From 12fbd8e3692f694a10ed23dd956f93e8a25ea855 Mon Sep 17 00:00:00 2001 From: Nathan Date: Mon, 11 Aug 2025 00:06:24 -0500 Subject: [PATCH] sops --- system-config/configuration/sandbox-nathan/default.nix | 4 ++-- system-config/services/containers/keycloak/default.nix | 6 +++++- 2 files changed, 7 insertions(+), 3 deletions(-) diff --git a/system-config/configuration/sandbox-nathan/default.nix b/system-config/configuration/sandbox-nathan/default.nix index 7106264..5f4b225 100644 --- a/system-config/configuration/sandbox-nathan/default.nix +++ b/system-config/configuration/sandbox-nathan/default.nix @@ -94,7 +94,7 @@ }; }; - sops = { + /*sops = { age.keyFile = "/home/nathan/.config/sops/age/keys.txt"; defaultSopsFile = ./secrets.yaml; defaultSopsFormat = "yaml"; @@ -104,7 +104,7 @@ neededForUsers = true; }; }; - }; + };*/ programs.fuse.userAllowOther = true; diff --git a/system-config/services/containers/keycloak/default.nix b/system-config/services/containers/keycloak/default.nix index 07fc786..07f7ccc 100644 --- a/system-config/services/containers/keycloak/default.nix +++ b/system-config/services/containers/keycloak/default.nix @@ -1,10 +1,14 @@ -{ config, lib, ... }: { +{ config, lib, inputs, ... }: { options.sysconfig.opts.virtualization.keycloak.enable = lib.options.mkOption { type = lib.types.bool; default = false; }; + imports = [ + inputs.sops-nix.nixosModules.sops + ]; + config = lib.mkIf config.sysconfig.opts.virtualization.keycloak.enable { sops.secrets."keycloak/dbpass" = {};