mirror of
https://github.com/kmein/niveum
synced 2026-03-18 11:01:07 +01:00
chore: get secrets via input, mock for CI
this fixes CI, yay!
This commit is contained in:
@@ -1,5 +1,5 @@
|
||||
{
|
||||
lib,
|
||||
inputs,
|
||||
config,
|
||||
pkgs,
|
||||
...
|
||||
@@ -36,19 +36,19 @@ in {
|
||||
|
||||
age.secrets = {
|
||||
retiolum-rsa = {
|
||||
file = ../../secrets/ful-retiolum-privateKey-rsa.age;
|
||||
file = inputs.secrets + "/ful-retiolum-privateKey-rsa.age";
|
||||
mode = "400";
|
||||
owner = "tinc.retiolum";
|
||||
group = "tinc.retiolum";
|
||||
};
|
||||
retiolum-ed25519 = {
|
||||
file = ../../secrets/ful-retiolum-privateKey-ed25519.age;
|
||||
file = inputs.secrets + "/ful-retiolum-privateKey-ed25519.age";
|
||||
mode = "400";
|
||||
owner = "tinc.retiolum";
|
||||
group = "tinc.retiolum";
|
||||
};
|
||||
root.file = ../../secrets/ful-root.age;
|
||||
restic.file = ../../secrets/restic.age;
|
||||
root.file = inputs.secrets + "/ful-root.age";
|
||||
restic.file = inputs.secrets + "/restic.age";
|
||||
};
|
||||
|
||||
services.restic.backups.niveum = {
|
||||
|
||||
@@ -1,7 +1,6 @@
|
||||
{
|
||||
config,
|
||||
inputs,
|
||||
pkgs,
|
||||
lib,
|
||||
...
|
||||
}: let
|
||||
inherit (import ../../lib) retiolumAddresses;
|
||||
@@ -26,20 +25,20 @@ in {
|
||||
|
||||
age.secrets = {
|
||||
retiolum-rsa = {
|
||||
file = ../../secrets/kabsa-retiolum-privateKey-rsa.age;
|
||||
file = inputs.secrets + "/kabsa-retiolum-privateKey-rsa.age";
|
||||
mode = "400";
|
||||
owner = "tinc.retiolum";
|
||||
group = "tinc.retiolum";
|
||||
};
|
||||
retiolum-ed25519 = {
|
||||
file = ../../secrets/kabsa-retiolum-privateKey-ed25519.age;
|
||||
file = inputs.secrets + "/kabsa-retiolum-privateKey-ed25519.age";
|
||||
mode = "400";
|
||||
owner = "tinc.retiolum";
|
||||
group = "tinc.retiolum";
|
||||
};
|
||||
restic.file = ../../secrets/restic.age;
|
||||
syncthing-cert.file = ../../secrets/kabsa-syncthing-cert.age;
|
||||
syncthing-key.file = ../../secrets/kabsa-syncthing-key.age;
|
||||
restic.file = inputs.secrets + "/restic.age";
|
||||
syncthing-cert.file = inputs.secrets + "/kabsa-syncthing-cert.age";
|
||||
syncthing-key.file = inputs.secrets + "/kabsa-syncthing-key.age";
|
||||
};
|
||||
|
||||
environment.systemPackages = [pkgs.minecraft pkgs.zeroad];
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
{
|
||||
lib,
|
||||
inputs,
|
||||
config,
|
||||
pkgs,
|
||||
...
|
||||
@@ -84,18 +84,18 @@ in {
|
||||
|
||||
age.secrets = {
|
||||
retiolum-rsa = {
|
||||
file = ../../secrets/makanek-retiolum-privateKey-rsa.age;
|
||||
file = inputs.secrets + "/makanek-retiolum-privateKey-rsa.age";
|
||||
mode = "400";
|
||||
owner = "tinc.retiolum";
|
||||
group = "tinc.retiolum";
|
||||
};
|
||||
retiolum-ed25519 = {
|
||||
file = ../../secrets/makanek-retiolum-privateKey-ed25519.age;
|
||||
file = inputs.secrets + "/makanek-retiolum-privateKey-ed25519.age";
|
||||
mode = "400";
|
||||
owner = "tinc.retiolum";
|
||||
group = "tinc.retiolum";
|
||||
};
|
||||
restic.file = ../../secrets/restic.age;
|
||||
restic.file = inputs.secrets + "/restic.age";
|
||||
};
|
||||
|
||||
system.stateVersion = "20.03";
|
||||
|
||||
@@ -1,7 +1,6 @@
|
||||
{
|
||||
config,
|
||||
pkgs,
|
||||
lib,
|
||||
inputs,
|
||||
...
