Prepare to upload encrypted secrets file
This commit is contained in:
parent
ba5d5260b3
commit
f61fa33b7e
1
.gitattributes
vendored
Normal file
1
.gitattributes
vendored
Normal file
|
@ -0,0 +1 @@
|
||||||
|
nixos/modules/secrets.nix filter=git-crypt diff=git-crypt
|
|
@ -44,8 +44,8 @@
|
||||||
auth = import ./common/auth.nix;
|
auth = import ./common/auth.nix;
|
||||||
in {
|
in {
|
||||||
nixdate = ''
|
nixdate = ''
|
||||||
${auth.method} nixos-rebuild switch --flake /etc/nixos/.#JimNixDesktop;
|
${auth.method} nixos-rebuild switch --flake /etc/nixos/NixOS-Config/.#JimNixDesktop;
|
||||||
home-manager switch --flake /etc/nixos/.#jimbo@JimNixDesktop;
|
home-manager switch --flake /etc/nixos/NixOS-Config/.#jimbo@JimNixDesktop;
|
||||||
notify-send "NixOS switch finished."
|
notify-send "NixOS switch finished."
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
|
@ -12,8 +12,8 @@
|
||||||
auth = import ./common/auth.nix;
|
auth = import ./common/auth.nix;
|
||||||
in {
|
in {
|
||||||
nixdate = ''
|
nixdate = ''
|
||||||
${auth.method} nixos-rebuild switch --flake /etc/nixos/.#JimNixServer;
|
${auth.method} nixos-rebuild switch --flake /etc/nixos/NixOS-Config/.#JimNixServer;
|
||||||
home-manager switch --flake /etc/nixos/.#jimbo@JimNixServer;
|
home-manager switch --flake /etc/nixos/NixOS-Config/.#jimbo@JimNixServer;
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,11 +1,15 @@
|
||||||
{
|
{pkgs, ...}: {
|
||||||
# Enable git and config
|
# Enable git and config
|
||||||
programs.git = let
|
programs.git = let
|
||||||
secrets = import ../../../secrets.nix;
|
secrets = import ../../nixos/modules/secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
lfs.enable = true;
|
lfs.enable = true;
|
||||||
userName = secrets.jimUsername;
|
userName = secrets.jimUsername;
|
||||||
userEmail = secrets.jimEmail;
|
userEmail = secrets.jimEmail;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
home.packages = with pkgs; [
|
||||||
|
git-crypt
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|
|
@ -16,7 +16,6 @@
|
||||||
|
|
||||||
# Modules
|
# Modules
|
||||||
./modules/security.nix
|
./modules/security.nix
|
||||||
./modules/networking.nix
|
|
||||||
|
|
||||||
# Hardware
|
# Hardware
|
||||||
./hardware/machines/desktop.nix
|
./hardware/machines/desktop.nix
|
||||||
|
|
|
@ -10,7 +10,8 @@
|
||||||
}: {
|
}: {
|
||||||
# You can import other NixOS modules here
|
# You can import other NixOS modules here
|
||||||
imports = [
|
imports = [
|
||||||
# My modules
|
./networking.nix
|
||||||
|
./gpg.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
nixpkgs = {
|
nixpkgs = {
|
||||||
|
@ -60,7 +61,7 @@
|
||||||
|
|
||||||
# Set timezone
|
# Set timezone
|
||||||
time.timeZone = let
|
time.timeZone = let
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in secrets.timeZone;
|
in secrets.timeZone;
