Compare commits
3 Commits
814511c939
...
90b85963cd
| Author | SHA1 | Date | |
|---|---|---|---|
|
90b85963cd
|
|||
|
010789965a
|
|||
|
5988a98a09
|
@@ -7,6 +7,7 @@
|
|||||||
{
|
{
|
||||||
sops.secrets.et-imxyy-nix-server-nixremote = {
|
sops.secrets.et-imxyy-nix-server-nixremote = {
|
||||||
sopsFile = secrets.et-imxyy-nix-server-nixremote;
|
sopsFile = secrets.et-imxyy-nix-server-nixremote;
|
||||||
|
restartUnits = [ "easytier-nixremote.service" ];
|
||||||
format = "binary";
|
format = "binary";
|
||||||
};
|
};
|
||||||
environment.systemPackages = [ pkgs.easytier ];
|
environment.systemPackages = [ pkgs.easytier ];
|
||||||
|
|||||||
@@ -2,6 +2,7 @@
|
|||||||
{
|
{
|
||||||
sops.secrets.efl-tuwunel-env = {
|
sops.secrets.efl-tuwunel-env = {
|
||||||
sopsFile = secrets.efl-tuwunel;
|
sopsFile = secrets.efl-tuwunel;
|
||||||
|
restartUnits = [ "podman-tuwunel.service" ];
|
||||||
format = "dotenv";
|
format = "dotenv";
|
||||||
};
|
};
|
||||||
virtualisation.oci-containers.containers = {
|
virtualisation.oci-containers.containers = {
|
||||||
|
|||||||
@@ -9,12 +9,14 @@
|
|||||||
];
|
];
|
||||||
sops.secrets.tuwunel-reg-token = {
|
sops.secrets.tuwunel-reg-token = {
|
||||||
sopsFile = secrets.tuwunel-reg-token;
|
sopsFile = secrets.tuwunel-reg-token;
|
||||||
|
restartUnits = [ "tuwunel.service" ];
|
||||||
format = "binary";
|
format = "binary";
|
||||||
owner = config.services.matrix-tuwunel.user;
|
owner = config.services.matrix-tuwunel.user;
|
||||||
group = config.services.matrix-tuwunel.group;
|
group = config.services.matrix-tuwunel.group;
|
||||||
};
|
};
|
||||||
sops.secrets.tuwunel-turn-secret = {
|
sops.secrets.tuwunel-turn-secret = {
|
||||||
sopsFile = secrets.tuwunel-turn-secret;
|
sopsFile = secrets.tuwunel-turn-secret;
|
||||||
|
restartUnits = [ "tuwunel.service" ];
|
||||||
format = "binary";
|
format = "binary";
|
||||||
owner = config.services.matrix-tuwunel.user;
|
owner = config.services.matrix-tuwunel.user;
|
||||||
group = config.services.matrix-tuwunel.group;
|
group = config.services.matrix-tuwunel.group;
|
||||||
@@ -68,6 +70,7 @@
|
|||||||
|
|
||||||
sops.secrets.mautrix-telegram = {
|
sops.secrets.mautrix-telegram = {
|
||||||
sopsFile = secrets.mautrix-telegram;
|
sopsFile = secrets.mautrix-telegram;
|
||||||
|
restartUnits = [ "mautrix-telegram.service" ];
|
||||||
format = "dotenv";
|
format = "dotenv";
|
||||||
owner = "mautrix-telegram";
|
owner = "mautrix-telegram";
|
||||||
group = "mautrix-telegram";
|
group = "mautrix-telegram";
|
||||||
|
|||||||
@@ -2,6 +2,7 @@
|
|||||||
{
|
{
|
||||||
sops.secrets.minio-env = {
|
sops.secrets.minio-env = {
|
||||||
sopsFile = secrets.minio;
|
sopsFile = secrets.minio;
|
||||||
|
restartUnits = [ "minio.service" ];
|
||||||
format = "dotenv";
|
format = "dotenv";
|
||||||
};
|
};
|
||||||
services.minio = {
|
services.minio = {
|
||||||
|
|||||||
@@ -142,6 +142,7 @@
|
|||||||
|
|
||||||
sops.secrets.dae-imxyy-nix-server = {
|
sops.secrets.dae-imxyy-nix-server = {
|
||||||
sopsFile = secrets.dae-imxyy-nix-server;
|
sopsFile = secrets.dae-imxyy-nix-server;
|
||||||
|
restartUnits = [ "dae.service" ];
|
||||||
format = "binary";
|
format = "binary";
|
