Compare commits
10 commits
fd4e1ce93d
...
8e27d7112b
Author | SHA1 | Date | |
---|---|---|---|
8e27d7112b | |||
1816515644 | |||
ce8953a179 | |||
fd5838d3f3 | |||
6edfb42e95 | |||
4f987b0a6f | |||
66b96a843f | |||
6b5be4cead | |||
6a3dc93ed1 | |||
f807e11b6c |
|
@ -11,6 +11,9 @@
|
|||
./nas
|
||||
./nextcloud
|
||||
./push
|
||||
./git
|
||||
./passwords
|
||||
./media
|
||||
];
|
||||
|
||||
environment.systemPackages = with pkgs; [arion];
|
||||
|
|
59
hosts/franz/arion/git/arion-compose.nix
Normal file
|
@ -0,0 +1,59 @@
|
|||
{pkgs, ...}: {
|
||||
project.name = "git";
|
||||
|
||||
networks.dmz = {
|
||||
name = "dmz";
|
||||
external = true;
|
||||
};
|
||||
|
||||
networks.transport = {};
|
||||
|
||||
services = {
|
||||
forgejo.service = {
|
||||
image = "codeberg.org/forgejo/forgejo:1.21.6-0";
|
||||
container_name = "forgejo";
|
||||
useHostStore = true;
|
||||
labels = {
|
||||
"traefik.enable" = "true";
|
||||
"traefik.http.routers.forgejo.entrypoints" = "websecure";
|
||||
"traefik.http.routers.forgejo.rule" = "Host(`git.ghoscht.com`)";
|
||||
"traefik.http.services.forgejo.loadbalancer.server.port" = "3000";
|
||||
"traefik.docker.network" = "dmz";
|
||||
"traefik.http.routers.forgejo.tls" = "true";
|
||||
"traefik.http.routers.forgejo.tls.certresolver" = "letsencrypt";
|
||||
};
|
||||
volumes = [
|
||||
"/home/ghoscht/.docker/git/forgejo_data:/data"
|
||||
"/etc/localtime:/etc/localtime:ro"
|
||||
];
|
||||
ports = [
|
||||
"2222:22"
|
||||
];
|
||||
environment = {
|
||||
USER_UID = 1000;
|
||||
USER_GID = 1000;
|
||||
GITEA__database__DB_TYPE = "postgres";
|
||||
GITEA__database__HOST = "db:5432";
|
||||
};
|
||||
env_file = [
|
||||
"/home/ghoscht/.docker/git/forgejo.env"
|
||||
];
|
||||
restart = "unless-stopped";
|
||||
networks = [
|
||||
"dmz"
|
||||
"transport"
|
||||
];
|
||||
};
|
||||
db.service = {
|
||||
image = "postgres:15.3-bullseye";
|
||||
env_file = [
|
||||
"/home/ghoscht/.docker/git/forgejo-db.env"
|
||||
];
|
||||
volumes = ["/home/ghoscht/.docker/git/forgejo_db:/var/lib/postgresql/data"];
|
||||
restart = "unless-stopped";
|
||||
networks = [
|
||||
"transport"
|
||||
];
|
||||
};
|
||||
};
|
||||
}
|
6
hosts/franz/arion/git/arion-pkgs.nix
Normal file
|
@ -0,0 +1,6 @@
|
|||
# Instead of pinning Nixpkgs, we can opt to use the one in NIX_PATH
|
||||
import <nixpkgs> {
|
||||
# We specify the architecture explicitly. Use a Linux remote builder when
|
||||
# calling arion from other platforms.
|
||||
system = "x86_64-linux";
|
||||
}
|
41
hosts/franz/arion/git/default.nix
Normal file
|
@ -0,0 +1,41 @@
|
|||
{config, ...}: let
|
||||
vars = import ../../../../vars.nix;
|
||||
in {
|
||||
virtualisation.arion = {
|
||||
projects.git.settings = {
|
||||
imports = [./arion-compose.nix];
|
||||
};
|
||||
};
|
||||
|
||||
sops.secrets."forgejo/db_password" = {
|
||||
owner = vars.user;
|
||||
};
|
||||
sops.secrets."forgejo/db_user" = {
|
||||
owner = vars.user;
|
||||
};
|
||||
sops.secrets."forgejo/db_database" = {
|
||||
owner = vars.user;
|
||||
};
|
||||
|
||||
sops.templates."forgejo.env" = {
|
||||
path = "/home/${vars.user}/.docker/git/forgejo.env";
|
||||
owner = vars.user;
|
||||
mode = "0775";
|
||||
content = ''
|
||||
GITEA__database__NAME="${config.sops.placeholder."forgejo/db_database"}"
|
||||
GITEA__database__USER="${config.sops.placeholder."forgejo/db_user"}"
|
||||
GITEA__database__PASSWD="${config.sops.placeholder."forgejo/db_password"}"
|
||||
'';
|
||||
};
|
||||
|
||||
sops.templates."forgejo-db.env" = {
|
||||
path = "/home/${vars.user}/.docker/git/forgejo-db.env";
|
||||
owner = vars.user;
|
||||
mode = "0775";
|
||||
content = ''
|
||||
POSTGRES_DB="${config.sops.placeholder."forgejo/db_database"}"
|
||||
POSTGRES_USER="${config.sops.placeholder."forgejo/db_user"}"
|
||||
POSTGRES_PASSWORD="${config.sops.placeholder."forgejo/db_password"}"
|
||||
'';
|
||||
};
|
||||
}
|
381
hosts/franz/arion/media/arion-compose.nix
Normal file
|
@ -0,0 +1,381 @@
|
|||
{pkgs, ...}: {
|
||||
project.name = "media";
|
||||
|
||||
networks.dmz = {
|
||||
name = "dmz";
|
||||
external = true;
|
||||
};
|
||||
|
||||
docker-compose.volumes = {
|
||||
jellyfin_cache = null;
|
||||
};
|
||||
|
||||
services = {
|
||||
jellyfin.service = {
|
||||
image = "jellyfin/jellyfin:latest";
|
||||
container_name = "jellyfin";
|
||||
ports = [
|
||||
"8096:8096"
|
||||
];
|
||||
labels = {
|
||||
"traefik.enable" = "true";
|
||||
"traefik.http.routers.jellyfin.entrypoints" = "websecure";
|
||||
"traefik.http.routers.jellyfin.rule" = "Host(`jellyfin.ghoscht.com`)";
|
||||
"traefik.http.services.jellyfin.loadbalancer.server.port" = "8096";
|
||||
"traefik.http.services.jellyfin.loadbalancer.passHostHeader" = "true";
|
||||
"traefik.http.routers.jellyfin.tls" = "true";
