2021-07-26 01:29:05 +02:00
|
|
|
let
|
|
|
|
pkgs = import <nixpkgs> {};
|
|
|
|
lib = pkgs.lib;
|
2022-08-16 01:59:59 +02:00
|
|
|
readPubkeys = user: builtins.filter (k: k != "") (lib.splitString "\n" (builtins.readFile (../../pubkeys + "/${user}.keys")));
|
2023-01-24 21:14:04 +01:00
|
|
|
superadmins = (readPubkeys "raito") ++ (readPubkeys "gdd") ++ (readPubkeys "hubrecht") ++ (readPubkeys "mrf");
|
2021-07-26 01:29:05 +02:00
|
|
|
core-services-01 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILrnZxP4OUGDzd1uykMghzFNLH0Fg42hH+0qxif6O6oU";
|
|
|
|
systems = [ core-services-01 ];
|
|
|
|
in
|
|
|
|
{
|
|
|
|
"keycloakDatabasePasswordFile.age".publicKeys = superadmins ++ systems;
|
|
|
|
"oauth2ProxyKeyFile.age".publicKeys = superadmins ++ systems;
|
2021-07-26 02:15:44 +02:00
|
|
|
"droneKeyFile.age".publicKeys = superadmins ++ systems;
|
2022-01-26 00:59:59 +01:00
|
|
|
"dexGiteaClientSecret.age".publicKeys = superadmins ++ systems;
|
2022-02-23 01:42:26 +01:00
|
|
|
"matterbridge.age".publicKeys = superadmins ++ systems;
|
2022-09-06 01:06:39 +02:00
|
|
|
"snipeItAppKey.age".publicKeys = superadmins ++ systems;
|
|
|
|
"snipeItOidcClientSecret.age".publicKeys = superadmins ++ systems;
|
2021-07-26 01:29:05 +02:00
|
|
|
}
|
|
|
|
|