let lib = (import { }).lib; sshKeys = (import ../common/machine-info/moduleless.nix { }).machines.ssh; # add userkeys to all roles so that I can r/w the secrets from my personal computers roles = lib.mapAttrs (role: hosts: hosts ++ sshKeys.userKeys) sshKeys.hostKeysByRole; # nobody is using this secret but I still need to be able to r/w it nobody = sshKeys.userKeys; in with roles; { # email "hashed-email-pw.age".publicKeys = email-server; "cris-hashed-email-pw.age".publicKeys = email-server; "sasl_relay_passwd.age".publicKeys = email-server; "hashed-robots-email-pw.age".publicKeys = email-server; "robots-email-pw.age".publicKeys = gitea; # nix binary cache # public key: s0.koi-bebop.ts.net:OjbzD86YjyJZpCp9RWaQKANaflcpKhtzBMNP8I2aPUU= "binary-cache-private-key.age".publicKeys = binary-cache; # public key: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINpUZFFL9BpBVqeeU63sFPhR9ewuhEZerTCDIGW1NPSB "binary-cache-push-sshkey.age".publicKeys = nobody; # this value is directly given to gitea # vpn "iodine.age".publicKeys = iodine; "pia-login.age".publicKeys = pia; # cloud "nextcloud-pw.age".publicKeys = nextcloud; "smb-secrets.age".publicKeys = personal ++ media-center; "oauth2-proxy-env.age".publicKeys = server; # services "searx.age".publicKeys = nobody; "wolframalpha.age".publicKeys = dailybot; # hostapd "hostapd-pw-experimental-tower.age".publicKeys = nobody; "hostapd-pw-CXNK00BF9176.age".publicKeys = nobody; # backups "backblaze-s3-backups.age".publicKeys = personal ++ server; "restic-password.age".publicKeys = personal ++ server; # gitea actions runner "gitea-actions-runner-token.age".publicKeys = gitea-actions-runner; # Librechat "librechat-env-file.age".publicKeys = librechat; # For ACME DNS Challenge "digitalocean-dns-credentials.age".publicKeys = server; # Frigate (DVR) "frigate-credentials.age".publicKeys = frigate; # zigbee2mqtt secrets "zigbee2mqtt.yaml.age".publicKeys = zigbee; }