|
||||
}: let
|
||||
@@ -47,7 +46,7 @@ in {
|
||||
};
|
||||
};
|
||||
|
||||
age.secrets.telegram-token-menstruation.file = ../../secrets/telegram-token-menstruation.age;
|
||||
age.secrets.telegram-token-menstruation.file = inputs.secrets + "/telegram-token-menstruation.age";
|
||||
|
||||
systemd.services.menstruation-backend = {
|
||||
wants = ["network-online.target"];
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
lib,
|
||||
config,
|
||||
pkgs,
|
||||
inputs,
|
||||
...
|
||||
}: let
|
||||
lokiConfig = import ./loki.nix;
|
||||
@@ -241,19 +242,19 @@ in {
|
||||
|
||||
age.secrets = {
|
||||
email-password-cock = {
|
||||
file = ../../../secrets/email-password-cock.age;
|
||||
file = inputs.secrets + "/email-password-cock.age";
|
||||
owner = "grafana";
|
||||
group = "grafana";
|
||||
mode = "440";
|
||||
};
|
||||
grafana-password-admin = {
|
||||
file = ../../../secrets/grafana-password-admin.age;
|
||||
file = inputs.secrets + "/grafana-password-admin.age";
|
||||
owner = "grafana";
|
||||
group = "grafana";
|
||||
mode = "440";
|
||||
};
|
||||
alertmanager-token-reporters = {
|
||||
file = ../../../secrets/alertmanager-token-reporters.age;
|
||||
file = inputs.secrets + "/alertmanager-token-reporters.age";
|
||||
owner = "prometheus";
|
||||
group = "prometheus";
|
||||
mode = "440";
|
||||
|
||||
@@ -1,6 +1,7 @@
|
||||
{
|
||||
pkgs,
|
||||
config,
|
||||
inputs,
|
||||
lib,
|
||||
...
|
||||
}: let
|
||||
@@ -8,13 +9,13 @@
|
||||
in {
|
||||
age.secrets = {
|
||||
nextcloud-password-database = {
|
||||
file = ../../secrets/nextcloud-password-database.age;
|
||||
file = inputs.secrets + "/nextcloud-password-database.age";
|
||||
owner = "nextcloud";
|
||||
group = "nextcloud";
|
||||
mode = "440";
|
||||
};
|
||||
nextcloud-password-admin = {
|
||||
file = ../../secrets/nextcloud-password-admin.age;
|
||||
file = inputs.secrets + "/nextcloud-password-admin.age";
|
||||
owner = "nextcloud";
|
||||
group = "nextcloud";
|
||||
mode = "440";
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
{
|
||||
pkgs,
|
||||
inputs,
|
||||
config,
|
||||
...
|
||||
}: {
|
||||
@@ -11,7 +11,7 @@
|
||||
};
|
||||
|
||||
age.secrets.onlyoffice-key = {
|
||||
file = ../../secrets/onlyoffice-jwt-key.age;
|
||||
file = inputs.secrets + "/onlyoffice-jwt-key.age";
|
||||
owner = "onlyoffice";
|
||||
};
|
||||
|
||||
|
||||
@@ -45,7 +45,7 @@ in {
|
||||
};
|
||||
};
|
||||
|
||||
age.secrets.maxmind-license-key.file = ../../secrets/maxmind-license-key.age;
|
||||
age.secrets.maxmind-license-key.file = inputs.secrets + "/maxmind-license-key.age";
|
||||
|
||||
niveum.passport.services = [
|
||||
{
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
{
|
||||
pkgs,
|
||||
lib,
|
||||
inputs,
|
||||
config,
|
||||
...
|
||||
}: let
|
||||
@@ -19,7 +18,7 @@ in {
|
||||
};
|
||||
};
|
||||
|
||||
age.secrets.miniflux-credentials.file = ../../secrets/miniflux-credentials.age;
|
||||
age.secrets.miniflux-credentials.file = inputs.secrets + "/miniflux-credentials.age";
|
||||
|
||||
services.postgresqlBackup = {
|
||||
enable = true;
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
{
|
||||
lib,
|
||||
pkgs,
|
||||
config,
|
||||
inputs,
|
||||
...
