313 current 2025-10-11 18:01:55 25.05.20251006.20c4598 6.12.50 *
This commit is contained in:
@@ -1,6 +1,6 @@
|
|||||||
# flake for blakes nixos config
|
# flake for blakes nixos config
|
||||||
# define new devices in outputs
|
# define new devices in outputs
|
||||||
# generation: 312 current 2025-10-11 17:54:46 25.05.20251006.20c4598 6.12.50 *
|
# generation: 313 current 2025-10-11 18:01:55 25.05.20251006.20c4598 6.12.50 *
|
||||||
{
|
{
|
||||||
description = "blakes nix config";
|
description = "blakes nix config";
|
||||||
inputs = {
|
inputs = {
|
||||||
|
|||||||
@@ -108,13 +108,6 @@ in
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
sops.secrets = {
|
|
||||||
"${service}_database_password" = {
|
|
||||||
owner = "${service}";
|
|
||||||
group = "${service}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# add to glance
|
# add to glance
|
||||||
modules.services.glance.links.services = [{
|
modules.services.glance.links.services = [{
|
||||||
title = service;
|
title = service;
|
||||||
@@ -123,6 +116,13 @@ in
|
|||||||
check-url = "http://${homelab.host_ip}:${toString cfg.port}";
|
check-url = "http://${homelab.host_ip}:${toString cfg.port}";
|
||||||
icon = "di:${service}"; }];
|
icon = "di:${service}"; }];
|
||||||
|
|
||||||
|
sops.secrets = {
|
||||||
|
"${service}_database_password" = {
|
||||||
|
owner = "${service}";
|
||||||
|
group = "${service}";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
# add to backups
|
# add to backups
|
||||||
modules.system.backups.baks = {
|
modules.system.backups.baks = {
|
||||||
${service} = { paths = [ cfg.data_dir ]; };
|
${service} = { paths = [ cfg.data_dir ]; };
|
||||||
|
|||||||
@@ -104,13 +104,6 @@ in
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
sops.secrets = {
|
|
||||||
"mosquitto_passwd.yaml" = {
|
|
||||||
owner = "${service}";
|
|
||||||
group = "${service}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# add to glance
|
# add to glance
|
||||||
modules.services.glance.links.services = [{
|
modules.services.glance.links.services = [{
|
||||||
title = service;
|
title = service;
|
||||||
@@ -119,6 +112,13 @@ in
|
|||||||
check-url = "http://${homelab.host_ip}:${toString cfg.port}";
|
check-url = "http://${homelab.host_ip}:${toString cfg.port}";
|
||||||
icon = "di:${service}"; }];
|
icon = "di:${service}"; }];
|
||||||
|
|
||||||
|
sops.secrets = {
|
||||||
|
"mosquitto_passwd.yaml" = {
|
||||||
|
owner = "${service}";
|
||||||
|
group = "${service}";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
# add to backups
|
# add to backups
|
||||||
modules.system.backups.baks = {
|
modules.system.backups.baks = {
|
||||||
${service} = { paths = [ cfg.data_dir ]; };
|
${service} = { paths = [ cfg.data_dir ]; };
|
||||||
|
|||||||
@@ -60,6 +60,7 @@ in
|
|||||||
settings =
|
settings =
|
||||||
{
|
{
|
||||||
PORT = toString cfg.port;
|
PORT = toString cfg.port;
|
||||||
|
HOST = "0.0.0.0";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -83,20 +84,13 @@ in
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
# # external reverse proxy entry
|
# # external reverse proxy entry
|
||||||
# services.nginx.virtualHosts."uptime.blakedheld.xyz" = {
|
# services.nginx.virtualHosts."up.blakedheld.xyz" = {
|
||||||
# forceSSL = true;
|
# forceSSL = true;
|
||||||
# sslCertificate = sec."ssl_blakedheld_crt".path;
|
# sslCertificate = sec."ssl_blakedheld_crt".path;
|
||||||
# sslCertificateKey = sec."ssl_blakedheld_key".path;
|
# sslCertificateKey = sec."ssl_blakedheld_key".path;
|
||||||
# locations."/" = {
|
# locations."/" = {
|
||||||
# proxyPass = "http://127.0.0.1:${toString cfg.port}";
|
# proxyPass = "http://127.0.0.1:${toString cfg.port}";
|
||||||
# };
|
# };
|
||||||
# };
|
|
||||||
|
|
||||||
# sops.secrets = {
|
|
||||||
# "${service}_" = {
|
|
||||||
# owner = "${service}";
|
|
||||||
# group = "${service}";
|
|
||||||
# };
|
|
||||||
# };
|
# };
|
||||||
|
|
||||||
# add to glance
|
# add to glance
|
||||||
@@ -107,6 +101,13 @@ in
|
|||||||
check-url = "http://${homelab.host_ip}:${toString cfg.port}";
|
check-url = "http://${homelab.host_ip}:${toString cfg.port}";
|
||||||
icon = "di:${service}"; }];
|
icon = "di:${service}"; }];
|
||||||
|
|
||||||
|
# sops.secrets = {
|
||||||
|
# "${service}_" = {
|
||||||
|
# owner = "${service}";
|
||||||
|
# group = "${service}";
|
||||||
|
# };
|
||||||
|
# };
|
||||||
|
|
||||||
# add to backups
|
# add to backups
|
||||||
modules.system.backups.paths = lib.mkIf cfg.backup [ cfg.data_dir ];
|
modules.system.backups.paths = lib.mkIf cfg.backup [ cfg.data_dir ];
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -103,13 +103,6 @@ in
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
sops.secrets = {
|
|
||||||
"${service}_admin_token" = {
|
|
||||||
owner = "${service}";
|
|
||||||
group = "${service}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# add to glance
|
# add to glance
|
||||||
modules.services.glance.links.services = [{
|
modules.services.glance.links.services = [{
|
||||||
title = service;
|
title = service;
|
||||||
@@ -118,6 +111,13 @@ in
|
|||||||
check-url = "http://${homelab.host_ip}:${toString cfg.port}";
|
check-url = "http://${homelab.host_ip}:${toString cfg.port}";
|
||||||
icon = "di:${service}"; }];
|
icon = "di:${service}"; }];
|
||||||
|
|
||||||
|
sops.secrets = {
|
||||||
|
"${service}_admin_token" = {
|
||||||
|
owner = "${service}";
|
||||||
|
group = "${service}";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
# add to backups
|
# add to backups
|
||||||
modules.system.backups.baks = {
|
modules.system.backups.baks = {
|
||||||
${service} = { paths = [ cfg.data_dir ]; };
|
${service} = { paths = [ cfg.data_dir ]; };
|
||||||
|
|||||||
Reference in New Issue
Block a user