|
||||
"traefik.http.routers.jellyfin.tls.certresolver" = "letsencrypt";
|
||||
};
|
||||
volumes = [
|
||||
"jellyfin_cache:/cache"
|
||||
"/home/ghoscht/.docker/media/jellyfin_data:/config"
|
||||
"/home/ghoscht/.docker/media/data/tv:/tv"
|
||||
"/home/ghoscht/.docker/media/data/anime:/anime"
|
||||
"/home/ghoscht/.docker/media/data/movies:/movies"
|
||||
];
|
||||
environment = {
|
||||
PUID = 1000;
|
||||
PGID = 1000;
|
||||
TZ = "Europe/Berlin";
|
||||
};
|
||||
restart = "always";
|
||||
networks = [
|
||||
"dmz"
|
||||
];
|
||||
};
|
||||
navidrome.service = {
|
||||
image = "deluan/navidrome:latest";
|
||||
container_name = "navidrome";
|
||||
labels = {
|
||||
"traefik.enable" = "true";
|
||||
"traefik.http.routers.navidrome.entrypoints" = "websecure";
|
||||
"traefik.http.routers.navidrome.rule" = "Host(`navidrome.ghoscht.com`)";
|
||||
"traefik.http.services.navidrome.loadbalancer.server.port" = "4533";
|
||||
"traefik.http.routers.navidrome.tls" = "true";
|
||||
"traefik.http.routers.navidrome.tls.certresolver" = "letsencrypt";
|
||||
};
|
||||
volumes = [
|
||||
"/home/ghoscht/.docker/media/navidrome_data:/data"
|
||||
"/home/ghoscht/.docker/media/data/music:/music"
|
||||
];
|
||||
environment = {
|
||||
ND_SESSIONTIMEOUT = "336h";
|
||||
};
|
||||
env_file = [
|
||||
"/home/ghoscht/.docker/media/navidrome.env"
|
||||
];
|
||||
restart = "always";
|
||||
networks = [
|
||||
"dmz"
|
||||
];
|
||||
};
|
||||
vpn.service = {
|
||||
image = "haugene/transmission-openvpn";
|
||||
container_name = "transmission";
|
||||
labels = {
|
||||
"traefik.enable" = "true";
|
||||
"traefik.http.routers.transmission.entrypoints" = "websecure";
|
||||
"traefik.http.routers.transmission.rule" = "Host(`transmission.ghoscht.com`)";
|
||||
"traefik.http.services.transmission.loadbalancer.server.port" = "9091";
|
||||
"traefik.docker.network" = "dmz";
|
||||
"traefik.http.routers.transmission.tls" = "true";
|
||||
"traefik.http.routers.transmission.tls.certresolver" = "letsencrypt";
|
||||
};
|
||||
volumes = [
|
||||
"/home/ghoscht/.docker/media/transmission_data:/config"
|
||||
"/home/ghoscht/.docker/media/data:/data"
|
||||
];
|
||||
environment = {
|
||||
PUID = 1000;
|
||||
PGID = 1000;
|
||||
TZ = "Europe/Berlin";
|
||||
OPENVPN_PROVIDER = "WINDSCRIBE";
|
||||
OPENVPN_CONFIG = "Vienna-Hofburg-udp";
|
||||
OVPN_PROTOCOL = "udp";
|
||||
OPENVPN_OPTS = "--pull-filter ignore ping --ping 10 --ping-restart 120";
|
||||
LOCAL_NETWORK = "192.168.0.0/16";
|
||||
TRANSMISSION_DOWNLOAD_DIR = "/data/torrents";
|
||||
TRANSMISSION_INCOMPLETE_DIR = "/data/torrents/incomplete";
|
||||
TRANSMISSION_WEB_UI = "flood-for-transmission";
|
||||
};
|
||||
env_file = [
|
||||
"/home/ghoscht/.docker/media/windscribe.env"
|
||||
];
|
||||
capabilities = {
|
||||
NET_ADMIN = true;
|
||||
};
|
||||
restart = "always";
|
||||
networks = [
|
||||
"dmz"
|
||||
];
|
||||
};
|
||||
prowlarr.service = {
|
||||
image = "linuxserver/prowlarr:latest";
|
||||
container_name = "prowlarr";
|
||||
labels = {
|
||||
"traefik.enable" = "true";
|
||||
"traefik.http.routers.prowlarr.entrypoints" = "websecure";
|
||||
"traefik.http.routers.prowlarr.rule" = "Host(`prowlarr.ghoscht.com`)";
|
||||
"traefik.http.services.prowlarr.loadbalancer.server.port" = "9696";
|
||||
"traefik.docker.network" = "dmz";
|
||||
"traefik.http.routers.prowlarr.tls" = "true";
|
||||
"traefik.http.routers.prowlarr.tls.certresolver" = "letsencrypt";
|
||||
};
|
||||
volumes = [
|
||||
"/home/ghoscht/.docker/media/prowlarr_data:/config"
|
||||
];
|
||||
environment = {
|
||||
PUID = 1000;
|
||||
PGID = 1000;
|
||||
TZ = "Europe/Berlin";
|
||||
};
|
||||
network_mode = "service:vpn";
|
||||
depends_on = {
|
||||
vpn = {condition = "service_healthy";};
|
||||
};
|
||||
restart = "always";
|
||||
};
|
||||
sonarr.service = {
|
||||
image = "linuxserver/sonarr:latest";
|
||||
container_name = "sonarr";
|
||||
labels = {
|
||||
"traefik.enable" = "true";
|
||||
"traefik.http.routers.sonarr.entrypoints" = "websecure";
|
||||
"traefik.http.routers.sonarr.rule" = "Host(`sonarr.ghoscht.com`)";
|
||||
"traefik.http.services.sonarr.loadbalancer.server.port" = "8989";
|
||||
"traefik.docker.network" = "dmz";
|
||||
"traefik.http.routers.sonarr.tls" = "true";
|
||||
"traefik.http.routers.sonarr.tls.certresolver" = "letsencrypt";
|
||||
};
|
||||
volumes = [
|
||||
"/home/ghoscht/.docker/media/sonarr_data:/config"
|
||||
"/home/ghoscht/.docker/media/data:/data"
|
||||
];
|
||||
environment = {
|
||||
PUID = 1000;
|
||||
PGID = 1000;
|
||||
TZ = "Europe/Berlin";
|
||||
};
|
||||
network_mode = "service:vpn";
|
||||
depends_on = {
|
||||
vpn = {condition = "service_healthy";};
|
||||
prowlarr = {condition = "service_started";};
|
||||
};
|
||||
restart = "always";
|
||||
};
|
||||
radarr.service = {
|
||||
image = "linuxserver/radarr:latest";
|
||||
container_name = "radarr";
|
||||
labels = {
|
||||
"traefik.enable" = "true";
|
||||
"traefik.http.routers.radarr.entrypoints" = "websecure";
|
||||
"traefik.http.routers.radarr.rule" = "Host(`radarr.ghoscht.com`)";
|
||||
"traefik.http.services.radarr.loadbalancer.server.port" = "7878";
|
||||
"traefik.docker.network" = "dmz";
|
||||
"traefik.http.routers.radarr.tls" = "true";
|
||||
"traefik.http.routers.radarr.tls.certresolver" = "letsencrypt";
|
||||
};
|
||||
volumes = [
|
||||
"/home/ghoscht/.docker/media/radarr_data:/config"
|
||||
"/home/ghoscht/.docker/media/data:/data"
|
||||
];
|
||||
environment = {
|
||||
PUID = 1000;
|
||||
PGID = 1000;
|
||||
TZ = "Europe/Berlin";
|
||||
};
|
||||
network_mode = "service:vpn";
|
||||
depends_on = {
|
||||
vpn = {condition = "service_healthy";};
|
||||
prowlarr = {condition = "service_started";};
|
||||
};
|
||||
restart = "always";
|
||||
};
|
||||
lidarr.service = {
|
||||
image = "linuxserver/lidarr:latest";
|
||||
container_name = "lidarr";
|
||||
labels = {
|
||||
"traefik.enable" = "true";
|
||||
"traefik.http.routers.lidarr.entrypoints" = "websecure";
|
||||
"traefik.http.routers.lidarr.rule" = "Host(`lidarr.ghoscht.com`)";
|
||||
"traefik.http.services.lidarr.loadbalancer.server.port" = "8686";
|
||||
"traefik.http.routers.lidarr.service" = "lidarr";
|
||||
"traefik.docker.network" = "dmz";
|
||||
"traefik.http.routers.lidarr.tls" = "true";
|
||||
"traefik.http.routers.lidarr.tls.certresolver" = "letsencrypt";
|
||||
};
|
||||
volumes = [
|
||||
"/home/ghoscht/.docker/media/lidarr_data:/config"
|
||||
"/home/ghoscht/.docker/media/data:/data"
|
||||
"/home/ghoscht/.docker/media/lidarr_addons/custom-services.d:/custom-services.d"
|
||||
"/home/ghoscht/.docker/media/lidarr_addons/custom-cont-init.d:/custom-cont-init.d"
|
||||
];
|
||||
environment = {
|
||||
PUID = 1000;
|
||||
PGID = 1000;
|
||||
TZ = "Europe/Berlin";
|
||||
};
|
||||
network_mode = "service:vpn";
|
||||
depends_on = {
|
||||
vpn = {condition = "service_healthy";};
|
||||
prowlarr = {condition = "service_started";};
|
||||
};
|
||||
restart = "always";
|
||||
};
|
||||
bazarr.service = {
|
||||
image = "hotio/bazarr:latest";
|
||||
container_name = "bazarr";
|
||||
labels = {
|
||||
"traefik.enable" = "true";
|
||||
"traefik.http.routers.bazarr.entrypoints" = "websecure";
|
||||
"traefik.http.routers.bazarr.rule" = "Host(`bazarr.ghoscht.com`)";
|
||||
"traefik.http.services.bazarr.loadbalancer.server.port" = "6767";
|
||||
"traefik.docker.network" = "dmz";
|
||||
"traefik.http.routers.bazarr.tls" = "true";
|
||||
"traefik.http.routers.bazarr.tls.certresolver" = "letsencrypt";
|
||||
};
|
||||
volumes = [
|
||||
"/home/ghoscht/.docker/media/bazarr_data:/config"
|
||||
"/home/ghoscht/.docker/media/data:/data"
|
||||
];
|
||||
environment = {
|
||||
PUID = 1000;
|
||||
PGID = 1000;
|
||||
TZ = "Europe/Berlin";
|
||||
};
|
||||
networks = ["dmz"];
|
||||
restart = "always";
|
||||
};
|
||||
jellyseerr.service = {
|
||||
image = "fallenbagel/jellyseerr:latest";
|
||||
container_name = "jellyseerr";
|
||||
labels = {
|
||||
"traefik.enable" = "true";
|
||||
"traefik.http.routers.jellyseerr.entrypoints" = "websecure";
|
||||
"traefik.http.routers.jellyseerr.rule" = "Host(`jellyseerr.ghoscht.com`)";
|
||||
"traefik.http.services.jellyseerr.loadbalancer.server.port" = "5055";
|
||||
"traefik.docker.network" = "dmz";
|
||||
"traefik.http.routers.jellyseerr.tls" = "true";
|
||||
"traefik.http.routers.jellyseerr.tls.certresolver" = "letsencrypt";
|
||||
};
|
||||
volumes = [
|
||||
"/home/ghoscht/.docker/media/jellyseerr_data:/app/config"
|
||||
];
|
||||
environment = {
|
||||
PUID = 1000;
|
||||
PGID = 1000;
|
||||
TZ = "Europe/Berlin";
|
||||
};
|
||||
networks = ["dmz"];
|
||||
restart = "always";
|
||||
};
|
||||
autobrr.service = {
|
||||
image = "ghcr.io/autobrr/autobrr:latest";
|
||||
container_name = "autobrr";
|
||||
labels = {
|
||||
"traefik.enable" = "true";
|
||||
"traefik.http.routers.autobrr.entrypoints" = "websecure";
|
||||
"traefik.http.routers.autobrr.rule" = "Host(`autobrr.ghoscht.com`)";
|
||||
"traefik.http.services.autobrr.loadbalancer.server.port" = "7474";
|
||||
"traefik.docker.network" = "dmz";
|
||||
"traefik.http.routers.autobrr.tls" = "true";
|
||||
"traefik.http.routers.autobrr.tls.certresolver" = "letsencrypt";
|
||||
};
|
||||
volumes = [
|
||||
"/home/ghoscht/.docker/media/jellyseerr_data:/app/config"
|
||||
];
|
||||
environment = {
|
||||
PUID = 1000;
|
||||
PGID = 1000;
|
||||
TZ = "Europe/Berlin";
|
||||
};
|
||||
network_mode = "service:vpn";
|
||||
depends_on = {
|
||||
vpn = {condition = "service_healthy";};
|
||||
prowlarr = {condition = "service_started";};
|
||||
sonarr = {condition = "service_started";};
|
||||
radarr = {condition = "service_started";};
|
||||
};
|
||||
restart = "always";
|
||||
};
|
||||
deemix.service = {
|
||||
image = "finniedj/deemix";
|
||||
container_name = "deemix";
|
||||
labels = {
|
||||
"traefik.enable" = "true";
|
||||
"traefik.http.routers.deemix.entrypoints" = "websecure";
|
||||
"traefik.http.routers.deemix.rule" = "Host(`deemix.ghoscht.com`)";
|
||||
"traefik.http.services.deemix.loadbalancer.server.port" = "6595";
|
||||
"traefik.docker.network" = "dmz";
|
||||
"traefik.http.routers.deemix.tls" = "true";
|
||||
"traefik.http.routers.deemix.tls.certresolver" = "letsencrypt";
|
||||
};
|
||||
volumes = [
|
||||
"/home/ghoscht/.docker/media/jellyseerr_data:/app/config"
|
||||
];
|
||||
environment = {
|
||||
PUID = 1000;
|
||||
PGID = 1000;
|
||||
UMASK_SET = 022;
|
||||
TZ = "Europe/Berlin";
|
||||
};
|
||||
network_mode = "service:vpn";
|
||||
depends_on = {
|
||||
vpn = {condition = "service_healthy";};
|
||||
};
|
||||
restart = "always";
|
||||
};
|
||||
unpackerr.service = {
|
||||
image = "golift/unpackerr";
|
||||
container_name = "unpackerr";
|
||||
volumes = [
|
||||
"/home/ghoscht/.docker/media/data:/data"
|
||||
];
|
||||
user = "1000:1000";
|
||||
env_file = [
|
||||
"/home/ghoscht/.docker/media/unpackerr.env"
|
||||
];
|
||||
environment = {
|
||||
TZ = "Europe/Berlin";
|
||||
# General config
|
||||
UN_DEBUG = "false";
|
||||
UN_INTERVAL = "2m";
|
||||
UN_START_DELAY = "1m";
|
||||
UN_RETRY_DELAY = "5m";
|
||||
UN_MAX_RETRIES = 3;
|
||||
UN_PARALLEL = 1;
|
||||
UN_FILE_MODE = 0644;
|
||||
UN_DIR_MODE = 0755;
|
||||
# Sonarr Config
|
||||
UN_SONARR_0_URL = "http://transmission:8989";
|
||||
UN_SONARR_0_PATHS_0 = "/data/torrents/tv";
|
||||
UN_SONARR_0_PROTOCOLS = "torrent";
|
||||
UN_SONARR_0_TIMEOUT = "10s";
|
||||
UN_SONARR_0_DELETE_ORIG = "false";
|
||||
UN_SONARR_0_DELETE_DELAY = "5m";
|
||||
# Radarr Config
|
||||
UN_RADARR_0_URL = "http://transmission:7878";
|
||||
UN_RADARR_0_PATHS_0 = "/data/torrents/movies";
|
||||
UN_RADARR_0_PROTOCOLS = "torrent";
|
||||
UN_RADARR_0_TIMEOUT = "10s";
|
||||
UN_RADARR_0_DELETE_ORIG = "false";
|
||||
UN_RADARR_0_DELETE_DELAY = "5m";
|
||||
# Lidarr Config
|
||||
UN_LIDARR_0_URL = "http://transmission:8686";
|
||||
UN_LIDARR_0_PATHS_0 = "/data/torrents/music";
|
||||
UN_LIDARR_0_PROTOCOLS = "torrent";
|
||||
UN_LIDARR_0_TIMEOUT = "10s";
|
||||
UN_LIDARR_0_DELETE_ORIG = "false";
|
||||
UN_LIDARR_0_DELETE_DELAY = "5m";
|
||||
};
|
||||
networks = ["dmz"];
|
||||
depends_on = {
|
||||
vpn = {condition = "service_healthy";};
|
||||
prowlarr = {condition = "service_started";};
|
||||
sonarr = {condition = "service_started";};
|
||||
radarr = {condition = "service_started";};
|
||||
};
|
||||
restart = "always";
|
||||
};
|
||||
};
|
||||
}
|
6
hosts/franz/arion/media/arion-pkgs.nix
Normal file
|
@ -0,0 +1,6 @@
|
|||
# Instead of pinning Nixpkgs, we can opt to use the one in NIX_PATH
|
||||
import <nixpkgs> {
|
||||
# We specify the architecture explicitly. Use a Linux remote builder when
|
||||
# calling arion from other platforms.
|
||||
system = "x86_64-linux";
|
||||
}
|
73
hosts/franz/arion/media/default.nix
Normal file
|
@ -0,0 +1,73 @@
|
|||
{config, ...}: let
|
||||
vars = import ../../../../vars.nix;
|
||||
in {
|
||||
virtualisation.arion = {
|
||||
projects.media.settings = {
|
||||
imports = [./arion-compose.nix];
|
||||
};
|
||||
};
|
||||
|
||||
sops.secrets."navidrome/spotify_id" = {
|
||||
owner = vars.user;
|
||||
};
|
||||
|
||||
sops.secrets."navidrome/spotify_secret" = {
|
||||
owner = vars.user;
|
||||
};
|
||||
sops.secrets."navidrome/lastfm_api_key" = {
|
||||
owner = vars.user;
|
||||
};
|
||||
sops.secrets."navidrome/lastfm_api_secret" = {
|
||||
owner = vars.user;
|
||||
};
|
||||
|
||||
sops.secrets."windscribe/openvpn_username" = {
|
||||
owner = vars.user;
|
||||
};
|
||||
sops.secrets."windscribe/openvpn_password" = {
|
||||
owner = vars.user;
|
||||
};
|
||||
|
||||
sops.secrets."unpackerr/sonarr_api_key" = {
|
||||
owner = vars.user;
|
||||
};
|
||||
sops.secrets."unpackerr/radarr_api_key" = {
|
||||
owner = vars.user;
|
||||
};
|
||||
sops.secrets."unpackerr/lidarr_api_key" = {
|
||||
owner = vars.user;
|
||||
};
|
||||
|
||||
sops.templates."navidrome.env" = {
|
||||
path = "/home/${vars.user}/.docker/media/navidrome.env";
|
||||
owner = vars.user;
|
||||
mode = "0775";
|
||||
content = ''
|
||||
ND_SPOTIFY_ID="${config.sops.placeholder."navidrome/spotify_id"}"
|
||||
ND_SPOTIFY_SECRET="${config.sops.placeholder."navidrome/spotify_secret"}"
|
||||
ND_LASTFM_APIKEY="${config.sops.placeholder."navidrome/lastfm_api_key"}"
|
||||
ND_LASTFM_SECRET="${config.sops.placeholder."navidrome/lastfm_api_secret"}"
|
||||
'';
|
||||
};
|
||||
|
||||
sops.templates."windscribe.env" = {
|
||||
path = "/home/${vars.user}/.docker/media/windscribe.env";
|
||||
owner = vars.user;
|
||||
mode = "0775";
|
||||
content = ''
|
||||
OPENVPN_USERNAME="${config.sops.placeholder."windscribe/openvpn_username"}"
|
||||
OPENVPN_PASSWORD="${config.sops.placeholder."windscribe/openvpn_password"}"
|
||||
'';
|
||||
};
|
||||
|
||||
sops.templates."unpackerr.env" = {
|
||||
path = "/home/${vars.user}/.docker/media/unpackerr.env";
|
||||
owner = vars.user;
|
||||
mode = "0775";
|
||||
content = ''
|
||||
UN_SONARR_0_API_KEY="${config.sops.placeholder."unpackerr/sonarr_api_key"}"
|
||||
UN_RADARR_0_API_KEY="${config.sops.placeholder."unpackerr/lidarr_api_key"}"
|
||||
UN_LIDARR_0_API_KEY="${config.sops.placeholder."unpackerr/radarr_api_key"}"
|
||||
'';
|
||||
};
|
||||
}
|
32
hosts/franz/arion/passwords/arion-compose.nix
Normal file
|
@ -0,0 +1,32 @@
|
|||
{pkgs, ...}: {
|
||||
project.name = "passwords";
|
||||
|
||||
networks.dmz = {
|
||||
name = "dmz";
|
||||
external = true;
|
||||
};
|
||||
|
||||
services = {
|
||||
vaultwarden.service = {
|
||||
image = "vaultwarden/server:latest";
|
||||
container_name = "vaultwarden";
|
||||
labels = {
|
||||
"traefik.enable" = "true";
|
||||
"traefik.http.routers.vaultwarden.entrypoints" = "websecure";
|
||||
"traefik.http.routers.vaultwarden.rule" = "Host(`vaultwarden.ghoscht.com`)";
|
||||
"traefik.http.routers.vaultwarden.tls" = "true";
|
||||
"traefik.http.routers.vaultwarden.tls.certresolver" = "letsencrypt";
|
||||
};
|
||||
volumes = [
|
||||
"/home/ghoscht/.docker/infrastructure/vaultwarden_data/:/data"
|
||||
];
|
||||
environment = {
|
||||
DOMAIN = "http://vaultwarden.ghoscht.com";
|
||||
};
|
||||
restart = "always";
|
||||
networks = [
|
||||
"dmz"
|
||||
];
|
||||
};
|
||||
};
|
||||
}
|
6
hosts/franz/arion/passwords/arion-pkgs.nix
Normal file
|
@ -0,0 +1,6 @@
|
|||
# Instead of pinning Nixpkgs, we can opt to use the one in NIX_PATH
|
||||
import <nixpkgs> {
|
||||
# We specify the architecture explicitly. Use a Linux remote builder when
|
||||
# calling arion from other platforms.
|
||||
system = "x86_64-linux";
|
||||
}
|
8
hosts/franz/arion/passwords/default.nix
Normal file
|
@ -0,0 +1,8 @@
|
|||
{config, ...}: let
|
||||
in {
|
||||
virtualisation.arion = {
|
||||
projects.password.settings = {
|
||||
imports = [./arion-compose.nix];
|
||||
};
|
||||
};
|
||||
}
|
44
hosts/franz/arion/signal/arion-compose.nix
Normal file
|
@ -0,0 +1,44 @@
|
|||
{pkgs, ...}: {
|
||||
project.name = "signal";
|
||||
|
||||
networks.dmz = {
|
||||
name = "dmz";
|
||||
external = true;
|
||||
};
|
||||
|
||||
services = {
|
||||
mollysocket.service = {
|
||||
image = "ghcr.io/mollyim/mollysocket:latest";
|
||||
container_name = "mollysocket";
|
||||
useHostStore = true;
|
||||
ports = [
|
||||
"8020:8020"
|
||||
];
|
||||
command = "server";
|
||||
working_dir = "/data";
|
||||
labels = {
|
||||
"traefik.enable" = "true";
|
||||
"traefik.http.routers.mollysocket.rule" = "Host(`signal.ghoscht.com`)";
|
||||
"traefik.http.routers.mollysocket.entrypoints" = "websecure";
|
||||
"traefik.http.services.mollysocket.loadbalancer.server.port" = "8020";
|
||||
"traefik.http.routers.mollysocket.tls" = "true";
|
||||
"traefik.http.routers.mollysocket.tls.certresolver" = "letsencrypt";
|
||||
};
|
||||
volumes = [
|
||||
"/home/ghoscht/.docker/signal/mollysocket_data:/data"
|
||||
];
|
||||
environment = {
|
||||
MOLLY_DB = "/data/mollysocket.db";
|
||||
MOLLY_ALLOWED_ENDPOINTS = "['https://push.ghoscht.com','*]";
|
||||
MOLLY_ALLOWED_UUIDS = "['*']";
|
||||
MOLLY_HOST = "0.0.0.0";
|
||||
MOLLY_PORT = 8020;
|
||||
RUST_LOG = "info";
|
||||
};
|
||||
restart = "always";
|
||||
networks = [
|
||||
"dmz"
|
||||
];
|
||||
};
|
||||
};
|
||||
}
|
6
hosts/franz/arion/signal/arion-pkgs.nix
Normal file
|
@ -0,0 +1,6 @@
|
|||
# Instead of pinning Nixpkgs, we can opt to use the one in NIX_PATH
|
||||
import <nixpkgs> {
|
||||
# We specify the architecture explicitly. Use a Linux remote builder when
|
||||
# calling arion from other platforms.
|
||||
system = "x86_64-linux";
|
||||
}
|
7
hosts/franz/arion/signal/default.nix
Normal file
|
@ -0,0 +1,7 @@
|
|||
{config, ...}: {
|
||||
virtualisation.arion = {
|
||||
projects.infrastructure.settings = {
|
||||
imports = [./arion-compose.nix];
|
||||
};
|
||||
};
|
||||
}
|
16
hosts/franz/arion/volman/arion-compose.nix
Normal file
|
@ -0,0 +1,16 @@
|
|||
{pkgs, ...}: {
|
||||
project.name = "volman";
|
||||
|
||||
docker-compose.volumes = {};
|
||||
|
||||
services = {
|
||||
volman.service = {
|
||||
image = "ubuntu";
|
||||
container_name = "volman";
|
||||
useHostStore = true;
|
||||
command = "sleep infinity";
|
||||
volumes = [
|
||||
];
|
||||
};
|
||||
};
|
||||
}
|
6
hosts/franz/arion/volman/arion-pkgs.nix
Normal file
|
@ -0,0 +1,6 @@
|
|||
# Instead of pinning Nixpkgs, we can opt to use the one in NIX_PATH
|
||||
import <nixpkgs> {
|
||||
# We specify the architecture explicitly. Use a Linux remote builder when
|
||||
# calling arion from other platforms.
|
||||
system = "x86_64-linux";
|
||||
}
|
0
rsc/config/awesome/icons/ac.png
Executable file → Normal file
Before Width: | Height: | Size: 106 B After Width: | Height: | Size: 106 B |
0
rsc/config/awesome/icons/battery.png
Executable file → Normal file
Before Width: | Height: | Size: 148 B After Width: | Height: | Size: 148 B |
0
rsc/config/awesome/icons/battery_empty.png
Executable file → Normal file
Before Width: | Height: | Size: 132 B After Width: | Height: | Size: 132 B |
0
rsc/config/awesome/icons/battery_low.png
Executable file → Normal file
Before Width: | Height: | Size: 131 B After Width: | Height: | Size: 131 B |
0
rsc/config/awesome/icons/centerfair.png
Executable file → Normal file
Before Width: | Height: | Size: 179 B After Width: | Height: | Size: 179 B |
0
rsc/config/awesome/icons/centerwork.png
Executable file → Normal file
Before Width: | Height: | Size: 195 B After Width: | Height: | Size: 195 B |
0
rsc/config/awesome/icons/centerworkh.png
Executable file → Normal file
Before Width: | Height: | Size: 195 B After Width: | Height: | Size: 195 B |
0
rsc/config/awesome/icons/cpu.png
Executable file → Normal file
Before Width: | Height: | Size: 185 B After Width: | Height: | Size: 185 B |
0
rsc/config/awesome/icons/dwindle.png
Executable file → Normal file
Before Width: | Height: | Size: 208 B After Width: | Height: | Size: 208 B |
0
rsc/config/awesome/icons/fairh.png
Executable file → Normal file
Before Width: | Height: | Size: 203 B After Width: | Height: | Size: 203 B |
0
rsc/config/awesome/icons/fairv.png
Executable file → Normal file
Before Width: | Height: | Size: 214 B After Width: | Height: | Size: 214 B |
0
rsc/config/awesome/icons/floating.png
Executable file → Normal file
Before Width: | Height: | Size: 198 B After Width: | Height: | Size: 198 B |
0
rsc/config/awesome/icons/hdd.png
Executable file → Normal file
Before Width: | Height: | Size: 253 B After Width: | Height: | Size: 253 B |
0
rsc/config/awesome/icons/magnifier.png
Executable file → Normal file
Before Width: | Height: | Size: 228 B After Width: | Height: | Size: 228 B |
0
rsc/config/awesome/icons/mail.png
Executable file → Normal file
Before Width: | Height: | Size: 189 B After Width: | Height: | Size: 189 B |
0
rsc/config/awesome/icons/mail_on.png
Executable file → Normal file
Before Width: | Height: | Size: 213 B After Width: | Height: | Size: 213 B |
0
rsc/config/awesome/icons/max.png
Executable file → Normal file
Before Width: | Height: | Size: 228 B After Width: | Height: | Size: 228 B |
0
rsc/config/awesome/icons/mem.png
Executable file → Normal file
Before Width: | Height: | Size: 93 B After Width: | Height: | Size: 93 B |
0
rsc/config/awesome/icons/net.png
Executable file → Normal file
Before Width: | Height: | Size: 193 B After Width: | Height: | Size: 193 B |
0
rsc/config/awesome/icons/net_wired.png
Executable file → Normal file
Before Width: | Height: | Size: 186 B After Width: | Height: | Size: 186 B |
0
rsc/config/awesome/icons/note.png
Executable file → Normal file
Before Width: | Height: | Size: 196 B After Width: | Height: | Size: 196 B |
0
rsc/config/awesome/icons/note_on.png
Executable file → Normal file
Before Width: | Height: | Size: 175 B After Width: | Height: | Size: 175 B |
0
rsc/config/awesome/icons/scissors.png
Executable file → Normal file
Before Width: | Height: | Size: 130 B After Width: | Height: | Size: 130 B |
0
rsc/config/awesome/icons/spiral.png
Executable file → Normal file
Before Width: | Height: | Size: 206 B After Width: | Height: | Size: 206 B |
0
rsc/config/awesome/icons/square_sel.png
Executable file → Normal file
Before Width: | Height: | Size: 81 B After Width: | Height: | Size: 81 B |
0
rsc/config/awesome/icons/square_unsel.png
Executable file → Normal file
Before Width: | Height: | Size: 88 B After Width: | Height: | Size: 88 B |
0
rsc/config/awesome/icons/submenu.png
Executable file → Normal file
Before Width: | Height: | Size: 142 B After Width: | Height: | Size: 142 B |
0
rsc/config/awesome/icons/task.png
Executable file → Normal file
Before Width: | Height: | Size: 189 B After Width: | Height: | Size: 189 B |
0
rsc/config/awesome/icons/temp.png
Executable file → Normal file
Before Width: | Height: | Size: 119 B After Width: | Height: | Size: 119 B |
0
rsc/config/awesome/icons/termfair.png
Executable file → Normal file
Before Width: | Height: | Size: 972 B After Width: | Height: | Size: 972 B |
0
rsc/config/awesome/icons/tile.png
Executable file → Normal file