|
||||
}: let
|
||||
inherit (import ../../lib) kieran;
|
||||
@@ -205,7 +205,7 @@ in {
|
||||
};
|
||||
|
||||
age.secrets.weechat-sec = {
|
||||
file = ../../secrets/weechat-sec.conf.age;
|
||||
file = inputs.secrets + "/weechat-sec.conf.age";
|
||||
path = "/var/lib/weechat/sec.conf";
|
||||
owner = "weechat";
|
||||
group = "weechat";
|
||||
|
||||
@@ -1,8 +1,4 @@
|
||||
{
|
||||
config,
|
||||
pkgs,
|
||||
...
|
||||
}: let
|
||||
{inputs, ...}: let
|
||||
inherit (import ../../lib) retiolumAddresses;
|
||||
in {
|
||||
imports = [
|
||||
@@ -16,19 +12,19 @@ in {
|
||||
|
||||
age.secrets = {
|
||||
retiolum-rsa = {
|
||||
file = ../../secrets/manakish-retiolum-privateKey-rsa.age;
|
||||
file = inputs.secrets + "/manakish-retiolum-privateKey-rsa.age";
|
||||
mode = "400";
|
||||
owner = "tinc.retiolum";
|
||||
group = "tinc.retiolum";
|
||||
};
|
||||
retiolum-ed25519 = {
|
||||
file = ../../secrets/manakish-retiolum-privateKey-ed25519.age;
|
||||
file = inputs.secrets + "/manakish-retiolum-privateKey-ed25519.age";
|
||||
mode = "400";
|
||||
owner = "tinc.retiolum";
|
||||
group = "tinc.retiolum";
|
||||
};
|
||||
syncthing-cert.file = ../../secrets/manakish-syncthing-cert.age;
|
||||
syncthing-key.file = ../../secrets/manakish-syncthing-key.age;
|
||||
syncthing-cert.file = inputs.secrets + "/manakish-syncthing-cert.age";
|
||||
syncthing-key.file = inputs.secrets + "/manakish-syncthing-key.age";
|
||||
};
|
||||
|
||||
niveum = {
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
{
|
||||
config,
|
||||
inputs,
|
||||
pkgs,
|
||||
...
|
||||
}: let
|
||||
@@ -15,13 +15,13 @@ in {
|
||||
|
||||
age.secrets = {
|
||||
retiolum-rsa = {
|
||||
file = ../../secrets/tabula-retiolum-privateKey-rsa.age;
|
||||
file = inputs.secrets + "/tabula-retiolum-privateKey-rsa.age";
|
||||
mode = "400";
|
||||
owner = "tinc.retiolum";
|
||||
group = "tinc.retiolum";
|
||||
};
|
||||
retiolum-ed25519 = {
|
||||
file = ../../secrets/tabula-retiolum-privateKey-ed25519.age;
|
||||
file = inputs.secrets + "/tabula-retiolum-privateKey-ed25519.age";
|
||||
mode = "400";
|
||||
owner = "tinc.retiolum";
|
||||
group = "tinc.retiolum";
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
{
|
||||
config,
|
||||
inputs,
|
||||
pkgs,
|
||||
...
|
||||
}: let
|
||||
@@ -15,13 +15,13 @@ in {
|
||||
|
||||
age.secrets = {
|
||||
retiolum-rsa = {
|
||||
file = ../../secrets/tahina-retiolum-privateKey-rsa.age;
|
||||
file = inputs.secrets + "/tahina-retiolum-privateKey-rsa.age";
|
||||
mode = "400";
|
||||
owner = "tinc.retiolum";
|
||||
group = "tinc.retiolum";
|
||||
};
|
||||
retiolum-ed25519 = {
|
||||
file = ../../secrets/tahina-retiolum-privateKey-ed25519.age;
|
||||
file = inputs.secrets + "/tahina-retiolum-privateKey-ed25519.age";
|
||||
mode = "400";
|
||||
owner = "tinc.retiolum";
|
||||
group = "tinc.retiolum";
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
{
|
||||
config,
|
||||
pkgs,
|
||||
lib,
|
||||
inputs,
|
||||
...
