Fuck around with secrets
This commit is contained in:
parent
0d4700e56f
commit
f8e1f5cd1d
|
@ -1,7 +1,7 @@
|
||||||
{
|
{
|
||||||
# Enable git and config
|
# Enable git and config
|
||||||
programs.git = let
|
programs.git = let
|
||||||
secrets = import ../../nixos/common/secrets.nix;
|
secrets = import ../../../secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
lfs.enable = true;
|
lfs.enable = true;
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{
|
{
|
||||||
security.acme = let
|
security.acme = let
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../../../secrets.nix;
|
||||||
in {
|
in {
|
||||||
acceptTerms = true;
|
acceptTerms = true;
|
||||||
defaults.email = secrets.jimEmail;
|
defaults.email = secrets.jimEmail;
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
{pkgs, ...}: {
|
{pkgs, ...}: {
|
||||||
# DDClient for Dynamic IPs
|
# DDClient for Dynamic IPs
|
||||||
services.ddclient = let
|
services.ddclient = let
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../../../secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
protocol = "cloudflare";
|
protocol = "cloudflare";
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
{
|
{
|
||||||
# Configure the Element web server
|
# Configure the Element web server
|
||||||
nixpkgs.config.element-web.conf = let
|
nixpkgs.config.element-web.conf = let
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../../../secrets.nix;
|
||||||
in {
|
in {
|
||||||
default_server_config = {
|
default_server_config = {
|
||||||
"m.homeserver" = {
|
"m.homeserver" = {
|
||||||
|
|
|
@ -4,8 +4,8 @@
|
||||||
|
|
||||||
# Configure firewall
|
# Configure firewall
|
||||||
networking = let
|
networking = let
|
||||||
ips = import ../common/ips.nix;
|
ips = import ../modules/ips.nix;
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../../../secrets.nix;
|
||||||
in {
|
in {
|
||||||
firewall = {
|
firewall = {
|
||||||
allowPing = false;
|
allowPing = false;
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{
|
{
|
||||||
services.gitea = let
|
services.gitea = let
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../../../secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{
|
{
|
||||||
services.lemmy = let
|
services.lemmy = let
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../../../secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
nginx.enable = true;
|
nginx.enable = true;
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
{pkgs, ...}: let
|
{pkgs, ...}: let
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../../../secrets.nix;
|
||||||
in rec {
|
in rec {
|
||||||
# Mail server
|
# Mail server
|
||||||
mailserver = rec {
|
mailserver = rec {
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{pkgs, ...}: {
|
{pkgs, ...}: {
|
||||||
services.mastodon = let
|
services.mastodon = let
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../../../secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
localDomain = "social.${secrets.jimDomain}";
|
localDomain = "social.${secrets.jimDomain}";
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
{pkgs, ...}: let
|
{pkgs, ...}: let
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../../../secrets.nix;
|
||||||
in {
|
in {
|
||||||
services.nextcloud = {
|
services.nextcloud = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
{
|
{
|
||||||
# NFS server
|
# NFS server
|
||||||
services.nfs.server = let
|
services.nfs.server = let
|
||||||
ips = import ../common/ips.nix;
|
ips = import ../modules/ips.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
exports = ''
|
exports = ''
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{pkgs, ...}: {
|
{pkgs, ...}: {
|
||||||
services.nginx = let
|
services.nginx = let
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../../../secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = (pkgs.nginx.override {
|
package = (pkgs.nginx.override {
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{pkgs, lib, ...}: {
|
{pkgs, lib, ...}: {
|
||||||
services.pufferpanel = let
|
services.pufferpanel = let
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../../../secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
environment = {
|
environment = {
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{pkgs, config, ...}: {
|
{pkgs, config, ...}: {
|
||||||
services = let
|
services = let
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../../../secrets.nix;
|
||||||
in {
|
in {
|
||||||
# Synapse Matrix server
|
# Synapse Matrix server
|
||||||
matrix-synapse = with config.services.coturn; {
|
matrix-synapse = with config.services.coturn; {
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{
|
{
|
||||||
services.vaultwarden = let
|
services.vaultwarden = let
|
||||||
secrets = import ../common/secrets.nix;
|
secrets = import ../../../secrets.nix;
|
||||||
in {
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
config = {
|
config = {
|
||||||
|
|
Loading…
Reference in a new issue