chore(infra): Switch to age-secrets.autoMatch
All checks were successful
lint / check (push) Successful in 23s
build configuration / build_web02 (push) Successful in 1m3s
build configuration / build_vault01 (push) Successful in 1m5s
build configuration / build_storage01 (push) Successful in 1m9s
build configuration / build_web01 (push) Successful in 1m39s
npins update / npins_update (push) Successful in 53s
build configuration / build_compute01 (push) Successful in 42m1s

This commit is contained in:
Tom Hubrecht 2024-02-19 14:47:27 +01:00
parent 10e768cacd
commit ad39c91168
12 changed files with 12 additions and 30 deletions

View file

@ -9,7 +9,7 @@ in
services.demarches-simplifiees = { services.demarches-simplifiees = {
enable = true; enable = true;
secretFile = config.age.secrets.ds_fr-secret_file.path; secretFile = config.age.secrets."ds-fr-secret_file".path;
initialDeploymentDate = "20230923"; initialDeploymentDate = "20230923";
@ -64,7 +64,5 @@ in
}; };
}; };
age-secrets.matches."^ds_fr-.*$" = { age-secrets.autoMatch = [ "ds-fr" ];
owner = "ds-fr";
};
} }

View file

@ -54,9 +54,7 @@
radiusClients = { }; radiusClients = { };
}; };
age-secrets.matches."^radius-.*$" = { age-secrets.autoMatch = [ "radius" ];
owner = "radius";
};
networking.firewall.allowedTCPPorts = [ 1812 ]; networking.firewall.allowedTCPPorts = [ 1812 ];
networking.firewall.allowedUDPPorts = [ 1812 ]; networking.firewall.allowedUDPPorts = [ 1812 ];

View file

@ -39,7 +39,5 @@ in
extraEnvFiles = [ config.age.secrets."mastodon-extra_env_file".path ]; extraEnvFiles = [ config.age.secrets."mastodon-extra_env_file".path ];
}; };
age-secrets.matches."^mastodon-.*$" = { age-secrets.autoMatch = [ "mastodon" ];
owner = "mastodon";
};
} }

View file

@ -199,9 +199,7 @@ in
"129.199.146.148" = [ "s3.dgnum.eu" ]; "129.199.146.148" = [ "s3.dgnum.eu" ];
}; };
age-secrets.matches."^nextcloud-.*$" = { age-secrets.autoMatch = [ "nextcloud" ];
owner = "nextcloud";
};
system.activationScripts = { system.activationScripts = {
restart-nextcloud.text = '' restart-nextcloud.text = ''

View file

@ -52,7 +52,5 @@ in
}; };
}; };
age-secrets.matches."^outline-.*$" = { age-secrets.autoMatch = [ "outline" ];
owner = "outline";
};
} }

View file

@ -153,7 +153,5 @@ in
forceSSL = true; forceSSL = true;
}; };
age-secrets.matches."^satosa-.*$" = { age-secrets.autoMatch = [ "satosa" ];
owner = "satosa";
};
} }

View file

@ -4,7 +4,7 @@ let
in in
lib.setDefault { inherit publicKeys; } [ lib.setDefault { inherit publicKeys; } [
"ds_fr-secret_file" "ds-fr-secret_file"
"grafana-smtp_password_file" "grafana-smtp_password_file"
"grafana-oauth_client_secret_file" "grafana-oauth_client_secret_file"
"hedgedoc-environment_file" "hedgedoc-environment_file"

View file

@ -51,7 +51,5 @@ in
}; };
}; };
age-secrets.matches."^zammad-.*$" = { age-secrets.autoMatch = [ "zammad" ];
owner = "zammad";
};
} }

View file

@ -43,5 +43,5 @@ in
}; };
}; };
# age-secrets.matches."^netbird-.*$" = { owner = "netbird"; }; # age-secrets.autoMatch = [ "netbird" ];
} }

View file

@ -64,7 +64,5 @@ in
forceSSL = true; forceSSL = true;
}; };
age-secrets.matches."^peertube-.*$" = { age-secrets.autoMatch = [ "peertube" ];
owner = "peertube";
};
} }

View file

@ -6,7 +6,5 @@
configPath = config.age.secrets."matterbridge-config_file".path; configPath = config.age.secrets."matterbridge-config_file".path;
}; };
age-secrets.matches."^matterbridge-.*$" = { age-secrets.autoMatch = [ "matterbridge" ];
owner = "matterbridge";
};
} }