aboutsummaryrefslogtreecommitdiff
path: root/modules/private/websites
diff options
context:
space:
mode:
Diffstat (limited to 'modules/private/websites')
-rw-r--r--modules/private/websites/chloe/integration.nix1
-rw-r--r--modules/private/websites/chloe/production.nix2
-rw-r--r--modules/private/websites/connexionswing/integration.nix1
-rw-r--r--modules/private/websites/connexionswing/production.nix2
-rw-r--r--modules/private/websites/default.nix4
-rw-r--r--modules/private/websites/emilia/moodle.nix1
-rw-r--r--modules/private/websites/florian/app.nix1
-rw-r--r--modules/private/websites/immae/temp.nix2
-rw-r--r--modules/private/websites/isabelle/aten_integration.nix1
-rw-r--r--modules/private/websites/isabelle/aten_production.nix2
-rw-r--r--modules/private/websites/isabelle/iridologie.nix2
-rw-r--r--modules/private/websites/ludivine/integration.nix1
-rw-r--r--modules/private/websites/ludivine/production.nix2
-rw-r--r--modules/private/websites/piedsjaloux/integration.nix1
-rw-r--r--modules/private/websites/piedsjaloux/production.nix2
-rw-r--r--modules/private/websites/richie/production.nix2
-rw-r--r--modules/private/websites/syden/peertube.nix4
-rw-r--r--modules/private/websites/tools/diaspora/default.nix4
-rw-r--r--modules/private/websites/tools/ether/default.nix3
-rw-r--r--modules/private/websites/tools/mail/default.nix4
-rw-r--r--modules/private/websites/tools/mastodon/default.nix3
-rw-r--r--modules/private/websites/tools/mgoblin/default.nix3
-rw-r--r--modules/private/websites/tools/peertube/default.nix3
-rw-r--r--modules/private/websites/tools/tools/default.nix11
-rw-r--r--modules/private/websites/tools/tools/dokuwiki.nix4
-rw-r--r--modules/private/websites/tools/tools/grocy.nix3
-rw-r--r--modules/private/websites/tools/tools/kanboard.nix3
-rw-r--r--modules/private/websites/tools/tools/phpbb.nix3
-rw-r--r--modules/private/websites/tools/tools/rompr.nix3
-rw-r--r--modules/private/websites/tools/tools/shaarli.nix4
-rw-r--r--modules/private/websites/tools/tools/ttrss.nix3
-rw-r--r--modules/private/websites/tools/tools/wallabag.nix4
32 files changed, 0 insertions, 89 deletions
diff --git a/modules/private/websites/chloe/integration.nix b/modules/private/websites/chloe/integration.nix
index aedf3a5..4dc4bf3 100644
--- a/modules/private/websites/chloe/integration.nix
+++ b/modules/private/websites/chloe/integration.nix
@@ -10,7 +10,6 @@ in {
10 options.myServices.websites.chloe.integration.enable = lib.mkEnableOption "enable Chloe's website in integration"; 10 options.myServices.websites.chloe.integration.enable = lib.mkEnableOption "enable Chloe's website in integration";
11 11
12 config = lib.mkIf cfg.enable { 12 config = lib.mkIf cfg.enable {
13 services.duplyBackup.profiles.chloe_integration.rootDir = app.varDir;
14 secrets.keys."websites/chloe/integration" = { 13 secrets.keys."websites/chloe/integration" = {
15 user = apacheUser; 14 user = apacheUser;
16 group = apacheGroup; 15 group = apacheGroup;
diff --git a/modules/private/websites/chloe/production.nix b/modules/private/websites/chloe/production.nix
index c3a5732..211232c 100644
--- a/modules/private/websites/chloe/production.nix
+++ b/modules/private/websites/chloe/production.nix
@@ -13,8 +13,6 @@ in {
13 options.myServices.websites.chloe.production.enable = lib.mkEnableOption "enable Chloe's website in production"; 13 options.myServices.websites.chloe.production.enable = lib.mkEnableOption "enable Chloe's website in production";