||||||
};
|
};
|
||||||
services.dae = {
|
services.dae = {
|
||||||
@@ -154,6 +155,7 @@
|
|||||||
};
|
};
|
||||||
sops.secrets.mihomo = {
|
sops.secrets.mihomo = {
|
||||||
sopsFile = secrets.mihomo;
|
sopsFile = secrets.mihomo;
|
||||||
|
restartUnits = [ "mihomo.service" ];
|
||||||
format = "yaml";
|
format = "yaml";
|
||||||
key = "";
|
key = "";
|
||||||
};
|
};
|
||||||
@@ -166,6 +168,7 @@
|
|||||||
|
|
||||||
sops.secrets.frp-env = {
|
sops.secrets.frp-env = {
|
||||||
sopsFile = secrets.frp;
|
sopsFile = secrets.frp;
|
||||||
|
restartUnits = [ "frp.service" ];
|
||||||
format = "dotenv";
|
format = "dotenv";
|
||||||
};
|
};
|
||||||
systemd.services.frp.serviceConfig.EnvironmentFile = [
|
systemd.services.frp.serviceConfig.EnvironmentFile = [
|
||||||
@@ -429,6 +432,7 @@
|
|||||||
|
|
||||||
sops.secrets.et-imxyy-nix-server = {
|
sops.secrets.et-imxyy-nix-server = {
|
||||||
sopsFile = secrets.et-imxyy-nix-server;
|
sopsFile = secrets.et-imxyy-nix-server;
|
||||||
|
restartUnits = [ "easytier.service" ];
|
||||||
format = "binary";
|
format = "binary";
|
||||||
};
|
};
|
||||||
environment.systemPackages = [ pkgs.easytier ];
|
environment.systemPackages = [ pkgs.easytier ];
|
||||||
|
|||||||
@@ -4,11 +4,10 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
sops.secrets = {
|
sops.secrets.siyuan-env = {
|
||||||
siyuan-env = {
|
sopsFile = secrets.siyuan;
|
||||||
sopsFile = secrets.siyuan;
|
restartUnits = [ "siyuan.service" ];
|
||||||
format = "dotenv";
|
format = "dotenv";
|
||||||
};
|
|
||||||
};
|
};
|
||||||
virtualisation.oci-containers.containers = {
|
virtualisation.oci-containers.containers = {
|
||||||
siyuan = {
|
siyuan = {
|
||||||
|
|||||||
@@ -5,6 +5,7 @@ in
|
|||||||
{
|
{
|
||||||
sops.secrets.rsshub-env = {
|
sops.secrets.rsshub-env = {
|
||||||
sopsFile = secrets.rsshub;
|
sopsFile = secrets.rsshub;
|
||||||
|
restartUnits = [ "podman-rsshub.service" ];
|
||||||
format = "dotenv";
|
format = "dotenv";
|
||||||
};
|
};
|
||||||
users.users.rsshub = {
|
users.users.rsshub = {
|
||||||
|
|||||||
@@ -2,6 +2,7 @@
|
|||||||
{
|
{
|
||||||
sops.secrets.vaultwarden-env = {
|
sops.secrets.vaultwarden-env = {
|
||||||
sopsFile = secrets.vaultwarden;
|
sopsFile = secrets.vaultwarden;
|
||||||
|
restartUnits = [ "vaultwarden.service" ];
|
||||||
format = "dotenv";
|
format = "dotenv";
|
||||||
};
|
};
|
||||||
services.postgresql.ensureUsers = [
|
services.postgresql.ensureUsers = [
|
||||||
|
|||||||
@@ -54,6 +54,7 @@
|
|||||||
|
|
||||||
sops.secrets.dae-imxyy-nix-x16 = {
|
sops.secrets.dae-imxyy-nix-x16 = {
|
||||||
sopsFile = secrets.dae-imxyy-nix-x16;
|
sopsFile = secrets.dae-imxyy-nix-x16;
|
||||||
|
restartUnits = [ "dae.service" ];
|
||||||
format = "binary";
|
format = "binary";
|
||||||
};
|
};
|
||||||
services.dae = {
|
services.dae = {
|
||||||
@@ -63,6 +64,7 @@
|
|||||||
systemd.services.dae.after = [ "sops-nix.service" ];
|
systemd.services.dae.after = [ "sops-nix.service" ];
|
||||||
sops.secrets.mihomo = {
|
sops.secrets.mihomo = {
|
||||||
sopsFile = secrets.mihomo;
|
sopsFile = secrets.mihomo;
|
||||||
|
restartUnits = [ "mihomo.service" ];
|
||||||
format = "yaml";
|
format = "yaml";
|
