nixos/hosts/modules/server/sops.nix
2024-06-19 22:44:55 +02:00

49 lines
1.2 KiB
Nix

{ inputs, ... }: {
imports = [ inputs.sops-nix.nixosModules.sops ];
sops = {
age.keyFile = "/home/hadi/.config/sops/age/keys.txt";
defaultSopsFile = "../../../secrets/server.yaml";
defaultSopsFormat = "yaml";
secrets = {
sshconfig = {
path = "/home/hadi/.ssh/config";
owner = "hadi";
};
github-key = {
path = "/home/hadi/.ssh/github";
owner = "hadi";
};
cloudflare-apitoken = {
path = "/home/hadi/test.txt";
owner = "hadi";
};
};
};
}
# sops = {
# age.keyFile = "/home/hadi/.config/sops/age/keys.txt";
# defaultSopsFile = ../../../secrets/server.yaml;
# secrets = {
# sshconfig = { path = "/home/hadi/.ssh/config"; };
# github-key = { path = "/home/hadi/.ssh/github"; };
# nextcloud-adminpass = {
# path = "/etc/nextcloud/adminpassFile";
# owner = "nextcloud";
# group = "nextcloud";
# };
# cloudflare-apitoken = {
# path = "/etc/cloudflare/apiToken";
# owner = "cloudflare-dyndns";
# group = "cloudflare-dyndns";
# };
# tailscaled-authKey = {
# path = "/etc/tailscale/authKey";
# owner = "tailscaled";
# group = "tailscaled";
# };
# };
# };