14 14
15 config = lib.mkIf cfg.enable { 15 config = lib.mkIf cfg.enable {
16 services.duplyBackup.profiles.chloe_production.rootDir = app.varDir;
17 services.duplyBackup.profiles.chloe_production.remotes = ["eriomem" "ovh"];
18 secrets.keys."websites/chloe/production" = { 16 secrets.keys."websites/chloe/production" = {
19 user = apacheUser; 17 user = apacheUser;
20 group = apacheGroup; 18 group = apacheGroup;
diff --git a/modules/private/websites/connexionswing/integration.nix b/modules/private/websites/connexionswing/integration.nix
index fe0e4d9..c1165b8 100644
--- a/modules/private/websites/connexionswing/integration.nix
+++ b/modules/private/websites/connexionswing/integration.nix
@@ -9,7 +9,6 @@ in {
9 options.myServices.websites.connexionswing.integration.enable = lib.mkEnableOption "enable Connexionswing's website in integration"; 9 options.myServices.websites.connexionswing.integration.enable = lib.mkEnableOption "enable Connexionswing's website in integration";
10 10
11 config = lib.mkIf cfg.enable { 11 config = lib.mkIf cfg.enable {
12 services.duplyBackup.profiles.connexionswing_integration.rootDir = app.varDir;
13 services.phpApplication.apps.connexionswing_integration = { 12 services.phpApplication.apps.connexionswing_integration = {
14 websiteEnv = "integration"; 13 websiteEnv = "integration";
15 httpdUser = config.services.httpd.Inte.user; 14 httpdUser = config.services.httpd.Inte.user;
diff --git a/modules/private/websites/connexionswing/production.nix b/modules/private/websites/connexionswing/production.nix
index 144093a..4b0407f 100644
--- a/modules/private/websites/connexionswing/production.nix
+++ b/modules/private/websites/connexionswing/production.nix
@@ -13,8 +13,6 @@ in {
13 options.myServices.websites.connexionswing.production.enable = lib.mkEnableOption "enable Connexionswing's website in production"; 13 options.myServices.websites.connexionswing.production.enable = lib.mkEnableOption "enable Connexionswing's website in production";
14 14
15 config = lib.mkIf cfg.enable { 15 config = lib.mkIf cfg.enable {
16 services.duplyBackup.profiles.connexionswing_production.rootDir = app.varDir;
17 services.duplyBackup.profiles.connexionswing_production.remotes = ["eriomem" "ovh"];
18 services.webstats.sites = [ { name = "connexionswing.com"; } ]; 16 services.webstats.sites = [ { name = "connexionswing.com"; } ];
19 services.phpApplication.apps.connexionswing_production = { 17 services.phpApplication.apps.connexionswing_production = {
20 websiteEnv = "production"; 18 websiteEnv = "production";
diff --git a/modules/private/websites/default.nix b/modules/private/websites/default.nix
index 08c9d79..7aac7b8 100644
--- a/modules/private/websites/default.nix
+++ b/modules/private/websites/default.nix
@@ -102,10 +102,6 @@ in
102 options.myServices.websites.enable = lib.mkEnableOption "enable websites"; 102 options.myServices.websites.enable = lib.mkEnableOption "enable websites";
103 103
104 config = lib.mkIf config.myServices.websites.enable { 104 config = lib.mkIf config.myServices.websites.enable {
105 services.duplyBackup.profiles.php = {
106 rootDir = "/var/lib/php";
107 remotes = [ "eriomem" "ovh" ];
108 };
109 users.users.wwwrun.extraGroups = [ "keys" ]; 105 users.users.wwwrun.extraGroups = [ "keys" ];
110 networking.firewall.allowedTCPPorts = [ 80 443 ]; 106 networking.firewall.allowedTCPPorts = [ 80 443 ];
111 107
diff --git a/modules/private/websites/emilia/moodle.nix b/modules/private/websites/emilia/moodle.nix
