My Nix Configuration

[marvin.secrets] update paths

+2
modules/nixos/default-config/secrets/secrets.nix
···
yubi-back = "ssh-rsa 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";
yubi-main = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBBsOIMMZVmleClXfqUMrnmyh8PFuyiJqHKEZ51Xy746";
backup = "ssh-rsa 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";
+
marvin = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP60B1IOdfJRrDcCKajMV8YJNC01gSsccZi3DKHlS6YJ";
servers = [
prefect
thought
+
marvin
];
personal = [
yubi-back
systems/x86_64-linux/marvin/secrets/authentik-env.age systems/x86_64-linux/marvin/services/secrets/authentik-env.age
systems/x86_64-linux/marvin/secrets/buildbot-gitea-token.age systems/x86_64-linux/marvin/services/secrets/buildbot-gitea-token.age
systems/x86_64-linux/marvin/secrets/buildbot-oauth-secret.age systems/x86_64-linux/marvin/services/secrets/buildbot-oauth-secret.age
systems/x86_64-linux/marvin/secrets/buildbot-worker-password.age systems/x86_64-linux/marvin/services/secrets/buildbot-worker-password.age
systems/x86_64-linux/marvin/secrets/buildbot-workers.age systems/x86_64-linux/marvin/services/secrets/buildbot-workers.age
systems/x86_64-linux/marvin/secrets/forgejo-db-pw.age systems/x86_64-linux/marvin/services/secrets/forgejo-db-pw.age
systems/x86_64-linux/marvin/secrets/forgejo-default-runner-token.age systems/x86_64-linux/marvin/services/secrets/forgejo-default-runner-token.age
systems/x86_64-linux/marvin/secrets/forgejo-gitgay-runner-token.age systems/x86_64-linux/marvin/services/secrets/forgejo-gitgay-runner-token.age
systems/x86_64-linux/marvin/secrets/forgejo-internal-token.age systems/x86_64-linux/marvin/services/secrets/forgejo-internal-token.age
systems/x86_64-linux/marvin/secrets/forgejo-lfs-jwt-secret.age systems/x86_64-linux/marvin/services/secrets/forgejo-lfs-jwt-secret.age
systems/x86_64-linux/marvin/secrets/forgejo-mail-pw.age systems/x86_64-linux/marvin/services/secrets/forgejo-mail-pw.age
systems/x86_64-linux/marvin/secrets/forgejo-oauth2-jwt-secret.age systems/x86_64-linux/marvin/services/secrets/forgejo-oauth2-jwt-secret.age
systems/x86_64-linux/marvin/secrets/forgejo-secret-key.age systems/x86_64-linux/marvin/services/secrets/forgejo-secret-key.age
systems/x86_64-linux/marvin/secrets/grafana-admin-password.age systems/x86_64-linux/marvin/services/secrets/grafana-admin-password.age
systems/x86_64-linux/marvin/secrets/grafana-smtp-password.age systems/x86_64-linux/marvin/services/secrets/grafana-smtp-password.age
systems/x86_64-linux/marvin/secrets/iceshrimp-db-password.age systems/x86_64-linux/marvin/services/secrets/iceshrimp-db-password.age
systems/x86_64-linux/marvin/secrets/iceshrimp-secret-config.age systems/x86_64-linux/marvin/services/secrets/iceshrimp-secret-config.age
systems/x86_64-linux/marvin/secrets/minio-root.age systems/x86_64-linux/marvin/services/secrets/minio-root.age
systems/x86_64-linux/marvin/secrets/nextcloud-admin-pw.age systems/x86_64-linux/marvin/services/nextcloud/nextcloud-admin-pw.age
systems/x86_64-linux/marvin/secrets/nix-serve-priv.age systems/x86_64-linux/marvin/services/secrets/nix-serve-priv.age
