diff --git a/config/hosts/imxyy-nix-server/build.nix b/config/hosts/imxyy-nix-server/build.nix index b3c24dc..d6baa8d 100644 --- a/config/hosts/imxyy-nix-server/build.nix +++ b/config/hosts/imxyy-nix-server/build.nix @@ -7,6 +7,7 @@ { sops.secrets.et-imxyy-nix-server-nixremote = { sopsFile = secrets.et-imxyy-nix-server-nixremote; + restartUnits = [ "easytier-nixremote.service" ]; format = "binary"; }; environment.systemPackages = [ pkgs.easytier ]; diff --git a/config/hosts/imxyy-nix-server/efl.nix b/config/hosts/imxyy-nix-server/efl.nix index cb6fe37..d1b5ecb 100644 --- a/config/hosts/imxyy-nix-server/efl.nix +++ b/config/hosts/imxyy-nix-server/efl.nix @@ -2,6 +2,7 @@ { sops.secrets.efl-tuwunel-env = { sopsFile = secrets.efl-tuwunel; + restartUnits = [ "podman-tuwunel.service" ]; format = "dotenv"; }; virtualisation.oci-containers.containers = { diff --git a/config/hosts/imxyy-nix-server/matrix.nix b/config/hosts/imxyy-nix-server/matrix.nix index 4f9486c..37e2789 100644 --- a/config/hosts/imxyy-nix-server/matrix.nix +++ b/config/hosts/imxyy-nix-server/matrix.nix @@ -9,12 +9,14 @@ ]; sops.secrets.tuwunel-reg-token = { sopsFile = secrets.tuwunel-reg-token; + restartUnits = [ "tuwunel.service" ]; format = "binary"; owner = config.services.matrix-tuwunel.user; group = config.services.matrix-tuwunel.group; }; sops.secrets.tuwunel-turn-secret = { sopsFile = secrets.tuwunel-turn-secret; + restartUnits = [ "tuwunel.service" ]; format = "binary"; owner = config.services.matrix-tuwunel.user; group = config.services.matrix-tuwunel.group; @@ -68,6 +70,7 @@ sops.secrets.mautrix-telegram = { sopsFile = secrets.mautrix-telegram; + restartUnits = [ "mautrix-telegram.service" ]; format = "dotenv"; owner = "mautrix-telegram"; group = "mautrix-telegram"; diff --git a/config/hosts/imxyy-nix-server/minio.nix b/config/hosts/imxyy-nix-server/minio.nix index 1c93e9f..198455d 100644 --- a/config/hosts/imxyy-nix-server/minio.nix +++ b/config/hosts/imxyy-nix-server/minio.nix @@ -2,6 +2,7 @@ { sops.secrets.minio-env = { sopsFile = secrets.minio; + restartUnits = [ "minio.service" ]; format = "dotenv"; }; services.minio = { diff --git a/config/hosts/imxyy-nix-server/net.nix b/config/hosts/imxyy-nix-server/net.nix index fb7d037..5ce39da 100644 --- a/config/hosts/imxyy-nix-server/net.nix +++ b/config/hosts/imxyy-nix-server/net.nix @@ -142,6 +142,7 @@ sops.secrets.dae-imxyy-nix-server = { sopsFile = secrets.dae-imxyy-nix-server; + restartUnits = [ "dae.service" ]; format = "binary"; }; services.dae = { @@ -154,6 +155,7 @@ }; sops.secrets.mihomo = { sopsFile = secrets.mihomo; + restartUnits = [ "mihomo.service" ]; format = "yaml"; key = ""; }; @@ -166,6 +168,7 @@ sops.secrets.frp-env = { sopsFile = secrets.frp; + restartUnits = [ "frp.service" ]; format = "dotenv"; }; systemd.services.frp.serviceConfig.EnvironmentFile = [ @@ -429,6 +432,7 @@ sops.secrets.et-imxyy-nix-server = { sopsFile = secrets.et-imxyy-nix-server; + restartUnits = [ "easytier.service" ]; format = "binary"; }; environment.systemPackages = [ pkgs.easytier ]; diff --git a/config/hosts/imxyy-nix-server/note.nix b/config/hosts/imxyy-nix-server/note.nix index b30135e..9ca3845 100644 --- a/config/hosts/imxyy-nix-server/note.nix +++ b/config/hosts/imxyy-nix-server/note.nix @@ -4,11 +4,10 @@ ... }: { - sops.secrets = { - siyuan-env = { - sopsFile = secrets.siyuan; - format = "dotenv"; - }; + sops.secrets.siyuan-env = { + sopsFile = secrets.siyuan; + restartUnits = [ "siyuan.service" ]; + format = "dotenv"; }; virtualisation.oci-containers.containers = { siyuan = { diff --git a/config/hosts/imxyy-nix-server/rss.nix b/config/hosts/imxyy-nix-server/rss.nix index f37c6dd..bd10334 100644 --- a/config/hosts/imxyy-nix-server/rss.nix +++ b/config/hosts/imxyy-nix-server/rss.nix @@ -5,6 +5,7 @@ in { sops.secrets.rsshub-env = { sopsFile = secrets.rsshub; + restartUnits = [ "podman-rsshub.service" ]; format = "dotenv"; }; users.users.rsshub = { diff --git a/config/hosts/imxyy-nix-server/vault.nix b/config/hosts/imxyy-nix-server/vault.nix index 4be7a58..5c5fb9b 100644 --- a/config/hosts/imxyy-nix-server/vault.nix +++ b/config/hosts/imxyy-nix-server/vault.nix @@ -2,6 +2,7 @@ { sops.secrets.vaultwarden-env = { sopsFile = secrets.vaultwarden; + restartUnits = [ "vaultwarden.service" ]; format = "dotenv"; }; services.postgresql.ensureUsers = [ diff --git a/config/hosts/imxyy-nix-x16/net.nix b/config/hosts/imxyy-nix-x16/net.nix index 5bc6d17..3608942 100644 --- a/config/hosts/imxyy-nix-x16/net.nix +++ b/config/hosts/imxyy-nix-x16/net.nix @@ -54,6 +54,7 @@ sops.secrets.dae-imxyy-nix-x16 = { sopsFile = secrets.dae-imxyy-nix-x16; + restartUnits = [ "dae.service" ]; format = "binary"; }; services.dae = { @@ -63,6 +64,7 @@ systemd.services.dae.after = [ "sops-nix.service" ]; sops.secrets.mihomo = { sopsFile = secrets.mihomo; + restartUnits = [ "mihomo.service" ]; format = "yaml"; key = ""; }; @@ -75,6 +77,7 @@ sops.secrets.et-imxyy-nix-x16 = { sopsFile = secrets.et-imxyy-nix-x16; + restartUnits = [ "easytier.service" ]; format = "binary"; }; environment.systemPackages = with pkgs; [ diff --git a/config/hosts/imxyy-nix/net.nix b/config/hosts/imxyy-nix/net.nix index 79f461f..635de98 100644 --- a/config/hosts/imxyy-nix/net.nix +++ b/config/hosts/imxyy-nix/net.nix @@ -90,6 +90,7 @@ sops.secrets.dae-imxyy-nix = { sopsFile = secrets.dae-imxyy-nix; + restartUnits = [ "dae.service" ]; format = "binary"; }; services.dae = { @@ -99,6 +100,7 @@ systemd.services.dae.after = [ "sops-nix.service" ]; sops.secrets.mihomo = { sopsFile = secrets.mihomo; + restartUnits = [ "mihomo.service" ]; format = "yaml"; key = ""; }; @@ -111,6 +113,7 @@ sops.secrets.et-imxyy-nix = { sopsFile = secrets.et-imxyy-nix; + restartUnits = [ "easytier.service" ]; format = "binary"; }; environment.systemPackages = [ pkgs.easytier ];