+1
-4
modules/default.nix
+1
-4
modules/default.nix
······
+6
-5
modules/dns.nix
+6
-5
modules/dns.nix
···
+27
-22
modules/gitea.nix
+27
-22
modules/gitea.nix
···············
+2
-1
modules/headscale.nix
+2
-1
modules/headscale.nix
······
+17
-20
modules/mailserver.nix
+17
-20
modules/mailserver.nix
···
+4
-4
modules/mailserver/common.nix
+4
-4
modules/mailserver/common.nix
···-mkHashFile = name: hash: pkgs.writeText "${builtins.hashString "sha256" name}-password-hash" hash;
+7
-15
modules/mailserver/default.nix
+7
-15
modules/mailserver/default.nix
···example = "$6$evQJs5CFQyPAW09S$Cn99Y8.QjZ2IBnSu4qf1vBxDRWkaIZWOtmu1Ddsm3.H3CFpeVc0JU4llIq8HQXgeatvYhh5O33eWG3TSpjzu6/";···-hashedPassword = "$6$evQJs5CFQyPAW09S$Cn99Y8.QjZ2IBnSu4qf1vBxDRWkaIZWOtmu1Ddsm3.H3CFpeVc0JU4llIq8HQXgeatvYhh5O33eWG3TSpjzu6/";+password = "$6$evQJs5CFQyPAW09S$Cn99Y8.QjZ2IBnSu4qf1vBxDRWkaIZWOtmu1Ddsm3.H3CFpeVc0JU4llIq8HQXgeatvYhh5O33eWG3TSpjzu6/";-hashedPassword = "$6$oE0ZNv2n7Vk9gOf$9xcZWCCLGdMflIfuA0vR1Q1Xblw6RZqPrP94mEit2/81/7AKj2bqUai5yPyWE.QYPyv6wLMHZvjw3Rlg7yTCD/";+password = "$6$oE0ZNv2n7Vk9gOf$9xcZWCCLGdMflIfuA0vR1Q1Xblw6RZqPrP94mEit2/81/7AKj2bqUai5yPyWE.QYPyv6wLMHZvjw3Rlg7yTCD/";
+2
-1
modules/mailserver/dovecot.nix
+2
-1
modules/mailserver/dovecot.nix
···-"${name}:${"$(head -n 1 ${passwordFiles."${name}"})"}:${builtins.toString cfg.vmailUID}:${builtins.toString cfg.vmailUID}::${cfg.mailDirectory}:/run/current-system/sw/bin/nologin:"+let passwordHash = ''$(head -n 1 ${passwordFiles."${name}"} | ${pkgs.findutils}/bin/xargs --null ${pkgs.apacheHttpd}/bin/htpasswd -nbB "" | cut -d: -f2)''; in+"${name}:${passwordHash}:${builtins.toString cfg.vmailUID}:${builtins.toString cfg.vmailUID}::${cfg.mailDirectory}:/run/current-system/sw/bin/nologin:"
+4
-4
modules/mailserver/users.nix
+4
-4
modules/mailserver/users.nix
···
+7
-4
modules/mastodon.nix
+7
-4
modules/mastodon.nix
······
+38
-10
modules/matrix.nix
+38
-10
modules/matrix.nix
············+chown ${config.systemd.services.matrix-synapse.serviceConfig.User}:${config.systemd.services.matrix-synapse.serviceConfig.Group} '${turnSharedSecretFile}'
+2
-3
modules/services/dns/default.nix
+2
-3
modules/services/dns/default.nix
·········
+10
-3
modules/turn.nix
+10
-3
modules/turn.nix
···
+5
-2
modules/wireguard/default.nix
+5
-2
modules/wireguard/default.nix
·········