mirror of
https://github.com/adrlau/nix-dotfiles.git
synced 2024-12-23 03:07:30 +01:00
32 lines
1.1 KiB
Nix
32 lines
1.1 KiB
Nix
{ config, pkgs, ... }:
|
|
{
|
|
environment.systemPackages = [
|
|
pkgs.ssh-to-age
|
|
pkgs.sops
|
|
];
|
|
|
|
imports = [ "${builtins.fetchTarball "https://github.com/Mic92/sops-nix/archive/master.tar.gz"}/modules/sops" ];
|
|
|
|
# This will add secrets.yml to the nix store
|
|
# You can avoid this by adding a string to the full path instead, i.e.
|
|
# sops.defaultSopsFile = "/root/.sops/secrets/example.yaml";
|
|
sops.defaultSopsFile = "/etc/nixos/nix-dotfiles/secrets/secrets.yaml";
|
|
sops.validateSopsFiles = false;
|
|
# This will automatically import SSH keys as age keys
|
|
sops.age.sshKeyPaths = [
|
|
"/etc/ssh/nixos"
|
|
#"/$HOME/.ssh/nixos"
|
|
#"/home/gunalx/.ssh/nixos"
|
|
];
|
|
# This is using an age key that is expected to already be in the filesystem
|
|
sops.age.keyFile = "/var/lib/sops-nix/key.txt";
|
|
# This will generate a new key if the key specified above does not exist
|
|
sops.age.generateKey = true;
|
|
|
|
# This is the actual specification of the secrets.
|
|
#sops.secrets."myservice/my_subdir/my_secret" = {};
|
|
sops.secrets."acme/certs" = { };
|
|
sops.secrets."nginx/defaultpass" = { };
|
|
|
|
}
|