diff --git a/.sops.yaml b/.sops.yaml new file mode 100644 index 0000000..aa3f5f4 --- /dev/null +++ b/.sops.yaml @@ -0,0 +1,14 @@ +# This example uses YAML anchors which allows reuse of multiple keys +# without having to repeat yourself. +# Also see https://github.com/Mic92/dotfiles/blob/master/nixos/.sops.yaml +# for a more complex example. +keys: + - &ephase 26D5035DF6B4BE70F2B51B4C178139E02D2ACF00 + - &luci age19kvatn3zpeqh9zy7u8ce0hqe7dyaesxrukewxt8u7pf4cqkj5dfqm5nlwy +creation_rules: + - path_regex: secrets/[^/]+\.(yaml|json|env|ini)$ + key_groups: + - age: + - *luci + pgp: + - *ephase diff --git a/modules/home-manager/accounts/dav/default.nix b/modules/home-manager/accounts/dav/default.nix index ddb3f4a..1282443 100644 --- a/modules/home-manager/accounts/dav/default.nix +++ b/modules/home-manager/accounts/dav/default.nix @@ -1,23 +1,36 @@ -{ lib, config, inputs, pkgs, ... }: +{ lib, config, ... }: with lib; let - cfg = config.modules.dav; - secretsDirectory = "${(builtins.toString inputs.nix-private)}/secrets"; + cfg = config.modules.accounts.dav; vdirsyncerConf = { - enable = true; - auth = "basic"; + enable = true; + auth = "basic"; + userNameCommand = [ + "cat" + "${config.sops.secrets."webdav/username".path}" + ]; }; in { - options.modules.dav = { + options.modules.accounts.dav = { enable = mkEnableOption "enable personal Caldav / CardDav"; }; config = mkIf cfg.enable { - + + ## Manage secrets used in this module sops = { secrets = { - "${inputs.nix-private.dav.personal.secret.key}" = { - sopsFile = "${secretsDirectory}/${inputs.nix-private.dav.personal.secret.file}"; + "webdav/url/caldav" = { + sopsFile = ../../../../secrets/accounts.yaml; + }; + "webdav/url/carddav" = { + sopsFile = ../../../../secrets/accounts.yaml; + }; + "webdav/username" = { + sopsFile = ../../../../secrets/accounts.yaml; + }; + "webdav/password" = { + sopsFile = ../../../../secrets/accounts.yaml; }; }; }; @@ -25,15 +38,11 @@ in accounts.calendar.basePath = ".local/share/calendars"; accounts.calendar.accounts.personal_calendars = { name = "personal_calendar"; - remote = { - type = "caldav"; - url = inputs.nix-private.dav.personal.caldavUrl; - userName = inputs.nix-private.dav.personal.userName; - passwordCommand = [ - "${pkgs.coreutils}/bin/cat" - "${config.sops.secrets."${inputs.nix-private.dav.personal.secret.key}".path}" - ]; - }; + remote.type = "caldav"; + remote.passwordCommand = [ + "cat" + "${config.sops.secrets."webdav/password".path}" + ]; vdirsyncer = vdirsyncerConf // { metadata = [ "color" @@ -43,6 +52,10 @@ in "VTODO" "VEVENT" ]; + urlCommand = [ + "cat" + "${config.sops.secrets."webdav/url/caldav".path}" + ]; collections = [ "from a" "from b" @@ -57,23 +70,22 @@ in accounts.contact.basePath = ".local/share/contacts"; accounts.contact.accounts.personal_contacts = { - remote = { - type = "carddav"; - url = inputs.nix-private.dav.personal.carddavUrl; - userName = inputs.nix-private.dav.personal.userName; - passwordCommand = [ - "${pkgs.coreutils}/bin/cat" - "${config.sops.secrets."