mirror of
https://github.com/ryan4yin/nix-config.git
synced 2026-01-11 22:30:25 +01:00
feat: data-crypted
This commit is contained in:
@@ -35,6 +35,7 @@ in {
|
||||
server.operation.enable = mkEnableOption "NixOS Secrets for Operation Servers(Backup, Monitoring, etc)";
|
||||
server.kubernetes.enable = mkEnableOption "NixOS Secrets for Kubernetes";
|
||||
server.webserver.enable = mkEnableOption "NixOS Secrets for Web Servers(contains tls cert keys)";
|
||||
server.storage.enable = mkEnableOption "NixOS Secrets for HDD Data's LUKS Encryption";
|
||||
|
||||
impermanence.enable = mkEnableOption "whether use impermanence and ephemeral root file system";
|
||||
};
|
||||
@@ -249,5 +250,24 @@ in {
|
||||
};
|
||||
};
|
||||
})
|
||||
|
||||
(mkIf cfg.server.storage.enable {
|
||||
age.secrets = {
|
||||
"hdd-luks-crypt-key" = {
|
||||
file = "${mysecrets}/hdd-luks-crypt-key.age";
|
||||
mode = "0400";
|
||||
owner = "root";
|
||||
};
|
||||
};
|
||||
|
||||
# place secrets in /etc/
|
||||
environment.etc = {
|
||||
"agenix/hdd-luks-crypt-key" = {
|
||||
source = config.age.secrets."hdd-luks-crypt-key".path;
|
||||
mode = "0400";
|
||||
user = "root";
|
||||
};
|
||||
};
|
||||
})
|
||||
]);
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user