private certificate fix
This commit is contained in:
@@ -38,7 +38,7 @@ in
|
|||||||
"bazarr"
|
"bazarr"
|
||||||
"collabora"
|
"collabora"
|
||||||
"gitea"
|
"gitea"
|
||||||
# "homepage"
|
"homepage"
|
||||||
"isso"
|
"isso"
|
||||||
"jellyfin"
|
"jellyfin"
|
||||||
"kavita"
|
"kavita"
|
||||||
@@ -53,7 +53,7 @@ in
|
|||||||
"oauth2-proxy"
|
"oauth2-proxy"
|
||||||
"plausible"
|
"plausible"
|
||||||
"plex"
|
"plex"
|
||||||
# "prowlarr"
|
"prowlarr"
|
||||||
"radarr"
|
"radarr"
|
||||||
"sonarr"
|
"sonarr"
|
||||||
"vaultwarden"
|
"vaultwarden"
|
||||||
|
|||||||
@@ -9,16 +9,9 @@ let
|
|||||||
in
|
in
|
||||||
{
|
{
|
||||||
options.my.servers.homepage = setup.mkOptions "homepage" "home" 8082;
|
options.my.servers.homepage = setup.mkOptions "homepage" "home" 8082;
|
||||||
config = lib.mkIf (cfg.enable && config.my.secureHost) {
|
config = lib.mkMerge [
|
||||||
sops.secrets = {
|
(lib.mkIf (cfg.enable && config.my.secureHost) {
|
||||||
homepage.sopsFile = ../../secrets/homepage.yaml;
|
sops.secrets.homepage.sopsFile = ../../secrets/homepage.yaml;
|
||||||
"private-ca/pem" = {
|
|
||||||
sopsFile = ../../secrets/certs.yaml;
|
|
||||||
owner = "nginx";
|
|
||||||
group = "nginx";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
my.servers.homepage.certPath = config.sops.secrets."private-ca/pem".path;
|
|
||||||
services.homepage-dashboard = {
|
services.homepage-dashboard = {
|
||||||
inherit (cfg) enable;
|
inherit (cfg) enable;
|
||||||
listenPort = cfg.port;
|
listenPort = cfg.port;
|
||||||
@@ -35,5 +28,14 @@ in
|
|||||||
|> builtins.filter (file: builtins.match ".*\\.nix" file != null)
|
|> builtins.filter (file: builtins.match ".*\\.nix" file != null)
|
||||||
|> map (file: import ./homepage/bookmarks/${file});
|
|> map (file: import ./homepage/bookmarks/${file});
|
||||||
};
|
};
|
||||||
|
})
|
||||||
|
(lib.mkIf (cfg.enableProxy && config.my.enableProxy && config.my.secureHost) {
|
||||||
|
sops.secrets."private-ca/pem" = {
|
||||||
|
sopsFile = ../../secrets/certs.yaml;
|
||||||
|
owner = "nginx";
|
||||||
|
group = "nginx";
|
||||||
};
|
};
|
||||||
|
my.servers.homepage.certPath = config.sops.secrets."private-ca/pem".path;
|
||||||
|
})
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -9,15 +9,8 @@ let
|
|||||||
in
|
in
|
||||||
{
|
{
|
||||||
options.my.servers.prowlarr = setup.mkOptions "prowlarr" "indexer" 9696;
|
options.my.servers.prowlarr = setup.mkOptions "prowlarr" "indexer" 9696;
|
||||||
config = lib.mkIf cfg.enable {
|
config = lib.mkMerge [
|
||||||
sops.secrets = lib.mkIf cfg.enable {
|
(lib.mkIf cfg.enable {
|
||||||
"private-ca/pem" = {
|
|
||||||
sopsFile = ../../secrets/certs.yaml;
|
|
||||||
owner = "nginx";
|
|
||||||
group = "nginx";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
my.servers.prowlarr.certPath = config.sops.secrets."private-ca/pem".path;
|
|
||||||
users.users.prowlarr = {
|
users.users.prowlarr = {
|
||||||
uid = 987;
|
uid = 987;
|
||||||
group = "piracy";
|
group = "piracy";
|
||||||
@@ -31,5 +24,14 @@ in
|
|||||||
inherit (cfg) enable;
|
inherit (cfg) enable;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
})
|
||||||
|
(lib.mkIf (cfg.enableProxy && config.my.enableProxy && config.my.secureHost) {
|
||||||
|
sops.secrets."private-ca/pem" = {
|
||||||
|
sopsFile = ../../secrets/certs.yaml;
|
||||||
|
owner = "nginx";
|
||||||
|
group = "nginx";
|
||||||
};
|
};
|
||||||
|
my.servers.prowlarr.certPath = config.sops.secrets."private-ca/pem".path;
|
||||||
|
})
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -29,18 +29,13 @@ let
|
|||||||
in
|
in
|
||||||
{
|
{
|
||||||
options.my.servers.stash = setup.mkOptions "stash" "xxx" 9999;
|
options.my.servers.stash = setup.mkOptions "stash" "xxx" 9999;
|
||||||
config = lib.mkIf (cfg.enable && config.my.secureHost) {
|
config = lib.mkMerge [
|
||||||
|
(lib.mkIf (cfg.enable && config.my.secureHost) {
|
||||||
sops.secrets = {
|
sops.secrets = {
|
||||||
"stash/password".sopsFile = ../../secrets/secrets.yaml;
|
"stash/password".sopsFile = ../../secrets/secrets.yaml;
|
||||||
"stash/jwt".sopsFile = ../../secrets/secrets.yaml;
|
"stash/jwt".sopsFile = ../../secrets/secrets.yaml;
|
||||||
"stash/session".sopsFile = ../../secrets/secrets.yaml;
|
"stash/session".sopsFile = ../../secrets/secrets.yaml;
|
||||||
"private-ca/pem" = {
|
|
||||||
sopsFile = ../../secrets/certs.yaml;
|
|
||||||
owner = "nginx";
|
|
||||||
group = "nginx";
|
|
||||||
};
|
};
|
||||||
};
|
|
||||||
my.servers.stash.certPath = config.sops.secrets."private-ca/pem".path;
|
|
||||||
services.stash = {
|
services.stash = {
|
||||||
inherit (cfg) enable;
|
inherit (cfg) enable;
|
||||||
group = "glue";
|
group = "glue";
|
||||||
@@ -76,5 +71,14 @@ in
|
|||||||
group = "glue";
|
group = "glue";
|
||||||
packages = [ stashPythonFHS ];
|
packages = [ stashPythonFHS ];
|
||||||
};
|
};
|
||||||
|
})
|
||||||
|
(lib.mkIf (cfg.enableProxy && config.my.enableProxy && config.my.secureHost) {
|
||||||
|
sops.secrets."private-ca/pem" = {
|
||||||
|
sopsFile = ../../secrets/certs.yaml;
|
||||||
|
owner = "nginx";
|
||||||
|
group = "nginx";
|
||||||
};
|
};
|
||||||
|
my.servers.stash.certPath = config.sops.secrets."private-ca/pem".path;
|
||||||
|
})
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user