diff options
Diffstat (limited to 'modules/private/websites')
32 files changed, 0 insertions, 89 deletions
diff --git a/modules/private/websites/chloe/integration.nix b/modules/private/websites/chloe/integration.nix index aedf3a5..4dc4bf3 100644 --- a/modules/private/websites/chloe/integration.nix +++ b/modules/private/websites/chloe/integration.nix | |||
@@ -10,7 +10,6 @@ in { | |||
10 | options.myServices.websites.chloe.integration.enable = lib.mkEnableOption "enable Chloe's website in integration"; | 10 | options.myServices.websites.chloe.integration.enable = lib.mkEnableOption "enable Chloe's website in integration"; |
11 | 11 | ||
12 | config = lib.mkIf cfg.enable { | 12 | config = lib.mkIf cfg.enable { |
13 | services.duplyBackup.profiles.chloe_integration.rootDir = app.varDir; | ||
14 | secrets.keys."websites/chloe/integration" = { | 13 | secrets.keys."websites/chloe/integration" = { |
15 | user = apacheUser; | 14 | user = apacheUser; |
16 | group = apacheGroup; | 15 | group = apacheGroup; |
diff --git a/modules/private/websites/chloe/production.nix b/modules/private/websites/chloe/production.nix index c3a5732..211232c 100644 --- a/modules/private/websites/chloe/production.nix +++ b/modules/private/websites/chloe/production.nix | |||
@@ -13,8 +13,6 @@ in { | |||
13 | options.myServices.websites.chloe.production.enable = lib.mkEnableOption "enable Chloe's website in production"; | 13 | options.myServices.websites.chloe.production.enable = lib.mkEnableOption "enable Chloe's website in production"; |
14 | 14 | ||
15 | config = lib.mkIf cfg.enable { | 15 | config = lib.mkIf cfg.enable { |
16 | services.duplyBackup.profiles.chloe_production.rootDir = app.varDir; | ||
17 | services.duplyBackup.profiles.chloe_production.remotes = ["eriomem" "ovh"]; | ||
18 | secrets.keys."websites/chloe/production" = { | 16 | secrets.keys."websites/chloe/production" = { |
19 | user = apacheUser; | 17 | user = apacheUser; |
20 | group = apacheGroup; | 18 | group = apacheGroup; |
diff --git a/modules/private/websites/connexionswing/integration.nix b/modules/private/websites/connexionswing/integration.nix index fe0e4d9..c1165b8 100644 --- a/modules/private/websites/connexionswing/integration.nix +++ b/modules/private/websites/connexionswing/integration.nix | |||
@@ -9,7 +9,6 @@ in { | |||
9 | options.myServices.websites.connexionswing.integration.enable = lib.mkEnableOption "enable Connexionswing's website in integration"; | 9 | options.myServices.websites.connexionswing.integration.enable = lib.mkEnableOption "enable Connexionswing's website in integration"; |
10 | 10 | ||
11 | config = lib.mkIf cfg.enable { | 11 | config = lib.mkIf cfg.enable { |
12 | services.duplyBackup.profiles.connexionswing_integration.rootDir = app.varDir; | ||
13 | services.phpApplication.apps.connexionswing_integration = { | 12 | services.phpApplication.apps.connexionswing_integration = { |
14 | websiteEnv = "integration"; | 13 | websiteEnv = "integration"; |
15 | httpdUser = config.services.httpd.Inte.user; | 14 | httpdUser = config.services.httpd.Inte.user; |
diff --git a/modules/private/websites/connexionswing/production.nix b/modules/private/websites/connexionswing/production.nix index 144093a..4b0407f 100644 --- a/modules/private/websites/connexionswing/production.nix +++ b/modules/private/websites/connexionswing/production.nix | |||
@@ -13,8 +13,6 @@ in { | |||
13 | options.myServices.websites.connexionswing.production.enable = lib.mkEnableOption "enable Connexionswing's website in production"; | 13 | options.myServices.websites.connexionswing.production.enable = lib.mkEnableOption "enable Connexionswing's website in production"; |
14 | 14 | ||
15 | config = lib.mkIf cfg.enable { | 15 | config = lib.mkIf cfg.enable { |
16 | services.duplyBackup.profiles.connexionswing_production.rootDir = app.varDir; | ||
17 | services.duplyBackup.profiles.connexionswing_production.remotes = ["eriomem" "ovh"]; | ||
18 | services.webstats.sites = [ { name = "connexionswing.com"; } ]; | 16 | services.webstats.sites = [ { name = "connexionswing.com"; } ]; |
19 | services.phpApplication.apps.connexionswing_production = { | 17 | services.phpApplication.apps.connexionswing_production = { |
20 | websiteEnv = "production"; | 18 | websiteEnv = "production"; |
diff --git a/modules/private/websites/default.nix b/modules/private/websites/default.nix index 08c9d79..7aac7b8 100644 --- a/modules/private/websites/default.nix +++ b/modules/private/websites/default.nix | |||
@@ -102,10 +102,6 @@ in | |||
102 | options.myServices.websites.enable = lib.mkEnableOption "enable websites"; | 102 | options.myServices.websites.enable = lib.mkEnableOption "enable websites"; |
103 | 103 | ||
104 | config = lib.mkIf config.myServices.websites.enable { | 104 | config = lib.mkIf config.myServices.websites.enable { |
105 | services.duplyBackup.profiles.php = { | ||
106 | rootDir = "/var/lib/php"; | ||
107 | remotes = [ "eriomem" "ovh" ]; | ||
108 | }; | ||
109 | users.users.wwwrun.extraGroups = [ "keys" ]; | 105 | users.users.wwwrun.extraGroups = [ "keys" ]; |
110 | networking.firewall.allowedTCPPorts = [ 80 443 ]; | 106 | networking.firewall.allowedTCPPorts = [ 80 443 ]; |
111 | 107 | ||
diff --git a/modules/private/websites/emilia/moodle.nix b/modules/private/websites/emilia/moodle.nix index f943502..779c460 100644 --- a/modules/private/websites/emilia/moodle.nix +++ b/modules/private/websites/emilia/moodle.nix | |||
@@ -43,7 +43,6 @@ in { | |||
43 | options.myServices.websites.emilia.moodle.enable = lib.mkEnableOption "enable Emilia's website"; | 43 | options.myServices.websites.emilia.moodle.enable = lib.mkEnableOption "enable Emilia's website"; |
44 | 44 | ||
45 | config = lib.mkIf cfg.enable { | 45 | config = lib.mkIf cfg.enable { |
46 | services.duplyBackup.profiles.emilia_moodle.rootDir = varDir; | ||
47 | system.activationScripts.emilia_moodle = '' | 46 | system.activationScripts.emilia_moodle = '' |
48 | install -m 0755 -o ${apacheUser} -g ${apacheGroup} -d ${varDir} | 47 | install -m 0755 -o ${apacheUser} -g ${apacheGroup} -d ${varDir} |
49 | ''; | 48 | ''; |
diff --git a/modules/private/websites/florian/app.nix b/modules/private/websites/florian/app.nix index 27810a5..2df344f 100644 --- a/modules/private/websites/florian/app.nix +++ b/modules/private/websites/florian/app.nix | |||
@@ -9,7 +9,6 @@ in { | |||
9 | options.myServices.websites.florian.app.enable = lib.mkEnableOption "enable Florian's app in integration"; | 9 | options.myServices.websites.florian.app.enable = lib.mkEnableOption "enable Florian's app in integration"; |
10 | 10 | ||
11 | config = lib.mkIf cfg.enable { | 11 | config = lib.mkIf cfg.enable { |
12 | services.duplyBackup.profiles.florian_app.rootDir = app.varDir; | ||
13 | services.phpApplication.apps.florian_app = { | 12 | services.phpApplication.apps.florian_app = { |
14 | websiteEnv = "integration"; | 13 | websiteEnv = "integration"; |
15 | httpdUser = config.services.httpd.Inte.user; | 14 | httpdUser = config.services.httpd.Inte.user; |
diff --git a/modules/private/websites/immae/temp.nix b/modules/private/websites/immae/temp.nix index 61ed9cf..19aef1a 100644 --- a/modules/private/websites/immae/temp.nix +++ b/modules/private/websites/immae/temp.nix | |||
@@ -7,8 +7,6 @@ in { | |||
7 | options.myServices.websites.immae.temp.enable = lib.mkEnableOption "enable Temp' website"; | 7 | options.myServices.websites.immae.temp.enable = lib.mkEnableOption "enable Temp' website"; |
8 | 8 | ||
9 | config = lib.mkIf cfg.enable { | 9 | config = lib.mkIf cfg.enable { |
10 | services.duplyBackup.profiles.immae_temp.rootDir = varDir; | ||
11 | services.duplyBackup.profiles.immae_temp_surfer.rootDir = "/var/lib/surfer"; | ||
12 | services.websites.env.production.vhostConfs.immae_temp = { | 10 | services.websites.env.production.vhostConfs.immae_temp = { |
13 | certName = "immae"; | 11 | certName = "immae"; |
14 | addToCerts = true; | 12 | addToCerts = true; |
diff --git a/modules/private/websites/isabelle/aten_integration.nix b/modules/private/websites/isabelle/aten_integration.nix index 288f20d..215038e 100644 --- a/modules/private/websites/isabelle/aten_integration.nix +++ b/modules/private/websites/isabelle/aten_integration.nix | |||
@@ -8,7 +8,6 @@ in { | |||
8 | options.myServices.websites.isabelle.aten_integration.enable = lib.mkEnableOption "enable Aten's website in integration"; | 8 | options.myServices.websites.isabelle.aten_integration.enable = lib.mkEnableOption "enable Aten's website in integration"; |
9 | 9 | ||
10 | config = lib.mkIf cfg.enable { | 10 | config = lib.mkIf cfg.enable { |
11 | services.duplyBackup.profiles.isabelle_aten_integration.rootDir = app.varDir; | ||
12 | services.phpApplication.apps.isabelle_aten_integration = { | 11 | services.phpApplication.apps.isabelle_aten_integration = { |
13 | websiteEnv = "integration"; | 12 | websiteEnv = "integration"; |
14 | httpdUser = config.services.httpd.Inte.user; | 13 | httpdUser = config.services.httpd.Inte.user; |
diff --git a/modules/private/websites/isabelle/aten_production.nix b/modules/private/websites/isabelle/aten_production.nix index 6a04710..928a815 100644 --- a/modules/private/websites/isabelle/aten_production.nix +++ b/modules/private/websites/isabelle/aten_production.nix | |||
@@ -12,8 +12,6 @@ in { | |||
12 | options.myServices.websites.isabelle.aten_production.enable = lib.mkEnableOption "enable Aten's website in production"; | 12 | options.myServices.websites.isabelle.aten_production.enable = lib.mkEnableOption "enable Aten's website in production"; |
13 | 13 | ||
14 | config = lib.mkIf cfg.enable { | 14 | config = lib.mkIf cfg.enable { |
15 | services.duplyBackup.profiles.isabelle_aten_production.rootDir = app.varDir; | ||
16 | services.duplyBackup.profiles.isabelle_aten_production.remotes = ["eriomem" "ovh"]; | ||
17 | services.webstats.sites = [ { name = "aten.pro"; } ]; | 15 | services.webstats.sites = [ { name = "aten.pro"; } ]; |
18 | services.phpApplication.apps.isabelle_aten_production = { | 16 | services.phpApplication.apps.isabelle_aten_production = { |
19 | websiteEnv = "production"; | 17 | websiteEnv = "production"; |
diff --git a/modules/private/websites/isabelle/iridologie.nix b/modules/private/websites/isabelle/iridologie.nix index 88521fc..cd733c1 100644 --- a/modules/private/websites/isabelle/iridologie.nix +++ b/modules/private/websites/isabelle/iridologie.nix | |||
@@ -15,8 +15,6 @@ in { | |||
15 | options.myServices.websites.isabelle.iridologie.enable = lib.mkEnableOption "enable Iridologie's website"; | 15 | options.myServices.websites.isabelle.iridologie.enable = lib.mkEnableOption "enable Iridologie's website"; |
16 | 16 | ||
17 | config = lib.mkIf cfg.enable { | 17 | config = lib.mkIf cfg.enable { |
18 | services.duplyBackup.profiles.isabelle_iridologie.rootDir = app.varDir; | ||
19 | services.duplyBackup.profiles.isabelle_iridologie.remotes = ["eriomem" "ovh"]; | ||
20 | secrets.keys."websites/isabelle/iridologie" = { | 18 | secrets.keys."websites/isabelle/iridologie" = { |
21 | user = apacheUser; | 19 | user = apacheUser; |
22 | group = apacheGroup; | 20 | group = apacheGroup; |
diff --git a/modules/private/websites/ludivine/integration.nix b/modules/private/websites/ludivine/integration.nix index d04295d..c0cbbef 100644 --- a/modules/private/websites/ludivine/integration.nix +++ b/modules/private/websites/ludivine/integration.nix | |||
@@ -8,7 +8,6 @@ in { | |||
8 | options.myServices.websites.ludivine.integration.enable = lib.mkEnableOption "enable Ludivine's website in integration"; | 8 | options.myServices.websites.ludivine.integration.enable = lib.mkEnableOption "enable Ludivine's website in integration"; |
9 | 9 | ||
10 | config = lib.mkIf cfg.enable { | 10 | config = lib.mkIf cfg.enable { |
11 | services.duplyBackup.profiles.ludivine_integration.rootDir = app.varDir; | ||
12 | services.phpApplication.apps.ludivine_integration = { | 11 | services.phpApplication.apps.ludivine_integration = { |
13 | websiteEnv = "integration"; | 12 | websiteEnv = "integration"; |
14 | httpdUser = config.services.httpd.Inte.user; | 13 | httpdUser = config.services.httpd.Inte.user; |
diff --git a/modules/private/websites/ludivine/production.nix b/modules/private/websites/ludivine/production.nix index 09bb3dc..7a18b88 100644 --- a/modules/private/websites/ludivine/production.nix +++ b/modules/private/websites/ludivine/production.nix | |||
@@ -13,8 +13,6 @@ in { | |||
13 | options.myServices.websites.ludivine.production.enable = lib.mkEnableOption "enable Ludivine's website in production"; | 13 | options.myServices.websites.ludivine.production.enable = lib.mkEnableOption "enable Ludivine's website in production"; |
14 | 14 | ||
15 | config = lib.mkIf cfg.enable { | 15 | config = lib.mkIf cfg.enable { |
16 | services.duplyBackup.profiles.ludivine_production.rootDir = app.varDir; | ||
17 | services.duplyBackup.profiles.ludivine_production.remotes = ["eriomem" "ovh"]; | ||
18 | services.webstats.sites = [ { name = "ludivinecassal.com"; } ]; | 16 | services.webstats.sites = [ { name = "ludivinecassal.com"; } ]; |
19 | services.phpApplication.apps.ludivine_production = { | 17 | services.phpApplication.apps.ludivine_production = { |
20 | websiteEnv = "production"; | 18 | websiteEnv = "production"; |
diff --git a/modules/private/websites/piedsjaloux/integration.nix b/modules/private/websites/piedsjaloux/integration.nix index 64d577e..d103ad7 100644 --- a/modules/private/websites/piedsjaloux/integration.nix +++ b/modules/private/websites/piedsjaloux/integration.nix | |||
@@ -9,7 +9,6 @@ in { | |||
9 | options.myServices.websites.piedsjaloux.integration.enable = lib.mkEnableOption "enable PiedsJaloux's website in integration"; | 9 | options.myServices.websites.piedsjaloux.integration.enable = lib.mkEnableOption "enable PiedsJaloux's website in integration"; |
10 | 10 | ||
11 | config = lib.mkIf cfg.enable { | 11 | config = lib.mkIf cfg.enable { |
12 | services.duplyBackup.profiles.piedsjaloux_integration.rootDir = app.varDir; | ||
13 | services.phpApplication.apps.piedsjaloux_integration = { | 12 | services.phpApplication.apps.piedsjaloux_integration = { |
14 | websiteEnv = "integration"; | 13 | websiteEnv = "integration"; |
15 | httpdUser = config.services.httpd.Inte.user; | 14 | httpdUser = config.services.httpd.Inte.user; |
diff --git a/modules/private/websites/piedsjaloux/production.nix b/modules/private/websites/piedsjaloux/production.nix index 118846d..422c7f0 100644 --- a/modules/private/websites/piedsjaloux/production.nix +++ b/modules/private/websites/piedsjaloux/production.nix | |||
@@ -14,8 +14,6 @@ in { | |||
14 | options.myServices.websites.piedsjaloux.production.enable = lib.mkEnableOption "enable PiedsJaloux's website in production"; | 14 | options.myServices.websites.piedsjaloux.production.enable = lib.mkEnableOption "enable PiedsJaloux's website in production"; |
15 | 15 | ||
16 | config = lib.mkIf cfg.enable { | 16 | config = lib.mkIf cfg.enable { |
17 | services.duplyBackup.profiles.piedsjaloux_production.rootDir = app.varDir; | ||
18 | services.duplyBackup.profiles.piedsjaloux_production.remotes = ["eriomem" "ovh"]; | ||
19 | services.webstats.sites = [ { name = "piedsjaloux.fr"; } ]; | 17 | services.webstats.sites = [ { name = "piedsjaloux.fr"; } ]; |
20 | services.phpApplication.apps.piedsjaloux_production = { | 18 | services.phpApplication.apps.piedsjaloux_production = { |
21 | websiteEnv = "production"; | 19 | websiteEnv = "production"; |
diff --git a/modules/private/websites/richie/production.nix b/modules/private/websites/richie/production.nix index e95df30..a548cff 100644 --- a/modules/private/websites/richie/production.nix +++ b/modules/private/websites/richie/production.nix | |||
@@ -24,8 +24,6 @@ in | |||
24 | { | 24 | { |
25 | options.myServices.websites.richie.production.enable = lib.mkEnableOption "enable Richie's website"; | 25 | options.myServices.websites.richie.production.enable = lib.mkEnableOption "enable Richie's website"; |
26 | config = lib.mkIf cfg.enable { | 26 | config = lib.mkIf cfg.enable { |
27 | services.duplyBackup.profiles.richie_production.rootDir = vardir; | ||
28 | services.duplyBackup.profiles.richie_production.remotes = ["eriomem" "ovh"]; | ||
29 | services.webstats.sites = [ { name = "europe-richie.org"; } ]; | 27 | services.webstats.sites = [ { name = "europe-richie.org"; } ]; |
30 | 28 | ||
31 | secrets.keys."websites/richie/production" = { | 29 | secrets.keys."websites/richie/production" = { |
diff --git a/modules/private/websites/syden/peertube.nix b/modules/private/websites/syden/peertube.nix index 4036eac..64d4a5d 100644 --- a/modules/private/websites/syden/peertube.nix +++ b/modules/private/websites/syden/peertube.nix | |||
@@ -10,10 +10,6 @@ in | |||
10 | options.myServices.websites.syden.peertube.enable = lib.mkEnableOption "enable Syden's website"; | 10 | options.myServices.websites.syden.peertube.enable = lib.mkEnableOption "enable Syden's website"; |
11 | 11 | ||
12 | config = lib.mkIf scfg.enable { | 12 | config = lib.mkIf scfg.enable { |
13 | services.duplyBackup.profiles.syden_peertube = { | ||
14 | rootDir = dataDir; | ||
15 | remotes = ["eriomem" "ovh"]; | ||
16 | }; | ||
17 | users.users.peertube = { | 13 | users.users.peertube = { |
18 | uid = config.ids.uids.peertube; | 14 | uid = config.ids.uids.peertube; |
19 | group = "peertube"; | 15 | group = "peertube"; |
diff --git a/modules/private/websites/tools/diaspora/default.nix b/modules/private/websites/tools/diaspora/default.nix index 9afd5b9..3a115ed 100644 --- a/modules/private/websites/tools/diaspora/default.nix +++ b/modules/private/websites/tools/diaspora/default.nix | |||
@@ -10,10 +10,6 @@ in { | |||
10 | }; | 10 | }; |
11 | 11 | ||
12 | config = lib.mkIf cfg.enable { | 12 | config = lib.mkIf cfg.enable { |
13 | services.duplyBackup.profiles.diaspora = { | ||
14 | rootDir = dcfg.dataDir; | ||
15 | remotes = [ "eriomem" "ovh" ]; | ||
16 | }; | ||
17 | users.users.diaspora.extraGroups = [ "keys" ]; | 13 | users.users.diaspora.extraGroups = [ "keys" ]; |
18 | 14 | ||
19 | secrets.keys = { | 15 | secrets.keys = { |
diff --git a/modules/private/websites/tools/ether/default.nix b/modules/private/websites/tools/ether/default.nix index d5c65a9..0539095 100644 --- a/modules/private/websites/tools/ether/default.nix +++ b/modules/private/websites/tools/ether/default.nix | |||
@@ -12,9 +12,6 @@ in { | |||
12 | }; | 12 | }; |
13 | 13 | ||
14 | config = lib.mkIf cfg.enable { | 14 | config = lib.mkIf cfg.enable { |
15 | services.duplyBackup.profiles.etherpad-lite = { | ||
16 | rootDir = "/var/lib/private/etherpad-lite"; | ||
17 | }; | ||
18 | secrets.keys = { | 15 | secrets.keys = { |
19 | "webapps/tools-etherpad-apikey" = { | 16 | "webapps/tools-etherpad-apikey" = { |
20 | permissions = "0400"; | 17 | permissions = "0400"; |
diff --git a/modules/private/websites/tools/mail/default.nix b/modules/private/websites/tools/mail/default.nix index 7bc3d2d..390f7ad 100644 --- a/modules/private/websites/tools/mail/default.nix +++ b/modules/private/websites/tools/mail/default.nix | |||
@@ -21,10 +21,6 @@ in | |||
21 | ]; | 21 | ]; |
22 | 22 | ||
23 | config = lib.mkIf cfg.enable { | 23 | config = lib.mkIf cfg.enable { |
24 | services.duplyBackup.profiles.mail.excludeFile = '' | ||
25 | + ${rainloop.varDir} | ||
26 | + ${roundcubemail.varDir} | ||
27 | ''; | ||
28 | secrets.keys = roundcubemail.keys; | 24 | secrets.keys = roundcubemail.keys; |
29 | 25 | ||
30 | services.websites.env.tools.modules = | 26 | services.websites.env.tools.modules = |
diff --git a/modules/private/websites/tools/mastodon/default.nix b/modules/private/websites/tools/mastodon/default.nix index 3512cf1..173a4b8 100644 --- a/modules/private/websites/tools/mastodon/default.nix +++ b/modules/private/websites/tools/mastodon/default.nix | |||
@@ -10,9 +10,6 @@ in { | |||
10 | }; | 10 | }; |
11 | 11 | ||
12 | config = lib.mkIf cfg.enable { | 12 | config = lib.mkIf cfg.enable { |
13 | services.duplyBackup.profiles.mastodon = { | ||
14 | rootDir = mcfg.dataDir; | ||
15 | }; | ||
16 | secrets.keys."webapps/tools-mastodon" = { | 13 | secrets.keys."webapps/tools-mastodon" = { |
17 | user = "mastodon"; | 14 | user = "mastodon"; |
18 | group = "mastodon"; | 15 | group = "mastodon"; |
diff --git a/modules/private/websites/tools/mgoblin/default.nix b/modules/private/websites/tools/mgoblin/default.nix index f6cba4a..1e5f5a0 100644 --- a/modules/private/websites/tools/mgoblin/default.nix +++ b/modules/private/websites/tools/mgoblin/default.nix | |||
@@ -9,9 +9,6 @@ in { | |||
9 | }; | 9 | }; |
10 | 10 | ||
11 | config = lib.mkIf cfg.enable { | 11 | config = lib.mkIf cfg.enable { |
12 | services.duplyBackup.profiles.mgoblin = { | ||
13 | rootDir = mcfg.dataDir; | ||
14 | }; | ||
15 | secrets.keys."webapps/tools-mediagoblin" = { | 12 | secrets.keys."webapps/tools-mediagoblin" = { |
16 | user = "mediagoblin"; | 13 | user = "mediagoblin"; |
17 | group = "mediagoblin"; | 14 | group = "mediagoblin"; |
