Compare commits

...

3 Commits

Author SHA1 Message Date
90b85963cd feat(sops-nix): use restartUnits 2025-12-14 10:40:11 +08:00
010789965a chore: fmt 2025-12-13 17:00:21 +08:00
5988a98a09 feat: upgrade noctalia-shell 2025-12-13 16:59:08 +08:00
13 changed files with 28 additions and 11 deletions

View File

@@ -7,6 +7,7 @@
{ {
sops.secrets.et-imxyy-nix-server-nixremote = { sops.secrets.et-imxyy-nix-server-nixremote = {
sopsFile = secrets.et-imxyy-nix-server-nixremote; sopsFile = secrets.et-imxyy-nix-server-nixremote;
restartUnits = [ "easytier-nixremote.service" ];
format = "binary"; format = "binary";
}; };
environment.systemPackages = [ pkgs.easytier ]; environment.systemPackages = [ pkgs.easytier ];

View File

@@ -2,6 +2,7 @@
{ {
sops.secrets.efl-tuwunel-env = { sops.secrets.efl-tuwunel-env = {
sopsFile = secrets.efl-tuwunel; sopsFile = secrets.efl-tuwunel;
restartUnits = [ "podman-tuwunel.service" ];
format = "dotenv"; format = "dotenv";
}; };
virtualisation.oci-containers.containers = { virtualisation.oci-containers.containers = {

View File

@@ -9,12 +9,14 @@
]; ];
sops.secrets.tuwunel-reg-token = { sops.secrets.tuwunel-reg-token = {
sopsFile = secrets.tuwunel-reg-token; sopsFile = secrets.tuwunel-reg-token;
restartUnits = [ "tuwunel.service" ];
format = "binary"; format = "binary";
owner = config.services.matrix-tuwunel.user; owner = config.services.matrix-tuwunel.user;
group = config.services.matrix-tuwunel.group; group = config.services.matrix-tuwunel.group;
}; };
sops.secrets.tuwunel-turn-secret = { sops.secrets.tuwunel-turn-secret = {
sopsFile = secrets.tuwunel-turn-secret; sopsFile = secrets.tuwunel-turn-secret;
restartUnits = [ "tuwunel.service" ];
format = "binary"; format = "binary";
owner = config.services.matrix-tuwunel.user; owner = config.services.matrix-tuwunel.user;
group = config.services.matrix-tuwunel.group; group = config.services.matrix-tuwunel.group;
@@ -68,6 +70,7 @@
sops.secrets.mautrix-telegram = { sops.secrets.mautrix-telegram = {
sopsFile = secrets.mautrix-telegram; sopsFile = secrets.mautrix-telegram;
restartUnits = [ "mautrix-telegram.service" ];
format = "dotenv"; format = "dotenv";
owner = "mautrix-telegram"; owner = "mautrix-telegram";
group = "mautrix-telegram"; group = "mautrix-telegram";

View File

@@ -2,6 +2,7 @@
{ {
sops.secrets.minio-env = { sops.secrets.minio-env = {
sopsFile = secrets.minio; sopsFile = secrets.minio;
restartUnits = [ "minio.service" ];
format = "dotenv"; format = "dotenv";
}; };
services.minio = { services.minio = {

View File

@@ -142,6 +142,7 @@
sops.secrets.dae-imxyy-nix-server = { sops.secrets.dae-imxyy-nix-server = {
sopsFile = secrets.dae-imxyy-nix-server; sopsFile = secrets.dae-imxyy-nix-server;
restartUnits = [ "dae.service" ];
format = "binary"; format = "binary";
}; };
services.dae = { services.dae = {
@@ -154,6 +155,7 @@
}; };
sops.secrets.mihomo = { sops.secrets.mihomo = {
sopsFile = secrets.mihomo; sopsFile = secrets.mihomo;
restartUnits = [ "mihomo.service" ];
format = "yaml"; format = "yaml";
key = ""; key = "";
}; };
@@ -166,6 +168,7 @@
sops.secrets.frp-env = { sops.secrets.frp-env = {
sopsFile = secrets.frp; sopsFile = secrets.frp;
restartUnits = [ "frp.service" ];
format = "dotenv"; format = "dotenv";
}; };
systemd.services.frp.serviceConfig.EnvironmentFile = [ systemd.services.frp.serviceConfig.EnvironmentFile = [
@@ -429,6 +432,7 @@
sops.secrets.et-imxyy-nix-server = { sops.secrets.et-imxyy-nix-server = {
sopsFile = secrets.et-imxyy-nix-server; sopsFile = secrets.et-imxyy-nix-server;
restartUnits = [ "easytier.service" ];
format = "binary"; format = "binary";
}; };
environment.systemPackages = [ pkgs.easytier ]; environment.systemPackages = [ pkgs.easytier ];

View File

@@ -4,11 +4,10 @@
... ...
}: }:
{ {
sops.secrets = { sops.secrets.siyuan-env = {
siyuan-env = { sopsFile = secrets.siyuan;
sopsFile = secrets.siyuan; restartUnits = [ "siyuan.service" ];
format = "dotenv"; format = "dotenv";
};
}; };
virtualisation.oci-containers.containers = { virtualisation.oci-containers.containers = {
siyuan = { siyuan = {

View File

@@ -5,6 +5,7 @@ in
{ {
sops.secrets.rsshub-env = { sops.secrets.rsshub-env = {
sopsFile = secrets.rsshub; sopsFile = secrets.rsshub;
restartUnits = [ "podman-rsshub.service" ];
format = "dotenv"; format = "dotenv";
}; };
users.users.rsshub = { users.users.rsshub = {

View File

@@ -2,6 +2,7 @@
{ {
sops.secrets.vaultwarden-env = { sops.secrets.vaultwarden-env = {
sopsFile = secrets.vaultwarden; sopsFile = secrets.vaultwarden;
restartUnits = [ "vaultwarden.service" ];
format = "dotenv"; format = "dotenv";
}; };
services.postgresql.ensureUsers = [ services.postgresql.ensureUsers = [

View File

@@ -54,6 +54,7 @@
sops.secrets.dae-imxyy-nix-x16 = { sops.secrets.dae-imxyy-nix-x16 = {
sopsFile = secrets.dae-imxyy-nix-x16; sopsFile = secrets.dae-imxyy-nix-x16;
restartUnits = [ "dae.service" ];
format = "binary"; format = "binary";
}; };
services.dae = { services.dae = {
@@ -63,6 +64,7 @@
systemd.services.dae.after = [ "sops-nix.service" ]; systemd.services.dae.after = [ "sops-nix.service" ];
sops.secrets.mihomo = { sops.secrets.mihomo = {
sopsFile = secrets.mihomo; sopsFile = secrets.mihomo;
restartUnits = [ "mihomo.service" ];
format = "yaml"; format = "yaml";
key = ""; key = "";
}; };
@@ -75,6 +77,7 @@
sops.secrets.et-imxyy-nix-x16 = { sops.secrets.et-imxyy-nix-x16 = {
sopsFile = secrets.et-imxyy-nix-x16; sopsFile = secrets.et-imxyy-nix-x16;
restartUnits = [ "easytier.service" ];
format = "binary"; format = "binary";
}; };
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [

View File

@@ -90,6 +90,7 @@
sops.secrets.dae-imxyy-nix = { sops.secrets.dae-imxyy-nix = {
sopsFile = secrets.dae-imxyy-nix; sopsFile = secrets.dae-imxyy-nix;
restartUnits = [ "dae.service" ];
format = "binary"; format = "binary";
}; };
services.dae = { services.dae = {
@@ -99,6 +100,7 @@
systemd.services.dae.after = [ "sops-nix.service" ]; systemd.services.dae.after = [ "sops-nix.service" ];
sops.secrets.mihomo = { sops.secrets.mihomo = {
sopsFile = secrets.mihomo; sopsFile = secrets.mihomo;
restartUnits = [ "mihomo.service" ];
format = "yaml"; format = "yaml";
key = ""; key = "";
}; };
@@ -111,6 +113,7 @@
sops.secrets.et-imxyy-nix = { sops.secrets.et-imxyy-nix = {
sopsFile = secrets.et-imxyy-nix; sopsFile = secrets.et-imxyy-nix;
restartUnits = [ "easytier.service" ];
format = "binary"; format = "binary";
}; };
environment.systemPackages = [ pkgs.easytier ]; environment.systemPackages = [ pkgs.easytier ];

8
flake.lock generated
View File

@@ -987,16 +987,16 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1764623294, "lastModified": 1765298291,
"narHash": "sha256-h94W20ZYS2HF1tSV7ZfZQf4Tsj9/0wofkBiRlepG/io=", "narHash": "sha256-2vmjE1RD0ky+LkFQ1tUChfDQF9984o4ntFXIks0P7m8=",
"owner": "noctalia-dev", "owner": "noctalia-dev",
"repo": "noctalia-shell", "repo": "noctalia-shell",
"rev": "30f11dc05202b85b390547ed194ef64f149b97f0", "rev": "83bdb5b0fcb5b1a4306a6fad3e7c7bba245010c4",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "noctalia-dev", "owner": "noctalia-dev",
"ref": "v3.5.0", "ref": "v3.6.2",
"repo": "noctalia-shell", "repo": "noctalia-shell",
"type": "github" "type": "github"
} }

View File

@@ -61,7 +61,7 @@
zen.inputs.nixpkgs.follows = "nixpkgs"; zen.inputs.nixpkgs.follows = "nixpkgs";
noctalia = { noctalia = {
url = "github:noctalia-dev/noctalia-shell/v3.5.0"; url = "github:noctalia-dev/noctalia-shell/v3.6.2";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };

View File

@@ -13,7 +13,7 @@
cfg = lib.getAttrFromPath optionPath config.my; cfg = lib.getAttrFromPath optionPath config.my;
in in
{ {
options.my = lib.setAttrByPath (optionPath) { options.my = lib.setAttrByPath optionPath {
enable = (lib.mkEnableOption optionName) // { enable = (lib.mkEnableOption optionName) // {
inherit default; inherit default;
}; };