add secret for openwebui
This commit is contained in:
parent
37231b8b68
commit
ce355885c6
5 changed files with 111 additions and 94 deletions
|
|
@ -130,6 +130,7 @@ in
|
|||
bindr = [
|
||||
# overview
|
||||
"$mainMod, SUPER_L, overview:toggle"
|
||||
"$mainMod SHIFT, R, exec, systemctl --user restart hyprpanel.service"
|
||||
];
|
||||
|
||||
binde = [
|
||||
|
|
|
|||
|
|
@ -38,96 +38,96 @@ in
|
|||
# })
|
||||
# (import secretsFile);
|
||||
{
|
||||
nix2github = {
|
||||
file = ./secrets/nix2github.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2bitbucket = {
|
||||
file = ./secrets/nix2bitbucket.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2gitjosh = {
|
||||
file = ./secrets/nix2gitjosh.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2gitforgejo = {
|
||||
file = ./secrets/nix2gitforgejo.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2nix = {
|
||||
file = ./secrets/nix2nix.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2h001 = {
|
||||
file = ./secrets/nix2h001.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2h002 = {
|
||||
file = ./secrets/nix2h002.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2h003 = {
|
||||
file = ./secrets/nix2h003.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2joe = {
|
||||
file = ./secrets/nix2joe.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2gpdPocket3 = {
|
||||
file = ./secrets/nix2gpdPocket3.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2t = {
|
||||
file = ./secrets/nix2t.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2linode = {
|
||||
file = ./secrets/nix2linode.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2oracle = {
|
||||
file = ./secrets/nix2oracle.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2l002 = {
|
||||
file = ./secrets/nix2l002.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2lio = {
|
||||
file = ./secrets/nix2lio.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
nix2oren = {
|
||||
file = ./secrets/nix2oren.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
github_read_token = {
|
||||
file = ./secrets/github_read_token.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
headscale_auth = {
|
||||
file = ./secrets/headscale_auth.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
obsidian_sync_env = {
|
||||
file = ./secrets/obsidian_sync_env.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
us_chi_wg = {
|
||||
file = ./secrets/us_chi_wg.age;
|
||||
owner = users_cfg.primary;
|
||||
};
|
||||
# nix2github = {
|
||||
# file = ./secrets/nix2github.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2bitbucket = {
|
||||
# file = ./secrets/nix2bitbucket.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2gitjosh = {
|
||||
# file = ./secrets/nix2gitjosh.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2gitforgejo = {
|
||||
# file = ./secrets/nix2gitforgejo.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2nix = {
|
||||
# file = ./secrets/nix2nix.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2h001 = {
|
||||
# file = ./secrets/nix2h001.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2h002 = {
|
||||
# file = ./secrets/nix2h002.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2h003 = {
|
||||
# file = ./secrets/nix2h003.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2joe = {
|
||||
# file = ./secrets/nix2joe.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2gpdPocket3 = {
|
||||
# file = ./secrets/nix2gpdPocket3.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2t = {
|
||||
# file = ./secrets/nix2t.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2linode = {
|
||||
# file = ./secrets/nix2linode.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2oracle = {
|
||||
# file = ./secrets/nix2oracle.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2l002 = {
|
||||
# file = ./secrets/nix2l002.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2lio = {
|
||||
# file = ./secrets/nix2lio.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# nix2oren = {
|
||||
# file = ./secrets/nix2oren.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# github_read_token = {
|
||||
# file = ./secrets/github_read_token.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# headscale_auth = {
|
||||
# file = ./secrets/headscale_auth.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# obsidian_sync_env = {
|
||||
# file = ./secrets/obsidian_sync_env.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# us_chi_wg = {
|
||||
# file = ./secrets/us_chi_wg.age;
|
||||
# owner = users_cfg.primary;
|
||||
# };
|
||||
# zitadel_master_key = {
|
||||
# file = ./secrets/zitadel_master_key.age;
|
||||
# owner = users_cfg.primary;
|
||||
# mode = "444"; # World readable!
|
||||
# };
|
||||
# vaultwarden_env = {
|
||||
# file = ./secrets/vaultwarden_env.age;
|
||||
# owner = users_cfg.primary;
|
||||
# mode = "444"; # World readable!
|
||||
# };
|
||||
vaultwarden_env = {
|
||||
file = ./secrets/vaultwarden_env.age;
|
||||
owner = users_cfg.primary;
|
||||
mode = "444"; # World readable!