index f943502..779c460 100644
--- a/modules/private/websites/emilia/moodle.nix
+++ b/modules/private/websites/emilia/moodle.nix
@@ -43,7 +43,6 @@ in {
43 options.myServices.websites.emilia.moodle.enable = lib.mkEnableOption "enable Emilia's website"; 43 options.myServices.websites.emilia.moodle.enable = lib.mkEnableOption "enable Emilia's website";
44 44
45 config = lib.mkIf cfg.enable { 45 config = lib.mkIf cfg.enable {
46 services.duplyBackup.profiles.emilia_moodle.rootDir = varDir;
47 system.activationScripts.emilia_moodle = '' 46 system.activationScripts.emilia_moodle = ''
48 install -m 0755 -o ${apacheUser} -g ${apacheGroup} -d ${varDir} 47 install -m 0755 -o ${apacheUser} -g ${apacheGroup} -d ${varDir}
49 ''; 48 '';
diff --git a/modules/private/websites/florian/app.nix b/modules/private/websites/florian/app.nix
index 27810a5..2df344f 100644
--- a/modules/private/websites/florian/app.nix
+++ b/modules/private/websites/florian/app.nix
@@ -9,7 +9,6 @@ in {
9 options.myServices.websites.florian.app.enable = lib.mkEnableOption "enable Florian's app in integration"; 9 options.myServices.websites.florian.app.enable = lib.mkEnableOption "enable Florian's app in integration";
10 10
11 config = lib.mkIf cfg.enable { 11 config = lib.mkIf cfg.enable {
12 services.duplyBackup.profiles.florian_app.rootDir = app.varDir;
13 services.phpApplication.apps.florian_app = { 12 services.phpApplication.apps.florian_app = {
14 websiteEnv = "integration"; 13 websiteEnv = "integration";
15 httpdUser = config.services.httpd.Inte.user; 14 httpdUser = config.services.httpd.Inte.user;
diff --git a/modules/private/websites/immae/temp.nix b/modules/private/websites/immae/temp.nix
index 61ed9cf..19aef1a 100644
--- a/modules/private/websites/immae/temp.nix
+++ b/modules/private/websites/immae/temp.nix
@@ -7,8 +7,6 @@ in {
7 options.myServices.websites.immae.temp.enable = lib.mkEnableOption "enable Temp' website"; 7 options.myServices.websites.immae.temp.enable = lib.mkEnableOption "enable Temp' website";
8 8
9 config = lib.mkIf cfg.enable { 9 config = lib.mkIf cfg.enable {
10 services.duplyBackup.profiles.immae_temp.rootDir = varDir;
11 services.duplyBackup.profiles.immae_temp_surfer.rootDir = "/var/lib/surfer";
12 services.websites.env.production.vhostConfs.immae_temp = { 10 services.websites.env.production.vhostConfs.immae_temp = {
13 certName = "immae"; 11 certName = "immae";
14 addToCerts = true; 12 addToCerts = true;
diff --git a/modules/private/websites/isabelle/aten_integration.nix b/modules/private/websites/isabelle/aten_integration.nix
index 288f20d..215038e 100644
--- a/modules/private/websites/isabelle/aten_integration.nix
+++ b/modules/private/websites/isabelle/aten_integration.nix
@@ -8,7 +8,6 @@ in {
8 options.myServices.websites.isabelle.aten_integration.enable = lib.mkEnableOption "enable Aten's website in integration"; 8 options.myServices.websites.isabelle.aten_integration.enable = lib.mkEnableOption "enable Aten's website in integration";
9 9
10 config = lib.mkIf cfg.enable { 10 config = lib.mkIf cfg.enable {
11 services.duplyBackup.profiles.isabelle_aten_integration.rootDir = app.varDir;
12 services.phpApplication.apps.isabelle_aten_integration = { 11 services.phpApplication.apps.isabelle_aten_integration = {
13 websiteEnv = "integration"; 12 websiteEnv = "integration";
14 httpdUser = config.services.httpd.Inte.user; 13 httpdUser = config.services.httpd.Inte.user;
