From bd03871ecec67fc62982f59234e2e0be04925490 Mon Sep 17 00:00:00 2001 From: Matei Adriel Date: Wed, 31 Jan 2024 20:03:00 +0100 Subject: [PATCH] Switch from `agenix` to `sops-nix` --- .sops.yaml | 21 +++ README.md | 7 +- flake.lock | 141 ++++++------------ flake.nix | 10 +- home/features/cli/default.nix | 1 - .../cli/productivity/smos/default.nix | 14 +- .../cli/productivity/smos/secrets.yaml | 21 +++ .../productivity/smos/smos_github_oauth.age | 8 - home/features/cli/ssh.nix | 1 + home/features/desktop/wakatime/default.nix | 8 +- home/features/desktop/wakatime/secrets.yaml | 21 +++ .../desktop/wakatime/wakatime_config.age | Bin 339 -> 0 bytes home/global.nix | 6 +- hosts/nixos/common/global/default.nix | 5 +- .../nixos/common/global/wireless/default.nix | 12 +- .../common/global/wireless/wifi_passwords.age | Bin 794 -> 0 bytes hosts/nixos/common/secrets.yaml | 40 +++++ hosts/nixos/common/users/adrielus.nix | 15 +- .../nixos/common/users/adrielus_password.age | 14 -- scripts/age-public-key.sh | 2 + scripts/emergency-lapetus.sh | 2 +- scripts/ssh-to-age.sh | 6 + secrets.nix | 19 --- 23 files changed, 194 insertions(+), 180 deletions(-) create mode 100644 .sops.yaml create mode 100644 home/features/cli/productivity/smos/secrets.yaml delete mode 100644 home/features/cli/productivity/smos/smos_github_oauth.age create mode 100644 home/features/desktop/wakatime/secrets.yaml delete mode 100644 home/features/desktop/wakatime/wakatime_config.age delete mode 100644 hosts/nixos/common/global/wireless/wifi_passwords.age create mode 100644 hosts/nixos/common/secrets.yaml delete mode 100644 hosts/nixos/common/users/adrielus_password.age create mode 100755 scripts/age-public-key.sh create mode 100755 scripts/ssh-to-age.sh delete mode 100644 secrets.nix diff --git a/.sops.yaml b/.sops.yaml new file mode 100644 index 0000000..14bdb13 --- /dev/null +++ b/.sops.yaml @@ -0,0 +1,21 @@ +keys: + - &users: + - &prescientmoon age14mga4r0xa82a2uus3wq5q7rqnvflms3jmhknz4f3hsda8wttk9gsv2k9fs + - &hosts: + - &tethys age1avsekqqyr62urdwtpfpt0ledzm49wy0rq7wcg3rnsprdx22er5usp0jxgs + - &lapetus age1jem6jfkmfq54wzhqqhrnf786jsn5dmx82ewtt4vducac8m2fyukskun2p4 +creation_rules: + - path_regex: hosts/nixos/common/secrets.yaml + key_groups: + - age: + - *prescientmoon + - *tethys + - *lapetus + - path_regex: home/features/desktop/wakatime/secrets.yaml + key_groups: + - age: + - *prescientmoon + - path_regex: home/features/cli/productivity/smos/secrets.yaml + key_groups: + - age: + - *prescientmoon diff --git a/README.md b/README.md index 07537c5..de8bb17 100644 --- a/README.md +++ b/README.md @@ -7,7 +7,7 @@ In case you are not familiar with nix/nixos, this is a collection of configurati ## Features this repository includes: - Consistent base16 theming using [stylix](https://github.com/danth/stylix) -- [Agenix](https://github.com/ryantm/agenix) & [homeage](https://github.com/jordanisaacs/homeage) based