all: refactor host specific secrets

This commit is contained in:
Adithya 2024-06-30 18:45:27 +05:30
parent 95c3317490
commit 5a8b7d4c74
Signed by: adtya
GPG key ID: B8857BFBA2C47B9C
5 changed files with 22 additions and 20 deletions

View file

@ -14,26 +14,6 @@
group = config.users.users.root.group;
neededForUsers = true;
};
"wireguard/psk/skipper" = {
mode = "400";
owner = config.users.users.root.name;
group = config.users.users.root.group;
};
"wireguard/psk/rico0" = {
mode = "400";
owner = config.users.users.root.name;
group = config.users.users.root.group;
};
"wireguard/psk/rico1" = {
mode = "400";
owner = config.users.users.root.name;
group = config.users.users.root.group;
};
"wireguard/psk/rico2" = {
mode = "400";
owner = config.users.users.root.name;
group = config.users.users.root.group;
};
};
};
}

View file

@ -1,4 +1,10 @@
{ config, ... }: {
sops.secrets."wireguard/psk/rico0" = {
mode = "400";
owner = config.users.users.root.name;
group = config.users.users.root.group;
};
networking.firewall.trustedInterfaces = [ "wg0" ];
networking.wireguard = {
enable = true;

View file

@ -1,4 +1,10 @@
{ config, ... }: {
sops.secrets."wireguard/psk/rico1" = {
mode = "400";
owner = config.users.users.root.name;
group = config.users.users.root.group;
};
networking.firewall.trustedInterfaces = [ "wg0" ];
networking.wireguard = {
enable = true;

View file

@ -1,4 +1,9 @@
{ config, ... }: {
sops.secrets."wireguard/psk/rico2" = {
mode = "400";
owner = config.users.users.root.name;
group = config.users.users.root.group;
};
networking.firewall.trustedInterfaces = [ "wg0" ];
networking.wireguard = {
enable = true;

View file

@ -1,4 +1,9 @@
{ config, ... }: {
sops.secrets."wireguard/psk/skipper" = {
mode = "400";
owner = config.users.users.root.name;
group = config.users.users.root.group;
};
networking.firewall.trustedInterfaces = [ "wg0" ];
networking.wireguard = {
enable = true;