This commit is contained in:
Lucy Hochkamp 2023-12-10 13:16:29 +01:00
parent 0cae64a938
commit 403554015a
No known key found for this signature in database
7 changed files with 10 additions and 10 deletions

View file

@ -74,7 +74,7 @@ in
enable = true; enable = true;
configurations."ds9-offsite" = { configurations."ds9-offsite" = {
source_directories = [ "/backups" "/data" "/persistent" ]; source_directories = [ "/backups" "/data" "/persistent" ];
repositories = [ "ssh://root@gatebridge/media/backup/ds9" ]; repositories = [{ label = "gatebridge"; path = "ssh://root@gatebridge/media/backup/ds9"; }];
exclude_if_present = [ ".nobackup" ]; exclude_if_present = [ ".nobackup" ];
#upload_rate_limit = "4000"; #upload_rate_limit = "4000";
encryption_passcommand = "${pkgs.coreutils}/bin/cat ${config.age.secrets.borgmaticEncryptionKey.path}"; encryption_passcommand = "${pkgs.coreutils}/bin/cat ${config.age.secrets.borgmaticEncryptionKey.path}";

View file

@ -147,8 +147,8 @@
configurations."picard-ds9" = { configurations."picard-ds9" = {
source_directories = [ "/persistent" ]; source_directories = [ "/persistent" ];
repositories = [ repositories = [
"ssh://picardbackup@ds9/backups/picard/borgmatic" { label = "ds9"; path = "ssh://picardbackup@ds9/backups/picard/borgmatic"; }
"ssh://root@gatebridge/media/backup/picard" { label = "gatebridge"; path = "ssh://root@gatebridge/media/backup/picard"; }
]; ];
exclude_if_present = [ ".nobackup" ]; exclude_if_present = [ ".nobackup" ];
encryption_passcommand = "${pkgs.coreutils}/bin/cat ${config.age.secrets.picardResticPassword.path}"; encryption_passcommand = "${pkgs.coreutils}/bin/cat ${config.age.secrets.picardResticPassword.path}";

View file

@ -47,7 +47,7 @@ in
ensureUsers = [ ensureUsers = [
{ {
name = "slidingsync"; name = "slidingsync";
ensurePermissions."DATABASE slidingsync" = "ALL PRIVILEGES"; ensureDBOwnership = true;
} }
]; ];
}; };

View file

@ -50,7 +50,7 @@ in
host = "/run/postgresql"; host = "/run/postgresql";
port = "5432"; port = "5432";
database = "authelia"; database = "authelia";
username = "authelia-main"; username = "authelia";
password = "dosentmatter"; password = "dosentmatter";
}; };
}; };
@ -68,8 +68,8 @@ in
ensureDatabases = [ "authelia" ]; ensureDatabases = [ "authelia" ];
ensureUsers = [ ensureUsers = [
{ {
name = "authelia-main"; name = "authelia";
ensurePermissions."DATABASE authelia" = "ALL PRIVILEGES"; ensureDBOwnership = true;
} }
]; ];
}; };

View file

@ -59,7 +59,7 @@ in
ensureUsers = [ ensureUsers = [
{ {
name = "hedgedoc"; name = "hedgedoc";
ensurePermissions."DATABASE hedgedoc" = "ALL PRIVILEGES"; ensureDBOwnership = true;
} }
]; ];
}; };

View file

@ -19,7 +19,7 @@ in
config = mkIf cfg.enable { config = mkIf cfg.enable {
environment.systemPackages = [ inputs.agenix.packages.${pkgs.system}.default ]; environment.systemPackages = [ inputs.agenix.packages.${pkgs.system}.default ];
# Set passwords # Set passwords
users.users.root.passwordFile = config.age.secrets.rootPasswd.path; users.users.root.hashedPasswordFile = config.age.secrets.rootPasswd.path;
age.identityPaths = age.identityPaths =
[ [
"/persistent/etc/ssh/ssh_host_ed25519_key" "/persistent/etc/ssh/ssh_host_ed25519_key"

View file

@ -57,7 +57,7 @@ in
extraGroups = [ "wheel" ] ++ extraGroups; extraGroups = [ "wheel" ] ++ extraGroups;
shell = pkgs.zsh; shell = pkgs.zsh;
openssh.authorizedKeys.keys = pubkeys.ragon.user ++ extraAuthorizedKeys; openssh.authorizedKeys.keys = pubkeys.ragon.user ++ extraAuthorizedKeys;
passwordFile = config.age.secrets.ragonPasswd.path; hashedPasswordFile = config.age.secrets.ragonPasswd.path;
}; };
ragon.agenix.secrets.ragonPasswd = { }; ragon.agenix.secrets.ragonPasswd = { };