Compare commits

...

3 commits

Author SHA1 Message Date
a3b4781bd0 fix forgejo on trantor 2026-02-16 00:14:43 -03:00
fe460c9151 fix secrets locations 2026-02-15 23:01:25 -03:00
10f823a3a6 lxc support for alexandria 2026-02-15 22:21:33 -03:00
6 changed files with 27 additions and 9 deletions

View file

@ -1,8 +1,7 @@
{ {
lib,
config, config,
pkgs,
inputs, inputs,
pkgs,
... ...
}: }:
@ -83,12 +82,12 @@ in
age.secrets = { age.secrets = {
"nextcloud-secrets.json" = { "nextcloud-secrets.json" = {
file = ../../../secrets/nextcloud-secrets.json.age; file = "${inputs.self}/secrets/nextcloud-secrets.json.age";
owner = "nextcloud"; owner = "nextcloud";
group = "nextcloud"; group = "nextcloud";
}; };
nextcloud-adminpass = { nextcloud-adminpass = {
file = ../../../secrets/nextcloud-adminpass.age; file = "${inputs.self}/secrets/nextcloud-adminpass.age";
owner = "nextcloud"; owner = "nextcloud";
group = "nextcloud"; group = "nextcloud";
}; };

View file

@ -51,7 +51,7 @@ in
]; ];
age.secrets.cloudflare = { age.secrets.cloudflare = {
file = ../../../secrets/cloudflare.age; file = "${inputs.self}/secrets/cloudflare.age";
owner = "nginx"; owner = "nginx";
group = "nginx"; group = "nginx";
}; };

View file

@ -67,5 +67,8 @@ in
}; };
# Disable PrivateMounts to allow LoadCredential to work with bind-mounted directories # Disable PrivateMounts to allow LoadCredential to work with bind-mounted directories
systemd.services.forgejo.serviceConfig.PrivateMounts = lib.mkForce false; systemd.services.forgejo.serviceConfig = {
PrivateMounts = lib.mkForce false;
ProtectSystem = lib.mkForce false;
};
} }

View file

@ -8,10 +8,8 @@
let let
services = inputs.self.services; services = inputs.self.services;
# Get all unique domains from shared services on trantor (host = "trantor")
localDomains = lib.unique (map (s: s.domain) (lib.filter (s: s.host == "trantor") services)); localDomains = lib.unique (map (s: s.domain) (lib.filter (s: s.host == "trantor") services));
# Generate ACME cert configs for all local domains
acmeCerts = lib.genAttrs localDomains (domain: { acmeCerts = lib.genAttrs localDomains (domain: {
group = "nginx"; group = "nginx";
}); });
@ -51,7 +49,7 @@ in
]; ];
age.secrets.cloudflare = { age.secrets.cloudflare = {
file = ../../../secrets/cloudflare.age; file = "${inputs.self}/secrets/cloudflare.age";
owner = "nginx"; owner = "nginx";
group = "nginx"; group = "nginx";
}; };

View file

@ -27,6 +27,7 @@
# other aspects # other aspects
fwupd fwupd
podman
]); ]);
}; };
} }

17
aspects/lxc.nix Normal file
View file

@ -0,0 +1,17 @@
{ ... }:
{
flake.modules.nixos.lxc =
{
config,
lib,
pkgs,
...
}:
{
virtualisation.lxc = {
enable = true;
unprivilegedContainers = true;
};
};
}