systems/x86_64-linux/marvin/secrets/planka-env.age systems/x86_64-linux/marvin/services/secrets/planka-env.age
-40
systems/x86_64-linux/marvin/secrets/secrets.nix
···
-
let
-
ssh-new = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxOg9nOtfbedq9AlnXNVUfyU8Mwfj4IB7HX/4VoWeXP";
-
yubi-back = "ssh-rsa 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";
-
# yubi-main = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBBsOIMMZVmleClXfqUMrnmyh8PFuyiJqHKEZ51Xy746";
-
# backup = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCyTiGctsHaTUlRJn2XQ/745dD0UWGWO8W0en8J5rf7BLI8lL/hPUmbNt45vC5754LXcBjnp1t/1FNgiGhvNZIWJpC+elBmhyMhg8z1exRZPD+as7XaH7scnij2vSbSphQFUqH433ggAGe77x5bc7wKFp9n7vj8G1u0JJxMEe1M7kNFY0+ShNtaHna3LxiQOVcW7qVlNKZP8Ol1V7kZLblRADCJMTYOXDIbktA8bbGRfGhbNjJGkL665qz36haYwb2i6A4sC7Y583N8ro8hIDG/ByJqwbl/Sz4rSxkT6G4+OdBvS6sa7TovNXHjmQCculMIltdog7UhgyBsim1sTzxAen3YyFRi1Cz/kLM0oH39m/W4IoMvJcNZCJ3ItLgy+lEVMd87jVOqfuq/hyjHVI0wJtU2Si2HTxv7aKL8gPzqXwbNH+nhkhlQ0ZH8zKVBunOgLDgsmGIky5X/T3bpWZpIoFkOR7AYrId/5dOeGM3pHhHb6woZ3SRubZ43Ah/VdJM=";
-
marvin = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP60B1IOdfJRrDcCKajMV8YJNC01gSsccZi3DKHlS6YJ";
-
# me = [yubi-main yubi-back backup ssh-new];
-
default = [
-
marvin
-
yubi-back
-
ssh-new
-
];
-
in
-
{
-
"authentik-env.age".publicKeys = default;
-
"buildbot-worker-password.age".publicKeys = default;
-
"buildbot-gitea-token.age".publicKeys = default;
-
"buildbot-oauth-secret.age".publicKeys = default;
-
"buildbot-workers.age".publicKeys = default;
-
"forgejo-db-pw.age".publicKeys = default;
-
"forgejo-mail-pw.age".publicKeys = default;
-
"forgejo-default-runner-token.age".publicKeys = default;
-
"forgejo-gitgay-runner-token.age".publicKeys = default;
-
"forgejo-internal-token.age".publicKeys = default;
-
"forgejo-lfs-jwt-secret.age".publicKeys = default;
-
"forgejo-oauth2-jwt-secret.age".publicKeys = default;
-
"forgejo-secret-key.age".publicKeys = default;
-
"golink-authkey.age".publicKeys = default;
-
"grafana-admin-password.age".publicKeys = default;
-
"grafana-smtp-password.age".publicKeys = default;
-
"iceshrimp-secret-config.age".publicKeys = default;
-
"iceshrimp-db-password.age".publicKeys = default;
-
"minio-root.age".publicKeys = default;
-
"nextcloud-admin-pw.age".publicKeys = default;
-
"nix-serve-priv.age".publicKeys = default;
-
"planka-env.age".publicKeys = default;
-
"vaultwarden-vars.age".publicKeys = default;
-
"vaultwarden-pgpass.age".publicKeys = default;
-
"webmentiond-env.age".publicKeys = default;
-
}
systems/x86_64-linux/marvin/secrets/thehedgehog-key.age systems/x86_64-linux/marvin/services/secrets/thehedgehog-key.age
systems/x86_64-linux/marvin/secrets/thehedgehog-pem.age systems/x86_64-linux/marvin/services/secrets/thehedgehog-pem.age
systems/x86_64-linux/marvin/secrets/vaultwarden-pgpass.age systems/x86_64-linux/marvin/services/secrets/vaultwarden-pgpass.age
systems/x86_64-linux/marvin/secrets/vaultwarden-vars.age systems/x86_64-linux/marvin/services/secrets/vaultwarden-vars.age
