diff options
Diffstat (limited to 'nixops/modules/websites')
-rw-r--r-- | nixops/modules/websites/aten/default.nix | 4 | ||||
-rw-r--r-- | nixops/modules/websites/chloe/default.nix | 4 | ||||
-rw-r--r-- | nixops/modules/websites/connexionswing/default.nix | 4 | ||||
-rw-r--r-- | nixops/modules/websites/default.nix | 2 | ||||
-rw-r--r-- | nixops/modules/websites/ftp/jerome.nix | 2 | ||||
-rw-r--r-- | nixops/modules/websites/ludivine/default.nix | 4 | ||||
-rw-r--r-- | nixops/modules/websites/piedsjaloux/default.nix | 4 | ||||
-rw-r--r-- | nixops/modules/websites/tellesflorian/default.nix | 2 | ||||
-rw-r--r-- | nixops/modules/websites/tools/cloud.nix | 2 | ||||
-rw-r--r-- | nixops/modules/websites/tools/dav/default.nix | 2 | ||||
-rw-r--r-- | nixops/modules/websites/tools/diaspora.nix | 2 | ||||
-rw-r--r-- | nixops/modules/websites/tools/ether.nix | 2 | ||||
-rw-r--r-- | nixops/modules/websites/tools/git/default.nix | 2 | ||||
-rw-r--r-- | nixops/modules/websites/tools/mastodon.nix | 2 | ||||
-rw-r--r-- | nixops/modules/websites/tools/mediagoblin.nix | 2 | ||||
-rw-r--r-- | nixops/modules/websites/tools/peertube.nix | 2 | ||||
-rw-r--r-- | nixops/modules/websites/tools/tools/default.nix | 2 |
17 files changed, 22 insertions, 22 deletions
diff --git a/nixops/modules/websites/aten/default.nix b/nixops/modules/websites/aten/default.nix index 6f58d3c..f6efe01 100644 --- a/nixops/modules/websites/aten/default.nix +++ b/nixops/modules/websites/aten/default.nix | |||
@@ -25,7 +25,7 @@ in { | |||
25 | 25 | ||
26 | config = lib.mkMerge [ | 26 | config = lib.mkMerge [ |
27 | (lib.mkIf cfg.production.enable { | 27 | (lib.mkIf cfg.production.enable { |
28 | mySecrets.keys = aten_prod.keys; | 28 | secrets.keys = aten_prod.keys; |
29 | services.myWebsites.commons.stats.enable = true; | 29 | services.myWebsites.commons.stats.enable = true; |
30 | services.myWebsites.commons.stats.sites = [ | 30 | services.myWebsites.commons.stats.sites = [ |
31 | { | 31 | { |
@@ -59,7 +59,7 @@ in { | |||
59 | }; | 59 | }; |
60 | }) | 60 | }) |
61 | (lib.mkIf cfg.integration.enable { | 61 | (lib.mkIf cfg.integration.enable { |
62 | mySecrets.keys = aten_dev.keys; | 62 | secrets.keys = aten_dev.keys; |
63 | security.acme.certs."eldiron".extraDomains."dev.aten.pro" = null; | 63 | security.acme.certs."eldiron".extraDomains."dev.aten.pro" = null; |
64 | services.myPhpfpm.preStart.aten_dev = aten_dev.phpFpm.preStart; | 64 | services.myPhpfpm.preStart.aten_dev = aten_dev.phpFpm.preStart; |
65 | services.myPhpfpm.serviceDependencies.aten_dev = aten_dev.phpFpm.serviceDeps; | 65 | services.myPhpfpm.serviceDependencies.aten_dev = aten_dev.phpFpm.serviceDeps; |
diff --git a/nixops/modules/websites/chloe/default.nix b/nixops/modules/websites/chloe/default.nix index 33ced2e..0ea9213 100644 --- a/nixops/modules/websites/chloe/default.nix +++ b/nixops/modules/websites/chloe/default.nix | |||
@@ -25,7 +25,7 @@ in { | |||
25 | 25 | ||
26 | config = lib.mkMerge [ | 26 | config = lib.mkMerge [ |
27 | (lib.mkIf cfg.production.enable { | 27 | (lib.mkIf cfg.production.enable { |
28 | mySecrets.keys = chloe_prod.keys; | 28 | secrets.keys = chloe_prod.keys; |
29 | services.myWebsites.commons.stats.enable = true; | 29 | services.myWebsites.commons.stats.enable = true; |
30 | services.myWebsites.commons.stats.sites = [ | 30 | services.myWebsites.commons.stats.sites = [ |
31 | { | 31 | { |