diff --git a/modules/private/websites/tools/peertube/default.nix b/modules/private/websites/tools/peertube/default.nix index daeeb1f..68c992f 100644 --- a/modules/private/websites/tools/peertube/default.nix +++ b/modules/private/websites/tools/peertube/default.nix | |||
@@ -9,9 +9,6 @@ in { | |||
9 | }; | 9 | }; |
10 | 10 | ||
11 | config = lib.mkIf cfg.enable { | 11 | config = lib.mkIf cfg.enable { |
12 | services.duplyBackup.profiles.peertube = { | ||
13 | rootDir = pcfg.dataDir; | ||
14 | }; | ||
15 | services.peertube = { | 12 | services.peertube = { |
16 | enable = true; | 13 | enable = true; |
17 | configFile = config.secrets.fullPaths."webapps/tools-peertube"; | 14 | configFile = config.secrets.fullPaths."webapps/tools-peertube"; |
diff --git a/modules/private/websites/tools/tools/default.nix b/modules/private/websites/tools/tools/default.nix index 9052473..77d6323 100644 --- a/modules/private/websites/tools/tools/default.nix +++ b/modules/private/websites/tools/tools/default.nix | |||
@@ -90,17 +90,6 @@ in { | |||
90 | // csp-reports.keys | 90 | // csp-reports.keys |
91 | // webhooks.keys; | 91 | // webhooks.keys; |
92 | 92 | ||
93 | services.duplyBackup.profiles = { | ||
94 | dokuwiki = dokuwiki.backups; | ||
95 | grocy = grocy.backups; | ||
96 | kanboard = kanboard.backups; | ||
97 | rompr = rompr.backups; | ||
98 | shaarli = shaarli.backups; | ||
99 | ttrss = ttrss.backups; | ||
100 | wallabag = wallabag.backups; | ||
101 | phpbb = phpbb.backups; | ||
102 | }; | ||
103 | |||
104 | services.websites.env.tools.modules = | 93 | services.websites.env.tools.modules = |
105 | [ "proxy_fcgi" ] | 94 | [ "proxy_fcgi" ] |
106 | ++ adminer.apache.modules | 95 | ++ adminer.apache.modules |
diff --git a/modules/private/websites/tools/tools/dokuwiki.nix b/modules/private/websites/tools/tools/dokuwiki.nix index 1bcd852..aee495a 100644 --- a/modules/private/websites/tools/tools/dokuwiki.nix +++ b/modules/private/websites/tools/tools/dokuwiki.nix | |||
@@ -1,9 +1,5 @@ | |||
1 | { lib, stdenv, dokuwiki, dokuwiki-plugins }: | 1 | { lib, stdenv, dokuwiki, dokuwiki-plugins }: |
2 | rec { | 2 | rec { |
3 | backups = { | ||
4 | rootDir = varDir; | ||
5 | remotes = [ "eriomem" "ovh" ]; | ||
6 | }; | ||
7 | varDir = "/var/lib/dokuwiki"; | 3 | varDir = "/var/lib/dokuwiki"; |
8 | activationScript = { | 4 | activationScript = { |
9 | deps = [ "wrappers" ]; | 5 | deps = [ "wrappers" ]; |
diff --git a/modules/private/websites/tools/tools/grocy.nix b/modules/private/websites/tools/tools/grocy.nix index 3c33170..3c45261 100644 --- a/modules/private/websites/tools/tools/grocy.nix +++ b/modules/private/websites/tools/tools/grocy.nix | |||
@@ -1,8 +1,5 @@ | |||
1 | { lib, stdenv, grocy }: | 1 | { lib, stdenv, grocy }: |
2 | rec { | 2 | rec { |
3 | backups = { | ||
4 | rootDir = varDir; | ||
5 | }; | ||
6 | varDir = "/var/lib/grocy"; | 3 | varDir = "/var/lib/grocy"; |
7 | activationScript = { | 4 | activationScript = { |
8 | deps = [ "wrappers" ]; | 5 | deps = [ "wrappers" ]; |
diff --git a/modules/private/websites/tools/tools/kanboard.nix b/modules/private/websites/tools/tools/kanboard.nix index 54bbe01..4809a42 100644 --- a/modules/private/websites/tools/tools/kanboard.nix +++ b/modules/private/websites/tools/tools/kanboard.nix | |||
@@ -1,8 +1,5 @@ | |||
1 | { env, kanboard, config }: | 1 | { env, kanboard, config }: |
2 | rec { | 2 | rec { |
3 | backups = { | ||
4 | rootDir = varDir; | ||
5 | }; | ||
6 | varDir = "/var/lib/kanboard"; | 3 | varDir = "/var/lib/kanboard"; |
7 | activationScript = { | 4 | activationScript = { |
8 | deps = [ "wrappers" ]; | 5 | deps = [ "wrappers" ]; |
diff --git a/modules/private/websites/tools/tools/phpbb.nix b/modules/private/websites/tools/tools/phpbb.nix index e341a64..77845c3 100644 --- a/modules/private/websites/tools/tools/phpbb.nix +++ b/modules/private/websites/tools/tools/phpbb.nix | |||
@@ -1,8 +1,5 @@ | |||
1 | { lib, phpbb, gnused }: | 1 | { lib, phpbb, gnused }: |
2 | rec { | 2 | rec { |
3 | backups = { | ||
4 | rootDir = varDir; | ||
5 | }; | ||
6 | varDir = "/var/lib/phpbb"; | 3 | varDir = "/var/lib/phpbb"; |
7 | activationScript = { | 4 | activationScript = { |
8 | deps = [ "wrappers" ]; | 5 | deps = [ "wrappers" ]; |
diff --git a/modules/private/websites/tools/tools/rompr.nix b/modules/private/websites/tools/tools/rompr.nix index 9765df5..e80d6b2 100644 --- a/modules/private/websites/tools/tools/rompr.nix +++ b/modules/private/websites/tools/tools/rompr.nix | |||
@@ -1,8 +1,5 @@ | |||
1 | { lib, env, rompr }: | 1 | { lib, env, rompr }: |
2 | rec { | 2 | rec { |
3 | backups = { | ||
4 | rootDir = varDir; | ||
5 | }; | ||
6 | varDir = "/var/lib/rompr"; | 3 | varDir = "/var/lib/rompr"; |
7 | activationScript = '' | 4 | activationScript = '' |
8 | install -m 0755 -o ${apache.user} -g ${apache.group} -d ${varDir} \ | 5 | install -m 0755 -o ${apache.user} -g ${apache.group} -d ${varDir} \ |
diff --git a/modules/private/websites/tools/tools/shaarli.nix b/modules/private/websites/tools/tools/shaarli.nix index f63c722..d128465 100644 --- a/modules/private/websites/tools/tools/shaarli.nix +++ b/modules/private/websites/tools/tools/shaarli.nix | |||
@@ -2,10 +2,6 @@ | |||
2 | let | 2 | let |
3 | varDir = "/var/lib/shaarli"; | 3 | varDir = "/var/lib/shaarli"; |
4 | in rec { | 4 | in rec { |
5 | backups = { | ||
6 | rootDir = varDir; | ||
7 | remotes = [ "eriomem" "ovh" ]; | ||
8 | }; | ||
9 | activationScript = '' | 5 | activationScript = '' |
10 | install -m 0755 -o ${apache.user} -g ${apache.group} -d ${varDir} \ | 6 | install -m 0755 -o ${apache.user} -g ${apache.group} -d ${varDir} \ |
11 | ${varDir}/cache ${varDir}/pagecache ${varDir}/tmp ${varDir}/data \ | 7 | ${varDir}/cache ${varDir}/pagecache ${varDir}/tmp ${varDir}/data \ |
diff --git a/modules/private/websites/tools/tools/ttrss.nix b/modules/private/websites/tools/tools/ttrss.nix index bee26c8..1dc99ed 100644 --- a/modules/private/websites/tools/tools/ttrss.nix +++ b/modules/private/websites/tools/tools/ttrss.nix | |||
@@ -1,8 +1,5 @@ | |||
1 | { php, env, ttrss, ttrss-plugins, config }: | 1 | { php, env, ttrss, ttrss-plugins, config }: |
2 | rec { | 2 | rec { |
3 | backups = { | ||
4 | rootDir = varDir; | ||
5 | }; | ||
6 | varDir = "/var/lib/ttrss"; | 3 | varDir = "/var/lib/ttrss"; |
7 | activationScript = { | 4 | activationScript = { |
8 | deps = [ "wrappers" ]; | 5 | deps = [ "wrappers" ]; |
diff --git a/modules/private/websites/tools/tools/wallabag.nix b/modules/private/websites/tools/tools/wallabag.nix index ceb061f..0ebdb0b 100644 --- a/modules/private/websites/tools/tools/wallabag.nix +++ b/modules/private/websites/tools/tools/wallabag.nix | |||
@@ -1,9 +1,5 @@ | |||
1 | { env, wallabag, mylibs, config }: | 1 | { env, wallabag, mylibs, config }: |
2 | rec { | 2 | rec { |
3 | backups = { | ||
4 | rootDir = varDir; | ||
5 | remotes = [ "eriomem" "ovh" ]; | ||
6 | }; | ||
7 | varDir = "/var/lib/wallabag"; | 3 | varDir = "/var/lib/wallabag"; |
8 | keys."webapps/tools-wallabag" = { | 4 | keys."webapps/tools-wallabag" = { |
9 | user = apache.user; | 5 | user = apache.user; |