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
|
|
|
|||
15
common/secrets/secrets/openwebui_env.age
Normal file
15
common/secrets/secrets/openwebui_env.age
Normal file
|
|
@ -0,0 +1,15 @@
|
|||
-----BEGIN AGE ENCRYPTED FILE-----
|
||||
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IHNzaC1lZDI1NTE5IDd6MzN5USBORVRn
|
||||
WmpIQStaRnV3QU9wMStQWHJMTklhb21nM3YyRE1xdWNxcWZEelRnCnZvckQ1K0hE
|
||||
UkNyZGIvTFhpU1JtcXgzTy9QK2hhV2JYcm9nczJSbXgyS1kKLT4gc3NoLWVkMjU1
|
||||
MTkgcGVGQlFnIFU4QndCcjhFbG05M1prbGkwcFlYWU1WT1NkU3ZCZ09SQm9sMERC
|
||||
OGZnMGMKbnBqNzd2dnBQT3R2YXBraEZKVFBJeHJXU1RhOWwwNHdGbC95TzhDM1g4
|
||||
MAotPiBzc2gtZWQyNTUxOSA5di8ySEEgOGdMRXZ4cnd0VFdxNlBHYlI0S2pCTkZo
|
||||
dGtnUm4vaGFQanpKMFRjVjdHSQo1aStST0hFdkR4T0syekFZZXM1b1JBbXV4bFB0
|
||||
RVIyRG0raEZDVmt3L3owCi0+IGxLPUBZOS1ncmVhc2UgOyAqIH06U1EgQCRXdn1K
|
||||
CnpSdjUwaDI1eWE3ckNBCi0tLSB2ZTJVTHphZVhBQndhUU1GZTYvYlFMT3h6cVRE
|
||||
SzBoK2sySStmWm9SSnU4CjTkglKu9/CMRrbdagHF1uNxTOBSthOhyAgfcHLXHwXe
|
||||
dtZiEnev479tMoIo2OXi5ODZpz1LTCkBMO0yRY6JlmNVlwpByNJkyij5bwXbUiPy
|
||||
Mk9airOI/s5fIEIStb6ei8TMgy68trToK8JUmBtK8JzL9fkJDET9YyQh8N3BTUMR
|
||||
8M2cUXX1qFjP7dyRDOQiq3LQEKpywUIuGNASDw==
|
||||
-----END AGE ENCRYPTED FILE-----
|
||||
|
|
@ -123,12 +123,13 @@ in
|
|||
"us_chi_wg.age" = {
|
||||
publicKeys = trustedKeys;
|
||||
};
|
||||
# "zitadel_master_key.age" = {
|
||||
# # h001 only
|
||||
# publicKeys = authorityKey ++ h001;
|
||||
# };
|
||||
# "vaultwarden_env.age" = {
|
||||
# # h001 only
|
||||
# publicKeys = authorityKey ++ o001;
|
||||
# };
|
||||
"zitadel_master_key.age" = {
|
||||
publicKeys = authorityKey ++ h001;
|
||||
};
|
||||
"openwebui_env.age" = {
|
||||
publicKeys = authorityKey ++ h001;
|
||||
};
|
||||
"vaultwarden_env.age" = {
|
||||
publicKeys = authorityKey ++ o001;
|
||||
};
|
||||
}
|
||||
|
|
|
|||
|
|
@ -116,7 +116,7 @@
|
|||
forceSSL = true;
|
||||
locations."/" = {
|
||||
proxyWebsockets = true;
|
||||
proxyPass = "http://100.64.0.1:3080";
|
||||
proxyPass = "http://100.64.0.13";
|
||||
};
|
||||
};
|
||||
"gist.joshuabell.xyz" = {
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue