# Breaking Changes - sops location movod to "system/dev/<dev-name>/sops/sops-conf.nix" - flake devices declaration changes - whole flake update
85 lines
2.3 KiB
Nix
85 lines
2.3 KiB
Nix
{ config, lib, ... }:
|
|
let
|
|
inherit (lib) mkIf;
|
|
in
|
|
{
|
|
sops.secrets = {
|
|
"wireguard/privateKey" = { };
|
|
"nextcloud/adminPassword" = { };
|
|
"step_ca/password" = { };
|
|
vaultwarden = { };
|
|
"oauth/password" = { };
|
|
"oauth/adminEnv" = { };
|
|
"ldap/password" = lib.mkIf config.mail-server.enable {
|
|
mode = "0660";
|
|
owner = config.services.openldap.user;
|
|
group = config.services.openldap.group;
|
|
};
|
|
"ldap/env" = lib.mkIf config.mail-server.enable {
|
|
mode = "0660";
|
|
group = config.users.groups.docker.name;
|
|
};
|
|
"powerdns-admin/secret" = {
|
|
mode = "0660";
|
|
owner = "powerdnsadmin";
|
|
group = "powerdnsadmin";
|
|
};
|
|
"powerdns-admin/salt" = {
|
|
mode = "0660";
|
|
owner = "powerdnsadmin";
|
|
group = "powerdnsadmin";
|
|
};
|
|
powerdns = {
|
|
mode = "0660";
|
|
owner = "pdns";
|
|
group = "pdns";
|
|
};
|
|
rspamd-trainer = {
|
|
};
|
|
rspamd = mkIf config.services.rspamd.enable {
|
|
owner = config.services.rspamd.user;
|
|
};
|
|
"acme/env" = mkIf config.security.acme.acceptTerms {
|
|
mode = "0660";
|
|
owner = "acme";
|
|
group = "acme";
|
|
};
|
|
"postsrsd/secret" = mkIf config.services.postsrsd.enable {
|
|
mode = "0660";
|
|
owner = config.services.postsrsd.user;
|
|
group = config.services.postsrsd.group;
|
|
};
|
|
"grafana/password" = mkIf config.services.grafana.enable {
|
|
mode = "0660";
|
|
owner = "grafana";
|
|
group = "grafana";
|
|
};
|
|
"grafana/client_secret" = mkIf config.services.grafana.enable {
|
|
mode = "0660";
|
|
owner = "grafana";
|
|
group = "grafana";
|
|
};
|
|
"prometheus/powerdns/password" = mkIf config.services.prometheus.enable {
|
|
mode = "0660";
|
|
owner = "prometheus";
|
|
group = config.users.users.prometheus.group;
|
|
};
|
|
"paperless/adminPassword" = mkIf config.services.paperless.enable {
|
|
owner = config.services.paperless.user;
|
|
};
|
|
"atticd/secret" = mkIf config.services.atticd.enable { };
|
|
"docmost" = { };
|
|
"crowdsec/lapi.yaml" = mkIf config.services.crowdsec.enable {
|
|
owner = "crowdsec";
|
|
mode = "0600";
|
|
};
|
|
"crowdsec/capi.yaml" = mkIf config.services.crowdsec.enable {
|
|
owner = "crowdsec";
|
|
mode = "0600";
|
|
};
|
|
"crowdsec/consoleToken" = mkIf config.services.crowdsec.enable {
|
|
owner = "crowdsec";
|
|
mode = "0600";
|
|
};
|
|
};
|
|
}
|