hosts: move miniflux from poseidon to hades
This commit is contained in:
parent
973415fe4d
commit
eab8a279a1
|
@ -57,6 +57,12 @@ in {
|
||||||
my.services = {
|
my.services = {
|
||||||
fail2ban.enable = true;
|
fail2ban.enable = true;
|
||||||
|
|
||||||
|
miniflux = {
|
||||||
|
enable = true;
|
||||||
|
adminCredentialsFile = config.age.secrets."miniflux/admin-credentials".path;
|
||||||
|
privatePort = 8080;
|
||||||
|
};
|
||||||
|
|
||||||
restic-backup = {
|
restic-backup = {
|
||||||
enable = true;
|
enable = true;
|
||||||
repo = "b2:hades-backup-alarsyo";
|
repo = "b2:hades-backup-alarsyo";
|
||||||
|
|
|
@ -13,6 +13,10 @@
|
||||||
// attrs;
|
// attrs;
|
||||||
in
|
in
|
||||||
lib.mapAttrs toSecret {
|
lib.mapAttrs toSecret {
|
||||||
|
"gandi/api-key" = {};
|
||||||
|
|
||||||
|
"miniflux/admin-credentials" = {};
|
||||||
|
|
||||||
"restic-backup/hades-credentials" = {};
|
"restic-backup/hades-credentials" = {};
|
||||||
"restic-backup/hades-password" = {};
|
"restic-backup/hades-password" = {};
|
||||||
|
|
||||||
|
|
|
@ -96,12 +96,6 @@ in {
|
||||||
port = 8083;
|
port = 8083;
|
||||||
};
|
};
|
||||||
|
|
||||||
miniflux = {
|
|
||||||
enable = true;
|
|
||||||
adminCredentialsFile = config.age.secrets."miniflux/admin-credentials".path;
|
|
||||||
privatePort = 8080;
|
|
||||||
};
|
|
||||||
|
|
||||||
matrix = {
|
matrix = {
|
||||||
enable = true;
|
enable = true;
|
||||||
secretConfigFile = config.age.secrets."matrix-synapse/secret-config".path;
|
secretConfigFile = config.age.secrets."matrix-synapse/secret-config".path;
|
||||||
|
|
|
@ -21,8 +21,6 @@
|
||||||
owner = "matrix-synapse";
|
owner = "matrix-synapse";
|
||||||
};
|
};
|
||||||
|
|
||||||
"miniflux/admin-credentials" = {};
|
|
||||||
|
|
||||||
"nextcloud/admin-pass" = {
|
"nextcloud/admin-pass" = {
|
||||||
owner = "nextcloud";
|
owner = "nextcloud";
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,11 +1,12 @@
|
||||||
age-encryption.org/v1
|
age-encryption.org/v1
|
||||||
-> ssh-ed25519 k2gHjw cPZECs2fo+sOznfaXiZjieBB6nwe4D7s5shh6YE/VWY
|
-> ssh-ed25519 k2gHjw E972A3kem7+3ul2Ai8TV8EVkF9upClr46y1pbN+AfDY
|
||||||
Oi/B1v/9NkPORSllIxrFltkXVFUwFZcgJlcxUdGWjT0
|
qZdZuv+F9c46uxKWYdBKp6AGkTA5IEjcBwDlBHpEbCU
|
||||||
-> ssh-ed25519 z6Eu8Q G3/FgigyszNLmNCXiAxeWgsALohxZ+ZLLvhRg38CBxk
|
-> ssh-ed25519 pX8y2g WEBknhwaTqfVzaLQRg1tfEY/aGZDFnH0PvXOZ3pC1k8
|
||||||
Z/OiV82zpOJhewVWvJSZUOCNzixFHvWl53cT/MIcZjo
|
A23ELihRVsx8jhTcJAy3a1/saKWPc6ojf8HhPHj0niw
|
||||||
-> -%^%:-grease
|
-> ssh-ed25519 z6Eu8Q IsN3L8xlk8VwrqUByYiUhthAk06KCn6hcYlZrodk/Vg
|
||||||
CkySRq28PocmIYUy7teSU9JkV8/tq/JIR83vFkuRSIYascFHgQrUhEbjy05uLMAe
|
lX/SjRJIZEt1/Q6iLKFiUTHB4eH8ig4WJN79mU/AVUw
|
||||||
Sw
|
-> &r29]-grease #}
|
||||||
--- LvigUOnTKMr+/oIUFVCWXM59d0Q9qePiZ1zqm8s/4lI
|
100ULy2nfLIOODMNPyvq0ATuGdVBAgwcXAs
|
||||||
ˇř·ëuśß>ŠÜ‚¸Č<C2B8>¦u€ÜIé—úÍśjX§„ĺN÷?ŞI‡•<E280A1>¸SGYěĘ7S®m›ćΡ†ú‰f
|
--- VkOZ7Vy9R4QPqvgAveJae/L4/nuDnQ/bAoN7UEKzxyw
|
||||||
Aľ©ę–pWřoňń
|
wQ{3É”3‘
|
||||||
|
m2eÞ?×ò¥.M„<19>:Df)ïˆ;t{zR½ªo’ñ²›‡òE#c·çáéTE…Ú9¹H67ÊqAÜ_Lb}
|
Binary file not shown.
|
@ -11,13 +11,13 @@ let
|
||||||
|
|
||||||
all = users ++ machines;
|
all = users ++ machines;
|
||||||
in {
|
in {
|
||||||
"gandi/api-key.age".publicKeys = [alarsyo poseidon];
|
"gandi/api-key.age".publicKeys = [alarsyo hades poseidon];
|
||||||
|
|
||||||
"lohr/shared-secret.age".publicKeys = [alarsyo poseidon];
|
"lohr/shared-secret.age".publicKeys = [alarsyo poseidon];
|
||||||
|
|
||||||
"matrix-synapse/secret-config.age".publicKeys = [alarsyo poseidon];
|
"matrix-synapse/secret-config.age".publicKeys = [alarsyo poseidon];
|
||||||
|
|
||||||
"miniflux/admin-credentials.age".publicKeys = [alarsyo poseidon];
|
"miniflux/admin-credentials.age".publicKeys = [alarsyo hades];
|
||||||
|
|
||||||
"nextcloud/admin-pass.age".publicKeys = [alarsyo poseidon];
|
"nextcloud/admin-pass.age".publicKeys = [alarsyo poseidon];
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue