add secret for openwebui

This commit is contained in:
RingOfStorms (Joshua Bell) 2025-08-21 23:52:01 -05:00
parent 37231b8b68
commit ce355885c6
5 changed files with 111 additions and 94 deletions

View file

@ -130,6 +130,7 @@ in
bindr = [ bindr = [
# overview # overview
"$mainMod, SUPER_L, overview:toggle" "$mainMod, SUPER_L, overview:toggle"
"$mainMod SHIFT, R, exec, systemctl --user restart hyprpanel.service"
]; ];
binde = [ binde = [

View file

@ -38,96 +38,96 @@ in
# }) # })
# (import secretsFile); # (import secretsFile);
{ {
nix2github = { # nix2github = {
file = ./secrets/nix2github.age; # file = ./secrets/nix2github.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2bitbucket = { # nix2bitbucket = {
file = ./secrets/nix2bitbucket.age; # file = ./secrets/nix2bitbucket.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2gitjosh = { # nix2gitjosh = {
file = ./secrets/nix2gitjosh.age; # file = ./secrets/nix2gitjosh.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2gitforgejo = { # nix2gitforgejo = {
file = ./secrets/nix2gitforgejo.age; # file = ./secrets/nix2gitforgejo.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2nix = { # nix2nix = {
file = ./secrets/nix2nix.age; # file = ./secrets/nix2nix.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2h001 = { # nix2h001 = {
file = ./secrets/nix2h001.age; # file = ./secrets/nix2h001.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2h002 = { # nix2h002 = {
file = ./secrets/nix2h002.age; # file = ./secrets/nix2h002.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2h003 = { # nix2h003 = {
file = ./secrets/nix2h003.age; # file = ./secrets/nix2h003.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2joe = { # nix2joe = {
file = ./secrets/nix2joe.age; # file = ./secrets/nix2joe.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2gpdPocket3 = { # nix2gpdPocket3 = {
file = ./secrets/nix2gpdPocket3.age; # file = ./secrets/nix2gpdPocket3.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2t = { # nix2t = {
file = ./secrets/nix2t.age; # file = ./secrets/nix2t.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2linode = { # nix2linode = {
file = ./secrets/nix2linode.age; # file = ./secrets/nix2linode.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2oracle = { # nix2oracle = {
file = ./secrets/nix2oracle.age; # file = ./secrets/nix2oracle.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2l002 = { # nix2l002 = {
file = ./secrets/nix2l002.age; # file = ./secrets/nix2l002.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2lio = { # nix2lio = {
file = ./secrets/nix2lio.age; # file = ./secrets/nix2lio.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
nix2oren = { # nix2oren = {
file = ./secrets/nix2oren.age; # file = ./secrets/nix2oren.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
github_read_token = { # github_read_token = {
file = ./secrets/github_read_token.age; # file = ./secrets/github_read_token.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
headscale_auth = { # headscale_auth = {
file = ./secrets/headscale_auth.age; # file = ./secrets/headscale_auth.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
obsidian_sync_env = { # obsidian_sync_env = {
file = ./secrets/obsidian_sync_env.age; # file = ./secrets/obsidian_sync_env.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
us_chi_wg = { # us_chi_wg = {
file = ./secrets/us_chi_wg.age; # file = ./secrets/us_chi_wg.age;
owner = users_cfg.primary; # owner = users_cfg.primary;
}; # };
# zitadel_master_key = { # zitadel_master_key = {
# file = ./secrets/zitadel_master_key.age; # file = ./secrets/zitadel_master_key.age;
# owner = users_cfg.primary; # owner = users_cfg.primary;
# mode = "444"; # World readable! # mode = "444"; # World readable!
# }; # };
# vaultwarden_env = { vaultwarden_env = {
# file = ./secrets/vaultwarden_env.age; file = ./secrets/vaultwarden_env.age;
# owner = users_cfg.primary; owner = users_cfg.primary;
# mode = "444"; # World readable! mode = "444"; # World readable!
# }; };
}; };
}; };
}; };

View file

@ -0,0 +1,15 @@
-----BEGIN AGE ENCRYPTED FILE-----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-----END AGE ENCRYPTED FILE-----

View file

@ -123,12 +123,13 @@ in
"us_chi_wg.age" = { "us_chi_wg.age" = {
publicKeys = trustedKeys; publicKeys = trustedKeys;
}; };
# "zitadel_master_key.age" = { "zitadel_master_key.age" = {
# # h001 only publicKeys = authorityKey ++ h001;
# publicKeys = authorityKey ++ h001; };
# }; "openwebui_env.age" = {
# "vaultwarden_env.age" = { publicKeys = authorityKey ++ h001;
# # h001 only };
# publicKeys = authorityKey ++ o001; "vaultwarden_env.age" = {
# }; publicKeys = authorityKey ++ o001;
};
} }

View file

@ -116,7 +116,7 @@
forceSSL = true; forceSSL = true;
locations."/" = { locations."/" = {
proxyWebsockets = true; proxyWebsockets = true;
proxyPass = "http://100.64.0.1:3080"; proxyPass = "http://100.64.0.13";
}; };
}; };
"gist.joshuabell.xyz" = { "gist.joshuabell.xyz" = {