nixos/home/common/optional/sops.nix

36 lines
1.1 KiB
Nix
Raw Normal View History

2024-05-17 20:17:53 +01:00
{ inputs, config, osConfig, ... }:
2024-05-12 19:58:55 +01:00
let
2024-05-14 14:51:09 +01:00
secretsDirectory = builtins.toString inputs.nix-secrets;
secretsFile = "${secretsDirectory}/secrets.yaml";
2024-05-12 19:58:55 +01:00
homeDirectory = config.home.homeDirectory;
2024-05-17 20:17:53 +01:00
username = config.home.username;
hostname = osConfig.networking.hostName;
2024-05-12 19:58:55 +01:00
in
{
imports = [
inputs.sops-nix.homeManagerModules.sops
];
sops = {
age.keyFile = "${homeDirectory}/.config/sops/age/keys.txt";
defaultSopsFile = "${secretsFile}";
validateSopsFiles = false;
secrets = {
2024-05-17 20:17:53 +01:00
"ssh_keys/${username}@${hostname}/${username}@${hostname}-ssh-ed25519" = {
path = "${homeDirectory}/.ssh/${username}@${hostname}-ssh-ed25519";
2024-05-12 20:45:37 +01:00
};
2024-05-17 20:17:53 +01:00
"ssh_keys/${username}@${hostname}/${username}@${hostname}-ssh-ed25519.pub" = {
path = "${homeDirectory}/.ssh/${username}@${hostname}-ssh-ed25519.pub";
2024-05-12 19:58:55 +01:00
};
2024-05-18 11:54:14 +01:00
"ssh_keys/deploy_key/deploy_key-ssh-ed25519" = {
path = "${homeDirectory}/.ssh/deploy_key-ssh-ed25519";
};
"ssh_keys/deploy_key/deploy_key-ssh-ed25519.pub" = {
path = "${homeDirectory}/.ssh/deploy_key-ssh-ed25519.pub";
};
2024-05-12 19:58:55 +01:00
};
};
}