systems/x86_64-linux/marvin/secrets/webmentiond-env.age systems/x86_64-linux/marvin/services/secrets/webmentiond-env.age
+1 -1
systems/x86_64-linux/marvin/services/authentik.nix
···
};
};
age.secrets.authentik-env = {
-
file = ../secrets/authentik-env.age;
+
file = ./secrets/authentik-env.age;
owner = "thehedgehog";
group = "misc";
};
+3 -3
systems/x86_64-linux/marvin/services/buildbot.nix
···
};
age.secrets = {
buildbot-gitea-token = bbSecret // {
-
file = ../secrets/buildbot-gitea-token.age;
+
file = ./secrets/buildbot-gitea-token.age;
};
buildbot-oauth-secret = bbSecret // {
-
file = ../secrets/buildbot-oauth-secret.age;
+
file = ./secrets/buildbot-oauth-secret.age;
};
buildbot-workers = bbSecret // {
-
file = ../secrets/buildbot-workers.age;
+
file = ./secrets/buildbot-workers.age;
};
};
}
+8 -8
systems/x86_64-linux/marvin/services/git.nix
···
};
age.secrets = {
forgejo-db-pw = forgejoSecret // {
-
file = ../secrets/forgejo-db-pw.age;
+
file = ./secrets/forgejo-db-pw.age;
};
forgejo-mail-pw = forgejoSecret // {
-
file = ../secrets/forgejo-mail-pw.age;
+
file = ./secrets/forgejo-mail-pw.age;
};
forgejo-default-runner-token = forgejoSecret // {
-
file = ../secrets/forgejo-default-runner-token.age;
+
file = ./secrets/forgejo-default-runner-token.age;
};
forgejo-gitgay-runner-token = forgejoSecret // {
-
file = ../secrets/forgejo-gitgay-runner-token.age;
+
file = ./secrets/forgejo-gitgay-runner-token.age;
};
forgejo-internal-token = forgejoSecret // {
-
file = ../secrets/forgejo-internal-token.age;
+
file = ./secrets/forgejo-internal-token.age;
};
forgejo-oauth2-jwt-secret = forgejoSecret // {
-
file = ../secrets/forgejo-oauth2-jwt-secret.age;
+
file = ./secrets/forgejo-oauth2-jwt-secret.age;
};
forgejo-lfs-jwt-secret = forgejoSecret // {
-
file = ../secrets/forgejo-lfs-jwt-secret.age;
+
file = ./secrets/forgejo-lfs-jwt-secret.age;
};
forgejo-secret-key = forgejoSecret // {
-
file = ../secrets/forgejo-secret-key.age;
+
file = ./secrets/forgejo-secret-key.age;
};
};
}
+1 -1
systems/x86_64-linux/marvin/services/golink.nix
···
tailscaleAuthKeyFile = /run/agenix/golink-authkey;
};
age.secrets.golink-authkey = {
-
file = ../secrets/golink-authkey.age;
+
file = ./secrets/golink-authkey.age;
path = "/run/agenix/golink-authkey";
owner = "golink";
group = "golink";
+2 -2
systems/x86_64-linux/marvin/services/grafana.nix
···
};
age.secrets = {
grafana-admin = {
-
file = ../secrets/grafana-admin-password.age;
+
file = ./secrets/grafana-admin-password.age;
owner = "grafana";
group = "grafana";
};
grafana-smtp-password = {
-
file = ../secrets/grafana-smtp-password.age;
+
file = ./secrets/grafana-smtp-password.age;
owner = "grafana";
group = "grafana";
};
+2 -2
systems/x86_64-linux/marvin/services/iceshrimp.nix
···
age.secrets = {
iceshrimp-secret-config = {
inherit (config.services.iceshrimp) group;
-
file = ../secrets/iceshrimp-secret-config.age;
+
file = ./secrets/iceshrimp-secret-config.age;
owner = config.services.iceshrimp.user;
};
iceshrimp-db-password = {
-
file = ../secrets/iceshrimp-db-password.age;
+
file = ./secrets/iceshrimp-db-password.age;
owner = "postgres";
group = "postgres";
};
+1 -1
systems/x86_64-linux/marvin/services/nextcloud/default.nix
···
nginx.recommendedHttpHeaders = true;
};
age.secrets.nextcloud-admin-pw = {
-
file = ../../secrets/nextcloud-admin-pw.age;
+
file = ./nextcloud-admin-pw.age;
owner = "nextcloud";
group = "nextcloud";
};
+1 -1
systems/x86_64-linux/marvin/services/planka.nix
···
};
};
age.secrets.planka-env = {
-
file = ../secrets/planka-env.age;
+
file = ./secrets/planka-env.age;
owner = "thehedgehog";
group = "misc";
};
+37
systems/x86_64-linux/marvin/services/secrets/secrets.nix
···
+
let
+
ssh-new = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxOg9nOtfbedq9AlnXNVUfyU8Mwfj4IB7HX/4VoWeXP";
+
yubi-back = "ssh-rsa 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";
+
marvin = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP60B1IOdfJRrDcCKajMV8YJNC01gSsccZi3DKHlS6YJ";
+
marvinDefault = [
+
marvin
+
yubi-back
+
ssh-new
+
];
+
in
+
{
+
"authentik-env.age".publicKeys = marvinDefault;
+
"buildbot-worker-password.age".publicKeys = marvinDefault;
+
"buildbot-gitea-token.age".publicKeys = marvinDefault;
+
"buildbot-oauth-secret.age".publicKeys = marvinDefault;
+
"buildbot-workers.age".publicKeys = marvinDefault;
+
"forgejo-db-pw.age".publicKeys = marvinDefault;
+
"forgejo-mail-pw.age".publicKeys = marvinDefault;
+
"forgejo-default-runner-token.age".publicKeys = marvinDefault;
+
"forgejo-gitgay-runner-token.age".publicKeys = marvinDefault;
+
"forgejo-internal-token.age".publicKeys = marvinDefault;
+
"forgejo-lfs-jwt-secret.age".publicKeys = marvinDefault;
+
"forgejo-oauth2-jwt-secret.age".publicKeys = marvinDefault;
+
"forgejo-secret-key.age".publicKeys = marvinDefault;
+
"golink-authkey.age".publicKeys = marvinDefault;
+
"grafana-admin-password.age".publicKeys = marvinDefault;
+
"grafana-smtp-password.age".publicKeys = marvinDefault;
+
"iceshrimp-secret-config.age".publicKeys = marvinDefault;
+
"iceshrimp-db-password.age".publicKeys = marvinDefault;
+
"minio-root.age".publicKeys = marvinDefault;
+
"../nextcloud/nextcloud-admin-pw.age".publicKeys = marvinDefault;
+
"nix-serve-priv.age".publicKeys = marvinDefault;
+
"planka-env.age".publicKeys = marvinDefault;
+
"vaultwarden-vars.age".publicKeys = marvinDefault;
+
"vaultwarden-pgpass.age".publicKeys = marvinDefault;
+
"webmentiond-env.age".publicKeys = marvinDefault;
+
}
+2 -2
systems/x86_64-linux/marvin/services/vaultwarden.nix
···
systemd.services.vaultwarden.environment.PGPASSFILE = config.age.secrets.vaultwarden-pgpass.path;
environment.systemPackages = with pkgs; [ vaultwarden-vault ];
age.secrets.vaultwarden-vars = vaultwardenSecret // {
-
file = ../secrets/vaultwarden-vars.age;
+
file = ./secrets/vaultwarden-vars.age;
};
age.secrets.vaultwarden-pgpass = vaultwardenSecret // {
-
file = ../secrets/vaultwarden-pgpass.age;
+
file = ./secrets/vaultwarden-pgpass.age;
};
}
+1 -1
systems/x86_64-linux/marvin/services/webmentiond.nix
···
];
};
config.age.secrets = {
-
webmentiond-env.path = ../secrets/webmentiond-env.age;
+
webmentiond-env.path = ./secrets/webmentiond-env.age;
owner = "thehedgehog";
group = "misc";
};