62 lines
1.4 KiB
Nix
62 lines
1.4 KiB
Nix
let
|
|
config = (import ../config/_globals.nix { }).globals;
|
|
users = config.master.public_ssh_keys;
|
|
|
|
keys = import ../config/_keys.nix;
|
|
common = builtins.attrValues (keys);
|
|
in
|
|
{
|
|
# TODO: Probably there would be a way to guess the default service key from the secret prefix
|
|
"auth-authentik-ldap-secrets.age".publicKeys = users ++ [
|
|
keys.auth
|
|
];
|
|
"auth-authentik-proxy-secrets.age".publicKeys = users ++ [
|
|
keys.auth
|
|
];
|
|
"auth-authentik-secrets.age".publicKeys = users ++ [
|
|
keys.auth
|
|
];
|
|
"db-postgres-initscript.age".publicKeys = users ++ [
|
|
keys.db
|
|
];
|
|
"finances-app-key.age" = {
|
|
publicKeys = users ++ [
|
|
keys.finances
|
|
];
|
|
extra = {
|
|
owner = "firefly-iii";
|
|
group = "nginx";
|
|
};
|
|
};
|
|
"matrix-maubot-cfg.age".publicKeys = users ++ [
|
|
keys.matrix
|
|
];
|
|
"metrics-pve.age".publicKeys = users ++ [
|
|
keys.metrics
|
|
];
|
|
"mqtt-exporter-environment.age".publicKeys = users ++ [
|
|
keys.mqtt
|
|
];
|
|
"mqtt-password-mqtt.age".publicKeys = users ++ [
|
|
keys.mqtt
|
|
];
|
|
"mqtt-password-frigate.age".publicKeys = users ++ [
|
|
keys.mqtt
|
|
];
|
|
"mqtt-password-ha.age".publicKeys = users ++ [
|
|
keys.mqtt
|
|
];
|
|
"mqtt-password-z2m.age".publicKeys = users ++ [
|
|
keys.mqtt
|
|
];
|
|
"power-password-file.age".publicKeys = users ++ [
|
|
keys.power
|
|
];
|
|
"proxy-dns-provider-config.age".publicKeys = users ++ [
|
|
keys.proxy
|
|
];
|
|
"yarrr-env.age".publicKeys = users ++ [
|
|
keys.yarrr
|
|
];
|
|
}
|