hosts: move miniflux from poseidon to hades

This commit is contained in:
Antoine Martin 2022-06-12 17:59:41 +02:00
parent 973415fe4d
commit eab8a279a1
7 changed files with 23 additions and 20 deletions

View file

@ -57,6 +57,12 @@ in {
my.services = { my.services = {
fail2ban.enable = true; fail2ban.enable = true;
miniflux = {
enable = true;
adminCredentialsFile = config.age.secrets."miniflux/admin-credentials".path;
privatePort = 8080;
};
restic-backup = { restic-backup = {
enable = true; enable = true;
repo = "b2:hades-backup-alarsyo"; repo = "b2:hades-backup-alarsyo";

View file

@ -13,6 +13,10 @@
// attrs; // attrs;
in in
lib.mapAttrs toSecret { lib.mapAttrs toSecret {
"gandi/api-key" = {};
"miniflux/admin-credentials" = {};
"restic-backup/hades-credentials" = {}; "restic-backup/hades-credentials" = {};
"restic-backup/hades-password" = {}; "restic-backup/hades-password" = {};

View file

@ -96,12 +96,6 @@ in {
port = 8083; port = 8083;
}; };
miniflux = {
enable = true;
adminCredentialsFile = config.age.secrets."miniflux/admin-credentials".path;
privatePort = 8080;
};
matrix = { matrix = {
enable = true; enable = true;
secretConfigFile = config.age.secrets."matrix-synapse/secret-config".path; secretConfigFile = config.age.secrets."matrix-synapse/secret-config".path;

View file

@ -21,8 +21,6 @@
owner = "matrix-synapse"; owner = "matrix-synapse";
}; };
"miniflux/admin-credentials" = {};
"nextcloud/admin-pass" = { "nextcloud/admin-pass" = {
owner = "nextcloud"; owner = "nextcloud";
}; };

View file

@ -1,11 +1,12 @@
age-encryption.org/v1 age-encryption.org/v1
-> ssh-ed25519 k2gHjw cPZECs2fo+sOznfaXiZjieBB6nwe4D7s5shh6YE/VWY -> ssh-ed25519 k2gHjw E972A3kem7+3ul2Ai8TV8EVkF9upClr46y1pbN+AfDY
Oi/B1v/9NkPORSllIxrFltkXVFUwFZcgJlcxUdGWjT0 qZdZuv+F9c46uxKWYdBKp6AGkTA5IEjcBwDlBHpEbCU
-> ssh-ed25519 z6Eu8Q G3/FgigyszNLmNCXiAxeWgsALohxZ+ZLLvhRg38CBxk -> ssh-ed25519 pX8y2g WEBknhwaTqfVzaLQRg1tfEY/aGZDFnH0PvXOZ3pC1k8
Z/OiV82zpOJhewVWvJSZUOCNzixFHvWl53cT/MIcZjo A23ELihRVsx8jhTcJAy3a1/saKWPc6ojf8HhPHj0niw
-> -%^%:-grease -> ssh-ed25519 z6Eu8Q IsN3L8xlk8VwrqUByYiUhthAk06KCn6hcYlZrodk/Vg
CkySRq28PocmIYUy7teSU9JkV8/tq/JIR83vFkuRSIYascFHgQrUhEbjy05uLMAe lX/SjRJIZEt1/Q6iLKFiUTHB4eH8ig4WJN79mU/AVUw
Sw -> &r29]-grease #}
--- LvigUOnTKMr+/oIUFVCWXM59d0Q9qePiZ1zqm8s/4lI 100ULy2nfLIOODMNPyvq0ATuGdVBAgwcXAs
ˇř·ëuśß>ŠÜ­¸Č<C2B8>¦u€Ü—úÍśjX§„ĺN÷?ŞI‡•<E280A1>¸SGYěĘ7S®mćΡ†ú‰f --- VkOZ7Vy9R4QPqvgAveJae/L4/nuDnQ/bAoN7UEKzxyw
Aľ©ępWřoňń wQ{3É”3
m2eÞ?×ò¥. M„<19>:Df)ïˆ;t {zR½ªo ñ²‡òE#c·çáéTE…Ú9¹H67ÊqAÜ_Lb}

View file

@ -11,13 +11,13 @@ let
all = users ++ machines; all = users ++ machines;
in { in {
"gandi/api-key.age".publicKeys = [alarsyo poseidon]; "gandi/api-key.age".publicKeys = [alarsyo hades poseidon];
"lohr/shared-secret.age".publicKeys = [alarsyo poseidon]; "lohr/shared-secret.age".publicKeys = [alarsyo poseidon];
"matrix-synapse/secret-config.age".publicKeys = [alarsyo poseidon]; "matrix-synapse/secret-config.age".publicKeys = [alarsyo poseidon];
"miniflux/admin-credentials.age".publicKeys = [alarsyo poseidon]; "miniflux/admin-credentials.age".publicKeys = [alarsyo hades];
"nextcloud/admin-pass.age".publicKeys = [alarsyo poseidon]; "nextcloud/admin-pass.age".publicKeys = [alarsyo poseidon];