hades: secret config for mealie

This commit is contained in:
Antoine Martin 2025-01-17 17:09:53 +01:00
parent 6aca4f9f62
commit c624183e4e
5 changed files with 19 additions and 0 deletions
hosts/hades
modules/secrets
services

View file

@ -84,6 +84,7 @@ in {
mealie = { mealie = {
enable = true; enable = true;
port = 8090; port = 8090;
credentialsFile = config.age.secrets."mealie/secret-config".path;
}; };
microbin = { microbin = {

View file

@ -22,6 +22,10 @@
owner = "matrix-synapse"; owner = "matrix-synapse";
}; };
"mealie/secret-config" = {
owner = "mealie";
};
"microbin/secret-config" = {}; "microbin/secret-config" = {};
"miniflux/admin-credentials" = {}; "miniflux/admin-credentials" = {};

Binary file not shown.

View file

@ -22,6 +22,8 @@ in {
"matrix-synapse/secret-config.age".publicKeys = [alarsyo hades]; "matrix-synapse/secret-config.age".publicKeys = [alarsyo hades];
"mealie/secret-config.age".publicKeys = [alarsyo hades];
"microbin/secret-config.age".publicKeys = [alarsyo hades]; "microbin/secret-config.age".publicKeys = [alarsyo hades];
"miniflux/admin-credentials.age".publicKeys = [alarsyo hades]; "miniflux/admin-credentials.age".publicKeys = [alarsyo hades];

View file

@ -29,11 +29,23 @@ in {
example = 8080; example = 8080;
description = "Internal port for Mealie webapp"; description = "Internal port for Mealie webapp";
}; };
credentialsFile = lib.mkOption {
type = types.nullOr types.path;
default = null;
example = "/run/secrets/mealie-credentials.env";
description = ''
File containing credentials used in mealie such as {env}`POSTGRES_PASSWORD`
or sensitive LDAP options.
Expects the format of an `EnvironmentFile=`, as described by {manpage}`systemd.exec(5)`.
'';
};
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
services.mealie = { services.mealie = {
inherit listenAddress; inherit listenAddress;
inherit (cfg) credentialsFile;
enable = true; enable = true;
package = pkgs.unstable.mealie; package = pkgs.unstable.mealie;