||||||
key = "";
|
key = "";
|
||||||
};
|
};
|
||||||
@@ -75,6 +77,7 @@
|
|||||||
|
|
||||||
sops.secrets.et-imxyy-nix-x16 = {
|
sops.secrets.et-imxyy-nix-x16 = {
|
||||||
sopsFile = secrets.et-imxyy-nix-x16;
|
sopsFile = secrets.et-imxyy-nix-x16;
|
||||||
|
restartUnits = [ "easytier.service" ];
|
||||||
format = "binary";
|
format = "binary";
|
||||||
};
|
};
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
|
|||||||
@@ -90,6 +90,7 @@
|
|||||||
|
|
||||||
sops.secrets.dae-imxyy-nix = {
|
sops.secrets.dae-imxyy-nix = {
|
||||||
sopsFile = secrets.dae-imxyy-nix;
|
sopsFile = secrets.dae-imxyy-nix;
|
||||||
|
restartUnits = [ "dae.service" ];
|
||||||
format = "binary";
|
format = "binary";
|
||||||
};
|
};
|
||||||
services.dae = {
|
services.dae = {
|
||||||
@@ -99,6 +100,7 @@
|
|||||||
systemd.services.dae.after = [ "sops-nix.service" ];
|
systemd.services.dae.after = [ "sops-nix.service" ];
|
||||||
sops.secrets.mihomo = {
|
sops.secrets.mihomo = {
|
||||||
sopsFile = secrets.mihomo;
|
sopsFile = secrets.mihomo;
|
||||||
|
restartUnits = [ "mihomo.service" ];
|
||||||
format = "yaml";
|
format = "yaml";
|
||||||
key = "";
|
key = "";
|
||||||
};
|
};
|
||||||
@@ -111,6 +113,7 @@
|
|||||||
|
|
||||||
sops.secrets.et-imxyy-nix = {
|
sops.secrets.et-imxyy-nix = {
|
||||||
sopsFile = secrets.et-imxyy-nix;
|
sopsFile = secrets.et-imxyy-nix;
|
||||||
|
restartUnits = [ "easytier.service" ];
|
||||||
format = "binary";
|
format = "binary";
|
||||||
};
|
};
|
||||||
environment.systemPackages = [ pkgs.easytier ];
|
environment.systemPackages = [ pkgs.easytier ];
|
||||||
|
|||||||
8
flake.lock
generated
8
flake.lock
generated
@@ -987,16 +987,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1764623294,
|
"lastModified": 1765298291,
|
||||||
"narHash": "sha256-h94W20ZYS2HF1tSV7ZfZQf4Tsj9/0wofkBiRlepG/io=",
|
"narHash": "sha256-2vmjE1RD0ky+LkFQ1tUChfDQF9984o4ntFXIks0P7m8=",
|
||||||
"owner": "noctalia-dev",
|
"owner": "noctalia-dev",
|
||||||
"repo": "noctalia-shell",
|
"repo": "noctalia-shell",
|
||||||
"rev": "30f11dc05202b85b390547ed194ef64f149b97f0",
|
"rev": "83bdb5b0fcb5b1a4306a6fad3e7c7bba245010c4",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "noctalia-dev",
|
"owner": "noctalia-dev",
|
||||||
"ref": "v3.5.0",
|
"ref": "v3.6.2",
|
||||||
"repo": "noctalia-shell",
|
"repo": "noctalia-shell",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -61,7 +61,7 @@
|
|||||||
zen.inputs.nixpkgs.follows = "nixpkgs";
|
zen.inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
|
||||||
noctalia = {
|
noctalia = {
|
||||||
url = "github:noctalia-dev/noctalia-shell/v3.5.0";
|
url = "github:noctalia-dev/noctalia-shell/v3.6.2";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
cfg = lib.getAttrFromPath optionPath config.my;
|
cfg = lib.getAttrFromPath optionPath config.my;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options.my = lib.setAttrByPath (optionPath) {
|
options.my = lib.setAttrByPath optionPath {
|
||||||
enable = (lib.mkEnableOption optionName) // {
|
enable = (lib.mkEnableOption optionName) // {
|
||||||
inherit default;
|
inherit default;
|
||||||
};
|
};
|
||||||
|
|||||||
Reference in New Issue
Block a user