fix
This commit is contained in:
parent
0cae64a938
commit
403554015a
7 changed files with 10 additions and 10 deletions
|
|
@ -74,7 +74,7 @@ in
|
||||||
enable = true;
|
enable = true;
|
||||||
configurations."ds9-offsite" = {
|
configurations."ds9-offsite" = {
|
||||||
source_directories = [ "/backups" "/data" "/persistent" ];
|
source_directories = [ "/backups" "/data" "/persistent" ];
|
||||||
repositories = [ "ssh://root@gatebridge/media/backup/ds9" ];
|
repositories = [{ label = "gatebridge"; path = "ssh://root@gatebridge/media/backup/ds9"; }];
|
||||||
exclude_if_present = [ ".nobackup" ];
|
exclude_if_present = [ ".nobackup" ];
|
||||||
#upload_rate_limit = "4000";
|
#upload_rate_limit = "4000";
|
||||||
encryption_passcommand = "${pkgs.coreutils}/bin/cat ${config.age.secrets.borgmaticEncryptionKey.path}";
|
encryption_passcommand = "${pkgs.coreutils}/bin/cat ${config.age.secrets.borgmaticEncryptionKey.path}";
|
||||||
|
|
|
||||||
|
|
@ -147,8 +147,8 @@
|
||||||
configurations."picard-ds9" = {
|
configurations."picard-ds9" = {
|
||||||
source_directories = [ "/persistent" ];
|
source_directories = [ "/persistent" ];
|
||||||
repositories = [
|
repositories = [
|
||||||
"ssh://picardbackup@ds9/backups/picard/borgmatic"
|
{ label = "ds9"; path = "ssh://picardbackup@ds9/backups/picard/borgmatic"; }
|
||||||
"ssh://root@gatebridge/media/backup/picard"
|
{ label = "gatebridge"; path = "ssh://root@gatebridge/media/backup/picard"; }
|
||||||
];
|
];
|
||||||
exclude_if_present = [ ".nobackup" ];
|
exclude_if_present = [ ".nobackup" ];
|
||||||
encryption_passcommand = "${pkgs.coreutils}/bin/cat ${config.age.secrets.picardResticPassword.path}";
|
encryption_passcommand = "${pkgs.coreutils}/bin/cat ${config.age.secrets.picardResticPassword.path}";
|
||||||
|
|
|
||||||
|
|
@ -47,7 +47,7 @@ in
|
||||||
ensureUsers = [
|
ensureUsers = [
|
||||||
{
|
{
|
||||||
name = "slidingsync";
|
name = "slidingsync";
|
||||||
ensurePermissions."DATABASE slidingsync" = "ALL PRIVILEGES";
|
ensureDBOwnership = true;
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -50,7 +50,7 @@ in
|
||||||
host = "/run/postgresql";
|
host = "/run/postgresql";
|
||||||
port = "5432";
|
port = "5432";
|
||||||
database = "authelia";
|
database = "authelia";
|
||||||
username = "authelia-main";
|
username = "authelia";
|
||||||
password = "dosentmatter";
|
password = "dosentmatter";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
@ -68,8 +68,8 @@ in
|
||||||
ensureDatabases = [ "authelia" ];
|
ensureDatabases = [ "authelia" ];
|
||||||
ensureUsers = [
|
ensureUsers = [
|
||||||
{
|
{
|
||||||
name = "authelia-main";
|
name = "authelia";
|
||||||
ensurePermissions."DATABASE authelia" = "ALL PRIVILEGES";
|
ensureDBOwnership = true;
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -59,7 +59,7 @@ in
|
||||||
ensureUsers = [
|
ensureUsers = [
|
||||||
{
|
{
|
||||||
name = "hedgedoc";
|
name = "hedgedoc";
|
||||||
ensurePermissions."DATABASE hedgedoc" = "ALL PRIVILEGES";
|
ensureDBOwnership = true;
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -19,7 +19,7 @@ in
|
||||||
config = mkIf cfg.enable {
|
config = mkIf cfg.enable {
|
||||||
environment.systemPackages = [ inputs.agenix.packages.${pkgs.system}.default ];
|
environment.systemPackages = [ inputs.agenix.packages.${pkgs.system}.default ];
|
||||||
# Set passwords
|
# Set passwords
|
||||||
users.users.root.passwordFile = config.age.secrets.rootPasswd.path;
|
users.users.root.hashedPasswordFile = config.age.secrets.rootPasswd.path;
|
||||||
age.identityPaths =
|
age.identityPaths =
|
||||||
[
|
[
|
||||||
"/persistent/etc/ssh/ssh_host_ed25519_key"
|
"/persistent/etc/ssh/ssh_host_ed25519_key"
|
||||||
|
|
|
||||||
|
|
@ -57,7 +57,7 @@ in
|
||||||
extraGroups = [ "wheel" ] ++ extraGroups;
|
extraGroups = [ "wheel" ] ++ extraGroups;
|
||||||
shell = pkgs.zsh;
|
shell = pkgs.zsh;
|
||||||
openssh.authorizedKeys.keys = pubkeys.ragon.user ++ extraAuthorizedKeys;
|
openssh.authorizedKeys.keys = pubkeys.ragon.user ++ extraAuthorizedKeys;
|
||||||
passwordFile = config.age.secrets.ragonPasswd.path;
|
hashedPasswordFile = config.age.secrets.ragonPasswd.path;
|
||||||
};
|
};
|
||||||
ragon.agenix.secrets.ragonPasswd = { };
|
ragon.agenix.secrets.ragonPasswd = { };
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue