrets/yusdacra.key.pub")
];
}
+1
hosts/wolumonde/modules/wgTkarontoKey.pub
···
+
IPz9tX4jsDOYcujU5B2KVuPaPVG2JaYA1FqLsZzky0Q=
+1 -1
hosts/wolumonde/modules/wireguard.nix
···
listenPort = 51820;
privateKeyFile = config.age.secrets.wgWolumondeKey.path;
peers = [{
-
publicKey = import ./wgTkarontoKey.pub;
+
publicKey = builtins.readFile ./wgTkarontoKey.pub;
allowedIPs = ["10.99.0.2/32"];
}];
};
+4 -1
lib/default.nix
···
importFolder = modules: let
b = builtins;
files = b.readDir modules;
+
fileNames = b.attrNames files;
filesToImport =
-
b.map (name: "${modules}/${name}") (b.attrNames files);
+
b.map
+
(name: "${modules}/${name}")
+
(b.filter (name: b.match ".*\.nix" name != null) fileNames);
in
filesToImport;