diff options
| author | seth <[email protected]> | 2023-10-01 10:41:09 -0400 |
|---|---|---|
| committer | seth <[email protected]> | 2023-10-01 10:49:46 -0400 |
| commit | a8630322f77dbb7be4810099a42352b9278996a1 (patch) | |
| tree | b8df66a7e5b9d8c31b27a4a9b357ff7e4b9d418f /parts/modules/nixos/server/acme.nix | |
| parent | 30f55e656d344e017f66ecbae8eb27cf13ba53bb (diff) | |
treewide!: flatten to parts/ layout
Diffstat (limited to 'parts/modules/nixos/server/acme.nix')
| -rw-r--r-- | parts/modules/nixos/server/acme.nix | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/parts/modules/nixos/server/acme.nix b/parts/modules/nixos/server/acme.nix new file mode 100644 index 0000000..69e02ac --- /dev/null +++ b/parts/modules/nixos/server/acme.nix @@ -0,0 +1,26 @@ +{ + config, + lib, + self, + ... +}: let + cfg = config.server.acme; + inherit (lib) mkEnableOption mkIf; +in { + options.server.acme = { + enable = mkEnableOption "acme"; + }; + + config = mkIf cfg.enable { + age.secrets.cloudflareApiKey.file = "${self}/parts/secrets/systems/${config.networking.hostName}/cloudflareApiKey.age"; + + security.acme = { + acceptTerms = true; + defaults = { + email = "[email protected]"; + dnsProvider = "cloudflare"; + credentialsFile = config.age.secrets.cloudflareApiKey.path; + }; + }; + }; +} |
