{inputs, ...}: let secretspath = builtins.toString inputs.nix-secrets; in { imports = [ inputs.sops-nix.nixosModules.sops ]; sops = { defaultSopsFile = "${secretspath}/secrets.yaml"; age = { # I'd prefer different OpenSSH keys for different hosts so I'm not 100% screwed if one of my devices get compromised (SSH traffic potentially being decrypted and analyzed). # Therefore, we set a custom path for the sops key & let the SSH key be generated automagically. sshKeyPaths = ["/persist/var/lib/sops-nix/ssh_host_ed25519_key"]; keyFile = "/persist/var/lib/sops-nix/key.txt"; generateKey = false; }; secrets = { tera_password = { neededForUsers = true; }; reverse_proxy_client_privkey = {}; caddy_docker_env = {}; forgejo_db_docker_env = {}; forgejo_server_docker_env = {}; mcaptcha_db_docker_env = {}; mcaptcha_mcaptcha_docker_env = {}; passbolt_db_docker_env = {}; passbolt_passbolt_docker_env = {}; pterodactyl_db_docker_env = {}; pterodactyl_pterodactyl_docker_env = {}; }; }; }