From cd845c95bac718f7628ce07f9b796396bdae203d Mon Sep 17 00:00:00 2001 From: Infinidoge Date: Wed, 7 Feb 2024 14:21:14 -0500 Subject: [PATCH] Infini-OPTIPLEX: setup freshrss --- hosts/Infini-OPTIPLEX/default.nix | 1 + hosts/Infini-OPTIPLEX/freshrss.nix | 17 +++++++++++++ secrets/default.nix | 3 +++ secrets/freshrss.age | 38 ++++++++++++++++++++++++++++++ secrets/secrets.nix | 1 + 5 files changed, 60 insertions(+) create mode 100644 hosts/Infini-OPTIPLEX/freshrss.nix create mode 100644 secrets/freshrss.age diff --git a/hosts/Infini-OPTIPLEX/default.nix b/hosts/Infini-OPTIPLEX/default.nix index e754e5a..59989f8 100644 --- a/hosts/Infini-OPTIPLEX/default.nix +++ b/hosts/Infini-OPTIPLEX/default.nix @@ -4,6 +4,7 @@ ./filesystems.nix ./factorio.nix + ./freshrss.nix ./thelounge.nix ./vaultwarden.nix ]; diff --git a/hosts/Infini-OPTIPLEX/freshrss.nix b/hosts/Infini-OPTIPLEX/freshrss.nix new file mode 100644 index 0000000..a82d6f2 --- /dev/null +++ b/hosts/Infini-OPTIPLEX/freshrss.nix @@ -0,0 +1,17 @@ +{ config, ... }: + +let + domain = "freshrss.inx.moe"; +in +{ + services.nginx.virtualHosts.${domain} = config.common.nginx.ssl; + + services.freshrss = { + enable = true; + virtualHost = domain; + baseUrl = "https://${domain}"; + dataDir = "/srv/freshrss"; + defaultUser = "infinidoge"; + passwordFile = config.secrets."freshrss"; + }; +} diff --git a/secrets/default.nix b/secrets/default.nix index 1844378..9a4db42 100644 --- a/secrets/default.nix +++ b/secrets/default.nix @@ -26,6 +26,9 @@ in (mkIf config.services.vaultwarden.enable { "vaultwarden" = withOwner "vaultwarden" secrets."vaultwarden"; }) + (mkIf config.services.freshrss.enable { + "freshrss" = withOwner "freshrss" secrets."freshrss"; + }) ]; }; } diff --git a/secrets/freshrss.age b/secrets/freshrss.age new file mode 100644 index 0000000..cf8afd6 --- /dev/null +++ b/secrets/freshrss.age @@ -0,0 +1,38 @@ +age-encryption.org/v1 +-> ssh-ed25519 sQ/0YA RbUXOZxIekScM+5y9PCXH97NhMXmgVafs3aQupgRums +Nji+iSO8Cm4xWT+SuTaLFa8Lxe70uUh7FP/ECp9pif4 +-> ssh-ed25519 i9xGKA BqWfDAdAECFm9KRb5fxO1ZCu4OgkdAqSUqzzUZ9zFBY +Yl1oI2v58CVq/1vmvDzKzQ5GAqDhEJb7Ckathe+5+SY +-> ssh-ed25519 