diff --git a/modules/private/websites/isabelle/aten_production.nix b/modules/private/websites/isabelle/aten_production.nix
index 6a04710..928a815 100644
--- a/modules/private/websites/isabelle/aten_production.nix
+++ b/modules/private/websites/isabelle/aten_production.nix
@@ -12,8 +12,6 @@ in {
12 options.myServices.websites.isabelle.aten_production.enable = lib.mkEnableOption "enable Aten's website in production"; 12 options.myServices.websites.isabelle.aten_production.enable = lib.mkEnableOption "enable Aten's website in production";
13 13
14 config = lib.mkIf cfg.enable { 14 config = lib.mkIf cfg.enable {
15 services.duplyBackup.profiles.isabelle_aten_production.rootDir = app.varDir;
16 services.duplyBackup.profiles.isabelle_aten_production.remotes = ["eriomem" "ovh"];
17 services.webstats.sites = [ { name = "aten.pro"; } ]; 15 services.webstats.sites = [ { name = "aten.pro"; } ];
18 services.phpApplication.apps.isabelle_aten_production = { 16 services.phpApplication.apps.isabelle_aten_production = {
19 websiteEnv = "production"; 17 websiteEnv = "production";
diff --git a/modules/private/websites/isabelle/iridologie.nix b/modules/private/websites/isabelle/iridologie.nix
index 88521fc..cd733c1 100644
--- a/modules/private/websites/isabelle/iridologie.nix
+++ b/modules/private/websites/isabelle/iridologie.nix
@@ -15,8 +15,6 @@ in {
15 options.myServices.websites.isabelle.iridologie.enable = lib.mkEnableOption "enable Iridologie's website"; 15 options.myServices.websites.isabelle.iridologie.enable = lib.mkEnableOption "enable Iridologie's website";
16 16
17 config = lib.mkIf cfg.enable { 17 config = lib.mkIf cfg.enable {
18 services.duplyBackup.profiles.isabelle_iridologie.rootDir = app.varDir;
19 services.duplyBackup.profiles.isabelle_iridologie.remotes = ["eriomem" "ovh"];
20 secrets.keys."websites/isabelle/iridologie" = { 18 secrets.keys."websites/isabelle/iridologie" = {
21 user = apacheUser; 19 user = apacheUser;
22 group = apacheGroup; 20 group = apacheGroup;
diff --git a/modules/private/websites/ludivine/integration.nix b/modules/private/websites/ludivine/integration.nix
index d04295d..c0cbbef 100644
--- a/modules/private/websites/ludivine/integration.nix
+++ b/modules/private/websites/ludivine/integration.nix
@@ -8,7 +8,6 @@ in {
8 options.myServices.websites.ludivine.integration.enable = lib.mkEnableOption "enable Ludivine's website in integration"; 8 options.myServices.websites.ludivine.integration.enable = lib.mkEnableOption "enable Ludivine's website in integration";
9 9
10 config = lib.mkIf cfg.enable { 10 config = lib.mkIf cfg.enable {
11 services.duplyBackup.profiles.ludivine_integration.rootDir = app.varDir;
12 services.phpApplication.apps.ludivine_integration = { 11 services.phpApplication.apps.ludivine_integration = {
13 websiteEnv = "integration"; 12 websiteEnv = "integration";
14 httpdUser = config.services.httpd.Inte.user; 13 httpdUser = config.services.httpd.Inte.user;
diff --git a/modules/private/websites/ludivine/production.nix b/modules/private/websites/ludivine/production.nix
index 09bb3dc..7a18b88 100644
--- a/modules/private/websites/ludivine/production.nix
+++ b/modules/private/websites/ludivine/production.nix
@@ -13,8 +13,6 @@ in {
13 options.myServices.websites.ludivine.production.enable = lib.mkEnableOption "enable Ludivine's website in production"; 13 options.myServices.websites.ludivine.production.enable = lib.mkEnableOption "enable Ludivine's website in production";
14 14
15 config = lib.mkIf cfg.enable { 15 config = lib.mkIf cfg.enable {
16 services.duplyBackup.profiles.ludivine_production.rootDir = app.varDir;
17 services.duplyBackup.profiles.ludivine_production.remotes = ["eriomem" "ovh"];
18 services.webstats.sites = [ { name = "ludivinecassal.com"; } ]; 16 services.webstats.sites = [ { name = "ludivinecassal.com"; } ];
19 services.phpApplication.apps.ludivine_production = { 17 services.phpApplication.apps.ludivine_production = {
20 websiteEnv = "production"; 18 websiteEnv = "production";
diff --git a/modules/private/websites/piedsjaloux/integration.nix b/modules/private/websites/piedsjaloux/integration.nix
index 64d577e..d103ad7 100644
--- a/modules/private/websites/piedsjaloux/integration.nix
+++ b/modules/private/websites/piedsjaloux/integration.nix
@@ -9,7 +9,6 @@ in {
9 options.myServices.websites.piedsjaloux.integration.enable = lib.mkEnableOption "enable PiedsJaloux's website in integration"; 9 options.myServices.websites.piedsjaloux.integration.enable = lib.mkEnableOption "enable PiedsJaloux's website in integration";
10 10
11 config = lib.mkIf cfg.enable { 11 config = lib.mkIf cfg.enable {
12 services.duplyBackup.profiles.piedsjaloux_integration.rootDir = app.varDir;
13 services.phpApplication.apps.piedsjaloux_integration = { 12 services.phpApplication.apps.piedsjaloux_integration = {
14 websiteEnv = "integration"; 13 websiteEnv = "integration";
15 httpdUser = config.services.httpd.Inte.user; 14 httpdUser = config.services.httpd.Inte.user;
diff --git a/modules/private/websites/piedsjaloux/production.nix b/modules/private/websites/piedsjaloux/production.nix
index 118846d..422c7f0 100644
--- a/modules/private/websites/piedsjaloux/production.nix
+++ b/modules/private/websites/piedsjaloux/production.nix
@@ -14,8 +14,6 @@ in {
14 options.myServices.websites.piedsjaloux.production.enable = lib.mkEnableOption "enable PiedsJaloux's website in production"; 14 options.myServices.websites.piedsjaloux.production.enable = lib.mkEnableOption "enable PiedsJaloux's website in production";
15 15
16 config = lib.mkIf cfg.enable { 16 config = lib.mkIf cfg.enable {
17 services.duplyBackup.profiles.piedsjaloux_production.rootDir = app.varDir;
18 services.duplyBackup.profiles.piedsjaloux_production.remotes = ["eriomem" "ovh"];
19 services.webstats.sites = [ { name = "piedsjaloux.fr"; } ]; 17 services.webstats.sites = [ { name = "piedsjaloux.fr"; } ];
20 services.phpApplication.apps.piedsjaloux_production = { 18 services.phpApplication.apps.piedsjaloux_production = {
21 websiteEnv = "production"; 19 websiteEnv = "production";
diff --git a/modules/private/websites/richie/production.nix b/modules/private/websites/richie/production.nix
index e95df30..a548cff 100644
--- a/modules/private/websites/richie/production.nix
+++ b/modules/private/websites/richie/production.nix
@@ -24,8 +24,6 @@ in
24{ 24{
25 options.myServices.websites.richie.production.enable = lib.mkEnableOption "enable Richie's website"; 25 options.myServices.websites.richie.production.enable = lib.mkEnableOption "enable Richie's website";
26 config = lib.mkIf cfg.enable { 26 config = lib.mkIf cfg.enable {
27 services.duplyBackup.profiles.richie_production.rootDir = vardir;
28 services.duplyBackup.profiles.richie_production.remotes = ["eriomem" "ovh"];
29 services.webstats.sites = [ { name = "europe-richie.org"; } ]; 27 services.webstats.sites = [ { name = "europe-richie.org"; } ];
30 28
31 secrets.keys."websites/richie/production" = { 29 secrets.keys."websites/richie/production" = {
diff --git a/modules/private/websites/syden/peertube.nix b/modules/private/websites/syden/peertube.nix
index 4036eac..64d4a5d 100644
--- a/modules/private/websites/syden/peertube.nix
+++ b/modules/private/websites/syden/peertube.nix
@@ -10,10 +10,6 @@ in
10 options.myServices.websites.syden.peertube.enable = lib.mkEnableOption "enable Syden's website"; 10 options.myServices.websites.syden.peertube.enable = lib.mkEnableOption "enable Syden's website";
11 11
12 config = lib.mkIf scfg.enable { 12 config = lib.mkIf scfg.enable {
13 services.duplyBackup.profiles.syden_peertube = {
14 rootDir = dataDir;
15 remotes = ["eriomem" "ovh"];
16 };
17 users.users.peertube = { 13 users.users.peertube = {
18 uid = config.ids.uids.peertube; 14 uid = config.ids.uids.peertube;
19 group = "peertube"; 15 group = "peertube";
diff --git a/modules/private/websites/tools/diaspora/default.nix b/modules/private/websites/tools/diaspora/default.nix
index 9afd5b9..3a115ed 100644
--- a/modules/private/websites/tools/diaspora/default.nix
+++ b/modules/private/websites/tools/diaspora/default.nix
@@ -10,10 +10,6 @@ in {
10 }; 10 };
11 11
12 config = lib.mkIf cfg.enable { 12 config = lib.mkIf cfg.enable {
13 services.duplyBackup.profiles.diaspora = {
14 rootDir = dcfg.dataDir;
15 remotes = [ "eriomem" "ovh" ];
16 };
17 users.users.diaspora.extraGroups = [ "keys" ]; 13 users.users.diaspora.extraGroups = [ "keys" ];
18 14
19 secrets.keys = { 15 secrets.keys = {
diff --git a/modules/private/websites/tools/ether/default.nix b/modules/private/websites/tools/ether/default.nix
index d5c65a9..0539095 100644
--- a/modules/private/websites/tools/ether/default.nix
+++ b/modules/private/websites/tools/ether/default.nix
@@ -12,9 +12,6 @@ in {
12 }; 12 };
13 13
14 config = lib.mkIf cfg.enable { 14 config = lib.mkIf cfg.enable {
15 services.duplyBackup.profiles.etherpad-lite = {
16 rootDir = "/var/lib/private/etherpad-lite";
17 };
18 secrets.keys = { 15 secrets.keys = {
19 "webapps/tools-etherpad-apikey" = { 16 "webapps/tools-etherpad-apikey" = {
20 permissions = "0400"; 17 permissions = "0400";
diff --git a/modules/private/websites/tools/mail/default.nix b/modules/private/websites/tools/mail/default.nix
index 7bc3d2d..390f7ad 100644
--- a/modules/private/websites/tools/mail/default.nix
+++ b/modules/private/websites/tools/mail/default.nix
@@ -21,10 +21,6 @@ in
21 ]; 21 ];
22 22
23 config = lib.mkIf cfg.enable { 23 config = lib.mkIf cfg.enable {
24 services.duplyBackup.profiles.mail.excludeFile = ''
25 + ${rainloop.varDir}
26 + ${roundcubemail.varDir}
27 '';
28 secrets.keys = roundcubemail.keys; 24 secrets.keys = roundcubemail.keys;
29 25
30 services.websites.env.tools.modules = 26 services.websites.env.tools.modules =
diff --git a/modules/private/websites/tools/mastodon/default.nix b/modules/private/websites/tools/mastodon/default.nix
index 3512cf1..173a4b8 100644
--- a/modules/private/websites/tools/mastodon/default.nix
+++ b/modules/private/websites/tools/mastodon/default.nix
@@ -10,9 +10,6 @@ in {
10 }; 10 };
11 11
12 config = lib.mkIf cfg.enable { 12 config = lib.mkIf cfg.enable {
13 services.duplyBackup.profiles.mastodon = {
14 rootDir = mcfg.dataDir;
15 };
16 secrets.keys."webapps/tools-mastodon" = { 13 secrets.keys."webapps/tools-mastodon" = {
17 user = "mastodon"; 14 user = "mastodon";
