nix/hosts/marvin/services/secret-files.nix
2022-07-02 17:30:18 -04:00

116 lines
3 KiB
Nix

{
config.age.secrets = {
# Caddy Secrets
# thehedgehog-pem = {
# file = ../secrets/thehedgehog-pem.age;
# path = "/run/agenix/thehedgehog.me.pem";
# owner = "caddy";
# group = "caddy";
# };
# thehedgehog-key = {
# file = ../secrets/thehedgehog-key.age;
# path = "/run/agenix/thehedgehog.me.key";
# owner = "caddy";
# group = "caddy";
# };
# cloudflare-ca = {
# file = ../secrets/cloudflare-ca.age;
# path = "/run/agenix/cloudflare-ca.pem";
# owner = "caddy";
# group = "caddy";
# };
# step-root-ca-crt-caddy = {
# file = ../secrets/step-root-ca-crt.age;
# path = "/run/agenix/step-root-ca-crt-caddy";
# owner = "caddy";
# group = "caddy";
# };
# Cloudflared secrets
cloudflared-creds = {
file = ../secrets/cloudflared-creds.age;
path = "/run/cloudflared/cloudflared-creds.json";
owner = "cloudflared";
group = "cloudflared";
};
cloudflared-vars = {
file = ../secrets/cloudflared-vars.age;
path = "/run/agenix/cloudflared_vars";
owner = "cloudflared";
group = "cloudflared";
};
# Vaultwarden Secrets
vaultwarden-vars = {
file = ../secrets/vaultwarden-vars.age;
path = "/run/agenix/vaultwarden-vars";
owner = "vaultwarden";
group = "vaultwarden";
};
# Miniflux admin password
miniflux-admin = {
file = ../secrets/miniflux-admin.age;
path = "/run/agenix/miniflux-admin";
owner = "miniflux";
};
# Wireguard private key
external-wg-priv-key = {
file = ../secrets/external-wg-priv-key.age;
path = "/run/agenix/external-wg-priv-key";
};
# Cloudflare DynDNS secret
# cf-dyndns-token = {
# file = ../secrets/cf-dyndns-token.age;
# path = "/run/agenix/cf-dyndns-token";
# };
# Step CA secrets
step-password = {
file = ../secrets/step-password.age;
path = "/run/agenix/step-password";
owner = "step-ca";
group = "step-ca";
};
step-root-ca-key = {
file = ../secrets/step-root-ca-key.age;
path = "/run/agenix/step-root-ca-key";
owner = "step-ca";
group = "step-ca";
};
step-inter-ca-key = {
file = ../secrets/step-inter-ca-key.age;
path = "/run/agenix/step-inter-ca-key";
owner = "step-ca";
group = "step-ca";
};
step-root-ca-crt = {
file = ../secrets/step-root-ca-crt.age;
path = "/run/agenix/step-root-ca-crt";
owner = "step-ca";
group = "step-ca";
};
step-inter-ca-crt = {
file = ../secrets/step-inter-ca-crt.age;
path = "/run/agenix/step-inter-ca-crt";
owner = "step-ca";
group = "step-ca";
};
# Gitea Secrets
gitea-db-pw = {
file = ../secrets/gitea-db-pw.age;
path = "/run/agenix/gitea-db-pw";
owner = "gitea";
group = "gitea";
};
gitea-mail-pw = {
file = ../secrets/gitea-mail-pw.age;
path = "/run/agenix/gitea-mail-pw";
owner = "gitea";
group = "gitea";
};
};
}