1
0
Fork 0
dotfiles/agenix/hosts/tanker/config.nix

164 lines
3.3 KiB
Nix
Raw Normal View History

2023-02-05 16:51:04 +00:00
{
age.secrets = {
2023-09-24 16:10:08 +00:00
nix-netrc = {
file = ../all/nix/netrc.age;
path = "/etc/nix/netrc";
mode = "444";
};
user-daniel-password = {
file = ./user/danielPassword.age;
};
2023-03-05 22:02:49 +00:00
acme-credentials = {
file = ./acme/credentials.age;
owner = "acme";
group = "acme";
};
2023-04-04 13:05:39 +00:00
tailscale-authkey = {
file = ./tailscale/authkey.age;
};
2023-06-23 18:08:22 +00:00
msmtp-password = {
file = ./msmtp/password.age;
2023-09-11 22:05:25 +00:00
mode = "444";
2023-06-23 18:08:22 +00:00
};
atticd-environment = {
file = ./atticd/environment.age;
};
fedifetcher-config = {
file = ./fedifetcher/config.age;
};
2023-09-12 22:00:21 +00:00
forgejo-actions-token = {
file = ./forgejo-actions/token.age;
};
headscale-database-password = {
file = ./headscale/dbPassword.age;
owner = "headscale";
group = "headscale";
};
headscale-acls = {
file = ./headscale/acls.age;
owner = "headscale";
group = "headscale";
};
2023-06-25 10:05:52 +00:00
linkding-environment = {
file = ./linkding/environment.age;
};
2023-02-05 19:32:19 +00:00
mastodon-database-password = {
file = ./mastodon/databasePassword.age;
owner = "mastodon";
group = "mastodon";
};
mastodon-smtp-password = {
file = ./mastodon/smtpPassword.age;
owner = "mastodon";
group = "mastodon";
};
mastodon-otp-secret = {
file = ./mastodon/otpSecret.age;
owner = "mastodon";
group = "mastodon";
};
mastodon-secret-key-base = {
file = ./mastodon/secretKeyBase.age;
owner = "mastodon";
group = "mastodon";
};
mastodon-vapid-private-key = {
file = ./mastodon/vapidPrivateKey.age;
owner = "mastodon";
group = "mastodon";
};
mastodon-vapid-public-key = {
file = ./mastodon/vapidPublicKey.age;
owner = "mastodon";
group = "mastodon";
};
mastodon-extra-config = {
file = ./mastodon/extraConfig.age;
owner = "mastodon";
group = "mastodon";
};
miniflux-credentials = {
file = ./miniflux/credentials.age;
2023-03-25 13:08:09 +00:00
};
2023-03-17 20:58:31 +00:00
mosquitto-password-weewx-proxy = {
file = ./mosquitto/passwordWeewxProxy.age;
2023-03-17 21:14:02 +00:00
owner = "mosquitto";
2023-03-17 21:13:20 +00:00
group = "mosquitto";
2023-03-17 20:58:31 +00:00
};
mosquitto-password-weewx = {
file = ./mosquitto/passwordWeewx.age;
2023-03-17 21:14:02 +00:00
owner = "mosquitto";
2023-03-17 21:13:20 +00:00
group = "mosquitto";
2023-03-17 20:58:31 +00:00
};
anonymous-overflow-config = {
file = ./anonymous-overflow/config.age;
2023-02-05 17:06:51 +00:00
};
invidious-extra-settings = {
file = ./invidious/extraSettings.age;
mode = "444";
2023-02-05 16:51:04 +00:00
};
2023-02-13 18:44:04 +00:00
proxitok-environment = {
file = ./proxitok/environment.age;
2023-03-20 12:49:46 +00:00
};
mautrix-signal-config = {
file = ./mautrix-signal/config.age;
2023-02-13 18:44:04 +00:00
};
2023-02-13 19:04:45 +00:00
synapse-extra-config = {
file = ./synapse/extraConfig.age;
owner = "matrix-synapse";
group = "matrix-synapse";
};
2023-07-24 10:27:16 +00:00
synapse-sliding-sync-config = {
file = ./synapse/slidingSyncConfig.age;
};
mautrix-whatsapp-config = {
file = ./mautrix-whatsapp/config.age;
};
weewx-config = {
file = ./weewx/config.age;
symlink = false;
path = "/var/lib/weewx/weewx.conf";
mode = "640";
owner = "421";
group = "421";
};
weewx-skin = {
file = ./weewx/skin.age;
symlink = false;
path = "/var/lib/weewx/skin-wdc/skin.conf";
mode = "644";
owner = "421";
group = "421";
2023-02-28 13:55:57 +00:00
};
2023-02-05 16:51:04 +00:00
};
}