18 group = "mastodon"; 15 group = "mastodon";
diff --git a/modules/private/websites/tools/mgoblin/default.nix b/modules/private/websites/tools/mgoblin/default.nix
index f6cba4a..1e5f5a0 100644
--- a/modules/private/websites/tools/mgoblin/default.nix
+++ b/modules/private/websites/tools/mgoblin/default.nix
@@ -9,9 +9,6 @@ in {
9 }; 9 };
10 10
11 config = lib.mkIf cfg.enable { 11 config = lib.mkIf cfg.enable {
12 services.duplyBackup.profiles.mgoblin = {
13 rootDir = mcfg.dataDir;
14 };
15 secrets.keys."webapps/tools-mediagoblin" = { 12 secrets.keys."webapps/tools-mediagoblin" = {
16 user = "mediagoblin"; 13 user = "mediagoblin";
17 group = "mediagoblin"; 14 group = "mediagoblin";
diff --git a/modules/private/websites/tools/peertube/default.nix b/modules/private/websites/tools/peertube/default.nix
index daeeb1f..68c992f 100644
--- a/modules/private/websites/tools/peertube/default.nix
+++ b/modules/private/websites/tools/peertube/default.nix
@@ -9,9 +9,6 @@ in {
9 }; 9 };
10 10
11 config = lib.mkIf cfg.enable { 11 config = lib.mkIf cfg.enable {
12 services.duplyBackup.profiles.peertube = {
13 rootDir = pcfg.dataDir;
14 };
15 services.peertube = { 12 services.peertube = {
16 enable = true; 13 enable = true;
17 configFile = config.secrets.fullPaths."webapps/tools-peertube"; 14 configFile = config.secrets.fullPaths."webapps/tools-peertube";
diff --git a/modules/private/websites/tools/tools/default.nix b/modules/private/websites/tools/tools/default.nix
index 9052473..77d6323 100644
--- a/modules/private/websites/tools/tools/default.nix
+++ b/modules/private/websites/tools/tools/default.nix
@@ -90,17 +90,6 @@ in {
90 // csp-reports.keys 90 // csp-reports.keys
91 // webhooks.keys; 91 // webhooks.keys;
92 92
93 services.duplyBackup.profiles = {
94 dokuwiki = dokuwiki.backups;
95 grocy = grocy.backups;
96 kanboard = kanboard.backups;
97 rompr = rompr.backups;
98 shaarli = shaarli.backups;
99 ttrss = ttrss.backups;
100 wallabag = wallabag.backups;
101 phpbb = phpbb.backups;
102 };
103
104 services.websites.env.tools.modules = 93 services.websites.env.tools.modules =
105 [ "proxy_fcgi" ] 94 [ "proxy_fcgi" ]
106 ++ adminer.apache.modules 95 ++ adminer.apache.modules
diff --git a/modules/private/websites/tools/tools/dokuwiki.nix b/modules/private/websites/tools/tools/dokuwiki.nix
index 1bcd852..aee495a 100644
--- a/modules/private/websites/tools/tools/dokuwiki.nix
+++ b/modules/private/websites/tools/tools/dokuwiki.nix
@@ -1,9 +1,5 @@
1{ lib, stdenv, dokuwiki, dokuwiki-plugins }: 1{ lib, stdenv, dokuwiki, dokuwiki-plugins }:
2rec { 2rec {
3 backups = {
4 rootDir = varDir;
5 remotes = [ "eriomem" "ovh" ];
6 };
7 varDir = "/var/lib/dokuwiki"; 3 varDir = "/var/lib/dokuwiki";
8 activationScript = { 4 activationScript = {
9 deps = [ "wrappers" ]; 5 deps = [ "wrappers" ];
diff --git a/modules/private/websites/tools/tools/grocy.nix b/modules/private/websites/tools/tools/grocy.nix
index 3c33170..3c45261 100644
--- a/modules/private/websites/tools/tools/grocy.nix
+++ b/modules/private/websites/tools/tools/grocy.nix
@@ -1,8 +1,5 @@
1{ lib, stdenv, grocy }: 1{ lib, stdenv, grocy }:
2rec { 2rec {
3 backups = {
4 rootDir = varDir;
5 };
6 varDir = "/var/lib/grocy"; 3 varDir = "/var/lib/grocy";
7 activationScript = { 4 activationScript = {
8 deps = [ "wrappers" ]; 5 deps = [ "wrappers" ];
diff --git a/modules/private/websites/tools/tools/kanboard.nix b/modules/private/websites/tools/tools/kanboard.nix
index 54bbe01..4809a42 100644