|
||||
}: let
|
||||
inherit (import ../../lib) retiolumAddresses restic;
|
||||
@@ -31,18 +31,18 @@ in {
|
||||
|
||||
age.secrets = {
|
||||
retiolum-rsa = {
|
||||
file = ../../secrets/zaatar-retiolum-privateKey-rsa.age;
|
||||
file = inputs.secrets + "/zaatar-retiolum-privateKey-rsa.age";
|
||||
mode = "400";
|
||||
owner = "tinc.retiolum";
|
||||
group = "tinc.retiolum";
|
||||
};
|
||||
retiolum-ed25519 = {
|
||||
file = ../../secrets/zaatar-retiolum-privateKey-ed25519.age;
|
||||
file = inputs.secrets + "/zaatar-retiolum-privateKey-ed25519.age";
|
||||
mode = "400";
|
||||
owner = "tinc.retiolum";
|
||||
group = "tinc.retiolum";
|
||||
};
|
||||
restic.file = ../../secrets/restic.age;
|
||||
restic.file = inputs.secrets + "/restic.age";
|
||||
};
|
||||
|
||||
services.restic.backups.moodle-dl = {
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
config,
|
||||
pkgs,
|
||||
lib,
|
||||
inputs,
|
||||
...
|
||||
}: let
|
||||
moodle-dl-package = pkgs.moodle-dl.overrideAttrs (old:
|
||||
@@ -13,14 +14,14 @@ in {
|
||||
age.secrets = {
|
||||
/*
|
||||
moodle-dl-tokens = {
|
||||
file = ../../secrets/zaatar-moodle-dl-tokens.json.age;
|
||||
file = inputs.secrets + "/zaatar-moodle-dl-tokens.json.age";
|
||||
owner = "moodle-dl";
|
||||
group = "moodle-dl";
|
||||
mode = "400";
|
||||
};
|
||||
*/
|
||||
moodle-dl-basicAuth = {
|
||||
file = ../../secrets/zaatar-moodle-dl-basicAuth.age;
|
||||
file = inputs.secrets + "/zaatar-moodle-dl-basicAuth.age";
|
||||
owner = "nginx";
|
||||
group = "nginx";
|
||||
mode = "400";
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
config,
|
||||
pkgs,
|
||||
lib,
|
||||
inputs,
|
||||
...
|
||||
}: let
|
||||
firewall = (import ../../lib).firewall lib;
|
||||
@@ -102,14 +103,14 @@ in {
|
||||
|
||||
age.secrets = {
|
||||
ympd-basicAuth = {
|
||||
file = ../../secrets/zaatar-ympd-basicAuth.age;
|
||||
file = inputs.secrets + "/zaatar-ympd-basicAuth.age";
|
||||
owner = "nginx";
|
||||
group = "nginx";
|
||||
mode = "400";
|
||||
};
|
||||
syncthing-cert.file = ../../secrets/zaatar-syncthing-cert.age;
|
||||
syncthing-key.file = ../../secrets/zaatar-syncthing-key.age;
|
||||
di-fm-key.file = ../../secrets/di-fm-key.age;
|
||||
syncthing-cert.file = inputs.secrets + "/zaatar-syncthing-cert.age";
|
||||
syncthing-key.file = inputs.secrets + "/zaatar-syncthing-key.age";
|
||||
di-fm-key.file = inputs.secrets + "/di-fm-key.age";
|
||||
};
|
||||
|
||||
services.nginx = {
|
||||
|
||||
@@ -1,4 +1,8 @@
|
||||
{config, ...}: {
|
||||
{
|
||||
config,
|
||||
inputs,
|
||||
...
|
||||
}: {
|
||||
services.spotifyd = {
|
||||
enable = true;
|
||||
settings = {
|
||||
@@ -21,8 +25,8 @@
|
||||
};
|
||||
|
||||
age.secrets = {
|
||||
spotify-username.file = ../../secrets/spotify-username.age;
|
||||
spotify-password.file = ../../secrets/spotify-password.age;
|
||||
spotify-username.file = inputs.secrets + "/spotify-username.age";
|
||||
spotify-password.file = inputs.secrets + "/spotify-password.age";
|
||||
};
|
||||
|
||||
# ref https://github.com/NixOS/nixpkgs/issues/71362#issuecomment-753461502
|
||||
|
||||
Reference in New Issue
Block a user