refactor: centralize SOPS configuration in separate file
All checks were successful
Flake checker / Build Nix targets (push) Successful in 9m29s
All checks were successful
Flake checker / Build Nix targets (push) Successful in 9m29s
This commit is contained in:
@@ -20,7 +20,6 @@
|
||||
inputs.sops-nix.nixosModules.sops
|
||||
inputs.disko.nixosModules.disko
|
||||
{nixpkgs.overlays = overlays;}
|
||||
./${device.name}/configuration.nix
|
||||
home-manager.nixosModules.home-manager
|
||||
inputs.arion.nixosModules.arion
|
||||
# inputs.command-runner.nixosModules.command-runner
|
||||
@@ -43,6 +42,8 @@
|
||||
];
|
||||
};
|
||||
}
|
||||
../sops.nix
|
||||
./${device.name}/configuration.nix
|
||||
];
|
||||
}
|
||||
)
|
||||
|
||||
@@ -24,9 +24,6 @@
|
||||
|
||||
security.sudo.wheelNeedsPassword = false;
|
||||
sops = {
|
||||
defaultSopsFile = ../../secrets/secrets.yaml;
|
||||
defaultSopsFormat = "yaml";
|
||||
age.keyFile = "/home/fs0c131y/.config/sops/age/keys.txt";
|
||||
secrets."builder/mirai/cache/private" = {};
|
||||
secrets.users = {
|
||||
sopsFile = ../../secrets/users.yaml;
|
||||
|
||||
@@ -1,7 +1,8 @@
|
||||
{...}: {
|
||||
{stablePkgs, ...}: {
|
||||
services = {
|
||||
flaresolverr = {
|
||||
enable = true;
|
||||
package = stablePkgs.flaresolverr;
|
||||
};
|
||||
};
|
||||
}
|
||||
|
||||
@@ -43,7 +43,7 @@
|
||||
};
|
||||
};
|
||||
open-webui = {
|
||||
enable = true;
|
||||
enable = false;
|
||||
port = 7070;
|
||||
environment = {
|
||||
SCARF_NO_ANALYTICS = "True";
|
||||
|
||||
@@ -13,8 +13,8 @@
|
||||
http_port = 5090;
|
||||
ldap_port = 389;
|
||||
ldap_host = "::";
|
||||
ldap_user_pass_file = config.sops.secrets."lldap/admin".path;
|
||||
environmentFile = ''
|
||||
LLDAP_LDAP_USER_PASS_FILE = ${config.sops.secrets."lldap/admin".path};
|
||||
LLDAP_JWT_SECRET_FILE = ${config.sops.secrets."lldap/jwt".path};
|
||||
LLDAP_KEY_SEED_FILE = ${config.sops.secrets."lldap/seed".path};
|
||||
'';
|
||||
|
||||
@@ -11,11 +11,11 @@
|
||||
./containers
|
||||
];
|
||||
|
||||
sops = {
|
||||
defaultSopsFile = ../../secrets/secrets.yaml;
|
||||
defaultSopsFormat = "yaml";
|
||||
age.keyFile = "/home/${device.user}/.config/sops/age/keys.txt";
|
||||
};
|
||||
# sops = {
|
||||
# defaultSopsFile = ../../secrets/secrets.yaml;
|
||||
# defaultSopsFormat = "yaml";
|
||||
# age.keyFile = "/home/${device.user}/.config/sops/age/keys.txt";
|
||||
# };
|
||||
|
||||
security.tpm2 = {
|
||||
enable = true;
|
||||
|
||||
@@ -13,11 +13,6 @@
|
||||
|
||||
nixpkgs.config.allowUnfree = true;
|
||||
security.sudo.wheelNeedsPassword = false;
|
||||
sops = {
|
||||
defaultSopsFile = ../../secrets/secrets.yaml;
|
||||
defaultSopsFormat = "yaml";
|
||||
age.keyFile = "/home/servius/.config/sops/age/keys.txt";
|
||||
};
|
||||
nix = {
|
||||
settings = {
|
||||
auto-optimise-store = true;
|
||||
|
||||
@@ -49,6 +49,7 @@
|
||||
./services
|
||||
./disk-config.nix
|
||||
./${name}.nix
|
||||
../../sops.nix
|
||||
];
|
||||
}
|
||||
)
|
||||
|
||||
@@ -31,11 +31,11 @@
|
||||
}
|
||||
}
|
||||
'';
|
||||
# package = pkgs.caddy.withPlugins {
|
||||
# plugins = ["github.com/caddy-dns/hetzner@v1.0.0"];
|
||||
# hash = "sha256-9ea0CfOHG7JhejB73HjfXQpnonn+ZRBqLNz1fFRkcDQ=";
|
||||
# };
|
||||
package = pkgs.caddyWithHetzner;
|
||||
package = pkgs.caddy.withPlugins {
|
||||
plugins = ["github.com/caddy-dns/hetzner@v1.0.0"];
|
||||
hash = "sha256-9ea0CfOHG7JhejB73HjfXQpnonn+ZRBqLNz1fFRkcDQ=";
|
||||
};
|
||||
# package = pkgs.caddyWithHetzner;
|
||||
};
|
||||
};
|
||||
systemd.services.caddy = {
|
||||
|
||||
Reference in New Issue
Block a user