From 2b0ab1d5388e336b6f6645aeef9783a2e27cf44b Mon Sep 17 00:00:00 2001 From: Nick Date: Mon, 9 Jun 2025 01:12:16 -0500 Subject: [PATCH] feat: kanboard test --- modules/nixos/services/kanboard/default.nix | 78 ++++++++++----------- 1 file changed, 39 insertions(+), 39 deletions(-) diff --git a/modules/nixos/services/kanboard/default.nix b/modules/nixos/services/kanboard/default.nix index 35f39dd..d7e416d 100755 --- a/modules/nixos/services/kanboard/default.nix +++ b/modules/nixos/services/kanboard/default.nix @@ -16,7 +16,7 @@ in services = { kanboard = { enable = true; - domain = host; + domain = web.localhost.address1; # dataDir = "/var/lib/${service.name}"; # settings = { # HTTP_PROXY_HOSTNAME = host; @@ -51,47 +51,47 @@ in }; }; }; - sops = - let - sopsPath = secret: { - path = "${service.sops.path0}/${service.name}-${secret}"; - owner = service.name; - mode = "600"; - }; - in - { - secrets = builtins.listToAttrs ( - map - (secret: { - name = "${service.name}-${secret}"; - value = sopsPath secret; - }) - [ - "smtp" - ] - ); - }; + # sops = + # let + # sopsPath = secret: { + # path = "${service.sops.path0}/${service.name}-${secret}"; + # owner = service.name; + # mode = "600"; + # }; + # in + # { + # secrets = builtins.listToAttrs ( + # map + # (secret: { + # name = "${service.name}-${secret}"; + # value = sopsPath secret; + # }) + # [ + # "smtp" + # ] + # ); + # }; - fileSystems."/var/lib/${service.name}" = { - device = service.paths.path0; - fsType = "none"; - options = [ - "bind" - ]; - depends = [ - ceres.storage0.mount - ]; - }; + # fileSystems."/var/lib/${service.name}" = { + # device = service.paths.path0; + # fsType = "none"; + # options = [ + # "bind" + # ]; + # depends = [ + # ceres.storage0.mount + # ]; + # }; - systemd.tmpfiles.rules = [ - "Z ${service.paths.path0} 755 ${service.name} ${service.name} -" - "Z ${service.sops.path0} 755 ${service.name} ${service.name} -" - ]; + # systemd.tmpfiles.rules = [ + # "Z ${service.paths.path0} 755 ${service.name} ${service.name} -" + # "Z ${service.sops.path0} 755 ${service.name} ${service.name} -" + # ]; - users.users.${service.name}.extraGroups = [ - "caddy" - "postgres" - ]; + # users.users.${service.name}.extraGroups = [ + # "caddy" + # "postgres" + # ]; networking = { firewall = {