nix-config/secrets/secrets.nix
2023-01-22 14:36:16 +01:00

27 lines
1.5 KiB
Nix

let
dadada = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN+bBJptw2H35vMPV7Mfj9oaepR7cHCQH8ZsvL8qnj+r dadada (nix-config-secrets) <dadada@dadada.li>";
systems = {
agares = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPcbuLtU9/VhFy5VAp/ZI0T+gr7kExG73hmjjvno10gP root@nixos";
gorgon = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDCcwG8BkqjZJ1bPdFbLYfXeBgaI10+gyVs1r1aNJ49H root@gorgon";
ifrit = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEYO4L5EvKRtVUB6YHtHN7R980fwH9kKVt0V3kj6rORS root@nixos";
pruflas = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBqZHu5ygTODgrNzcU9C2O+b8yCfVsnztV83qxXV4aA8 root@pruflas";
surgat = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOOJ9UgAle5sX0pAawfRztckVwaQm2U8o0Bawv7cZfXE root@surgat";
};
backupSecrets = hostName: {
"${hostName}-backup-passphrase.age".publicKeys = [ systems.${hostName} dadada ];
"${hostName}-backup-ssh-key.age".publicKeys = [ systems.${hostName} dadada ];
};
in
{
"pruflas-wg0-key.age".publicKeys = [ systems.pruflas dadada ];
"pruflas-wg0-preshared-key.age".publicKeys = [ systems.pruflas dadada ];
"pruflas-wg-hydra-key.age".publicKeys = [ systems.pruflas dadada ];
"hydra-github-authorization.age".publicKeys = [ systems.pruflas dadada ];
"miniflux-admin-credentials.age".publicKeys = [ systems.surgat dadada ];
"gorgon-backup-gs-passphrase.age".publicKeys = [ systems.gorgon dadada ];
} //
backupSecrets "gorgon" //
backupSecrets "ifrit" //
backupSecrets "pruflas" //
backupSecrets "surgat" //
backupSecrets "agares"