chore(infra): Switch to age-secrets.autoMatch
All checks were successful
lint / check (push) Successful in 23s
build configuration / build_web02 (push) Successful in 1m3s
build configuration / build_vault01 (push) Successful in 1m5s
build configuration / build_storage01 (push) Successful in 1m9s
build configuration / build_web01 (push) Successful in 1m39s
npins update / npins_update (push) Successful in 53s
build configuration / build_compute01 (push) Successful in 42m1s

This commit is contained in:
Tom Hubrecht 2024-02-19 14:47:27 +01:00
parent 10e768cacd
commit ad39c91168
12 changed files with 12 additions and 30 deletions

View file

@ -9,7 +9,7 @@ in
services.demarches-simplifiees = {
enable = true;
secretFile = config.age.secrets.ds_fr-secret_file.path;
secretFile = config.age.secrets."ds-fr-secret_file".path;
initialDeploymentDate = "20230923";
@ -64,7 +64,5 @@ in
};
};
age-secrets.matches."^ds_fr-.*$" = {
owner = "ds-fr";
};
age-secrets.autoMatch = [ "ds-fr" ];
}

View file

@ -54,9 +54,7 @@
radiusClients = { };
};
age-secrets.matches."^radius-.*$" = {
owner = "radius";
};
age-secrets.autoMatch = [ "radius" ];
networking.firewall.allowedTCPPorts = [ 1812 ];
networking.firewall.allowedUDPPorts = [ 1812 ];

View file

@ -39,7 +39,5 @@ in
extraEnvFiles = [ config.age.secrets."mastodon-extra_env_file".path ];
};
age-secrets.matches."^mastodon-.*$" = {
owner = "mastodon";
};
age-secrets.autoMatch = [ "mastodon" ];
}

View file

@ -199,9 +199,7 @@ in
"129.199.146.148" = [ "s3.dgnum.eu" ];
};
age-secrets.matches."^nextcloud-.*$" = {
owner = "nextcloud";
};
age-secrets.autoMatch = [ "nextcloud" ];
system.activationScripts = {
restart-nextcloud.text = ''

View file

@ -52,7 +52,5 @@ in
};
};
age-secrets.matches."^outline-.*$" = {
owner = "outline";
};
age-secrets.autoMatch = [ "outline" ];
}

View file

@ -153,7 +153,5 @@ in
forceSSL = true;
};
age-secrets.matches."^satosa-.*$" = {
owner = "satosa";
};
age-secrets.autoMatch = [ "satosa" ];
}

View file

@ -4,7 +4,7 @@ let
in
lib.setDefault { inherit publicKeys; } [
"ds_fr-secret_file"
"ds-fr-secret_file"
"grafana-smtp_password_file"
"grafana-oauth_client_secret_file"
"hedgedoc-environment_file"

View file

@ -51,7 +51,5 @@ in
};
};
age-secrets.matches."^zammad-.*$" = {
owner = "zammad";
};
age-secrets.autoMatch = [ "zammad" ];
}

View file

@ -43,5 +43,5 @@ in
};
};
# age-secrets.matches."^netbird-.*$" = { owner = "netbird"; };
# age-secrets.autoMatch = [ "netbird" ];
}

View file

@ -64,7 +64,5 @@ in
forceSSL = true;
};
age-secrets.matches."^peertube-.*$" = {
owner = "peertube";
};
age-secrets.autoMatch = [ "peertube" ];
}

View file

@ -6,7 +6,5 @@
configPath = config.age.secrets."matterbridge-config_file".path;
};
age-secrets.matches."^matterbridge-.*$" = {
owner = "matterbridge";
};
age-secrets.autoMatch = [ "matterbridge" ];
}