aboutsummaryrefslogtreecommitdiff
path: root/cluster/prod/app/backup/secrets.toml
diff options
context:
space:
mode:
authorAlex Auvolat <alex@adnab.me>2022-12-25 22:31:18 +0100
committerAlex Auvolat <alex@adnab.me>2022-12-25 22:31:18 +0100
commit87bb031ed00b7993a29d74aee2e89875c5444caf (patch)
tree80ebbf8c3870b3dfa756905fa55af938b503e283 /cluster/prod/app/backup/secrets.toml
parent6d6e48c8fa7f4f38a5b812389d269c025a977790 (diff)
downloadnixcfg-87bb031ed00b7993a29d74aee2e89875c5444caf.tar.gz
nixcfg-87bb031ed00b7993a29d74aee2e89875c5444caf.zip
Migrate prod cluster secrets to new format
Diffstat (limited to 'cluster/prod/app/backup/secrets.toml')
-rw-r--r--cluster/prod/app/backup/secrets.toml90
1 files changed, 90 insertions, 0 deletions
diff --git a/cluster/prod/app/backup/secrets.toml b/cluster/prod/app/backup/secrets.toml
new file mode 100644
index 0000000..5d2b851
--- /dev/null
+++ b/cluster/prod/app/backup/secrets.toml
@@ -0,0 +1,90 @@
+# Cryptpad backup
+
+[secrets."backup/cryptpad/backup_restic_password"]
+type = 'user'
+description = 'Restic password to encrypt backups'
+
+[secrets."backup/cryptpad/backup_aws_secret_access_key"]
+type = 'user'
+description = 'Backup AWS secret access key'
+
+[secrets."backup/cryptpad/backup_restic_repository"]
+type = 'user'
+description = 'Restic repository'
+example = 's3:https://s3.garage.tld'
+
+[secrets."backup/cryptpad/backup_aws_access_key_id"]
+type = 'user'
+description = 'Backup AWS access key ID'
+
+
+# Consul backup
+
+[secrets."backup/consul/backup_restic_password"]
+type = 'user'
+description = 'Restic password to encrypt backups'
+
+[secrets."backup/consul/backup_aws_secret_access_key"]
+type = 'user'
+description = 'Backup AWS secret access key'
+
+[secrets."backup/consul/backup_restic_repository"]
+type = 'user'
+description = 'Restic repository'
+example = 's3:https://s3.garage.tld'
+
+[secrets."backup/consul/backup_aws_access_key_id"]
+type = 'user'
+description = 'Backup AWS access key ID'
+
+
+# Postgresql backup
+
+[secrets."backup/psql/aws_secret_access_key"]
+type = 'user'
+description = 'Minio secret key'
+
+[secrets."backup/psql/aws_access_key_id"]
+type = 'user'
+description = 'Minio access key'
+
+[secrets."backup/psql/crypt_public_key"]
+type = 'user'
+description = 'A public key to encypt backups with age'
+
+[secrets."backup/psql/crypt_private_key"]
+type = 'user'
+description = 'a private key to decript backups from age'
+
+
+# SSH target config (do we still use this?)
+
+[secrets."backup/target_ssh_host"]
+type = 'user'
+description = 'Hostname of the backup target host'
+
+[secrets."backup/target_ssh_port"]
+type = 'user'
+description = 'SSH port number to connect to the target host'
+
+[secrets."backup/target_ssh_dir"]
+type = 'user'
+description = 'Directory where to store backups on target host'
+
+[secrets."backup/target_ssh_user"]
+type = 'user'
+description = 'SSH username to log in as on the target host'
+
+[secrets."backup/target_ssh_fingerprint"]
+type = 'user'
+description = 'SSH fingerprint of the target machine (format: copy here the corresponding line from your known_hosts file)'
+
+[secrets."backup/id_ed25519"]
+type = 'user'
+multiline = true
+description = 'Private ed25519 key of the container doing the backup'
+
+[secrets."backup/id_ed25519.pub"]
+type = 'user'
+description = 'Public ed25519 key of the container doing the backup (this key must be in authorized_keys on the backup target host)'
+