mirror of
https://github.com/starr-dusT/dotfiles.git
synced 2025-02-19 19:27:31 -08:00
move secrets out of modules into relevant config files
This commit is contained in:
parent
6ee5593da6
commit
9be3ce3f96
@ -46,7 +46,6 @@
|
|||||||
nipr.enable = true;
|
nipr.enable = true;
|
||||||
ssh.enable = true;
|
ssh.enable = true;
|
||||||
terminal.enable = true;
|
terminal.enable = true;
|
||||||
secrets.enable = true;
|
|
||||||
wireguard-client.enable = false;
|
wireguard-client.enable = false;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
{ config, pkgs, user, lib, ... }:
|
{ config, pkgs, user, lib, inputs, ... }:
|
||||||
{
|
{
|
||||||
nix = {
|
nix = {
|
||||||
package = pkgs.nixFlakes;
|
package = pkgs.nixFlakes;
|
||||||
@ -46,6 +46,7 @@
|
|||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
cowsay # A program which generates ASCII pictures of a cow with a message
|
cowsay # A program which generates ASCII pictures of a cow with a message
|
||||||
|
inputs.agenix.packages.x86_64-linux.default
|
||||||
];
|
];
|
||||||
|
|
||||||
# Did you read the comment?
|
# Did you read the comment?
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
{ ... }:
|
{ ... }:
|
||||||
{
|
{
|
||||||
imports = [ ./backup.nix ./configuration.nix ./home-configuration.nix ];
|
imports = [ ./git.nix ./backup.nix ./configuration.nix ./home-configuration.nix ];
|
||||||
}
|
}
|
||||||
|
15
provision/hosts/default/git.nix
Normal file
15
provision/hosts/default/git.nix
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{ config, pkgs, user, lib, ... }:
|
||||||
|
{
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
git # Version control system for tracking changes in source code during software development.
|
||||||
|
git-annex # Manages files with git, without checking the file contents into git.
|
||||||
|
lazygit # Terminal-based GUI for git, making it easier to use and visualize git repositories.
|
||||||
|
];
|
||||||
|
|
||||||
|
age.secrets."git/github_personal" = {
|
||||||
|
file = ../../secrets/git/github_personal.age;
|
||||||
|
owner = "${user}";
|
||||||
|
group = "users";
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
@ -1,9 +1,33 @@
|
|||||||
{ config, pkgs, user, lib, ... }:
|
{ config, pkgs, user, lib, ... }:
|
||||||
{
|
{
|
||||||
|
age.secrets."ssh/torus/id_ed25519.pub" = {
|
||||||
|
file = ../../secrets/ssh/torus/id_ed25519.pub.age;
|
||||||
|
owner = "${user}";
|
||||||
|
group = "users";
|
||||||
|
};
|
||||||
|
age.secrets."ssh/kestrel/id_ed25519" = {
|
||||||
|
file = ../../secrets/ssh/kestrel/id_ed25519.age;
|
||||||
|
owner = "${user}";
|
||||||
|
group = "users";
|
||||||
|
};
|
||||||
|
age.secrets."ssh/kestrel/id_ed25519.pub" = {
|
||||||
|
file = ../../secrets/ssh/kestrel/id_ed25519.pub.age;
|
||||||
|
owner = "${user}";
|
||||||
|
group = "users";
|
||||||
|
};
|
||||||
|
|
||||||
# Password-less logins for backup
|
# Password-less logins for backup
|
||||||
users.users."${user}".openssh.authorizedKeys.keyFiles = [
|
users.users."${user}".openssh.authorizedKeys.keyFiles = [
|
||||||
config.age.secrets."ssh/torus/id_ed25519.pub".path
|
config.age.secrets."ssh/torus/id_ed25519.pub".path
|
||||||
];
|
];
|
||||||
|
|
||||||
|
# Password-less login for root
|
||||||
|
programs.ssh.extraConfig = ''
|
||||||
|
Host torus
|
||||||
|
AddKeysToAgent yes
|
||||||
|
IdentityFile /run/agenix/ssh/kestrel/id_ed25519
|
||||||
|
'';
|
||||||
|
|
||||||
systemd.tmpfiles.rules = [
|
systemd.tmpfiles.rules = [
|
||||||
"d /store 0775 ${user} users -"
|
"d /store 0775 ${user} users -"
|
||||||
];
|
];
|
||||||
|
@ -61,7 +61,6 @@
|
|||||||
};
|
};
|
||||||
system = {
|
system = {
|
||||||
nipr.enable = true;
|
nipr.enable = true;
|
||||||
secrets.enable = true;
|
|
||||||
ssh.enable = true;
|
ssh.enable = true;
|
||||||
terminal.enable = true;
|
terminal.enable = true;
|
||||||
wireguard-client = {
|
wireguard-client = {
|
||||||
|
@ -49,7 +49,6 @@
|
|||||||
};
|
};
|
||||||
system = {
|
system = {
|
||||||
nipr = true;
|
nipr = true;
|
||||||
secrets.enable = true;
|
|
||||||
ssh.enable = true;
|
ssh.enable = true;
|
||||||
terminal.enable = true;
|
terminal.enable = true;
|
||||||
wireguard-client.enable = false;
|
wireguard-client.enable = false;
|
||||||
|
@ -1,8 +1,31 @@
|
|||||||
{ config, pkgs, user, lib, ... }:
|
{ config, pkgs, user, lib, ... }:
|
||||||
{
|
{
|
||||||
# Password-less logins for backup
|
age.secrets."ssh/kestrel/id_ed25519.pub" = {
|
||||||
|
file = ../../secrets/ssh/kestrel/id_ed25519.pub.age;
|
||||||
|
owner = "${user}";
|
||||||
|
group = "users";
|
||||||
|
};
|
||||||
|
age.secrets."ssh/torus/id_ed25519" = {
|
||||||
|
file = ../../secrets/ssh/torus/id_ed25519.age;
|
||||||
|
owner = "${user}";
|
||||||
|
group = "users";
|
||||||
|
};
|
||||||
|
age.secrets."ssh/torus/id_ed25519.pub" = {
|
||||||
|
file = ../../secrets/ssh/torus/id_ed25519.pub.age;
|
||||||
|
owner = "${user}";
|
||||||
|
group = "users";
|
||||||
|
};
|
||||||
|
|
||||||
|
# Password-less login for user
|
||||||
users.users."${user}".openssh.authorizedKeys.keyFiles = [
|
users.users."${user}".openssh.authorizedKeys.keyFiles = [
|
||||||
config.age.secrets."ssh/kestrel/id_ed25519.pub".path
|
config.age.secrets."ssh/kestrel/id_ed25519.pub".path
|
||||||
];
|
];
|
||||||
|
|
||||||
|
# Password-less login for root
|
||||||
|
programs.ssh.extraConfig = ''
|
||||||
|
Host kestrel
|
||||||
|
AddKeysToAgent yes
|
||||||
|
IdentityFile /run/agenix/ssh/torus/id_ed25519
|
||||||
|
'';
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -102,7 +102,6 @@
|
|||||||
system = {
|
system = {
|
||||||
terminal.enable = true;
|
terminal.enable = true;
|
||||||
ssh.enable = true;
|
ssh.enable = true;
|
||||||
secrets.enable = true;
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -21,5 +21,16 @@ in {
|
|||||||
];
|
];
|
||||||
})
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
|
age.secrets."emu/switch/prod.keys" = {
|
||||||
|
file = ../../secrets/emu/switch/prod.keys.age;
|
||||||
|
owner = "${user}";
|
||||||
|
group = "users";
|
||||||
|
};
|
||||||
|
age.secrets."emu/switch/title.keys" = {
|
||||||
|
file = ../../secrets/emu/switch/title.keys.age;
|
||||||
|
owner = "${user}";
|
||||||
|
