dotfiles/provision/secrets/secrets.nix

31 lines
1.4 KiB
Nix
Raw Normal View History

2024-07-21 11:52:02 -07:00
let
kestrel = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIM2iE16XVkriD0x6GhnqmvGDA1qNBibvHVIi5xY+c7Iu";
2024-07-21 12:47:13 -07:00
torus = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN71z5g6QyCn5Go0Wm+NOSF4f22xOOCvtIA3IM4KzSpG";
2024-07-22 16:48:26 -07:00
bulwark = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIG52QybtJrt0KU7iJGyiBBoDCcd0AXoy+wFi+9fBsopk";
2024-10-21 10:38:33 -07:00
osprey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINpYnahS9+WKJrM3ZpjZlMLL5V7iwJJqZml337VuG7Jq";
systems = [ kestrel torus bulwark osprey ];
2024-07-21 11:52:02 -07:00
in
{
2024-10-21 10:38:33 -07:00
"git/github_personal.age".publicKeys = systems;
"git/gitea-runner-1.age".publicKeys = systems;
2024-10-21 10:38:33 -07:00
"wireguard/kestrel.age".publicKeys = systems;
2024-07-21 13:07:07 -07:00
"wireguard/torus.age".publicKeys = systems;
"wireguard/bulwark.age".publicKeys = systems;
2024-10-21 10:38:33 -07:00
"wireguard/osprey.age".publicKeys = systems;
"ssh/kestrel/id_ed25519.age".publicKeys = systems;
"ssh/kestrel/id_ed25519.pub.age".publicKeys = systems;
"ssh/torus/id_ed25519.age".publicKeys = systems;
"ssh/torus/id_ed25519.pub.age".publicKeys = systems;
"borg/torus/password.age".publicKeys = systems;
"borg/rsync/id_rsa.age".publicKeys = systems;
"borg/rsync/id_rsa.pub.age".publicKeys = systems;
"nextcloud/password.age".publicKeys = systems;
"syncthing/kestrel/key.pem.age".publicKeys = systems;
"syncthing/kestrel/cert.pem.age".publicKeys = systems;
"syncthing/bulwark/key.pem.age".publicKeys = systems;
"syncthing/bulwark/cert.pem.age".publicKeys = systems;
2024-11-01 22:07:00 -07:00
"syncthing/torus/key.pem.age".publicKeys = systems;
"syncthing/torus/cert.pem.age".publicKeys = systems;
2024-07-21 11:52:02 -07:00
}
2024-07-22 16:48:26 -07:00