forked from DGNum/infrastructure
chore(infra): Switch to age-secrets.autoMatch
This commit is contained in:
parent
10e768cacd
commit
ad39c91168
12 changed files with 12 additions and 30 deletions
|
@ -9,7 +9,7 @@ in
|
|||
services.demarches-simplifiees = {
|
||||
enable = true;
|
||||
|
||||
secretFile = config.age.secrets.ds_fr-secret_file.path;
|
||||
secretFile = config.age.secrets."ds-fr-secret_file".path;
|
||||
|
||||
initialDeploymentDate = "20230923";
|
||||
|
||||
|
@ -64,7 +64,5 @@ in
|
|||
};
|
||||
};
|
||||
|
||||
age-secrets.matches."^ds_fr-.*$" = {
|
||||
owner = "ds-fr";
|
||||
};
|
||||
age-secrets.autoMatch = [ "ds-fr" ];
|
||||
}
|
||||
|
|
|
@ -54,9 +54,7 @@
|
|||
radiusClients = { };
|
||||
};
|
||||
|
||||
age-secrets.matches."^radius-.*$" = {
|
||||
owner = "radius";
|
||||
};
|
||||
age-secrets.autoMatch = [ "radius" ];
|
||||
|
||||
networking.firewall.allowedTCPPorts = [ 1812 ];
|
||||
networking.firewall.allowedUDPPorts = [ 1812 ];
|
||||
|
|
|
@ -39,7 +39,5 @@ in
|
|||
extraEnvFiles = [ config.age.secrets."mastodon-extra_env_file".path ];
|
||||
};
|
||||
|
||||
age-secrets.matches."^mastodon-.*$" = {
|
||||
owner = "mastodon";
|
||||
};
|
||||
age-secrets.autoMatch = [ "mastodon" ];
|
||||
}
|
||||
|
|
|
@ -199,9 +199,7 @@ in
|
|||
"129.199.146.148" = [ "s3.dgnum.eu" ];
|
||||
};
|
||||
|
||||
age-secrets.matches."^nextcloud-.*$" = {
|
||||
owner = "nextcloud";
|
||||
};
|
||||
age-secrets.autoMatch = [ "nextcloud" ];
|
||||
|
||||
system.activationScripts = {
|
||||
restart-nextcloud.text = ''
|
||||
|
|
|
@ -52,7 +52,5 @@ in
|
|||
};
|
||||
};
|
||||
|
||||
age-secrets.matches."^outline-.*$" = {
|
||||
owner = "outline";
|
||||
};
|
||||
age-secrets.autoMatch = [ "outline" ];
|
||||
}
|
||||
|
|
|
@ -153,7 +153,5 @@ in
|
|||
forceSSL = true;
|
||||
};
|
||||
|
||||
age-secrets.matches."^satosa-.*$" = {
|
||||
owner = "satosa";
|
||||
};
|
||||
age-secrets.autoMatch = [ "satosa" ];
|
||||
}
|
||||
|
|
|
@ -4,7 +4,7 @@ let
|
|||
in
|
||||
|
||||
lib.setDefault { inherit publicKeys; } [
|
||||
"ds_fr-secret_file"
|
||||
"ds-fr-secret_file"
|
||||
"grafana-smtp_password_file"
|
||||
"grafana-oauth_client_secret_file"
|
||||
"hedgedoc-environment_file"
|
||||
|
|
|
@ -51,7 +51,5 @@ in
|
|||
};
|
||||
};
|
||||
|
||||
age-secrets.matches."^zammad-.*$" = {
|
||||
owner = "zammad";
|
||||
};
|
||||
age-secrets.autoMatch = [ "zammad" ];
|
||||
}
|
||||
|
|
|
@ -43,5 +43,5 @@ in
|
|||
};
|
||||
};
|
||||
|
||||
# age-secrets.matches."^netbird-.*$" = { owner = "netbird"; };
|
||||
# age-secrets.autoMatch = [ "netbird" ];
|
||||
}
|
||||
|
|
|
@ -64,7 +64,5 @@ in
|
|||
forceSSL = true;
|
||||
};
|
||||
|
||||
age-secrets.matches."^peertube-.*$" = {
|
||||
owner = "peertube";
|
||||
};
|
||||
age-secrets.autoMatch = [ "peertube" ];
|
||||
}
|
||||
|
|
|
@ -6,7 +6,5 @@
|
|||
configPath = config.age.secrets."matterbridge-config_file".path;
|
||||
};
|
||||
|
||||
age-secrets.matches."^matterbridge-.*$" = {
|
||||
owner = "matterbridge";
|
||||
};
|
||||
age-secrets.autoMatch = [ "matterbridge" ];
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue