private certificate fix

This commit is contained in:
Danilo Reyes
2026-02-05 06:26:40 -06:00
parent eddef549e7
commit d14a7ba395
4 changed files with 96 additions and 88 deletions

View File

@@ -38,7 +38,7 @@ in
"bazarr" "bazarr"
"collabora" "collabora"
"gitea" "gitea"
# "homepage" "homepage"
"isso" "isso"
"jellyfin" "jellyfin"
"kavita" "kavita"
@@ -53,7 +53,7 @@ in
"oauth2-proxy" "oauth2-proxy"
"plausible" "plausible"
"plex" "plex"
# "prowlarr" "prowlarr"
"radarr" "radarr"
"sonarr" "sonarr"
"vaultwarden" "vaultwarden"

View File

@@ -9,16 +9,9 @@ let
in in
{ {
options.my.servers.homepage = setup.mkOptions "homepage" "home" 8082; options.my.servers.homepage = setup.mkOptions "homepage" "home" 8082;
config = lib.mkIf (cfg.enable && config.my.secureHost) { config = lib.mkMerge [
sops.secrets = { (lib.mkIf (cfg.enable && config.my.secureHost) {
homepage.sopsFile = ../../secrets/homepage.yaml; sops.secrets.homepage.sopsFile = ../../secrets/homepage.yaml;
"private-ca/pem" = {
sopsFile = ../../secrets/certs.yaml;
owner = "nginx";
group = "nginx";
};
};
my.servers.homepage.certPath = config.sops.secrets."private-ca/pem".path;
services.homepage-dashboard = { services.homepage-dashboard = {
inherit (cfg) enable; inherit (cfg) enable;
listenPort = cfg.port; listenPort = cfg.port;
@@ -35,5 +28,14 @@ in
|> builtins.filter (file: builtins.match ".*\\.nix" file != null) |> builtins.filter (file: builtins.match ".*\\.nix" file != null)
|> map (file: import ./homepage/bookmarks/${file}); |> map (file: import ./homepage/bookmarks/${file});
}; };
})
(lib.mkIf (cfg.enableProxy && config.my.enableProxy && config.my.secureHost) {
sops.secrets."private-ca/pem" = {
sopsFile = ../../secrets/certs.yaml;
owner = "nginx";
group = "nginx";
}; };
my.servers.homepage.certPath = config.sops.secrets."private-ca/pem".path;
})
];
} }

View File

@@ -9,15 +9,8 @@ let
in in
{ {
options.my.servers.prowlarr = setup.mkOptions "prowlarr" "indexer" 9696; options.my.servers.prowlarr = setup.mkOptions "prowlarr" "indexer" 9696;
config = lib.mkIf cfg.enable { config = lib.mkMerge [
sops.secrets = lib.mkIf cfg.enable { (lib.mkIf cfg.enable {
"private-ca/pem" = {
sopsFile = ../../secrets/certs.yaml;
owner = "nginx";
group = "nginx";
};
};
my.servers.prowlarr.certPath = config.sops.secrets."private-ca/pem".path;
users.users.prowlarr = { users.users.prowlarr = {
uid = 987; uid = 987;
group = "piracy"; group = "piracy";
@@ -31,5 +24,14 @@ in
inherit (cfg) enable; inherit (cfg) enable;
}; };
}; };
})
(lib.mkIf (cfg.enableProxy && config.my.enableProxy && config.my.secureHost) {
sops.secrets."private-ca/pem" = {
sopsFile = ../../secrets/certs.yaml;
owner = "nginx";
group = "nginx";
}; };
my.servers.prowlarr.certPath = config.sops.secrets."private-ca/pem".path;
})
];
} }

View File

@@ -29,18 +29,13 @@ let
in in
{ {
options.my.servers.stash = setup.mkOptions "stash" "xxx" 9999; options.my.servers.stash = setup.mkOptions "stash" "xxx" 9999;
config = lib.mkIf (cfg.enable && config.my.secureHost) { config = lib.mkMerge [
(lib.mkIf (cfg.enable && config.my.secureHost) {
sops.secrets = { sops.secrets = {
"stash/password".sopsFile = ../../secrets/secrets.yaml; "stash/password".sopsFile = ../../secrets/secrets.yaml;
"stash/jwt".sopsFile = ../../secrets/secrets.yaml; "stash/jwt".sopsFile = ../../secrets/secrets.yaml;
"stash/session".sopsFile = ../../secrets/secrets.yaml; "stash/session".sopsFile = ../../secrets/secrets.yaml;
"private-ca/pem" = {
sopsFile = ../../secrets/certs.yaml;
owner = "nginx";
group = "nginx";
}; };
};
my.servers.stash.certPath = config.sops.secrets."private-ca/pem".path;
services.stash = { services.stash = {
inherit (cfg) enable; inherit (cfg) enable;
group = "glue"; group = "glue";
@@ -76,5 +71,14 @@ in
group = "glue"; group = "glue";
packages = [ stashPythonFHS ]; packages = [ stashPythonFHS ];
}; };
})
(lib.mkIf (cfg.enableProxy && config.my.enableProxy && config.my.secureHost) {
sops.secrets."private-ca/pem" = {
sopsFile = ../../secrets/certs.yaml;
owner = "nginx";
group = "nginx";
}; };
my.servers.stash.certPath = config.sops.secrets."private-ca/pem".path;
})
];
} }