@@ -60,7 +60,7 @@ in { | |||
60 | }; | 60 | }; |
61 | }) | 61 | }) |
62 | (lib.mkIf cfg.integration.enable { | 62 | (lib.mkIf cfg.integration.enable { |
63 | mySecrets.keys = chloe_dev.keys; | 63 | secrets.keys = chloe_dev.keys; |
64 | security.acme.certs."eldiron".extraDomains."chloe.immae.eu" = null; | 64 | security.acme.certs."eldiron".extraDomains."chloe.immae.eu" = null; |
65 | services.myPhpfpm.serviceDependencies.chloe_dev = chloe_dev.phpFpm.serviceDeps; | 65 | services.myPhpfpm.serviceDependencies.chloe_dev = chloe_dev.phpFpm.serviceDeps; |
66 | services.myPhpfpm.poolConfigs.chloe_dev = chloe_dev.phpFpm.pool; | 66 | services.myPhpfpm.poolConfigs.chloe_dev = chloe_dev.phpFpm.pool; |
diff --git a/nixops/modules/websites/connexionswing/default.nix b/nixops/modules/websites/connexionswing/default.nix index c0036d8..2966cb8 100644 --- a/nixops/modules/websites/connexionswing/default.nix +++ b/nixops/modules/websites/connexionswing/default.nix | |||
@@ -25,7 +25,7 @@ in { | |||
25 | 25 | ||
26 | config = lib.mkMerge [ | 26 | config = lib.mkMerge [ |
27 | (lib.mkIf cfg.production.enable { | 27 | (lib.mkIf cfg.production.enable { |
28 | mySecrets.keys = connexionswing_prod.keys; | 28 | secrets.keys = connexionswing_prod.keys; |
29 | services.myWebsites.commons.stats.enable = true; | 29 | services.myWebsites.commons.stats.enable = true; |
30 | services.myWebsites.commons.stats.sites = [ | 30 | services.myWebsites.commons.stats.sites = [ |
31 | { | 31 | { |
@@ -61,7 +61,7 @@ in { | |||
61 | }; | 61 | }; |
62 | }) | 62 | }) |
63 | (lib.mkIf cfg.integration.enable { | 63 | (lib.mkIf cfg.integration.enable { |
64 | mySecrets.keys = connexionswing_dev.keys; | 64 | secrets.keys = connexionswing_dev.keys; |
65 | security.acme.certs."eldiron".extraDomains."sandetludo.immae.eu" = null; | 65 | security.acme.certs."eldiron".extraDomains."sandetludo.immae.eu" = null; |
66 | security.acme.certs."eldiron".extraDomains."connexionswing.immae.eu" = null; | 66 | security.acme.certs."eldiron".extraDomains."connexionswing.immae.eu" = null; |
67 | services.myPhpfpm.preStart.connexionswing_dev = connexionswing_dev.phpFpm.preStart; | 67 | services.myPhpfpm.preStart.connexionswing_dev = connexionswing_dev.phpFpm.preStart; |
diff --git a/nixops/modules/websites/default.nix b/nixops/modules/websites/default.nix index 555e780..ceef1e1 100644 --- a/nixops/modules/websites/default.nix +++ b/nixops/modules/websites/default.nix | |||
@@ -228,7 +228,7 @@ in | |||
228 | services.myWebsites.TellesFlorian.integration.enable = true; | 228 | services.myWebsites.TellesFlorian.integration.enable = true; |
229 | services.myWebsites.Florian.integration.enable = true; | 229 | services.myWebsites.Florian.integration.enable = true; |
230 | 230 | ||
231 | mySecrets.keys = [{ | 231 | secrets.keys = [{ |
232 | dest = "apache-ldap"; | 232 | dest = "apache-ldap"; |
233 | user = "wwwrun"; | 233 | user = "wwwrun"; |
234 | group = "wwwrun"; | 234 | group = "wwwrun"; |
diff --git a/nixops/modules/websites/ftp/jerome.nix b/nixops/modules/websites/ftp/jerome.nix index 18d16a1..610de02 100644 --- a/nixops/modules/websites/ftp/jerome.nix +++ b/nixops/modules/websites/ftp/jerome.nix | |||
@@ -29,7 +29,7 @@ in { | |||
29 | domain = "naturaloutil.immae.eu"; | 29 | domain = "naturaloutil.immae.eu"; |
30 | }; | 30 | }; |
31 | 31 | ||
32 | mySecrets.keys = [{ | 32 | secrets.keys = [{ |
33 | dest = "webapps/prod-naturaloutil"; | 33 | dest = "webapps/prod-naturaloutil"; |
34 | user = "wwwrun"; | 34 | user = "wwwrun"; |
35 | group = "wwwrun"; | 35 | group = "wwwrun"; |
diff --git a/nixops/modules/websites/ludivine/default.nix b/nixops/modules/websites/ludivine/default.nix index a3d3922..7fa33ed 100644 --- a/nixops/modules/websites/ludivine/default.nix +++ b/nixops/modules/websites/ludivine/default.nix | |||
@@ -21,7 +21,7 @@ in { | |||
21 | 21 | ||
22 | config = lib.mkMerge [ | 22 | config = lib.mkMerge [ |
23 | (lib.mkIf cfg.production.enable { | 23 | (lib.mkIf cfg.production.enable { |
24 | mySecrets.keys = ludivinecassal_prod.keys; | 24 | secrets.keys = ludivinecassal_prod.keys; |
25 | services.myWebsites.commons.stats.enable = true; | 25 | services.myWebsites.commons.stats.enable = true; |
26 | services.myWebsites.commons.stats.sites = [ | 26 | services.myWebsites.commons.stats.sites = [ |
27 | { | 27 | { |
@@ -54,7 +54,7 @@ in { | |||
54 | }; | 54 | }; |
55 | }) | 55 | }) |
56 | (lib.mkIf cfg.integration.enable { | 56 | (lib.mkIf cfg.integration.enable { |
57 | mySecrets.keys = ludivinecassal_dev.keys; | 57 | secrets.keys = ludivinecassal_dev.keys; |
58 | security.acme.certs."eldiron".extraDomains."ludivine.immae.eu" = null; | 58 | security.acme.certs."eldiron".extraDomains."ludivine.immae.eu" = null; |
59 | 59 | ||
60 | services.myPhpfpm.preStart.ludivinecassal_dev = ludivinecassal_dev.phpFpm.preStart; | 60 | services.myPhpfpm.preStart.ludivinecassal_dev = ludivinecassal_dev.phpFpm.preStart; |
diff --git a/nixops/modules/websites/piedsjaloux/default.nix b/nixops/modules/websites/piedsjaloux/default.nix index b2bd2fd..d75170f 100644 --- a/nixops/modules/websites/piedsjaloux/default.nix +++ b/nixops/modules/websites/piedsjaloux/default.nix | |||
@@ -25,7 +25,7 @@ in { | |||
25 | 25 | ||
26 | config = lib.mkMerge [ | 26 | config = lib.mkMerge [ |
27 | (lib.mkIf cfg.production.enable { | 27 | (lib.mkIf cfg.production.enable { |
28 | mySecrets.keys = piedsjaloux_prod.keys; | 28 | secrets.keys = piedsjaloux_prod.keys; |
29 | services.myWebsites.commons.stats.enable = true; | 29 | services.myWebsites.commons.stats.enable = true; |
30 | services.myWebsites.commons.stats.sites = [ | 30 | services.myWebsites.commons.stats.sites = [ |
31 | { | 31 | { |
@@ -58,7 +58,7 @@ in { | |||
58 | }; | 58 | }; |
59 | }) | 59 | }) |
60 | (lib.mkIf cfg.integration.enable { | 60 | (lib.mkIf cfg.integration.enable { |
61 | mySecrets.keys = piedsjaloux_dev.keys; | 61 | secrets.keys = piedsjaloux_dev.keys; |
62 | security.acme.certs."eldiron".extraDomains."piedsjaloux.immae.eu" = null; | 62 | security.acme.certs."eldiron".extraDomains."piedsjaloux.immae.eu" = null; |
63 | services.myPhpfpm.preStart.piedsjaloux_dev = piedsjaloux_dev.phpFpm.preStart; | 63 | services.myPhpfpm.preStart.piedsjaloux_dev = piedsjaloux_dev.phpFpm.preStart; |
64 | services.myPhpfpm.serviceDependencies.piedsjaloux_dev = piedsjaloux_dev.phpFpm.serviceDeps; | 64 | services.myPhpfpm.serviceDependencies.piedsjaloux_dev = piedsjaloux_dev.phpFpm.serviceDeps; |
diff --git a/nixops/modules/websites/tellesflorian/default.nix b/nixops/modules/websites/tellesflorian/default.nix index 16d788f..f86b0c5 100644 --- a/nixops/modules/websites/tellesflorian/default.nix +++ b/nixops/modules/websites/tellesflorian/default.nix | |||
@@ -16,7 +16,7 @@ in { | |||
16 | }; | 16 | }; |
17 | 17 | ||
