diff options
author | Ismaël Bouya <ismael.bouya@normalesup.org> | 2021-10-13 02:26:54 +0200 |
---|---|---|
committer | Ismaël Bouya <ismael.bouya@normalesup.org> | 2021-10-16 01:39:24 +0200 |
commit | da30ae4ffdd153a1eb32fb86f9ca9a65aa19e4e2 (patch) | |
tree | bd45012713b065829c1991e55d52081a8baef58a /flakes/private | |
parent | bd5c5d4e23ebd3863a960976767ed4a83dfd07fe (diff) | |
download | Nix-da30ae4ffdd153a1eb32fb86f9ca9a65aa19e4e2.tar.gz Nix-da30ae4ffdd153a1eb32fb86f9ca9a65aa19e4e2.tar.zst Nix-da30ae4ffdd153a1eb32fb86f9ca9a65aa19e4e2.zip |
Move secrets to flakes
Diffstat (limited to 'flakes/private')
-rw-r--r-- | flakes/private/openarc/flake.lock | 14 | ||||
-rw-r--r-- | flakes/private/openarc/flake.nix | 9 | ||||
-rw-r--r-- | flakes/private/opendmarc/flake.lock | 14 | ||||
-rw-r--r-- | flakes/private/opendmarc/flake.nix | 9 |
4 files changed, 38 insertions, 8 deletions
diff --git a/flakes/private/openarc/flake.lock b/flakes/private/openarc/flake.lock index f0f56c7..744d002 100644 --- a/flakes/private/openarc/flake.lock +++ b/flakes/private/openarc/flake.lock | |||
@@ -140,7 +140,19 @@ | |||
140 | "files-watcher": "files-watcher", | 140 | "files-watcher": "files-watcher", |
141 | "my-lib": "my-lib", | 141 | "my-lib": "my-lib", |
142 | "nix-lib": "nix-lib", | 142 | "nix-lib": "nix-lib", |
143 | "openarc": "openarc" | 143 | "openarc": "openarc", |
144 | "secrets": "secrets" | ||
145 | } | ||
146 | }, | ||
147 | "secrets": { | ||
148 | "locked": { | ||
149 | "narHash": "sha256-aRHKDVHDpnqpmgGhLGQxXwyTwmPuhUJTVcOLBYtY2ks=", | ||
150 | "path": "../../secrets", | ||
151 | "type": "path" | ||
152 | }, | ||
153 | "original": { | ||
154 | "path": "../../secrets", | ||
155 | "type": "path" | ||
144 | } | 156 | } |
145 | } | 157 | } |
146 | }, | 158 | }, |
diff --git a/flakes/private/openarc/flake.nix b/flakes/private/openarc/flake.nix index 5c4b73c..b4ab4c8 100644 --- a/flakes/private/openarc/flake.nix +++ b/flakes/private/openarc/flake.nix | |||
@@ -3,6 +3,10 @@ | |||
3 | path = "../../openarc"; | 3 | path = "../../openarc"; |
4 | type = "path"; | 4 | type = "path"; |
5 | }; | 5 | }; |
6 | inputs.secrets = { | ||
7 | path = "../../secrets"; | ||
8 | type = "path"; | ||
9 | }; | ||
6 | inputs.files-watcher = { | 10 | inputs.files-watcher = { |
7 | path = "../../files-watcher"; | 11 | path = "../../files-watcher"; |
8 | type = "path"; | 12 | type = "path"; |
@@ -14,14 +18,13 @@ | |||
14 | inputs.nix-lib.url = "github:NixOS/nixpkgs"; | 18 | inputs.nix-lib.url = "github:NixOS/nixpkgs"; |
15 | 19 | ||
16 | description = "Private configuration for openarc"; | 20 | description = "Private configuration for openarc"; |
17 | outputs = { self, nix-lib, my-lib, files-watcher, openarc }: | 21 | outputs = { self, nix-lib, my-lib, files-watcher, openarc, secrets }: |
18 | let | 22 | let |
19 | cfg = name': { config, lib, pkgs, name, ... }: { | 23 | cfg = name': { config, lib, pkgs, name, ... }: { |
20 | imports = [ | 24 | imports = [ |
21 | (my-lib.lib.withNarKey files-watcher "nixosModule") | 25 | (my-lib.lib.withNarKey files-watcher "nixosModule") |
22 | (my-lib.lib.withNarKey openarc "nixosModule") | 26 | (my-lib.lib.withNarKey openarc "nixosModule") |
23 | #FIXME: | 27 | (my-lib.lib.withNarKey secrets "nixosModule") |
24 | #(my-lib.lib.withNarKey secrets "nixosModule") | ||
25 | ]; | 28 | ]; |
26 | config = lib.mkIf (name == name') { | 29 | config = lib.mkIf (name == name') { |
27 | services.openarc = { | 30 | services.openarc = { |
diff --git a/flakes/private/opendmarc/flake.lock b/flakes/private/opendmarc/flake.lock index 121f51d..bd5019c 100644 --- a/flakes/private/opendmarc/flake.lock +++ b/flakes/private/opendmarc/flake.lock | |||
@@ -123,7 +123,19 @@ | |||
123 | "files-watcher": "files-watcher", | 123 | "files-watcher": "files-watcher", |
124 | "my-lib": "my-lib", | 124 | "my-lib": "my-lib", |
125 | "nix-lib": "nix-lib", | 125 | "nix-lib": "nix-lib", |
126 | "opendmarc": "opendmarc" | 126 | "opendmarc": "opendmarc", |
127 | "secrets": "secrets" | ||
128 | } | ||
129 | }, | ||
130 | "secrets": { | ||
131 | "locked": { | ||
132 | "narHash": "sha256-aRHKDVHDpnqpmgGhLGQxXwyTwmPuhUJTVcOLBYtY2ks=", | ||
133 | "path": "../../secrets", | ||
134 | "type": "path" | ||
135 | }, | ||
136 | "original": { | ||
137 | "path": "../../secrets", | ||
138 | "type": "path" | ||
127 | } | 139 | } |
128 | } | 140 | } |
129 | }, | 141 | }, |
diff --git a/flakes/private/opendmarc/flake.nix b/flakes/private/opendmarc/flake.nix index debcfbd..2b73070 100644 --- a/flakes/private/opendmarc/flake.nix +++ b/flakes/private/opendmarc/flake.nix | |||
@@ -3,6 +3,10 @@ | |||
3 | path = "../../opendmarc"; | 3 | path = "../../opendmarc"; |
4 | type = "path"; | 4 | type = "path"; |
5 | }; | 5 | }; |
6 | inputs.secrets = { | ||
7 | path = "../../secrets"; | ||
8 | type = "path"; | ||
9 | }; | ||
6 | inputs.files-watcher = { | 10 | inputs.files-watcher = { |
7 | path = "../../files-watcher"; | 11 | path = "../../files-watcher"; |
8 | type = "path"; | 12 | type = "path"; |
@@ -14,14 +18,13 @@ | |||
14 | inputs.nix-lib.url = "github:NixOS/nixpkgs"; | 18 | inputs.nix-lib.url = "github:NixOS/nixpkgs"; |
15 | 19 | ||
16 | description = "Private configuration for opendmarc"; | 20 | description = "Private configuration for opendmarc"; |
17 | outputs = { self, nix-lib, opendmarc, my-lib, files-watcher }: | 21 | outputs = { self, nix-lib, opendmarc, my-lib, files-watcher, secrets }: |
18 | let | 22 | let |
19 | cfg = name': { config, lib, pkgs, name, ... }: { | 23 | cfg = name': { config, lib, pkgs, name, ... }: { |
20 | imports = [ | 24 | imports = [ |
21 | (my-lib.lib.withNarKey files-watcher "nixosModule") | 25 | (my-lib.lib.withNarKey files-watcher "nixosModule") |
22 | (my-lib.lib.withNarKey opendmarc "nixosModule") | 26 | (my-lib.lib.withNarKey opendmarc "nixosModule") |
23 | #FIXME: | 27 | (my-lib.lib.withNarKey secrets "nixosModule") |
24 | #(my-lib.lib.withNarKey secrets "nixosModule") | ||
25 | ]; | 28 | ]; |
26 | config = lib.mkIf (name == name') { | 29 | config = lib.mkIf (name == name') { |
27 | users.users."${config.services.opendmarc.user}".extraGroups = [ "keys" ]; | 30 | users.users."${config.services.opendmarc.user}".extraGroups = [ "keys" ]; |