Delete comment monzo_ynab deployment
I haven't used this since I wrote it months ago...
This commit is contained in:
parent
a076027945
commit
3fb9324c82
1 changed files with 0 additions and 22 deletions
|
@ -1,8 +1,6 @@
|
||||||
let
|
let
|
||||||
briefcase = import <briefcase> {};
|
briefcase = import <briefcase> {};
|
||||||
pkgs = briefcase.third_party.pkgs;
|
pkgs = briefcase.third_party.pkgs;
|
||||||
trimNewline = x: pkgs.lib.removeSuffix "\n" x;
|
|
||||||
readSecret = x: trimNewline (builtins.readFile ("/etc/secrets/" + x));
|
|
||||||
in {
|
in {
|
||||||
imports = [ ./hardware.nix ];
|
imports = [ ./hardware.nix ];
|
||||||
|
|
||||||
|
@ -116,26 +114,6 @@ in {
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# systemd.services.monzo-token-server = {
|
|
||||||
# enable = true;
|
|
||||||
# description = "Ensure my Monzo access token is valid";
|
|
||||||
# script = "${briefcase.tools.monzo_ynab.tokens}/bin/token-server";
|
|
||||||
# # TODO(wpcarro): I'm unsure of the size of this security risk, but if a
|
|
||||||
# # non-root user runs `systemctl cat monzo-token-server`, they could read the
|
|
||||||
# # following, sensitive environment variables.
|
|
||||||
# environment = {
|
|
||||||
# store_path = "/var/cache/monzo_ynab";
|
|
||||||
# monzo_client_id = readSecret "monzo-client-id";
|
|
||||||
# monzo_client_secret = readSecret "monzo-client-secret";
|
|
||||||
# ynab_personal_access_token = readSecret "ynab-personal-access-token";
|
|
||||||
# ynab_account_id = readSecret "ynab-account-id";
|
|
||||||
# ynab_budget_id = readSecret "ynab-budget-id";
|
|
||||||
# };
|
|
||||||
# serviceConfig = {
|
|
||||||
# Type = "simple";
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
|
|
||||||
systemd.services.zoo = {
|
systemd.services.zoo = {
|
||||||
enable = true;
|
enable = true;
|
||||||
description = "Run my monoserver";
|
description = "Run my monoserver";
|
||||||
|
|
Loading…
Reference in a new issue