18 | config = lib.mkIf cfg.integration.enable { | 18 | config = lib.mkIf cfg.integration.enable { |
19 | mySecrets.keys = tellesflorian_dev.keys; | 19 | secrets.keys = tellesflorian_dev.keys; |
20 | security.acme.certs."eldiron".extraDomains."app.tellesflorian.com" = null; | 20 | security.acme.certs."eldiron".extraDomains."app.tellesflorian.com" = null; |
21 | services.myPhpfpm.preStart.tellesflorian_dev = tellesflorian_dev.phpFpm.preStart; | 21 | services.myPhpfpm.preStart.tellesflorian_dev = tellesflorian_dev.phpFpm.preStart; |
22 | services.myPhpfpm.serviceDependencies.tellesflorian_dev = tellesflorian_dev.phpFpm.serviceDeps; | 22 | services.myPhpfpm.serviceDependencies.tellesflorian_dev = tellesflorian_dev.phpFpm.serviceDeps; |
diff --git a/nixops/modules/websites/tools/cloud.nix b/nixops/modules/websites/tools/cloud.nix index a7fcd61..8af2914 100644 --- a/nixops/modules/websites/tools/cloud.nix +++ b/nixops/modules/websites/tools/cloud.nix | |||
@@ -80,7 +80,7 @@ in { | |||
80 | ]; | 80 | ]; |
81 | }; | 81 | }; |
82 | 82 | ||
83 | mySecrets.keys = [{ | 83 | secrets.keys = [{ |
84 | dest = "webapps/tools-nextcloud"; | 84 | dest = "webapps/tools-nextcloud"; |
85 | user = "wwwrun"; | 85 | user = "wwwrun"; |
86 | group = "wwwrun"; | 86 | group = "wwwrun"; |
diff --git a/nixops/modules/websites/tools/dav/default.nix b/nixops/modules/websites/tools/dav/default.nix index c24f8db..bf5e412 100644 --- a/nixops/modules/websites/tools/dav/default.nix +++ b/nixops/modules/websites/tools/dav/default.nix | |||
@@ -29,7 +29,7 @@ in { | |||
29 | config = lib.mkIf cfg.enable { | 29 | config = lib.mkIf cfg.enable { |
30 | security.acme.certs."eldiron".extraDomains."dav.immae.eu" = null; | 30 | security.acme.certs."eldiron".extraDomains."dav.immae.eu" = null; |
31 | 31 | ||
32 | mySecrets.keys = davical.keys; | 32 | secrets.keys = davical.keys; |
33 | services.myWebsites.tools.modules = davical.apache.modules; | 33 | services.myWebsites.tools.modules = davical.apache.modules; |
34 | 34 | ||
35 | services.myWebsites.tools.vhostConfs.dav = { | 35 | services.myWebsites.tools.vhostConfs.dav = { |
diff --git a/nixops/modules/websites/tools/diaspora.nix b/nixops/modules/websites/tools/diaspora.nix index 53989b7..1088e71 100644 --- a/nixops/modules/websites/tools/diaspora.nix +++ b/nixops/modules/websites/tools/diaspora.nix | |||
@@ -35,7 +35,7 @@ in { | |||
35 | }; | 35 | }; |
36 | 36 | ||
37 | users.groups.diaspora.gid = config.ids.gids.diaspora; | 37 | users.groups.diaspora.gid = config.ids.gids.diaspora; |
38 | mySecrets.keys = [ | 38 | secrets.keys = [ |
39 | { | 39 | { |
40 | dest = "webapps/diaspora/diaspora.yml"; | 40 | dest = "webapps/diaspora/diaspora.yml"; |
41 | user = "diaspora"; | 41 | user = "diaspora"; |
diff --git a/nixops/modules/websites/tools/ether.nix b/nixops/modules/websites/tools/ether.nix index 1c952af..80472f0 100644 --- a/nixops/modules/websites/tools/ether.nix +++ b/nixops/modules/websites/tools/ether.nix | |||
@@ -14,7 +14,7 @@ in { | |||
14 | }; | 14 | }; |
15 | 15 | ||
16 | config = lib.mkIf cfg.enable { | 16 | config = lib.mkIf cfg.enable { |
17 | mySecrets.keys = [ | 17 | secrets.keys = [ |
18 | { | 18 | { |
19 | dest = "webapps/tools-etherpad-apikey"; | 19 | dest = "webapps/tools-etherpad-apikey"; |
20 | permissions = "0400"; | 20 | permissions = "0400"; |