Before Width: | Height: | Size: 195 B After Width: | Height: | Size: 195 B |
0
rsc/config/awesome/icons/tilebottom.png
Executable file → Normal file
Before Width: | Height: | Size: 200 B After Width: | Height: | Size: 200 B |
0
rsc/config/awesome/icons/tileleft.png
Executable file → Normal file
Before Width: | Height: | Size: 193 B After Width: | Height: | Size: 193 B |
0
rsc/config/awesome/icons/tiletop.png
Executable file → Normal file
Before Width: | Height: | Size: 199 B After Width: | Height: | Size: 199 B |
0
rsc/config/awesome/icons/titlebar/close_focus.png
Executable file → Normal file
Before Width: | Height: | Size: 187 B After Width: | Height: | Size: 187 B |
0
rsc/config/awesome/icons/titlebar/close_normal.png
Executable file → Normal file
Before Width: | Height: | Size: 254 B After Width: | Height: | Size: 254 B |
0
rsc/config/awesome/icons/titlebar/floating_focus_active.png
Executable file → Normal file
Before Width: | Height: | Size: 186 B After Width: | Height: | Size: 186 B |
0
rsc/config/awesome/icons/titlebar/floating_focus_inactive.png
Executable file → Normal file
Before Width: | Height: | Size: 154 B After Width: | Height: | Size: 154 B |
0
rsc/config/awesome/icons/titlebar/floating_normal_active.png
Executable file → Normal file
Before Width: | Height: | Size: 217 B After Width: | Height: | Size: 217 B |
0
rsc/config/awesome/icons/titlebar/floating_normal_inactive.png
Executable file → Normal file
Before Width: | Height: | Size: 176 B After Width: | Height: | Size: 176 B |
0
rsc/config/awesome/icons/titlebar/maximized_focus_active.png
Executable file → Normal file
Before Width: | Height: | Size: 264 B After Width: | Height: | Size: 264 B |
0
rsc/config/awesome/icons/titlebar/maximized_focus_inactive.png
Executable file → Normal file
Before Width: | Height: | Size: 176 B After Width: | Height: | Size: 176 B |
0
rsc/config/awesome/icons/titlebar/maximized_normal_active.png
Executable file → Normal file
Before Width: | Height: | Size: 244 B After Width: | Height: | Size: 244 B |
0
rsc/config/awesome/icons/titlebar/maximized_normal_inactive.png
Executable file → Normal file
Before Width: | Height: | Size: 174 B After Width: | Height: | Size: 174 B |
0
rsc/config/awesome/icons/titlebar/ontop_focus_active.png
Executable file → Normal file
Before Width: | Height: | Size: 184 B After Width: | Height: | Size: 184 B |
0
rsc/config/awesome/icons/titlebar/ontop_focus_inactive.png
Executable file → Normal file
Before Width: | Height: | Size: 161 B After Width: | Height: | Size: 161 B |
0
rsc/config/awesome/icons/titlebar/ontop_normal_active.png
Executable file → Normal file
Before Width: | Height: | Size: 224 B After Width: | Height: | Size: 224 B |
0
rsc/config/awesome/icons/titlebar/ontop_normal_inactive.png
Executable file → Normal file
Before Width: | Height: | Size: 171 B After Width: | Height: | Size: 171 B |
0
rsc/config/awesome/icons/titlebar/sticky_focus_active.png
Executable file → Normal file
Before Width: | Height: | Size: 184 B After Width: | Height: | Size: 184 B |
0
rsc/config/awesome/icons/titlebar/sticky_focus_inactive.png
Executable file → Normal file
Before Width: | Height: | Size: 155 B After Width: | Height: | Size: 155 B |
0
rsc/config/awesome/icons/titlebar/sticky_normal_active.png
Executable file → Normal file
Before Width: | Height: | Size: 235 B After Width: | Height: | Size: 235 B |
0
rsc/config/awesome/icons/titlebar/sticky_normal_inactive.png
Executable file → Normal file
Before Width: | Height: | Size: 165 B After Width: | Height: | Size: 165 B |
0
rsc/config/awesome/icons/vol.png
Executable file → Normal file
Before Width: | Height: | Size: 123 B After Width: | Height: | Size: 123 B |
0
rsc/config/awesome/icons/vol_low.png
Executable file → Normal file
Before Width: | Height: | Size: 193 B After Width: | Height: | Size: 193 B |
0
rsc/config/awesome/icons/vol_mute.png
Executable file → Normal file
Before Width: | Height: | Size: 227 B After Width: | Height: | Size: 227 B |
0
rsc/config/awesome/icons/vol_no.png
Executable file → Normal file
Before Width: | Height: | Size: 127 B After Width: | Height: | Size: 127 B |
62
rsc/docker/franz/git/forgejo_data/gitea/conf/app.ini
Normal file
|
@ -0,0 +1,62 @@
|
|||
APP_NAME = Forgejo: Beyond coding. We forge.
|
||||
RUN_MODE = prod
|
||||
|
||||
[repository]
|
||||
ROOT = /data/git/repositories
|
||||
|
||||
[repository.local]
|
||||
LOCAL_COPY_PATH = /data/gitea/tmp/local-repo
|
||||
|
||||
[repository.upload]
|
||||
TEMP_PATH = /data/gitea/uploads
|
||||
|
||||
[server]
|
||||
APP_DATA_PATH = /data/gitea
|
||||
DOMAIN = localhost
|
||||
SSH_DOMAIN = localhost
|
||||
HTTP_PORT = 3000
|
||||
ROOT_URL =
|
||||
DISABLE_SSH = false
|
||||
SSH_PORT = 22
|
||||
SSH_LISTEN_PORT = 22
|
||||
LFS_START_SERVER = false