${inputs.nix-private.dav.personal.secret.key}".path}" - ]; - }; - local = { - type = "filesystem"; - fileExt = ".vcf"; - }; + remote.type = "carddav"; + remote.passwordCommand = [ + "cat" + "${config.sops.secrets."webdav/password".path}" + ]; + local.type = "filesystem"; + local.fileExt = ".vcf"; vdirsyncer = vdirsyncerConf // { + metadata = [ "displayname" ]; + urlCommand = [ + "cat" + "${config.sops.secrets."webdav/url/carddav".path}" + ]; }; khal = { enable = true; diff --git a/secrets/accounts.yaml b/secrets/accounts.yaml new file mode 100644 index 0000000..f1d11e4 --- /dev/null +++ b/secrets/accounts.yaml @@ -0,0 +1,46 @@ +webdav: + url: + caldav: ENC[AES256_GCM,data:UMoSLlEhxtJ/80wIQlGaqfu/OI4JXodSLYySwAyJJg==,iv:WTGZ8mq3huVEPMNOBDGdghy994Z5vCzvVDMvp5djnlw=,tag:s34QZVjqvNiQT/P9SVCeUw==,type:str] + carddav: ENC[AES256_GCM,data:oGLZ4c02b4wiYCqhyQzC1NG210BUpSpSqibi7xvtIjHhW/X4wvYU5QPm2VKCrJYpvqIEeiah1TDwvByqLpBz5d8Ucyme,iv:cwaWTvdS5eEGmwm5+n2N31ajzAXPix4woXECUqXtk3E=,tag:jRK3viRDzwd5JmNh6UVt2A==,type:str] + username: ENC[AES256_GCM,data:Z/QVE3Di,iv:pRBgv/K+VzbF5/iaftTDoxZWjvVztPznLJ5LKpKQaoM=,tag:rCw9mLFtzhpp5vO5eVKqvA==,type:str] + password: ENC[AES256_GCM,data:X7hjL2VczjPGKF4n2g==,iv:BwqXZ3h+EIHU+Cvx8gDYhgd2NiBkednUz+ksp40sYas=,tag:ngbtcYsfOxvTTcftBE+lMg==,type:str] +sops: + kms: [] + gcp_kms: [] + azure_kv: [] + hc_vault: [] + age: + - recipient: age19kvatn3zpeqh9zy7u8ce0hqe7dyaesxrukewxt8u7pf4cqkj5dfqm5nlwy + enc: | + -----BEGIN AGE ENCRYPTED FILE----- + YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBJRk1KamJ3clA4QTBZT3BL + blZGaVNQb2tWMTkrWUxicm9PdXV6RTJJbXh3ClJJQTJON3BBRGJ4RWg1UnRQNVoy + bFllM0E1djlOUTVRQ1lZc1JEQS9YNXcKLS0tIEhac3FpUVd6TW9pbUMyNlAzbk5P + dGZkOExNbTRuS0NvaDgzUmlFRVNvckEK7PSVxtaDd/3yWIIuAMcX586imRu/On09 + duwFZ5btOY2fxNYgV9sCG7Vr+OGCO8n9OWBS9hLy7MJwAzi/f5l7Fg== + -----END AGE ENCRYPTED FILE----- + lastmodified: "2024-07-20T16:25:53Z" + mac: ENC[AES256_GCM,data:4vNjXD26LeHv00B4gDumkUzq7Us9HRWv79Wq3iyTeDjKOXw9lluIQIZsDB1aQS90dTNCEvlbZ6pt1oHRqGySpDcKHId6rsUy9qkeLl683haKKilT47ABpGiMd2sY6xL1FQPiXMH4qc7wxh+EuS0N6Y+mgIY9Kn0qP6ion1s/lqs=,iv:JZ5lnJKBXQeKadihHyItueHDO6zULVMLSPmGCe+Qlz4=,tag:+bh08XI2TWov6yQJ1+KtoA==,type:str] + pgp: + - created_at: "2024-06-24T20:12:19Z" + enc: |- + -----BEGIN PGP MESSAGE----- + + hQIMA9/d8qUtz+3ZAQ/7BoojnrnGgF4TEnFTJMWVy229Cx1knABVot45A1frFWmS + kwIGPGQPlCjGF4tyIOmBy8WpQWBuKffYakCC/OklHCyfnLjsyhcR+MSqDVzqMmy3 + dEThTcGPRCerM1Mu8oWPk0yq5AKzuJagr9+4ITrljsh6tRwA4qmfKxQ6BZhGPQHJ + 3FZwcQHfaDkuag3o5swNKHX//MIZwEDyXJHKgeTUPhENzc0POdjPU5CZN0HBU4ep + 98PJAlAiDKyYSQkg1MfOWvCllyfvhGPzTLEPq5jazqpc7lgNKxJGU5kTnUUi2fKS + gCJdqRlMBO/3S8wUZg0gIsw1+OwmfL0y99MeMP1ggGaqFkGs6Pqj7sRd6/QcuP0l + w2QZgB9S6DOUkfy5m5Xw7VboE2aAX4BOrWNJVDy//358322xxuqZdbp3pIjnsmt/ + b2gTZb1eGK/o5GmXfgzCf7In1b3wldg/ZSHyxGct1CJIgNBb1nFDMmyVI9J5zER0 + 2ZTflNfN/cxttW2BvGRoL3fWXnO+ThLHz1q1WWWCOC7TLTnESOtAueSCTlrMcij/ + 7zL7Wc98JgdAuxhznMjiYqY9nZK48jhBCBOdC0uool/FNElcStUaOq1O3HRo5qoi + s277Wqtp0uZqeLBxgNEGwicEDm9BbrVzH9egYGMaPJI6STIJYduJXBegnPf5KFXS + XgHTJyK7u9MrZ58kkiT95455NEqQd27JMqmsGwReX6/LpYs5KJJGT4qGNab8GM5A + VMniFb1GOXIOxSbYgfkgaHc+zK43O5UwBwegOneTC6ak/CQYvD9xQS94FKqwF10= + =7pZ/ + -----END PGP MESSAGE----- + fp: 26D5035DF6B4BE70F2B51B4C178139E02D2ACF00 + unencrypted_suffix: _unencrypted + version: 3.8.1