diff --git a/nixops/modules/websites/tools/git/default.nix b/nixops/modules/websites/tools/git/default.nix index e7dbd6f..799c180 100644 --- a/nixops/modules/websites/tools/git/default.nix +++ b/nixops/modules/websites/tools/git/default.nix | |||
@@ -16,7 +16,7 @@ in { | |||
16 | config = lib.mkIf cfg.enable { | 16 | config = lib.mkIf cfg.enable { |
17 | security.acme.certs."eldiron".extraDomains."git.immae.eu" = null; | 17 | security.acme.certs."eldiron".extraDomains."git.immae.eu" = null; |
18 | 18 | ||
19 | mySecrets.keys = mantisbt.keys; | 19 | secrets.keys = mantisbt.keys; |
20 | services.myWebsites.tools.modules = | 20 | services.myWebsites.tools.modules = |
21 | gitweb.apache.modules ++ | 21 | gitweb.apache.modules ++ |
22 | mantisbt.apache.modules; | 22 | mantisbt.apache.modules; |
diff --git a/nixops/modules/websites/tools/mastodon.nix b/nixops/modules/websites/tools/mastodon.nix index 3279cf8..c461bec 100644 --- a/nixops/modules/websites/tools/mastodon.nix +++ b/nixops/modules/websites/tools/mastodon.nix | |||
@@ -16,7 +16,7 @@ in { | |||
16 | }; | 16 | }; |
17 | 17 | ||
18 | config = lib.mkIf cfg.enable { | 18 | config = lib.mkIf cfg.enable { |
19 | mySecrets.keys = [{ | 19 | secrets.keys = [{ |
20 | dest = "webapps/tools-mastodon"; | 20 | dest = "webapps/tools-mastodon"; |
21 | user = "mastodon"; | 21 | user = "mastodon"; |
22 | group = "mastodon"; | 22 | group = "mastodon"; |
diff --git a/nixops/modules/websites/tools/mediagoblin.nix b/nixops/modules/websites/tools/mediagoblin.nix index bdb8323..bf45e8e 100644 --- a/nixops/modules/websites/tools/mediagoblin.nix +++ b/nixops/modules/websites/tools/mediagoblin.nix | |||
@@ -9,7 +9,7 @@ in { | |||
9 | }; | 9 | }; |
10 | 10 | ||
11 | config = lib.mkIf cfg.enable { | 11 | config = lib.mkIf cfg.enable { |
12 | mySecrets.keys = [{ | 12 | secrets.keys = [{ |
13 | dest = "webapps/tools-mediagoblin"; | 13 | dest = "webapps/tools-mediagoblin"; |
14 | user = "mediagoblin"; | 14 | user = "mediagoblin"; |
15 | group = "mediagoblin"; | 15 | group = "mediagoblin"; |
diff --git a/nixops/modules/websites/tools/peertube.nix b/nixops/modules/websites/tools/peertube.nix index 9a56a85..ab5e08a 100644 --- a/nixops/modules/websites/tools/peertube.nix +++ b/nixops/modules/websites/tools/peertube.nix | |||
@@ -16,7 +16,7 @@ in { | |||
16 | }; | 16 | }; |
17 | users.users.peertube.extraGroups = [ "keys" ]; | 17 | users.users.peertube.extraGroups = [ "keys" ]; |
18 | 18 | ||
19 | mySecrets.keys = [{ | 19 | secrets.keys = [{ |
20 | dest = "webapps/tools-peertube"; | 20 | dest = "webapps/tools-peertube"; |
21 | user = "peertube"; | 21 | user = "peertube"; |
22 | group = "peertube"; | 22 | group = "peertube"; |
diff --git a/nixops/modules/websites/tools/tools/default.nix b/nixops/modules/websites/tools/tools/default.nix index addb2c3..7a14e12 100644 --- a/nixops/modules/websites/tools/tools/default.nix +++ b/nixops/modules/websites/tools/tools/default.nix | |||
@@ -49,7 +49,7 @@ in { | |||
49 | security.acme.certs."eldiron".extraDomains."tools.immae.eu" = null; | 49 | security.acme.certs."eldiron".extraDomains."tools.immae.eu" = null; |
50 | security.acme.certs."eldiron".extraDomains."devtools.immae.eu" = null; | 50 | security.acme.certs."eldiron".extraDomains."devtools.immae.eu" = null; |
51 | 51 | ||
52 | mySecrets.keys = | 52 | secrets.keys = |
53 | kanboard.keys | 53 | kanboard.keys |
54 | ++ ldap.keys | 54 | ++ ldap.keys |
55 | ++ roundcubemail.keys | 55 | ++ roundcubemail.keys |