|
||||||
|
|
||||||
# Select internationalisation properties.
|
# Select internationalisation properties.
|
||||||
|
|
6
nixos/modules/gpg.nix
Normal file
6
nixos/modules/gpg.nix
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
{
|
||||||
|
programs.gnupg.agent = {
|
||||||
|
enable = true;
|
||||||
|
enableSSHSupport = true;
|
||||||
|
};
|
||||||
|
}
|
|
@ -7,7 +7,7 @@
|
||||||
|
|
||||||
# Set hostnames
|
# Set hostnames
|
||||||
hosts = let
|
hosts = let
|
||||||
ips = import ../common/ips.nix;
|
ips = import ../modules/ips.nix;
|
||||||
in {
|
in {
|
||||||
"${ips.server}" = ["server"];
|
"${ips.server}" = ["server"];
|
||||||
"${ips.pc}" = ["pc"];
|
"${ips.pc}" = ["pc"];
|
||||||
|
|
|
@ -10,7 +10,6 @@
|
||||||
|
|
||||||
# Modules
|
# Modules
|
||||||
./modules/security.nix
|
./modules/security.nix
|
||||||
./modules/networking.nix
|
|
||||||
|
|
||||||
# Hardware
|
# Hardware
|
||||||
./hardware/machines/server.nix
|
./hardware/machines/server.nix
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{
|
{
|
||||||
security.acme = let
|
security.acme = let
|
||||||
secrets = import ../../../secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in {
|
in {
|
||||||
acceptTerms = true;
|
acceptTerms = true;
|
||||||
defaults.email = secrets.jimEmail;
|
defaults.email = secrets.jimEmail;
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
{pkgs, ...}: {
|
{pkgs, ...}: {
|
||||||
# DDClient for Dynamic IPs
|
# DDClient for Dynamic IPs
|
||||||
services.ddclient = let
|
services.ddclient = let
|
||||||
secrets = import ../../../secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
protocol = "cloudflare";
|
protocol = "cloudflare";
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
{
|
{
|
||||||
# Configure the Element web server
|
# Configure the Element web server
|
||||||
nixpkgs.config.element-web.conf = let
|
nixpkgs.config.element-web.conf = let
|
||||||
secrets = import ../../../secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in {
|
in {
|
||||||
default_server_config = {
|
default_server_config = {
|
||||||
"m.homeserver" = {
|
"m.homeserver" = {
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# Configure firewall
|
# Configure firewall
|
||||||
networking = let
|
networking = let
|
||||||
ips = import ../modules/ips.nix;
|
ips = import ../modules/ips.nix;
|
||||||
secrets = import ../../../secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in {
|
in {
|
||||||
firewall = {
|
firewall = {
|
||||||
allowPing = false;
|
allowPing = false;
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{
|
{
|
||||||
services.gitea = let
|
services.gitea = let
|
||||||
secrets = import ../../../secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{
|
{
|
||||||
services.lemmy = let
|
services.lemmy = let
|
||||||
secrets = import ../../../secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
nginx.enable = true;
|
nginx.enable = true;
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
{pkgs, ...}: let
|
{pkgs, ...}: let
|
||||||
secrets = import ../../../secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in rec {
|
in rec {
|
||||||
# Mail server
|
# Mail server
|
||||||
mailserver = rec {
|
mailserver = rec {
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{pkgs, ...}: {
|
{pkgs, ...}: {
|
||||||
services.mastodon = let
|
services.mastodon = let
|
||||||
secrets = import ../../../secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
localDomain = "social.${secrets.jimDomain}";
|
localDomain = "social.${secrets.jimDomain}";
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
{pkgs, ...}: let
|
{pkgs, ...}: let
|
||||||
secrets = import ../../../secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in {
|
in {
|
||||||
services.nextcloud = {
|
services.nextcloud = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{pkgs, ...}: {
|
{pkgs, ...}: {
|
||||||
services.nginx = let
|
services.nginx = let
|
||||||
secrets = import ../../../secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = (pkgs.nginx.override {
|
package = (pkgs.nginx.override {
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{pkgs, lib, ...}: {
|
{pkgs, lib, ...}: {
|
||||||
services.pufferpanel = let
|
services.pufferpanel = let
|
||||||
secrets = import ../../../secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
environment = {
|
environment = {
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{pkgs, config, ...}: {
|
{pkgs, config, ...}: {
|
||||||
services = let
|
services = let
|
||||||
secrets = import ../../../secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in {
|
in {
|
||||||
# Synapse Matrix server
|
# Synapse Matrix server
|
||||||
matrix-synapse = with config.services.coturn; {
|
matrix-synapse = with config.services.coturn; {
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{
|
{
|
||||||
services.vaultwarden = let
|
services.vaultwarden = let
|
||||||
secrets = import ../../../secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
config = {
|
config = {
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
{pkgs, ...}: {
|
{pkgs, ...}: {
|
||||||
users.users = {
|
users.users = {
|
||||||
jimbo = let
|
jimbo = let
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../modules/secrets.nix;
|
||||||
in {
|
in {
|
||||||
description = "Jimbo";
|
description = "Jimbo";
|
||||||
hashedPassword = secrets.jimboAccPass;
|
hashedPassword = secrets.jimboAccPass;
|
||||||
|
|
Loading…
Reference in a new issue