diff options
author | Benedikt Peetz <benedikt.peetz@b-peetz.de> | 2024-10-18 22:13:18 +0200 |
---|---|---|
committer | Benedikt Peetz <benedikt.peetz@b-peetz.de> | 2024-10-18 22:13:18 +0200 |
commit | ed51e818c1995f57b710327957c1d179980e4deb (patch) | |
tree | 51f002f947677a3cb0f74ab47d8fc0d6b0a52711 /modules/by-name/se/secrets/module.nix | |
parent | refactor(modules/legacy/conf/lf): Move to new `by-name` dir (diff) | |
download | nixos-config-ed51e818c1995f57b710327957c1d179980e4deb.zip |
refactor(modules/secrets): Split into the modules, that need the secrets
Storing the secrets in the module that actually needs them, is a cleaner solution.
Diffstat (limited to '')
-rw-r--r-- | modules/by-name/se/secrets/module.nix | 73 |
1 files changed, 0 insertions, 73 deletions
diff --git a/modules/by-name/se/secrets/module.nix b/modules/by-name/se/secrets/module.nix deleted file mode 100644 index 8b3188b0..00000000 --- a/modules/by-name/se/secrets/module.nix +++ /dev/null @@ -1,73 +0,0 @@ -{ - config, - lib, - ... -}: let - # mkFakeSecret = secretName: { - # name = secretName; - # value = { - # path = "/dev/null"; - # }; - # }; - # fakeSecrets = - # builtins.listToAttrs (lib.debug.traceValSeqN 2 (builtins.map mkFakeSecret - # (lib.debug.traceValSeqN 2 (builtins.attrNames secrets)))); - cfg = config.soispha.secrets; -in { - options.soispha.secrets = { - enable = lib.mkEnableOption "secrets through agenix"; - }; - - config = lib.mkIf cfg.enable { - age = { - secrets = { - lf_cd_paths = { - file = ./lf/cd_paths.age; - mode = "700"; - owner = "soispha"; - group = "users"; - }; - - # FIXME: Reactive when serverphone is merged in tree again <2024-05-11> - # - # serverphoneCa = { - # file = ./serverphone/ca.key; - # mode = "700"; - # owner = "serverphone"; - # group = "serverphone"; - # }; - # serverphoneServer = { - # file = ./serverphone/server.key; - # mode = "700"; - # owner = "serverphone"; - # group = "serverphone"; - # }; - - taskserverPrivate = { - file = ./taskserver/private.key; - mode = "700"; - owner = "soispha"; - group = "users"; - }; - taskserverPublic = { - file = ./taskserver/public.cert; - mode = "700"; - owner = "soispha"; - group = "users"; - }; - taskserverCA = { - file = ./taskserver/ca.cert; - mode = "700"; - owner = "soispha"; - group = "users"; - }; - taskserverCredentials = { - file = ./taskserver/credentials; - mode = "700"; - owner = "soispha"; - group = "users"; - }; - }; - }; - }; -} |