2023-11-19 22:55:56 -08:00
|
|
|
{ config, lib, pkgs, user, ... }:
|
|
|
|
|
|
|
|
let cfg = config.modules.system.secrets;
|
|
|
|
in {
|
|
|
|
options.modules.system.secrets.enable = lib.mkEnableOption "secrets";
|
|
|
|
config = lib.mkIf cfg.enable {
|
|
|
|
|
|
|
|
sops = {
|
|
|
|
defaultSopsFile = ../../secrets/secrets.yaml;
|
|
|
|
defaultSopsFormat = "yaml";
|
|
|
|
age.keyFile = "/home/${user}/.config/sops/age/keys.txt";
|
|
|
|
|
2024-01-14 23:21:03 -08:00
|
|
|
# Keys
|
|
|
|
secrets."keys/github_personal" = { owner = "${user}"; };
|
|
|
|
|
2024-05-21 21:53:08 -07:00
|
|
|
# Nextcloud password
|
|
|
|
secrets."nextcloud/password" = { owner = "nextcloud"; };
|
|
|
|
|
2023-11-19 23:25:08 -08:00
|
|
|
# Wireguard secrets
|
|
|
|
secrets."wireguard/kestrel" = { owner = "${user}"; };
|
|
|
|
secrets."wireguard/bulwark" = { owner = "${user}"; };
|
|
|
|
secrets."wireguard/adjudicator" = { owner = "${user}"; };
|
2023-11-19 23:43:26 -08:00
|
|
|
secrets."wireguard/torus" = { owner = "${user}"; };
|
2023-11-19 22:55:56 -08:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|