--- a/modules/private/websites/tools/tools/kanboard.nix
+++ b/modules/private/websites/tools/tools/kanboard.nix
@@ -1,8 +1,5 @@
1{ env, kanboard, config }: 1{ env, kanboard, config }:
2rec { 2rec {
3 backups = {
4 rootDir = varDir;
5 };
6 varDir = "/var/lib/kanboard"; 3 varDir = "/var/lib/kanboard";
7 activationScript = { 4 activationScript = {
8 deps = [ "wrappers" ]; 5 deps = [ "wrappers" ];
diff --git a/modules/private/websites/tools/tools/phpbb.nix b/modules/private/websites/tools/tools/phpbb.nix
index e341a64..77845c3 100644
--- a/modules/private/websites/tools/tools/phpbb.nix
+++ b/modules/private/websites/tools/tools/phpbb.nix
@@ -1,8 +1,5 @@
1{ lib, phpbb, gnused }: 1{ lib, phpbb, gnused }:
2rec { 2rec {
3 backups = {
4 rootDir = varDir;
5 };
6 varDir = "/var/lib/phpbb"; 3 varDir = "/var/lib/phpbb";
7 activationScript = { 4 activationScript = {
8 deps = [ "wrappers" ]; 5 deps = [ "wrappers" ];
diff --git a/modules/private/websites/tools/tools/rompr.nix b/modules/private/websites/tools/tools/rompr.nix
index 9765df5..e80d6b2 100644
--- a/modules/private/websites/tools/tools/rompr.nix
+++ b/modules/private/websites/tools/tools/rompr.nix
@@ -1,8 +1,5 @@
1{ lib, env, rompr }: 1{ lib, env, rompr }:
2rec { 2rec {
3 backups = {
4 rootDir = varDir;
5 };
6 varDir = "/var/lib/rompr"; 3 varDir = "/var/lib/rompr";
7 activationScript = '' 4 activationScript = ''
8 install -m 0755 -o ${apache.user} -g ${apache.group} -d ${varDir} \ 5 install -m 0755 -o ${apache.user} -g ${apache.group} -d ${varDir} \
diff --git a/modules/private/websites/tools/tools/shaarli.nix b/modules/private/websites/tools/tools/shaarli.nix
index f63c722..d128465 100644
--- a/modules/private/websites/tools/tools/shaarli.nix
+++ b/modules/private/websites/tools/tools/shaarli.nix
@@ -2,10 +2,6 @@
2let 2let
3 varDir = "/var/lib/shaarli"; 3 varDir = "/var/lib/shaarli";
4in rec { 4in rec {
5 backups = {
6 rootDir = varDir;
7 remotes = [ "eriomem" "ovh" ];
8 };
9 activationScript = '' 5 activationScript = ''
10 install -m 0755 -o ${apache.user} -g ${apache.group} -d ${varDir} \ 6 install -m 0755 -o ${apache.user} -g ${apache.group} -d ${varDir} \
11 ${varDir}/cache ${varDir}/pagecache ${varDir}/tmp ${varDir}/data \ 7 ${varDir}/cache ${varDir}/pagecache ${varDir}/tmp ${varDir}/data \
diff --git a/modules/private/websites/tools/tools/ttrss.nix b/modules/private/websites/tools/tools/ttrss.nix
index bee26c8..1dc99ed 100644
--- a/modules/private/websites/tools/tools/ttrss.nix
+++ b/modules/private/websites/tools/tools/ttrss.nix
@@ -1,8 +1,5 @@
1{ php, env, ttrss, ttrss-plugins, config }: 1{ php, env, ttrss, ttrss-plugins, config }:
2rec { 2rec {
3 backups = {
4 rootDir = varDir;
5 };
6 varDir = "/var/lib/ttrss"; 3 varDir = "/var/lib/ttrss";
7 activationScript = { 4 activationScript = {
8 deps = [ "wrappers" ]; 5 deps = [ "wrappers" ];
diff --git a/modules/private/websites/tools/tools/wallabag.nix b/modules/private/websites/tools/tools/wallabag.nix
index ceb061f..0ebdb0b 100644
--- a/modules/private/websites/tools/tools/wallabag.nix
+++ b/modules/private/websites/tools/tools/wallabag.nix
@@ -1,9 +1,5 @@
1{ env, wallabag, mylibs, config }: 1{ env, wallabag, mylibs, config }:
2rec { 2rec {
3 backups = {
4 rootDir = varDir;
5 remotes = [ "eriomem" "ovh" ];
6 };
7 varDir = "/var/lib/wallabag"; 3 varDir = "/var/lib/wallabag";
8 keys."webapps/tools-wallabag" = { 4 keys."webapps/tools-wallabag" = {
9 user = apache.user; 5 user = apache.user;