group = "users";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
{ ... }:
|
{ ... }:
|
||||||
{
|
{
|
||||||
imports = [ ./nipr.nix ./secrets.nix ./ssh.nix ./terminal.nix ./wireguard-client.nix ];
|
imports = [ ./nipr.nix ./ssh.nix ./terminal.nix ./wireguard-client.nix ];
|
||||||
}
|
}
|
||||||
|
@ -1,53 +0,0 @@
|
|||||||
{ config, lib, pkgs, user, inputs, ... }:
|
|
||||||
|
|
||||||
let cfg = config.modules.system.secrets;
|
|
||||||
in {
|
|
||||||
options.modules.system.secrets.enable = lib.mkEnableOption "secrets";
|
|
||||||
config = lib.mkIf cfg.enable {
|
|
||||||
|
|
||||||
environment.systemPackages = [
|
|
||||||
inputs.agenix.packages.x86_64-linux.default
|
|
||||||
];
|
|
||||||
|
|
||||||
# git secrets
|
|
||||||
age.secrets."git/github_personal" = {
|
|
||||||
file = ../../secrets/git/github_personal.age;
|
|
||||||
owner = "${user}";
|
|
||||||
group = "users";
|
|
||||||
};
|
|
||||||
|
|
||||||
# ssh secrets
|
|
||||||
age.secrets."ssh/kestrel/id_ed25519" = {
|
|
||||||
file = ../../secrets/ssh/kestrel/id_ed25519.age;
|
|
||||||
owner = "${user}";
|
|
||||||
group = "users";
|
|
||||||
};
|
|
||||||
age.secrets."ssh/kestrel/id_ed25519.pub" = {
|
|
||||||
file = ../../secrets/ssh/kestrel/id_ed25519.pub.age;
|
|
||||||
owner = "${user}";
|
|
||||||
group = "users";
|
|
||||||
};
|
|
||||||
age.secrets."ssh/torus/id_ed25519" = {
|
|
||||||
file = ../../secrets/ssh/torus/id_ed25519.age;
|
|
||||||
owner = "${user}";
|
|
||||||
group = "users";
|
|
||||||
};
|
|
||||||
age.secrets."ssh/torus/id_ed25519.pub" = {
|
|
||||||
file = ../../secrets/ssh/torus/id_ed25519.pub.age;
|
|
||||||
owner = "${user}";
|
|
||||||
group = "users";
|
|
||||||
};
|
|
||||||
|
|
||||||
# emu secrets
|
|
||||||
age.secrets."emu/switch/prod.keys" = {
|
|
||||||
file = ../../secrets/emu/switch/prod.keys.age;
|
|
||||||
owner = "${user}";
|
|
||||||
group = "users";
|
|
||||||
};
|
|
||||||
age.secrets."emu/switch/title.keys" = {
|
|
||||||
file = ../../secrets/emu/switch/title.keys.age;
|
|
||||||
owner = "${user}";
|
|
||||||
group = "users";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
@ -6,9 +6,6 @@ in {
|
|||||||
config = lib.mkIf cfg.enable {
|
config = lib.mkIf cfg.enable {
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
git # Version control system for tracking changes in source code during software development.
|
|
||||||
git-annex # Manages files with git, without checking the file contents into git.
|
|
||||||
lazygit # Terminal-based GUI for git, making it easier to use and visualize git repositories.
|
|
||||||
killall # Command-line utility to terminate processes by name.
|
killall # Command-line utility to terminate processes by name.
|
||||||
pciutils # Utilities for inspecting and manipulating devices connected to the PCI bus.
|
pciutils # Utilities for inspecting and manipulating devices connected to the PCI bus.
|
||||||
chezmoi # Manages your dotfiles across multiple machines, ensuring consistency and version control.
|
chezmoi # Manages your dotfiles across multiple machines, ensuring consistency and version control.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user