Compare commits

..

2 commits

10 changed files with 55 additions and 49 deletions

View file

@ -13,4 +13,9 @@
log_level = "DEBUG"; log_level = "DEBUG";
}; };
}; };
sops.secrets = {
"battery-manager/email" = { };
"battery-manager/password" = { };
};
} }

View file

@ -179,4 +179,11 @@ in
systemd.services.coturn.serviceConfig.SupplementaryGroups = [ systemd.services.coturn.serviceConfig.SupplementaryGroups = [
config.security.acme.certs."tlater.net".group config.security.acme.certs."tlater.net".group
]; ];
sops.secrets = {
"turn/env" = { };
"turn/secret" = {
owner = "turnserver";
};
};
} }

View file

@ -75,4 +75,10 @@ in
# AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ]; # AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ];
}; };
}; };
sops.secrets = {
# Accessed via systemd cred through /run/secrets/heisebridge
"heisenbridge/as-token" = { };
"heisenbridge/hs-token" = { };
};
} }

View file

@ -163,4 +163,10 @@ in
metrics.enabled = true; metrics.enabled = true;
}; };
}; };
sops.secrets = {
# Accessed via systemd cred through /run/secrets/matrix-hookshot
"matrix-hookshot/as-token" = { };
"matrix-hookshot/hs-token" = { };
};
} }

View file

@ -67,4 +67,15 @@ in
}; };
}; };
}; };
sops.secrets = {
"grafana/adminPassword" = {
owner = "grafana";
group = "grafana";
};
"grafana/secretKey" = {
owner = "grafana";
group = "grafana";
};
};
} }

View file

@ -96,4 +96,10 @@ in
victorialogs.targets = [ config.services.victorialogs.bindAddress ]; victorialogs.targets = [ config.services.victorialogs.bindAddress ];
}; };
}; };
sops.secrets."forgejo/metrics-token" = {
owner = "forgejo";
group = "metrics";
mode = "0440";
};
} }

View file

@ -100,4 +100,9 @@ in
# Ensure that this service doesn't start before postgres is ready # Ensure that this service doesn't start before postgres is ready
systemd.services.nextcloud-setup.after = [ "postgresql.service" ]; systemd.services.nextcloud-setup.after = [ "postgresql.service" ];
sops.secrets."nextcloud/tlater" = {
owner = "nextcloud";
group = "nextcloud";
};
} }

View file

@ -114,4 +114,7 @@ in
paths = [ "/var/lib/private/starbound/storage/universe/" ]; paths = [ "/var/lib/private/starbound/storage/universe/" ];
pauseServices = [ "starbound.service" ]; pauseServices = [ "starbound.service" ];
}; };
# Accessed via systemd cred through /run/secrets/steam
sops.secrets."steam/tlater" = { };
} }

View file

@ -62,4 +62,10 @@
}; };
}; };
}; };
sops.secrets."wireguard/server-key" = {
owner = "root";
group = "systemd-network";
mode = "0440";
};
} }

View file

@ -3,41 +3,6 @@
defaultSopsFile = ../keys/production.yaml; defaultSopsFile = ../keys/production.yaml;
secrets = { secrets = {
"battery-manager/email" = { };
"battery-manager/password" = { };
# Gitea
"forgejo/metrics-token" = {
owner = "forgejo";
group = "metrics";
mode = "0440";
};
# Grafana
"grafana/adminPassword" = {
owner = "grafana";
group = "grafana";
};
"grafana/secretKey" = {
owner = "grafana";
group = "grafana";
};
# Heisenbridge
"heisenbridge/as-token" = { };
"heisenbridge/hs-token" = { };
# Matrix-hookshot
"matrix-hookshot/as-token" = { };
"matrix-hookshot/hs-token" = { };
# Nextcloud
"nextcloud/tlater" = {
owner = "nextcloud";
group = "nextcloud";
};
# Restic # Restic
"restic/local-backups" = { "restic/local-backups" = {
owner = "root"; owner = "root";
@ -45,27 +10,13 @@
mode = "0440"; mode = "0440";
}; };
# Steam
"steam/tlater" = { };
# Turn # Turn
"turn/env" = { };
"turn/secret" = {
owner = "turnserver";
};
"turn/ssl-key" = { "turn/ssl-key" = {
owner = "turnserver"; owner = "turnserver";
}; };
"turn/ssl-cert" = { "turn/ssl-cert" = {
owner = "turnserver"; owner = "turnserver";
}; };
# Wireguard
"wireguard/server-key" = {
owner = "root";
group = "systemd-network";
mode = "0440";
};
}; };
}; };
} }