secret management +- [sops-nix](https://github.com/Mic92/sops-nix) based secret management - Sets up all the apps I use — including git, neovim, fish, tmux, starship, hyprland, anyrun, discord, zathura, wezterm & much more. The current state of this repo is a refactor of my old, messy nixos config, based on the structure of [this template](https://github.com/Misterio77/nix-starter-configs). @@ -33,7 +33,7 @@ This repo's structure is based on the concept of hosts - individual machines con | [overlays](./overlays) | Nix overlays | | [pkgs](./pkgs) | Nix packages | | [flake.nix](./flake.nix) | Nix flake entrypoint! | -| [secrets.nix](./secrets.nix) | Agenix entrypoint | +| [.sops.yaml](./.sops.yaml) | Sops entrypoint | | [stylua.toml](./stylua.toml) | Lua formatter config for the repo | ## Points of interest @@ -52,7 +52,7 @@ Here's some things you might want to check out: - [Nixos](http://nixos.org/) — nix based operating system - [Home-manager](https://github.com/nix-community/home-manager) — manage user configuration using nix - [Impernanence](https://github.com/nix-community/impermanence) — see the article about [erasing your darlings](https://grahamc.com/blog/erase-your-darlings) -- [Agenix](https://github.com/ryantm/agenix) & [homeage](https://github.com/jordanisaacs/homeage) — secret management +- [Sops-nix](https://github.com/Mic92/sops-nix) — secret management - [Slambda](https://github.com/Mateiadrielrafael/slambda) — custom keyboard chording utility - [disko](https://github.com/nix-community/disko) — format disks using nix - [zfs](https://openzfs.org/wiki/Main_Page) — filesystem @@ -101,6 +101,7 @@ Here's some things you might want to check out: Includes links to stuff which used to be in the previous section but is not used anymore. Only created this section in June 2023, so stuff I used earlier might not be here. Sorted with the most recently dropped things at the top. +- [Agenix](https://github.com/ryantm/agenix) & [homeage](https://github.com/jordanisaacs/homeage) — I switched to [sops-nix](https://github.com/Mic92/sops-nix) - [Mind.nvim](https://github.com/phaazon/mind.nvim) — self management tree editor. The project got archived, so I switched to [Smos](https://github.com/NorfairKing/smos). - [Null-ls](https://github.com/jose-elias-alvarez/null-ls.nvim) — general purpose neovim LSP. The project got archived, so I switched to [formatter.nvim](https://github.com/mhartington/formatter.nvim). - [Wofi](https://sr.ht/~scoopta/wofi/) — program launcher. I switched to [Anyrun](https://github.com/Kirottu/anyrun). diff --git a/flake.lock b/flake.lock index bd6496e..f71642f 100644 --- a/flake.lock +++ b/flake.lock @@ -1,27 +1,5 @@ { "nodes": { - "agenix": { - "inputs": { - "darwin": "darwin", - "home-manager": "home-manager", - "nixpkgs": [ - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1701216516, - "narHash": "sha256-jKSeJn+7hZ1dZdiH1L+NWUGT2i/BGomKAJ54B9kT06Q=", - "owner": "ryantm", - "repo": "agenix", - "rev": "13ac9ac6d68b9a0896e3d43a082947233189e247", - "type": "github" - }, - "original": { - "owner": "ryantm", - "repo": "agenix", - "type": "github" - } - }, "anyrun": { "inputs": { "flake-parts": "flake-parts", @@ -386,28 +364,6 @@ "type": "github" } }, - "darwin": { - "inputs": { - "nixpkgs": [ - "agenix", - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1673295039, - "narHash": "sha256-AsdYgE8/GPwcelGgrntlijMg4t3hLFJFCRF3tL5WVjA=", - "owner": "lnl7", - "repo": "nix-darwin", - "rev": "87b9d090ad39b25b2400029c64825fc2a8868943", - "type": "github" - }, - "original": { - "owner": "lnl7", - "ref": "master", - "repo": "nix-darwin", - "type": "github" - } - }, "dekking": { "flake": false, "locked": { @@ -1351,27 +1307,6 @@ } }, "home-manager": { - "inputs": { - "nixpkgs": [ - "agenix", - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1682203081, - "narHash": "sha256-kRL4ejWDhi0zph/FpebFYhzqlOBrk0Pl3dzGEKSAlEw=", - "owner": "nix-community", - "repo": "home-manager", - "rev": "32d3e39c491e2f91152c84f8ad8b003420eab0a1", - "type": "github" - }, - "original": { - "owner": "nix-community", - "repo": "home-manager", - "type": "github" - } - }, - "home-manager_2": { "inputs": { "nixpkgs": [ "nixpkgs" @@ -1392,7 +1327,7 @@ "type": "github" } }, - "home-manager_3": { + "home-manager_2": { "inputs": { "nixpkgs": "nixpkgs" }, @@ -1411,7 +1346,7 @@ "type": "github" } }, - "home-manager_4": { + "home-manager_3": { "inputs": { "nixpkgs": "nixpkgs_9" }, @@ -1430,26 +1365,6 @@ "type": "github" } }, - "homeage": { - "inputs": { - "nixpkgs": [ - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1669234151, - "narHash": "sha256-TwT87E3m2TZLgwYJESlype14HxUOrRGojPM5C2akrMg=", - "owner": "jordanisaacs", - "repo": "homeage", - "rev": "02bfe4ca06962d222e522fff0240c93946b20278", - "type": "github" - }, - "original": { - "owner": "jordanisaacs", - "repo": "homeage", - "type": "github" - } - }, "hyprland": { "inputs": { "hyprland-protocols": "hyprland-protocols", @@ -1556,7 +1471,7 @@ "dekking": "dekking", "fast-myers-diff": "fast-myers-diff", "haskell-dependency-graph-nix": "haskell-dependency-graph-nix", - "home-manager": "home-manager_3", + "home-manager": "home-manager_2", "linkcheck": "linkcheck", "mergeless": "mergeless", "nixpkgs": "nixpkgs_2", @@ -2081,6 +1996,22 @@ } }, "nixpkgs-stable_5": { + "locked": { + "lastModified": 1705957679, + "narHash": "sha256-Q8LJaVZGJ9wo33wBafvZSzapYsjOaNjP/pOnSiKVGHY=", + "owner": "NixOS", + "repo": "nixpkgs", + "rev": "9a333eaa80901efe01df07eade2c16d183761fa3", + "type": "github" + }, + "original": { + "owner": "NixOS", + "ref": "release-23.05", + "repo": "nixpkgs", + "type": "github" + } + }, + "nixpkgs-stable_6": { "locked": { "lastModified": 1685801374, "narHash": "sha256-otaSUoFEMM+LjBI1XL/xGB5ao6IwnZOXc47qhIgJe8U=", @@ -2096,7 +2027,7 @@ "type": "github" } }, - "nixpkgs-stable_6": { + "nixpkgs-stable_7": { "locked": { "lastModified": 1685801374, "narHash": "sha256-otaSUoFEMM+LjBI1XL/xGB5ao6IwnZOXc47qhIgJe8U=", @@ -2538,7 +2469,7 @@ "flake-utils": "flake-utils_10", "gitignore": "gitignore_4", "nixpkgs": "nixpkgs_15", - "nixpkgs-stable": "nixpkgs-stable_5" + "nixpkgs-stable": "nixpkgs-stable_6" }, "locked": { "lastModified": 1685970613, @@ -2560,7 +2491,7 @@ "flake-utils": "flake-utils_11", "gitignore": "gitignore_5", "nixpkgs": "nixpkgs_16", - "nixpkgs-stable": "nixpkgs-stable_6" + "nixpkgs-stable": "nixpkgs-stable_7" }, "locked": { "lastModified": 1700064067, @@ -2594,15 +2525,13 @@ }, "root": { "inputs": { - "agenix": "agenix", "anyrun": "anyrun", "anyrun-nixos-options": "anyrun-nixos-options", "catppuccin-base16": "catppuccin-base16", "disko": "disko", "firefox-addons": "firefox-addons", "grub2-themes": "grub2-themes", - "home-manager": "home-manager_2", - "homeage": "homeage", + "home-manager": "home-manager", "hyprland": "hyprland", "hyprland-contrib": "hyprland-contrib", "impermanence": "impermanence", @@ -2621,6 +2550,7 @@ "rosepine-base16": "rosepine-base16", "slambda": "slambda", "smos": "smos", + "sops-nix": "sops-nix", "spicetify-nix": "spicetify-nix", "stylix": "stylix", "tickler": "tickler", @@ -2851,7 +2781,7 @@ "fuzzy-time": "fuzzy-time", "get-flake": "get-flake", "haskell-dependency-graph-nix": "haskell-dependency-graph-nix_2", - "home-manager": "home-manager_4", + "home-manager": "home-manager_3", "ical": "ical", "linkcheck": "linkcheck_2", "looper": "looper", @@ -2899,6 +2829,27 @@ "type": "github" } }, + "sops-nix": { + "inputs": { + "nixpkgs": [ + "nixpkgs" + ], + "nixpkgs-stable": "nixpkgs-stable_5" + }, + "locked": { + "lastModified": 1706410821, + "narHash": "sha256-iCfXspqUOPLwRobqQNAQeKzprEyVowLMn17QaRPQc+M=", + "owner": "Mic92", + "repo": "sops-nix", + "rev": "73bf36912e31a6b21af6e0f39218e067283c67ef", + "type": "github" + }, + "original": { + "owner": "Mic92", + "repo": "sops-nix", + "type": "github" + } + }, "spicetify-nix": { "inputs": { "flake-utils": "flake-utils_9", diff --git a/flake.nix b/flake.nix index 0b902d0..f6e50d0 100644 --- a/flake.nix +++ b/flake.nix @@ -25,13 +25,6 @@ firefox-addons.inputs.nixpkgs.follows = "nixpkgs"; # }}} # {{{ Nix-related tooling - # {{{ Secret management - agenix.url = "github:ryantm/agenix"; - agenix.inputs.nixpkgs.follows = "nixpkgs"; - - homeage.url = "github:jordanisaacs/homeage"; - homeage.inputs.nixpkgs.follows = "nixpkgs"; - # }}} # {{{ Storage impermanence.url = "github:nix-community/impermanence"; @@ -46,6 +39,9 @@ nix-index-database.url = "github:Mic92/nix-index-database"; nix-index-database.inputs.nixpkgs.follows = "nixpkgs"; + sops-nix.url = "github:Mic92/sops-nix"; + sops-nix.inputs.nixpkgs.follows = "nixpkgs"; + korora.url = "github:adisbladis/korora"; # Nix language server diff --git a/home/features/cli/default.nix b/home/features/cli/default.nix index 88b023c..2f80c70 100644 --- a/home/features/cli/default.nix +++ b/home/features/cli/default.nix @@ -38,7 +38,6 @@ ouch # Unified compression / decompression tool mkpasswd # Hash passwords jq # Json maniuplation - inputs.agenix.packages.${pkgs.system}.agenix # Secret encryption # }}} ]; diff --git a/home/features/cli/productivity/smos/default.nix b/home/features/cli/productivity/smos/default.nix index 7a2dca9..bd7228b 100644 --- a/home/features/cli/productivity/smos/default.nix +++ b/home/features/cli/productivity/smos/default.nix @@ -2,6 +2,7 @@ let workflowDir = "${config.home.homeDirectory}/productivity/smos"; in { + # {{{ Smos config programs.smos = { inherit workflowDir; @@ -10,19 +11,21 @@ in github = { enable = true; - oauth-token-file = config.homeage.file.smos.path; + oauth-token-file = config.sops.secrets.smos_github_token.path; }; }; - + # }}} + # {{{ Storage & secrets satellite.persistence.at.data.apps.smos.directories = [ config.programs.smos.workflowDir ]; - homeage.file.smos = { - source = ./smos_github_oauth.age; + sops.secrets.smos_github_token = { + sopsFile = ./secrets.yaml; path = "${config.xdg.dataHome}/smos/.github_token"; }; - + # }}} + # {{{ Add desktop entry home.packages = # Start smos with a custom class so our WM can move it to the correct workspace let smosgui = pkgs.writeShellScriptBin "smosgui" '' @@ -37,4 +40,5 @@ in exec = "smosgui"; terminal = false; }; + # }}} } diff --git a/home/features/cli/productivity/smos/secrets.yaml b/home/features/cli/productivity/smos/secrets.yaml new file mode 100644 index 0000000..ce4d25e --- /dev/null +++ b/home/features/cli/productivity/smos/secrets.yaml @@ -0,0 +1,21 @@ +smos_github_token: ENC[AES256_GCM,data:kqy5mQf96DoPN1iEt2akJWFfD3IJWdSkvZa0MeAyF0WJ/+V5P5C4iQ==,iv:QwmIdV/vzGTLE89XJVi3prgfmXqRa/OYcp9CA7KJDYc=,tag:+S1EZBcxoOQO2ADjDx9STQ==,type:str] +sops: + kms: [] + gcp_kms: [] + azure_kv: [] + hc_vault: [] + age: + - recipient: age14mga4r0xa82a2uus3wq5q7rqnvflms3jmhknz4f3hsda8wttk9gsv2k9fs + enc: | + -----BEGIN AGE ENCRYPTED FILE----- + YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBwYkx3eWhxZUpTRVR3R1R4 + Vm9hMTVsbXBnU0tFU093amU3TTNjalhsVHdvCmZURElTY2Q0eTQvR3M1V3AzTVl4 + VkR2NXRHR2FiTURqNUp5Y3VDWFQ1UjgKLS0tIEVlRWs3YUFaZzdvd1Q5bmFwazJi + Y2E3bmM1TkZoOEN0anJqYUNSQUN5ZDAKtobUBBKbfaUeiPtKN4/oTNaxY3C2joCK + 8h4FlRLXd+CGnAyjN2p4FliWzLgmOg4HFNmZSmYLpIh4E9yqadNSSg== + -----END AGE ENCRYPTED FILE----- + lastmodified: "2024-01-31T18:33:00Z" + mac: ENC[AES256_GCM,data:HMJ9K1Ox0GPFgi7yG+Kb7ogHCQHXhj0hZEWGs0gLFHw0qqXBAUpAZfqVDd5DvNQSK7m4lRoxZC+wyc2ni0o95QGoDM1wA83npalvTEZyRI+9N0TAsrO03JHq+1uSawwLEhmHjvcVsX8W3d5hJzY+/Tq21D14SBKMqXxgHwHsH2E=,iv:dEyBbXDHboP/x0Bqo7p3YHh8gJWWfmTNLAZhUYeqkfc=,tag:WduTOOkgox6GRtLkm2Zkdw==,type:str] + pgp: [] + unencrypted_suffix: _unencrypted + version: 3.8.1 diff --git a/home/features/cli/productivity/smos/smos_github_oauth.age b/home/features/cli/productivity/smos/smos_github_oauth.age deleted file mode 100644 index f86ad51..0000000 --- a/home/features/cli/productivity/smos/smos_github_oauth.age +++ /dev/null @@ -1,8 +0,0 @@ -age-encryption.org/v1 --> ssh-ed25519 UUF9JQ 8KhqQ8dEHYLDM89d+glRT9xtId2umJM2O8Vj6oWM0zY -UAZ+pzFuL+wKSFY+yG1t1U9l0knA/VpupVBr6m2/+eY --> Q7U4ZXW4-grease S8&{':OI EQs~v%Gq zp_"?LJ* z@)Y -mmb3Yi9moBnueYa4AeMJwAA0A6lZAo9+L4zYgnxyjLBOUwQMPO/zDPmHqQ ---- HMqzE5ekHYLWxdxpC7J9NMdrfx4VJYVwwnvhq6JAtmI - -c ޵F;UKFt2_}ns3oYCn쎪80@"AjQ` \ No newline at end of file diff --git a/home/features/cli/ssh.nix b/home/features/cli/ssh.nix index f702010..2d240ff 100644 --- a/home/features/cli/ssh.nix +++ b/home/features/cli/ssh.nix @@ -1,6 +1,7 @@ { programs.ssh.enable = true; + # TODO: age persistence satellite.persistence.at.state.apps.ssh.directories = [ ".ssh" ]; # Makes it easy to copy ssh keys at install time without messing up permissions diff --git a/home/features/desktop/wakatime/default.nix b/home/features/desktop/wakatime/default.nix index bb555e8..22dbf85 100644 --- a/home/features/desktop/wakatime/default.nix +++ b/home/features/desktop/wakatime/default.nix @@ -1,9 +1,7 @@ { pkgs, config, ... }: { - homeage.file.wakatime = { - source = ./wakatime_config.age; - symlinks = [ - "${config.home.homeDirectory}/.wakatime.cfg" - ]; + sops.secrets.wakatime_config = { + sopsFile = ./secrets.yaml; + path = "${config.home.homeDirectory}/.wakatime.cfg"; }; home.packages = [ pkgs.wakatime ]; diff --git a/home/features/desktop/wakatime/secrets.yaml b/home/features/desktop/wakatime/secrets.yaml new file mode 100644 index 0000000..6c6d93b --- /dev/null +++ b/home/features/desktop/wakatime/secrets.yaml @@ -0,0 +1,21 @@ +wakatime_config: ENC[AES256_GCM,data:IgGcMQNf8u2KXjgI60zPKZ6M7oxibbQK+in/9jrnEzk20WA1JM122zICXYuLfuQgNd2CMoEeu4LivQHv/D79tw==,iv:HoS00ihAX+SCw58kgcnvqAy4ILdS+/RPMqQwXusTqYU=,tag:0sSaZTrjO43PB7g215wwUA==,type:str] +sops: + kms: [] + gcp_kms: [] + azure_kv: [] + hc_vault: [] + age: + - recipient: age14mga4r0xa82a2uus3wq5q7rqnvflms3jmhknz4f3hsda8wttk9gsv2k9fs + enc: | + -----BEGIN AGE ENCRYPTED FILE----- + YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBDR0RmdFIxNFJpQTdGYXlq + bkZrNktMaFlrOEZtSXh6Y1l6NTN0REN6N2dnCmNMRUk2TXA3RWhtZVlnbTg2aE00 + eFVwejBTcWRaTUhGWFFIS1RlVkhhQ28KLS0tIEdWWGRWSDZOQW9pQkdCRFFncTM2 + cURjWFplY1pyMzY4a0h6cTRLS2I2ZW8KqGtYjCsdriSWdKhC+kGBAMSY9WVDL3tE + oMxyhrgDMtWndZEGv1+J3XLLmatDKmEcJO2k0CXZlCWWj17O4Rm+eA== + -----END AGE ENCRYPTED FILE----- + lastmodified: "2024-01-31T18:29:11Z" + mac: ENC[AES256_GCM,data:PmKn6D+olZSKrjY0i9zZ3YZxi+k39CS7ckUF7YaVINqZlCBNe12T+FnPyHhH/vDujA61ZzalsY14SHwSkOwMNVTJ9tdvOEfpEtwq0wKn+5TQmz8LfWNBUazRefhY0hKZN/k/akRjRh65wOvMZfah+L6A9wA7vW1OrCbLtAKExsY=,iv:9vGJAzjRN6MxRG7EeYKKft3YElkicu0XX8Q28Ua2n3M=,tag:eyg5yUH2ME2annShaFQAqg==,type:str] + pgp: [] + unencrypted_suffix: _unencrypted + version: 3.8.1 diff --git a/home/features/desktop/wakatime/wakatime_config.age b/home/features/desktop/wakatime/wakatime_config.age deleted file mode 100644 index c0521365eed23ac674b0c32ac6878c60f7854c4f..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 339 zcmYdHPt{G$OD?J`D9Oyv)5|YP*Do{V(zR14F3!+RO))YxHMCR+4Ry2h3REcfNHZ=< zuJTFuD$C3?s45Iju{80j3MxxCGd4|haxP5{_bT^H1d>K3T!zU3?up?>9-&5tQ9)52 zd1YpKZlwjjp$54jNruJw`mU~Jl}7nlQHlD2Alvl3s~k0S(~D9Qi&GUGO#A~QBe<#z z3{BF^ib}Fm0|Uzo3oN{H%N#>Y&AiL?qk@A19n1ZLyn;*Jin(-kbrpQwQY}0}{Igv% z{heJ6vMpR3JxU{-3JP2-&4CUs$W4s&Of56;@W@Va<3^EP$N)HZB2?;YTEAaA;EUmIA%0{=%I6W~V)KQ_-CCnu?s?4xF*`vra z!!pU&)Fjj^$T=WU+uXU(#N4MU)yJ#MG||{HD3r@A+c?;uydcxx$5=nxyTmZGG9tjk zF)%7h-`u<+(L6~z%)-+kE4jeM-xJ-o&`>u^uRsOY$S~J%4_7ni0DTLOl#0}1ztrFi zw=j2?ByBI_z@+4~oK$aTZS!O&H(xIObeHtBd>3QG;(WuhsK{_Hx1hxGR8v#atTLm5 zEH^XLfE?pAFQdew00WS18M^63sfop@3QAFK_FM)Y8HVmDZ>x07VL7d-C5Ju=WhG2lR&(K)P^Y?E zs`J%WQ!z=QCl&sw*Ct!odwlw~Fgt0*{g~~FY`U`~PdntkxV3M2i#dx+vs?Pkf`1>@ z%L|7r>RSHuPNU$IG~U90+JRzs(@VZT*IwHFa%tqJRf<86xCPEB@BJGnni~0%$w+p3 zW{R!t%ix&#)rS4YuHSDrUn0sTf8Rpvv)SUuJtBEOraKiCJ`Bt5ked~!>J;bbC-led zW7_QB)!K~TY<|ztJJHa#)MQD!(bncO-Ey&E!VBK%d~>Us@o!1b&55i#J30@vO<1?< z*YBLjlzm5fRX*BqFZm|T`dhX+R6&j1U`k?V{H-TfRJJ*!9QNOPUT4V_zv5?J&vOb? GuK@siEh@ ssh-ed25519 qgVaDQ sYn14+1vJEk4dnYdHQ58q36LTMS7tU5V3V/3xswLWHk -mnr7r/IJOmVtnsSiIq9B8GvO6xnNs3r7jiz0yLAAL8Q --> ssh-ed25519 3gahUA kpYU2sudkfqfCGrqjeNsU61IEal7AGJLJuXE8Wyo0Ro -m3Z6vZGG+h3lvtT7zYl1lIb+z9tVzRw0Tpr17LHE1NA --> ssh-ed25519 UUF9JQ MzmLpgpJ/t4XrLFUk8xUhyO+W2if+aCG7t7aHv3Tqkw -Yf51xXY5pzC+txLTIiK4PwZksjeaTDlPIwGhghaAQPg --> ~/.config/sops/age/keys.txt" +echo "🚀 All done" diff --git a/secrets.nix b/secrets.nix deleted file mode 100644 index 1bd2211..0000000 --- a/secrets.nix +++ /dev/null @@ -1,19 +0,0 @@ -let - tethys = builtins.readFile ./hosts/nixos/tethys/keys/ssh_host_ed25519_key.pub; - lapetus = builtins.readFile ./hosts/nixos/lapetus/keys/ssh_host_ed25519_key.pub; - - adrielus_tethys = builtins.readFile ./hosts/nixos/tethys/keys/id_ed25519.pub; - adrielus_lapetus = builtins.readFile ./hosts/nixos/lapetus/keys/id_ed25519.pub; - - all_hosts = [ tethys lapetus ]; -in -{ - # Scoped for entire systems - "./hosts/nixos/common/global/wireless/wifi_passwords.age".publicKeys = all_hosts ++ [ adrielus_tethys ]; - "./hosts/nixos/common/users/adrielus_password.age".publicKeys = all_hosts ++ [ adrielus_tethys ]; - - # Scoped for the user - # TODO: perhaps move this into `pass`?. - "./home/features/desktop/wakatime/wakatime_config.age".publicKeys = [ adrielus_tethys ]; - "./home/features/cli/productivity/smos/smos_github_oauth.age".publicKeys = [ adrielus_tethys ]; -}