|
||||
|
||||
[database]
|
||||
PATH = /data/gitea/gitea.db
|
||||
DB_TYPE = postgres
|
||||
HOST = db:5432
|
||||
NAME = gitea
|
||||
USER = gitea
|
||||
PASSWD = gitea
|
||||
LOG_SQL = false
|
||||
|
||||
[indexer]
|
||||
ISSUE_INDEXER_PATH = /data/gitea/indexers/issues.bleve
|
||||
|
||||
[session]
|
||||
PROVIDER_CONFIG = /data/gitea/sessions
|
||||
|
||||
[picture]
|
||||
AVATAR_UPLOAD_PATH = /data/gitea/avatars
|
||||
REPOSITORY_AVATAR_UPLOAD_PATH = /data/gitea/repo-avatars
|
||||
|
||||
[attachment]
|
||||
PATH = /data/gitea/attachments
|
||||
|
||||
[log]
|
||||
MODE = console
|
||||
LEVEL = info
|
||||
ROOT_PATH = /data/gitea/log
|
||||
|
||||
[security]
|
||||
INSTALL_LOCK = false
|
||||
SECRET_KEY =
|
||||
REVERSE_PROXY_LIMIT = 1
|
||||
REVERSE_PROXY_TRUSTED_PROXIES = *
|
||||
|
||||
[service]
|
||||
DISABLE_REGISTRATION = false
|
||||
REQUIRE_SIGNIN_VIEW = false
|
||||
|
||||
[lfs]
|
||||
PATH = /data/git/lfs
|
|
@ -7,8 +7,24 @@ traefik:
|
|||
nextcloud:
|
||||
mysql_root_password: ENC[AES256_GCM,data:bCghTvvQ8eR76g1tTbtOE/MB8UcnVUsn5ooQ9+tKdB8=,iv:tmopYWAIVHNVcYYOWJy2uedP38nM5WR5nzD7pjD9w0Y=,tag:E8VIkOu2bWHxq94w7YyC2Q==,type:str]
|
||||
mysql_password: ENC[AES256_GCM,data:g+xf2rbj1HMMF0vLoXHlvrX2ct9/OXCystt42cdkodk=,iv:6Q7JAWR8WMmSKo21k+zmqGcSEnpTOoO38G66UMHc5qM=,tag:LQHHAH69EFk0v5LVBznjzA==,type:str]
|
||||
mysql_database: ENC[AES256_GCM,data:2OP4bt4Tq09q,iv:l6k5lW0PsfciPv3uhVjxrILZ7hNGKQNPtF2QSmtlym0=,tag:HXYilVMhngdeMP1qQWDGBg==,type:str]
|
||||
mysql_user: ENC[AES256_GCM,data:AixE7ec9SjO4,iv:cnxCAt+MAr0BXixkqH77JC5kjb7p1vKZlD5hkemtKvE=,tag:/m8TBXht6RuB5QE4MFRUBA==,type:str]
|
||||
mysql_database: ENC[AES256_GCM,data:2OP4bt4Tq09q,iv:l6k5lW0PsfciPv3uhVjxrILZ7hNGKQNPtF2QSmtlym0=,tag:HXYilVMhngdeMP1qQWDGBg==,type:str]
|
||||
forgejo:
|
||||
db_password: ENC[AES256_GCM,data:1lpmX58=,iv:9TehYmpS3RQc0WsKVR4Tx36utL2e6avbc7BlK0+B178=,tag:xHRv+WJUch3jmRIWghjnPg==,type:str]
|
||||
db_user: ENC[AES256_GCM,data:rYxa8nU=,iv:Lijug8gqMTnMG9WQsivyrO/IbgrAyWfG7IQ99x1Q5gA=,tag:OipZUyZiMh4PLbo7KJAksQ==,type:str]
|
||||
db_database: ENC[AES256_GCM,data:br/OvQA=,iv:g2krpkX1XXXhT4FgzbeXp/MgcpHayndtBv+8dpmp03M=,tag:z5h/TSBXViFr3lNN15XFAA==,type:str]
|
||||
navidrome:
|
||||
spotify_id: ENC[AES256_GCM,data:yTNp25CHtnFkvXhbvduVzkmenT3TjkpWR0ZhSTKOiAs=,iv:cuewBT/XfneiHUjlFCV0O/nzXHoEVO/JyfgqRACreEc=,tag:TOZ+GDqZ2SkibKhEhIcX7w==,type:str]
|
||||
spotify_secret: ENC[AES256_GCM,data:sHYYHDgW0nNP7vCk0qOZdLOyetG4XbK7NaxYSt4kr68=,iv:p0+wW287UteJfJaiajX9/XOEkkm957Rs46hYaml6Of4=,tag:SsEyVYdPpO/yv9vF7Dj+HA==,type:str]
|
||||
lastfm_api_key: ENC[AES256_GCM,data:Jk9zSyoq47p49v901nc70ERsb0LqTryb9QkTEQCmSPs=,iv:SUeoRcFY5ReTfeay8ubCMSaHMk/OQh6Z3wWJ7kEsrVs=,tag:9BAcx3f9rgGn+vsdlGtgiA==,type:str]
|
||||
lastfm_api_secret: ENC[AES256_GCM,data:yI3OhYtrDBk4HKst1glPgVaUxcL+PsxW5Na9gnOBpa0=,iv:PJ3ryZMzZuilI2kI74LQ0z48vEwMvtl+AEm2kRTLJeg=,tag:fUHzpiIpTK3PMlEbCP15Fw==,type:str]
|
||||
windscribe:
|
||||
openvpn_username: ENC[AES256_GCM,data:IoohrQdi3sh2M0ozweR30g==,iv:2kRhmQncEQV/TRYBRf4rY5OdCw0zsiOB12KdNfaQtME=,tag:gb1deA0DFa8fEg3HTmCYhQ==,type:str]
|
||||
openvpn_password: ENC[AES256_GCM,data:H9ke5qGzQJscqg==,iv:Q2oasgApVfCOKBF4C6mQ/XPtHY0yfoBJfGVLUgWY4yY=,tag:OJP1ER1QiJyZmhkHLuXwuQ==,type:str]
|
||||
unpackerr:
|
||||
sonarr_api_key: ENC[AES256_GCM,data:iENKLrYT7xbRrFAxN58VItZWhGfWjX1Nbu8zpFWA2ZI=,iv:WGFPGGoCvT993t9ROg1cRVPg8+qlDE92VpKfm9PNfpo=,tag:KBMggYqcUEhTg7yVaytysg==,type:str]
|
||||
radarr_api_key: ENC[AES256_GCM,data:zFMPIFc682n0wj/UOI6BUag2wVVys3EXCcYNqatExJA=,iv:NwRUIHolFyw9P0iiNrgm6EV+GAp5sSLho1NEwv5DaHw=,tag:TpapILDy8Oad5XzudcXaeQ==,type:str]
|
||||
lidarr_api_key: ENC[AES256_GCM,data:WZzb/Is7qdIq9qPEYt0FFXSucUx3qCv/isWwUyxDrB0=,iv:k0CFPUU4UmTmW0R/5sWgptbsfdLlglKze3EAyNi6t1E=,tag:aXUZd43krL9qKvs1uvJ4AA==,type:str]
|
||||
sops:
|
||||
kms: []
|
||||
gcp_kms: []
|
||||
|
@ -24,8 +40,8 @@ sops:
|
|||
VUUxcEhvYi8zeXlCUUViUTl0eWdhcU0KXOfbnDc+zc8lnBcyEAV5EiJSjcSU6AgI
|
||||
EfeRw8qVqwChrYn1agslcNnDbE0WQsOCBuA6cE4V3kRofp9HU949ig==
|
||||
-----END AGE ENCRYPTED FILE-----
|
||||
lastmodified: "2024-03-03T19:42:11Z"
|
||||
mac: ENC[AES256_GCM,data:jMTVK6KR/qbOg1K8TyS4hKHcp0byv/KJSpvbg9y2c3skKNRDHwvb62xtSQHHDFtzqoegmLtxycqW29EneXeHrqwbxM2i/O1jdqacybnieIAVPixG6nN/onZ9f1Pqoc7TpX5Mgw5Fj6qxJUfT3u+susz31BsE1U4Za/+mimfZHdQ=,iv:JmM+hRclxgvIz80PM9zYLZ3NsIBOTkO4ItusgZzHjmE=,tag:cTpl5atAqz5yGDaKpkk3AQ==,type:str]
|
||||
lastmodified: "2024-03-06T15:02:59Z"
|
||||
mac: ENC[AES256_GCM,data:jWfGV2lKFoDEX+1OUzbnzYE0zqzh6+GX/X9IsZ1igg6xMW7T1sfQwKrRBHUnRO6HTDd9ppcIsRkZo/tL76mmLRiOlMrsoWD8quzkSjJrW6whxQn0acyqVhIw3KZmmet8+ICV4lIuI006zr3vffPVkDAizhrl3jXnuLBO+8yADHs=,iv:cxozu5kuLU1wXWiu0RfxYJgYUkoMyEUSmfHXrrfCMhc=,tag:rUbr/h3FKmil6zRBSG4RSw==,type:str]
|
||||
pgp: []
|
||||
unencrypted_suffix: _unencrypted
|
||||
version: 3.8.1
|
||||
|
|