ydxrGg KbBegFRk2NZYvpQqv9PrUWWNTJwSWLBZBKmwsRZDjAI +3iU4igyNlkVQe/TsVsAfZg+OYX9cKw3t8PgScY1i/zY +-> ssh-ed25519 hjL/yw Wx0+1pqho6nbUpfCYvOHWBFVbdRXvDp8vYPk61xRYGw +bdkHdRpDi35eg+T/c4egdw8fD9AyZm7HOMCbrTsU80g +-> ssh-ed25519 fUfJ3w UFALuD/aUiaewHDI60T8oLNavc55nkJDdbPcMCOf+X8 +BoK330reb6+emScfZhW6KqmHMljKnuHFATB2s0KJO78 +-> ssh-ed25519 GT2Stg 3pjJBCvwI59oqDmZLLUOb8g6vIH87g0NfLmDRp3pMhM +I5uLCWZnofOaT7nmJ8FHVBj/HP+nqZOpYA40sLpBw50 +-> ssh-ed25519 oAMyvg yC1Ulw+0HuzOfaNmLRvo2oWlvEUJCMcly1WQU866IFs +oyYFhXEcSWKkI+CCzoGFKSBdXMF3AyBnJR4GdW7BsRs +-> ssh-ed25519 VIHjXg hywaGDdYLZAZUv7QoqKToSMXo9ebWN9akLoq0d1gGFc +pP/MaQh2FyC5upKlCtUih5J43PchJ8eoeGEdneZc81s +-> ssh-ed25519 VEv3zg diyT2TZgBOGIJhrm/X2Zvyep/oHcz4p28rccbkaJFCw +kAHY1Nd1ykqzoP1pJf6geUBDvKoZr81OoF1DsACBP+4 +-> ssh-ed25519 6ZS9Zw mO1UuwnLBjWPe5RfKCzwRit1scnKAXbkWD5+nPPgIQg +ARTUkZw/5Q2DrYOAjkV/tZuXzJ0mekz5Tz2fay+Yhf8 +-> ssh-ed25519 GB2MZQ R2rcip66ul3wiCSCdiLy+DRNM/B37pWAh5l4d52Lln0 +F6/sIxNZKYWg3soPt+pFg37EXeIYiAvSrvWeqIDZfWY +-> ssh-ed25519 FelIjw c6yQL5YrjEcc5+4C9XNSW2YSU3xLGIsbLvt2e6ZY+U4 +s2a908iaQs3wRum68nmCSwSRpFklyzZtekrQKjc6NTQ +-> ssh-ed25519 TRpHkw R47Tk35z3HaJ0xS0lgQF+eKIRwT4k8/KMmAiZjLsY0I +2Sf1rztmzvd6yJN6VUkP7XJC9eutIlmoOE2DplXZ2HE +-> ssh-ed25519 rKpRzQ m0tPfMcbOErhjPWj6oqRw4u3ltFQY/c6wW2QemiFU3k +pJYMnYOMY05wrCMwPBVGA8sxvQkrhbqKwWL5BrTGFg0 +-> ssh-ed25519 8/Dzqw OdUdpuqrhkBxyDkhJSPA2rNDDIr+bExh8Nk8LA+saCM +HxUhJeNsYDuy4Nm2tcftErHmxV8/9IDDwALWRU1dIwM +-> ssh-ed25519 tJyugw wdOyUGj8wAyzLvioiGCo3dZeqsXodRSht1kOA09VgBY +q/biU4ftkI4ANWXNEty+V/faWL4OQvOuK78KkzZ2Y3Q +-> iCVdvB7-grease S`6dKXX< nF_^O +AyJ78z08WHRh1FLb/PTWH8h9o4QWNQQU/XuiNko3jRcjlwBYlfnrhy+NSM+AgJWe +Rv9pA2legCwkXYIQIhaXT0A0X6l3dtx1WeKUIVHin4ou1vnN +--- CfF4HfHdRoIhelaizHgOic3sndfvkWSt5M2f/px3a2g +‰‰)¤±åø"ôó=†‹ÜÈÉŸ_·ÿا̀Öù|2ùyk° ¢¡Üºíž†ÈVù„tÙäŽs \ No newline at end of file diff --git a/secrets/secrets.nix b/secrets/secrets.nix index 299a333..8a688a1 100644 --- a/secrets/secrets.nix +++ b/secrets/secrets.nix @@ -29,4 +29,5 @@ in "inx.moe.pem.age".publicKeys = allKeys; "inx.moe.key.age".publicKeys = allKeys; "vaultwarden.age".publicKeys = allKeys; + "freshrss.age".publicKeys = allKeys; }