Remove the Transmission env file content from the nix store

This commit is contained in:
James Eversole 2023-06-27 20:36:48 -05:00
parent 47c7db222f
commit 16d8aa3dc6
5 changed files with 9 additions and 9 deletions

View File

@ -1,3 +1,4 @@
{ config, ... }:
{ {
virtualisation.oci-containers = { virtualisation.oci-containers = {
containers = { containers = {
@ -74,7 +75,7 @@
"/home/torrent/data:/data" "/home/torrent/data:/data"
]; ];
environmentFiles = environmentFiles =
[ /home/sezycei/srv/containerdata/transmission/.env ]; [ config.age.secrets.transmission-env.path ];
extraOptions = [ "--cap-add=NET_ADMIN" "--privileged" ]; extraOptions = [ "--cap-add=NET_ADMIN" "--privileged" ];
}; };

View File

@ -1,11 +1,7 @@
{ pkgs, config, ... }: { pkgs, config, ... }: {
let
containernix = import ./containers.nix;
containers = containernix.virtualisation.oci-containers.containers;
in
{
services.nginx = { services.nginx = {
enable = true; enable = true;
recommendedProxySettings = true; recommendedProxySettings = true;
recommendedOptimisation = true; recommendedOptimisation = true;
recommendedGzipSettings = true; recommendedGzipSettings = true;
@ -36,6 +32,7 @@ in
extraConfig = extra; extraConfig = extra;
}; };
}; };
proxiedLAN = { target }: base { proxiedLAN = { target }: base {
"/" = { "/" = {
proxyPass = target; proxyPass = target;
@ -58,7 +55,7 @@ in
}; };
"eversole.co" = static { dir = "/var/www/jame.su"; }; "eversole.co" = static { dir = "/var/www/jame.su"; };
"git.eversole.co" = proxied { target = "http://127.0.0.1:5121"; }; "git.eversole.co" = proxied { target = "http://127.0.0.1:5121"; };
"graf.eversole.co" = { root = "/var/www/graf.eversole.co"; }; # refer to /monitoring/nginx.nix "graf.matri.cx" = { root = "/var/www/graf.matri.cx"; }; # refer to /monitoring/nginx.nix
"hydra.matri.cx" = proxied { "hydra.matri.cx" = proxied {
target = "http://127.0.0.1:3034"; target = "http://127.0.0.1:3034";
extra = '' extra = ''
@ -70,7 +67,7 @@ in
"media.matri.cx" = proxied { target = "http://127.0.0.1:8096"; }; "media.matri.cx" = proxied { target = "http://127.0.0.1:8096"; };
"sezycei.com" = static { dir = "/var/www/sezycei.com"; }; "sezycei.com" = static { dir = "/var/www/sezycei.com"; };
"snakebelmont.com" = static { dir = "/var/www/snakebelmont.com"; }; "snakebelmont.com" = static { dir = "/var/www/snakebelmont.com"; };
"transmission.matri.cx" = proxiedLAN { target = "http://127.0.0.1:9001"; }; "transmission.matri.cx" = proxiedLAN { target = "http://127.0.0.1:9091"; };
"purr.eversole.co" = proxied { target = "http://127.0.0.1:5195"; }; "purr.eversole.co" = proxied { target = "http://127.0.0.1:5195"; };
}; };
}; };

View File

@ -11,4 +11,5 @@ in
"secrets/htpasswd-dock.age" = { publicKeys = all; }; "secrets/htpasswd-dock.age" = { publicKeys = all; };
"secrets/keys.age" = { publicKeys = all; }; "secrets/keys.age" = { publicKeys = all; };
"secrets/sezycei.age" = { publicKeys = all; }; "secrets/sezycei.age" = { publicKeys = all; };
"secrets/transmission-env.age" = { publicKeys = all; };
} }

Binary file not shown.

View File

@ -11,6 +11,7 @@
htpasswd-dock.file = ../secrets/htpasswd-dock.age; htpasswd-dock.file = ../secrets/htpasswd-dock.age;
keys.file = ../secrets/keys.age; keys.file = ../secrets/keys.age;
sezycei.file = ../secrets/sezycei.age; sezycei.file = ../secrets/sezycei.age;
transmission-env.file = ../secrets/transmission-env.age;
}; };
identityPaths = [ "/etc/ssh/ssh_host_ed25519_key" ]; identityPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
}; };