Kieran's opinionated (and probably slightly dumb) nix config

chore: add resend secrets

+43 -7
+19 -7
moonlark/configuration.nix
··· 118 118 pkgs.openssl 119 119 pkgs.unstable.nodePackages_latest.prisma 120 120 pkgs.nodejs_22 121 + pkgs.invoice 122 + pkgs.pop 123 + pkgs.gum 124 + pkgs.unstable.netlify-cli 121 125 ]; 122 126 123 127 services.gnome.gnome-keyring.enable = true; ··· 144 148 fira 145 149 ]; 146 150 151 + # import the secret 152 + age.identityPaths = [ "/home/kierank/.ssh/id_rsa" "/etc/ssh/id_rsa" "/mnt/etc/ssh/id_rsa" ]; 153 + age.secrets = { 154 + wifi = { 155 + file = ../secrets/wifi.age; 156 + owner = "kierank"; 157 + }; 158 + resend = { 159 + file = ../secrets/resend.age; 160 + owner = "kierank"; 161 + }; 162 + }; 163 + 147 164 environment.sessionVariables = { 148 165 XDG_CACHE_HOME = "$HOME/.cache"; 149 166 XDG_CONFIG_HOME = "$HOME/.config"; ··· 154 171 PRISMA_QUERY_ENGINE_LIBRARY = "${pkgs.prisma-engines}/lib/libquery_engine.node"; 155 172 PRISMA_QUERY_ENGINE_BINARY = "${pkgs.prisma-engines}/bin/query-engine"; 156 173 PRISMA_SCHEMA_ENGINE_BINARY = "${pkgs.prisma-engines}/bin/schema-engine"; 157 - }; 158 - 159 - # import the secret 160 - age.identityPaths = [ "/home/kierank/.ssh/id_rsa" "/etc/ssh/id_rsa" "/mnt/etc/ssh/id_rsa" ]; 161 - age.secrets.wifi = { 162 - file = ../secrets/wifi.age; 163 - owner = "kierank"; 174 + RESEND_API_KEY = ''$(${pkgs.coreutils}/bin/cat ${config.age.secrets.resend.path})''; 175 + POP_FROM = "me@dunkirk.sh"; 164 176 }; 165 177 166 178 # setup the network
+23
secrets/resend.age
··· 1 + age-encryption.org/v1 2 + -> ssh-rsa DqcG0Q 3 + QVtoU4x4NGS4wDmzRDa98V76GXXWiE1ArRyVxYood6/QbXP5ZakEh5m0RQX7zU+6 4 + 8CXZyA9ME24eMIyCGN7jvgYurUVH32grFbqO0SV6Ozsdd+8KZw3MeWp+08z9xJlU 5 + ZkROo4yTViJO8XfigTdQlfkEJu8f/uwWPZyDG0vEr5aXteePffkEmgbP7IZ6uSwC 6 + G3a5LoCOx2/lcZ2VA0trQpapFezTUotdLbMQ6+Eu+Rv1Eh9SjBNJZ2gN+CiHko/2 7 + jSBsiOvJDJ7iMg9f2qS7A8NOD0VTHxFxG4WMoYJ6FjIdNX5Yghdz7vkcHZzAgZBy 8 + jQ3F3kXZ+M0gDUT9eKFPP9q5qk3IK9HAUlnZElJS+J07KSOOgD34P7I6AT8mcmJ0 9 + xXl7idqlX/NmmBlh8HbhdB+TX79IoKkm5G+Bi+YbRBvMAh9Xy5ig9uIUJKJcnpnR 10 + cL0uDBoRsbyxdJpUF5NfXJj2EmERynnMpUuvh2ThNMcsQKeVNii5Mvk+HwngF72Q 11 + 12 + -> ssh-rsa DqcG0Q 13 + V/Qx/lo8OPBqrcx9FSLYN+5q+Gf/fouyGS4ksd+Ruag+v3LtUgzR+t8y6VNo3PD6 14 + lM1DeMuDQmie70jP/rW7NcUS4SzJ1xWKina+Ix4uA8BM2W4aEZwn6qgWdOzkryhJ 15 + 8tB0MZuogcvyz5DHZYg2riKQkLnkD0oGbZIfeRM9cFz7UX2KjnGQl2fitnASk+Ub 16 + hIaF0MPJo0uZrBhdGulHH5qx4v5vahK/M3vcgIY8NTAHG3/fU75kJ5mcQd4Kwesm 17 + O1Q2rato95ddM98IngNQ7hgbeSL9Pr6cRM2BaNsQsI09RUjV/PN8LmAH0eHhWT1k 18 + KIIjlAzRjOb4cN133zS63H6kkur2LdjHbBxmvt0XcCNc/sbOZdHnB6oQQa0cPuqc 19 + Qi/j9nkinAiDxSuJfrsMZqZGbA7AQbCd7DtlJsZn18/nKusjCKuagiWXhcZFs64C 20 + o7teM8YUrzb8vBjYkMMzs/BJoytzxoW7yxLkuAs28Wj8C0K3/dPSWesPiz9pUUHp 21 + 22 + --- E9XQg8S6Hb5LUQciLQZWeIt8cAfJz2jR7L+Rh56hKmI 23 + AO���=����9���l��-�g��z�a)��>�;�0n>{�rZt� ���~_RP���'[;4���n�* &L
+1
secrets/secrets.nix
··· 7 7 in 8 8 { 9 9 "wifi.age".publicKeys = [ kierank moonlark ]; 10 + "resend.age".publicKeys = [ kierank moonlark ]; 10 11 }