nix-config/secrets/secrets.nix
smayzy 0a43a381cc
All checks were successful
nixos config pipeline / show-flake (push) Successful in 32s
nixos config pipeline / deploy (push) Successful in 43s
add auth to traefik and mv it to server1
2025-09-22 22:04:52 +02:00

53 lines
1.6 KiB
Nix

let
nix-config-dev = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEPRiK+vZw/G4d0fzkHzPSx+UJdiDdMyxW+ygCPLRxz2";
smayzy_desktop1 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKebxL3JGy2UgPX4NjDvHjRz1ri6yyReAOURET+ULKz5";
smayzy_laptop1 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIB1AK9eYCMHAz1HE0/UmFeAmFNn6EJsVwiKsvzeHipuI";
smayzy_server1 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK0rBzdu8mwX26ZH7+bxHQsYqLZ/uCcBRP05OJlhzfZF";
users = [
smayzy_desktop1
smayzy_laptop1
smayzy_server1
];
desktop1 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIM627oXXyR+0SlVNcRhyw2/8c3X4y+cl3XSU/BUumxzi";
laptop1 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ6tnupPyqe4Ihc3D4S8ZSPCX4k1M/AEQ0gmy61O4CTb";
server1 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKnu2elHgXTUPOTPjjyARNswMvxnrCkjdbUjD3thFo3l";
desktops = [ desktop1 ];
laptops = [ laptop1 ];
servers = [ server1 ];
systems = desktops ++ laptops ++ servers;
mkKey = key: {
publicKeys =
if builtins.isList key then
key ++ [ nix-config-dev ]
else
[
key
nix-config-dev
];
armor = true;
};
in
{
"smayzy_desktop1.age" = mkKey smayzy_desktop1;
"smayzy_laptop1.age" = mkKey smayzy_laptop1;
"smayzy_server1.age" = mkKey smayzy_server1;
"users.age" = mkKey users;
"desktop1.age" = mkKey desktop1;
"laptop1.age" = mkKey laptop1;
"server1.age" = mkKey server1;
"desktops.age" = mkKey desktops;
"laptops.age" = mkKey laptops;
"servers.age" = mkKey servers;
"systems.age" = mkKey systems;
"traefik-cf-tk.age" = mkKey server1;
"traefik-dashboard-auth.age" = mkKey server1;
}