-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy path.sops.yaml
36 lines (31 loc) · 1.1 KB
/
.sops.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
# For sops-nix
# Defines public keys and location of secret files
# Make a host key:
# sudo mkdir -p /var/lib/private/sops/age
# sudo age-keygen -o /var/lib/private/sops/age/keys.txt
# Display the host public key:
# sudo age-keygen -y /var/lib/private/sops/age/keys.txt
# Or use the host SSH key:
# nix shell nixpkgs#ssh-to-age -c bash -c 'cat /etc/ssh/ssh_host_ed25519_key.pub | ssh-to-age'
# Add secrets
# sops secrets/secrets.yaml
# Rekey secrets.yaml after editing recipients in .sops.yaml:
# sops updatekeys secrets/secrets.yaml
keys:
# User-level key on desktop
- &desktop age17q2ewtw3xkdv3prlxv0zxexfrrzgz6y7q0rpy78du2z3yccqmv7q8nzs24
# From SSH host key
- &desktop-root age1nlemqdl7e5yx05vayza3em8s4vzzuu5uckfn276lk07k6fhpzysquyj443
- &sandbox age1gspny8l309qn7xy3kf8t9sd85nu9cs0mvnfw3k4mz9gkdsuj0pqqckwt8r
creation_rules:
# Keep sandbox (testing) secrets separate from main secrets.
- path_regex: secrets/sandbox.yaml
key_groups:
- age:
- *desktop
- *sandbox
- path_regex: secrets/[^/]+\.(yaml|json|env|ini)$
key_groups:
- age:
- *desktop
- *desktop-root