nixos/machines/serverle/services.nix

59 lines
1.2 KiB
Nix
Raw Normal View History

2022-11-29 18:45:37 +01:00
# Deployed services
{ config, lib, ... }:
let
secrets = config.sops.secrets;
in
{
sops.secrets."acme/inwx" = { };
2022-12-04 18:06:51 +01:00
sops.secrets."borgbackup/password" = { };
2023-02-05 19:04:16 +01:00
sops.secrets."borgbackup/ssh_key" = { };
sops.secrets."sso/auth-key" = { };
sops.secrets."sso/felix/password-hash" = { };
sops.secrets."sso/felix/totp-secret" = { };
2022-12-04 18:06:51 +01:00
2022-11-29 18:45:37 +01:00
# List services that you want to enable:
my.services = {
2022-12-04 18:06:51 +01:00
backup = {
enable = true;
OnFailureMail = "server@buehler.rocks";
passwordFile = secrets."borgbackup/password".path;
2023-02-05 19:04:16 +01:00
sshKeyFile = secrets."borgbackup/ssh_key".path;
2022-12-04 18:06:51 +01:00
};
2023-03-15 22:34:36 +01:00
sonarr = {
enable = true;
};
2022-11-29 18:45:37 +01:00
ssh-server = {
enable = true;
};
2022-11-30 13:41:31 +01:00
jellyfin = {
enable = true;
};
# Dashboard
homer = {
enable = true;
};
# Webserver
nginx = {
enable = true;
acme = {
credentialsFile = secrets."acme/inwx".path;
};
sso = {
authKeyFile = secrets."sso/auth-key".path;
users = {
felix = {
passwordHashFile = secrets."sso/felix/password-hash".path;
totpSecretFile = secrets."sso/felix/totp-secret".path;
};
};
groups = {
root = [ "felix" ];
};
};
};
2022-11-29 18:45:37 +01:00
};
}