1
0
Fork 0

controld: replace agh everywhere

This commit is contained in:
Daniel Kempkens 2024-07-27 23:49:54 +02:00
parent c76cc915f5
commit 335f91a670
Signed by: daniel
SSH key fingerprint: SHA256:Ks/MyhQYcPRQiwMKLAKquWCdCPe3JXlb1WttgnAoSeM
10 changed files with 19 additions and 11 deletions

View file

@ -10,14 +10,15 @@
group = "acme"; group = "acme";
}; };
cfdyndns-api-token = {
file = ./cfdyndns/apiToken.age;
};
tailscale-authkey = { tailscale-authkey = {
file = ./tailscale/authkey.age; file = ./tailscale/authkey.age;
}; };
controld-config = {
file = ./controld/config.age;
path = "/var/lib/controld/ctrld.toml";
};
adguardhome-sync-environment = { adguardhome-sync-environment = {
file = ./adguardhome-sync/environment.age; file = ./adguardhome-sync/environment.age;
}; };

Binary file not shown.

View file

@ -22,6 +22,11 @@
file = ./wireguard/config.age; file = ./wireguard/config.age;
}; };
controld-config = {
file = ./controld/config.age;
path = "/var/lib/controld/ctrld.toml";
};
tubearchivist-environment-ta = { tubearchivist-environment-ta = {
file = ./tubearchivist/environmentTA.age; file = ./tubearchivist/environmentTA.age;
}; };

Binary file not shown.

Binary file not shown.

View file

@ -77,6 +77,8 @@ in
"agenix/hosts/mediaserver/wireguard/config.age".publicKeys = mediaserver; "agenix/hosts/mediaserver/wireguard/config.age".publicKeys = mediaserver;
"agenix/hosts/mediaserver/controld/config.age".publicKeys = mediaserver;
"agenix/hosts/mediaserver/tubearchivist/environmentTA.age".publicKeys = mediaserver; "agenix/hosts/mediaserver/tubearchivist/environmentTA.age".publicKeys = mediaserver;
"agenix/hosts/mediaserver/tubearchivist/environmentES.age".publicKeys = mediaserver; "agenix/hosts/mediaserver/tubearchivist/environmentES.age".publicKeys = mediaserver;
@ -94,6 +96,8 @@ in
"agenix/hosts/argon/cfdyndns/apiToken.age".publicKeys = argon; "agenix/hosts/argon/cfdyndns/apiToken.age".publicKeys = argon;
"agenix/hosts/argon/controld/config.age".publicKeys = argon;
"agenix/hosts/argon/forgejo-actions/token.age".publicKeys = argon; "agenix/hosts/argon/forgejo-actions/token.age".publicKeys = argon;
"agenix/hosts/argon/tailscale/authkey.age".publicKeys = argon; "agenix/hosts/argon/tailscale/authkey.age".publicKeys = argon;

View file

@ -19,13 +19,12 @@ in
../nixos/nginx.nix ../nixos/nginx.nix
../nixos/nginx-argon.nix ../nixos/nginx-argon.nix
(import ../nixos/adguardhome.nix (args // { inherit secret; }))
#(import ../nixos/cfdyndns.nix (args // { inherit secret; }))
../nixos/attic.nix ../nixos/attic.nix
../nixos/chrony.nix ../nixos/chrony.nix
(import ../nixos/controld.nix (args // { podmanDNS = false; }))
(import ../nixos/forgejo-runner.nix (args // { inherit secret; name = "argon"; tag = "ubuntu-latest-arm64"; nixTag = "arm64"; })) (import ../nixos/forgejo-runner.nix (args // { inherit secret; name = "argon"; tag = "ubuntu-latest-arm64"; nixTag = "arm64"; }))
../nixos/tailscale-router.nix ../nixos/tailscale-router.nix
@ -38,7 +37,6 @@ in
../nixos/weewx-proxy.nix ../nixos/weewx-proxy.nix
../nixos/container.nix ../nixos/container.nix
../nixos/adguardhome-sync.nix
../nixos/homebridge.nix ../nixos/homebridge.nix
]; ];

View file

@ -19,10 +19,10 @@ in
../nixos/nginx-mediaserver.nix ../nixos/nginx-mediaserver.nix
../nixos/postgresql.nix ../nixos/postgresql.nix
(import ../nixos/adguardhome.nix (args // { inherit secret; }))
../nixos/attic.nix ../nixos/attic.nix
(import ../nixos/controld.nix (args // { podmanDNS = true; }))
../nixos/ddg.nix ../nixos/ddg.nix
../nixos/tailscale-router.nix ../nixos/tailscale-router.nix

View file

@ -7,7 +7,7 @@
startLimitIntervalSec = 5; startLimitIntervalSec = 5;
startLimitBurst = 10; startLimitBurst = 10;
serviceConfig = { serviceConfig = {
ExecStart = "${pkgs.controld}/bin/ctrld run -vvvv"; ExecStart = "${pkgs.controld}/bin/ctrld run";
WorkingDirectory = "/var/lib/controld"; WorkingDirectory = "/var/lib/controld";
RestartSec = 120; RestartSec = 120;
LimitMEMLOCK = "infinity"; LimitMEMLOCK = "infinity";