Commit graph

144 commits

Author SHA1 Message Date
bbe9daaa88 modules: services: navidrome: persist data 2021-11-18 21:16:35 +01:00
32199462de modules: services: lohr: persist data 2021-11-18 21:16:35 +01:00
5b280ab16d modules: services: jellyfin: persist data 2021-11-18 21:16:35 +01:00
86cc42d793 modules: services: indexers: persist data 2021-11-18 21:16:35 +01:00
25984fb088 modules: services: postgresql: persist data 2021-11-18 21:16:35 +01:00
f3c99e6aa2 modules: services: postgresql-backup: persist data 2021-11-18 21:16:35 +01:00
9732a518a5 modules: services: paperless: persist data 2021-11-18 21:16:35 +01:00
35a3fc88bd modules: services: matrix: persist data 2021-11-18 21:16:35 +01:00
346df9a213 modules: services: gitea: persist repositories 2021-11-18 21:16:35 +01:00
222f413950 modules: services: flood: persist data 2021-11-18 21:16:35 +01:00
aa3c0574d6 modules: services: calibre-web: persist library 2021-11-18 21:16:35 +01:00
1e862e8138 modules: services: blog: persist website data 2021-11-18 21:16:35 +01:00
9af15be8bb modules: hardware: bluetooth: persist connections 2021-11-18 21:16:35 +01:00
e0680c06b6 modules: hardware: netowrking persist connections 2021-11-18 21:16:35 +01:00
8d752a642d modules: services: ssh-server: persist host keys 2021-11-18 21:16:35 +01:00
808b5b7048 WIP: modules: systems: add persist
This is the module that takes care of configuring impermanence at the
system level.

WIP:
    * address FIXMEs
    * activate home-manager persistence?
        * set `programs.fuse.userAllowOther = true;` ?
    * point `age` to persisted paths [1] ?
    * make sure all services and modules are persisted correctly...

[1]: b1d18d25b8
2021-11-18 21:16:35 +01:00
10d35f73c8 modules: services: nginx-sso: always rewrite conf
All checks were successful
continuous-integration/drone/push Build is passing
2021-11-06 15:43:00 +01:00
4491eaea49 modules: services: paperless: backup 'dataDir' 2021-11-05 17:03:52 +01:00
5f47ec564c modules: services: calibre-web: use 'dataDir' 2021-11-05 17:03:52 +01:00
6633405e42 modules: services: pirate: sort 'ports' values 2021-11-05 17:03:52 +01:00
7c1f379d82 modules: services: lohr: declarative ssh key 2021-11-05 16:59:11 +01:00
e91ebb24f0 modules: secrets: lohr: add 'ssh-key' 2021-11-05 15:31:59 +01:00
79265008d2 modules: services: nginx: remove unused argument 2021-11-05 14:58:58 +01:00
74a5c50fbe modules: services: drone: remove unused arguments 2021-11-05 14:58:58 +01:00
ddeeb974a4 modules: services: backup: remove deprecated name
All checks were successful
continuous-integration/drone/push Build is passing
2021-11-03 17:16:40 +01:00
3058636c87 modules: home: forward inputs to home-manager
This will be useful if and when I end up adding inputs with home-manager
modules defined.
2021-10-22 13:06:53 +02:00
927dd9e02a modules: services: indexers: add prowlarr 2021-10-18 19:48:50 +02:00
df1bc0d0d5 modules: services: indexers: refactor
This is cleaner and more correct.
2021-10-18 19:48:50 +02:00
760e24a356 modules: services: indexers: fix typo 2021-10-18 19:48:50 +02:00
cbf6ea9ac9 modules: system: nix: change nix build niceness
19 is the lowest priority.
2021-10-18 18:49:03 +02:00
ef07c9ff43 modules: services: nginx: use 'mkMailAccount' 2021-10-13 15:36:28 +02:00
d918bf279d modules: services: wireguard: add 'milady'
All checks were successful
continuous-integration/drone/push Build is passing
2021-10-10 17:16:29 +02:00
6f3bee895c modules: secrets: wireguard: add 'milady' 2021-10-10 17:16:29 +02:00
e805496588 modules: secrets: fix permission for grafana
All checks were successful
continuous-integration/drone/push Build is passing
2021-09-26 23:09:33 +02:00
3201445c08 modules: secrets: fix permission of 'matrix/mail' 2021-09-26 23:09:33 +02:00
30eaefc1d1 modules: secrets: add 'owner' logic 2021-09-26 23:09:33 +02:00
5f41bb1647 modules: secrets: remove 'with lib;' 2021-09-26 23:09:33 +02:00
fec4956063 secrets: move into 'modules' 2021-09-26 23:09:33 +02:00
e962d4c574 modules: services: nginx: sso: use runtime secrets 2021-09-26 23:09:33 +02:00
3bf3980e45 modules: services: nginx: allow sso secret files
This is in preparation of the migration to agenix, which does not allow
access to the secrets at build time.
2021-09-26 23:09:32 +02:00
fb6e2afe89 modules: services: drone: split into files
This is cleaner to read.
2021-09-26 23:09:32 +02:00
51067582e0 modules: services: put modules into folders 2021-09-26 23:09:32 +02:00
78ade4c605 modules: hardware: put modules into folders 2021-09-26 23:09:32 +02:00
5c2921e00d modules: system: put modules into folders 2021-09-26 23:09:32 +02:00
62a18cd3f6 modules: programs: put modules into folders 2021-09-26 23:09:32 +02:00
c6cc64e156 modules: home: put into folder 2021-09-26 23:09:32 +02:00
409e0ef357 modules: system: users: use agenix secrets 2021-09-26 23:09:32 +02:00
b6af754199 modules: services: wireguard: use agenix secrets 2021-09-26 23:09:32 +02:00
ca5e5a53cd modules: services: nginx: use 'credentialsFile'
In preparation for the migration to agenix.
2021-09-26 23:09:32 +02:00
ba10af0644 modules: services: matrix: use 'mailConfigFile'
In preparation of the migration to agenix.
2021-09-26 23:09:32 +02:00