/ secrets.nix
secrets.nix
1 let 2 vincent-yubikey5a = ""; 3 #vincent-yubikey5a = "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFT5Rx+4Wuvd8lMBkcHxb4oHdRhm/OTg+p5tvPzoIN9enSmgRw5Inm/SlS8ZzV87G1NESTgzDRi6hREvqDlKvxs="; 4 vincent-yubikey5c1 = "age1yubikey1q0g72w5n3zgt4qv64fkymcttqlpct0yh0rf29079h3696d6wkruakkst877"; # does this work ? Otherwise the ssh one. 5 # vincent-yubikey5c1 = "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBBFzxC16VqwTgWDQfw2YCiOw2JzpH3z9XgHtKoHhBdHi2i9m9XUc7fIUeEIIf7P8ARRNd8q5bjvl8JY7LtPkNCU="; 6 vincent-yubikey5c2 = "age1yubikey1qf2vcr22ugzj94dzfhdrz39h60ukr6gvk2687de2srg9407azd53kgsajvu"; 7 users = [ vincent-yubikey5c1 vincent-yubikey5c2 ]; 8 9 aomi = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFQVlSrUKU0xlM9E+sJ8qgdgqCW6ePctEBD2Yf+OnyME"; # ssh-keyscan -q -t ed25519 aomi.sbr.pm 10 athena = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIM/4KRP1rzOwyA2zP1Nf1WlLRHqAGutLtOHYWfH732xh"; # ssh-keyscan -q -t ed25519 athena.sbr.pm 11 demeter = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGqQfEyHyjIGglayB9FtCqL7bnYfNSQlBXks2IuyCPmd"; # ssh-keyscan -q -t ed25519 demeter.sbr.pm 12 kerkouane = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJguVoQYObRLyNxELFc3ai2yDJ25+naiM3tKrBGuxwwA"; # ssh-keyscan -q -t ed25519 kerkouane.sbr.pm 13 sakhalin = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN/PMBThi4DhgZR8VywbRDzzMVh2Qp3T6NJAcPubfXz6"; # ssh-keyscan -q -t ed25519 sakhalin.sbr.pm 14 shikoku = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIH18c6kcorVbK2TwCgdewL6nQf29Cd5BVTeq8nRYUigm"; # ssh-keyscan -q -t ed25519 shikoku.sbr.pm 15 wakasu = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINrAh07USjRnAdS3mMNGdKee1KumjYDLzgXaiZ5LYi2D"; # ssh-keyscan -q -t ed25519 wakasu.sbr.pm 16 desktops = [ aomi wakasu ]; 17 servers = [ athena demeter kerkouane sakhalin shikoku ]; 18 systems = servers ++ desktops; 19 in 20 { 21 # Red Hat 22 "secrets/redhat/krb5.conf.age".publicKeys = users ++ [ aomi wakasu ]; 23 "secrets/redhat/RHVPN.ovpn.age".publicKeys = users ++ [ aomi wakasu ]; 24 "secrets/redhat/AMS2.ovpn.age".publicKeys = users ++ [ aomi wakasu ]; 25 "secrets/redhat/RDU2.ovpn.age".publicKeys = users ++ [ aomi wakasu ]; 26 "secrets/redhat/BBRQ.ovpn.age".publicKeys = users ++ [ aomi wakasu ]; 27 "secrets/redhat/ipa.crt.age".publicKeys = users ++ [ aomi wakasu ]; 28 "secrets/redhat/2015-RH-IT-Root-CA.pem.age".publicKeys = users ++ [ aomi wakasu ]; 29 "secrets/redhat/Eng-CA.crt.age".publicKeys = users ++ [ aomi wakasu ]; 30 "secrets/redhat/newca.crt.age".publicKeys = users ++ [ aomi wakasu ]; 31 "secrets/redhat/oracle_ebs.crt.age".publicKeys = users ++ [ aomi wakasu ]; 32 "secrets/redhat/pki-ca-chain.crt.age".publicKeys = users ++ [ aomi wakasu ]; 33 "secrets/redhat/RH_ITW.crt.age".publicKeys = users ++ [ aomi wakasu ]; 34 "secrets/redhat/win-intermediate-ca.cer.age".publicKeys = users ++ [ aomi wakasu ]; 35 "secrets/redhat/redhat.pem.age".publicKeys = users ++ systems; 36 # Others 37 "secrets/minica.pem.age".publicKeys = users ++ systems; 38 "secrets/shikoku/aria2rpcsecret.age".publicKeys = users ++ [ shikoku ]; 39 }