configuration.nix/secrets.nix.example

39 lines
1,018 B
Text
Raw Normal View History

2023-08-05 14:11:03 +05:30
{
2024-01-04 21:51:21 +05:30
wireguard_config = {
peers = {
Proxy = {
name = "Proxy";
endpoint = "<ip:port>";
publicKey = "<peer public key>";
persistentKeepalive = 20;
allowedIPs = [
"x.x.x.x/xx"
"xxxx::/xx"
];
};
};
};
2023-08-05 14:11:03 +05:30
aria2_config = {
rpc_secret = "<rpc secret for aria2>";
};
frp_config = {
2024-01-04 21:51:21 +05:30
server_addr = "<ip addess of server running frps>";
2023-08-05 14:11:03 +05:30
token = "<secret token for frps <-> frpc connection>";
};
caddy_config = {
email = "<email for certificate generation>";
};
users = {
root.hashedPassword = "<password hash of root user>";
primary = {
userName = "<primary non-root username>";
realName = "<primary user's full name>";
hashedPassword = "<password hash of primary user>";
pgpFingerprint = "<primary user's pgp fingerprint>";
emailAddress = "<primary user's email>";
sshPublicKey = "<ssh public key>";
};
};
2024-01-04 21:51:21 +05:30
phone.sshPublicKey = "<ssh public key from phone>";
2023-08-05 14:11:03 +05:30
}