1
0
Fork 0
dotfiles/agenix/hosts/sail/config.nix

148 lines
3 KiB
Nix
Raw Normal View History

2023-02-05 16:51:04 +00:00
{
age.secrets = {
2023-03-05 22:02:49 +00:00
acme-credentials = {
file = ./acme/credentials.age;
owner = "acme";
group = "acme";
};
2023-02-05 19:32:19 +00:00
mastodon-database-password = {
file = ./mastodon/databasePassword.age;
owner = "mastodon";
group = "mastodon";
};
mastodon-smtp-password = {
file = ./mastodon/smtpPassword.age;
owner = "mastodon";
group = "mastodon";
};
mastodon-otp-secret = {
file = ./mastodon/otpSecret.age;
owner = "mastodon";
group = "mastodon";
};
mastodon-secret-key-base = {
file = ./mastodon/secretKeyBase.age;
owner = "mastodon";
group = "mastodon";
};
mastodon-vapid-private-key = {
file = ./mastodon/vapidPrivateKey.age;
owner = "mastodon";
group = "mastodon";
};
mastodon-vapid-public-key = {
file = ./mastodon/vapidPublicKey.age;
owner = "mastodon";
group = "mastodon";
};
mastodon-extra-config = {
file = ./mastodon/extraConfig.age;
owner = "mastodon";
group = "mastodon";
};
2023-02-05 22:25:57 +00:00
synapse-extra-config = {
2023-02-05 22:30:19 +00:00
file = ./synapse/extraConfig.age;
2023-02-05 22:25:57 +00:00
owner = "matrix-synapse";
group = "matrix-synapse";
};
signald-environment = {
file = ./signald/environment.age;
};
2023-03-17 20:58:31 +00:00
mosquitto-password-weewx-proxy = {
file = ./mosquitto/passwordWeewxProxy.age;
2023-03-17 21:14:02 +00:00
owner = "mosquitto";
2023-03-17 21:13:20 +00:00
group = "mosquitto";
2023-03-17 20:58:31 +00:00
};
mosquitto-password-weewx = {
file = ./mosquitto/passwordWeewx.age;
2023-03-17 21:14:02 +00:00
owner = "mosquitto";
2023-03-17 21:13:20 +00:00
group = "mosquitto";
2023-03-17 20:58:31 +00:00
};
2023-02-27 16:51:39 +00:00
atuin-environment = {
file = ./atuin/environment.age;
owner = "atuin";
group = "atuin";
};
2023-02-05 16:52:42 +00:00
freshrss-user-password = {
file = ./freshrss/userPassword.age;
2023-02-05 17:06:51 +00:00
owner = "freshrss";
group = "freshrss";
};
freshrss-database-password = {
file = ./freshrss/databasePassword.age;
owner = "freshrss";
group = "freshrss";
2023-02-05 16:51:04 +00:00
};
2023-02-13 18:44:04 +00:00
2023-03-20 12:49:46 +00:00
invidious-database-password = {
file = ./invidious/databasePassword.age;
2023-03-20 13:07:23 +00:00
mode = "444";
2023-03-20 12:49:46 +00:00
};
invidious-auth = {
file = ./invidious/auth.age;
owner = "nginx";
group = "nginx";
};
2023-02-13 18:44:04 +00:00
nitter-config = {
file = ./nitter/config.age;
2023-02-14 10:04:10 +00:00
mode = "444";
2023-02-13 18:44:04 +00:00
};
2023-02-13 19:04:45 +00:00
nitter-auth = {
file = ./nitter/auth.age;
2023-02-13 19:08:31 +00:00
owner = "nginx";
group = "nginx";
2023-02-13 19:04:45 +00:00
};
2023-02-13 19:15:10 +00:00
libreddit-auth = {
file = ./libreddit/auth.age;
owner = "nginx";
group = "nginx";
};
2023-02-15 19:35:46 +00:00
2023-03-05 18:22:15 +00:00
rimgo-auth = {
file = ./rimgo/auth.age;
owner = "nginx";
group = "nginx";
};
2023-02-15 19:35:46 +00:00
anonymous-overflow-config = {
file = ./anonymous-overflow/config.age;
mode = "444";
};
anonymous-overflow-auth = {
file = ./anonymous-overflow/auth.age;
owner = "nginx";
group = "nginx";
};
2023-02-28 13:55:57 +00:00
proxitok-environment = {
file = ./proxitok/environment.age;
mode = "444";
};
proxitok-auth = {
file = ./proxitok/auth.age;
owner = "nginx";
group = "nginx";
};
2023-02-05 16:51:04 +00:00
};
}