nix-infra/system/sops.nix

36 lines
1.1 KiB
Nix
Executable file

{inputs, ...}: let
secretspath = builtins.toString inputs.nix-secrets;
in
{
imports = [
inputs.sops-nix.nixosModules.sops
];
sops = {
defaultSopsFile = "${secretspath}/secrets.yaml";
age = {
# I'd prefer different OpenSSH keys for different hosts so I'm not 100% screwed if one of my devices get compromised (SSH traffic potentially being decrypted and analyzed).
# Therefore, we set a custom path for the sops key & let the SSH key be generated automagically.
sshKeyPaths = ["/persist/var/lib/sops-nix/ssh_host_ed25519_key"];
keyFile = "/persist/var/lib/sops-nix/key.txt";
generateKey = false;
};
secrets = {
tera_password = {
neededForUsers = true;
};
reverse_proxy_client_privkey = {};
caddy_docker_env = {};
forgejo_db_docker_env = {};
forgejo_server_docker_env = {};
mcaptcha_db_docker_env = {};
mcaptcha_mcaptcha_docker_env = {};
passbolt_db_docker_env = {};
passbolt_passbolt_docker_env = {};
pterodactyl_db_docker_env = {};
pterodactyl_pterodactyl_docker_env = {};
};
};
}