+31
-3
nixos/modules/security/acme.nix
+31
-3
nixos/modules/security/acme.nix
················································-options = (inheritableOpts { inherit (cfg) defaults; inheritDefaults = cfg.certs."${name}".inheritDefaults; }) // {···
···················································
+137
-22
nixos/modules/security/acme.xml
+137
-22
nixos/modules/security/acme.xml
························
························+<literal><link linkend="opt-services.nginx.virtualHosts._name_.enableACME">enableACME</link></literal>+<link linkend="opt-security.acme.defaults.credentialsFile">credentialsFile</link> = "/var/lib/secrets/certs.secret";+<link linkend="opt-security.acme.defaults.dnsPropagationCheck">dnsPropagationCheck</link> = false;+<link linkend="opt-systemd.services._name_.requires">systemd.services.opensmtpd.requires</link> = ["acme-finished-mail.example.com.target"];+<link linkend="opt-systemd.services._name_.serviceConfig">systemd.services.opensmtpd.serviceConfig.LoadCredential</link> = let
+1
-1
nixos/modules/services/networking/prosody.xml
+1
-1
nixos/modules/services/networking/prosody.xml
···
···
+1
-1
nixos/modules/services/web-apps/discourse.xml
+1
-1
nixos/modules/services/web-apps/discourse.xml
···<link linkend="opt-services.discourse.secretKeyBaseFile">secretKeyBaseFile</link> = "/path/to/secret_key_base_file";
···<link linkend="opt-services.discourse.secretKeyBaseFile">secretKeyBaseFile</link> = "/path/to/secret_key_base_file";+<link linkend="opt-security.acme.defaults.email">security.acme.email</link> = "me@example.com";
+2
-2
nixos/modules/services/web-apps/jitsi-meet.xml
+2
-2
nixos/modules/services/web-apps/jitsi-meet.xml
···<link linkend="opt-services.jitsi-videobridge.openFirewall">services.jitsi-videobridge.openFirewall</link> = true;<link linkend="opt-networking.firewall.allowedTCPPorts">networking.firewall.allowedTCPPorts</link> = [ 80 443 ];···<link linkend="opt-services.jitsi-videobridge.openFirewall">services.jitsi-videobridge.openFirewall</link> = true;<link linkend="opt-networking.firewall.allowedTCPPorts">networking.firewall.allowedTCPPorts</link> = [ 80 443 ];
···<link linkend="opt-services.jitsi-videobridge.openFirewall">services.jitsi-videobridge.openFirewall</link> = true;<link linkend="opt-networking.firewall.allowedTCPPorts">networking.firewall.allowedTCPPorts</link> = [ 80 443 ];+<link linkend="opt-security.acme.defaults.email">security.acme.email</link> = "me@example.com";···<link linkend="opt-services.jitsi-videobridge.openFirewall">services.jitsi-videobridge.openFirewall</link> = true;<link linkend="opt-networking.firewall.allowedTCPPorts">networking.firewall.allowedTCPPorts</link> = [ 80 443 ];+<link linkend="opt-security.acme.defaults.email">security.acme.email</link> = "me@example.com";