nix-conf/modules/servers/per-server/tyr/secrets.nix

64 lines
1.7 KiB
Nix

{
config,
inputs,
...
}: {
age = {
secrets = {
wg-tyr = {
file = "${inputs.secrets}/secrets/wg-tyr.age";
};
duckdns = {
file = "${inputs.secrets}/secrets/duckdns.age";
};
restic-server-local-pass = {
file = "${inputs.secrets}/secrets/restic-server-local-pass.age";
};
restic-server-pass = {
file = "${inputs.secrets}/secrets/restic-server-pass.age";
};
restic-server-repo = {
file = "${inputs.secrets}/secrets/restic-server-repo.age";
};
restic-server-env = {
file = "${inputs.secrets}/secrets/restic-server-env.age";
};
glance = {
file = "${inputs.secrets}/secrets/glance.age";
};
traefik = {
file = "${inputs.secrets}/secrets/traefik.age";
owner = "traefik";
};
ddns = {
file = "${inputs.secrets}/secrets/ddns.age";
path = "/var/lib/ddns-updater/config.json";
owner = "nobody";
group = "nogroup";
symlink = false;
};
linkwarden = {
file = "${inputs.secrets}/secrets/linkwarden.age";
owner = config.services.linkwarden.user;
};
linkwarden-db = {
file = "${inputs.secrets}/secrets/linkwarden.age";
};
paperless-ngx = {
file = "${inputs.secrets}/secrets/paperless-ngx.age";
};
wg-wireproxy = {
file = "${inputs.secrets}/secrets/wg-wireproxy.age";
owner = "wireproxy";
group = "wireproxy";
};
wireproxy = {
file = "${inputs.secrets}/secrets/wireproxy.age";
path = "/etc/wireproxy/wireproxy.conf";
owner = "wireproxy";
group = "wireproxy";
symlink = false;
};
};
};
}