nix-config/secrets.nix

35 lines
1.9 KiB
Nix

let
lkk-nix-1 =
"ssh-rsa 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";
systems = [ lkk-nix-1 ];
lkk-admin =
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDh8J7t25qJ5ibc1qmf5WOTWMSqbMQnCbAgdnTzCIJto6ybyRUqoKTr4Os1d1wf4SxzERApzqkBA9fKN2hsAoCi72agXZSpSgHNWZMH+qYXxiYQjNV1ueuCISCjFdDSeu8jQV8UMyEOfi1yNN0g3YXnt7KOnfcv5mdi7jZXmI6CpaHoVZo1xyozBFQj9AM7jP0J5RMXL5mxMfluULBjuR2rxa/74HHbxfxrireGgeW94nnyT0WD9vPxvLuiAufarCrwwh1kLS4COu9QshcVnu1tKH9vXJFIS0r6+vHf/Swo/gRf/AaHUNktFIi9rso+MGGFXozdoHligea6vxYU/3sV";
users = [ lkk-admin ];
in {
"secrets/mj-smtp-user.age".publicKeys = users ++ systems;
"secrets/mj-smtp-pass.age".publicKeys = users ++ systems;
"secrets/n8n-env.age".publicKeys = users ++ systems;
"secrets/godaddy-api-key.age".publicKeys = users ++ systems;
"secrets/godaddy-api-secret.age".publicKeys = users ++ systems;
"secrets/tailscale-key.age".publicKeys = users ++ systems;
"secrets/briefkasten-env.age".publicKeys = users ++ systems;
"secrets/littlelink-lanakk-env.age".publicKeys = users ++ systems;
"secrets/littlelink-m3tam3re-env.age".publicKeys = users ++ systems;
"secrets/traefik-env.age".publicKeys = users ++ systems;
"secrets/metabase-env.age".publicKeys = users ++ systems;
"secrets/ordercollector-env.age".publicKeys = users ++ systems;
"secrets/baserow-env.age".publicKeys = users ++ systems;
"secrets/pgadmin.age".publicKeys = users ++ systems;
"secrets/vaultwarden-env.age".publicKeys = users ++ systems;
}