Handle secrets using agenix

This commit is contained in:
coolneng 2021-08-09 01:10:51 +01:00
parent 88a7394651
commit f5b58f97ca
Signed by: coolneng
GPG Key ID: 9893DA236405AF57
6 changed files with 30 additions and 3 deletions

View File

@ -100,6 +100,12 @@
dates = "14:00";
};
# Specify secrets
age.secrets = {
soundcloud_api_key.file = secrets/soundcloud_api_key.age;
wireguard.file = secrets/wireguard.age;
};
# Import other configuration modules
imports = [
./modules/hardware-configuration.nix

View File

@ -64,7 +64,7 @@
[soundcloud]
enabled = true
auth_token = PLACEHOLDER
auth_token = ${config.age.secrets.soundcloud_api_key.path}
explore_songs = 100
[m3u]

View File

@ -19,7 +19,7 @@
networking.wg-quick.interfaces = {
home = {
address = [ "10.8.0.2/32" ];
privateKeyFile = "/home/coolneng/.wg/keys/privatekey";
privateKeyFile = config.age.secrets.wireguard.path;
dns = [ "10.8.0.1" ];
peers = [
# zion
@ -32,7 +32,7 @@
};
coace = {
address = [ "10.9.0.2/32" ];
privateKeyFile = "/home/coolneng/.wg/keys/privatekey";
privateKeyFile = config.age.secrets.wireguard.path;
peers = [
# unit
{

7
secrets/secrets.nix Normal file
View File

@ -0,0 +1,7 @@
let
coolneng =
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIC57m1j/G6iQyi2EpU3nj3+df5Z4PL/XbiOmDcqA7ODg";
in {
"soundcloud_api_key.age".publicKeys = [ coolneng ];
"wireguard.age".publicKeys = [ coolneng ];
}

View File

@ -0,0 +1,7 @@
age-encryption.org/v1
-> ssh-ed25519 G5UUhw tVGNxVkibTRSr8c2l7Wmo3pMhnyI6JHBZzddC93sv2E
0NOlI4vaBZz+Wg7LDji6CRrNsBPVhQ5rFyjPUe+ekg0
-> *NFvF-grease b1zp>
TIRHkh0
--- Y9Rt0ibteW6VSuzIGt4EenoFoOmRnvIUeFbJkqkL5m4
P隝}ォョ7ゥ}t逋vヒ酢T[c#ibカC<EFBDB6>i|カホオ?%%リシ」lッニDアワノアュ羊・Iェy,Z{」、 _

7
secrets/wireguard.age Normal file
View File

@ -0,0 +1,7 @@
age-encryption.org/v1
-> ssh-ed25519 G5UUhw ORYEDFD+GUYWiTOhOgjFNa/SQ7DGPIdDFXTUnYkjKUg
4oM7eE8cg15T8gbHBNOa/oB97SCaSANd7/7vM6+EbNc
-> ",?]B-grease #sF Zg_{'
P+bwL7YflfWA4f9LRIM
--- O+3vZIjCS6xIQwO/fwmdfeMcFqBCpQWTe9UltdlXx5o
9ߢÆ]?ÛÉw>“•¾Óͯ®8sn‰òæ"_üªŸÄ@4˜w÷c¬‡¯W¯øNžñ¶Øxšeª~ËOƒ±<C692>ŽPà!„~1ôú>