nixos/bitwarden_rs: add environmentFile option
Add the option `environmentFile` to allow passing secrets to the service without adding them to the Nix store, while keeping the current configuration via the existing environment file intact.
This commit is contained in:
parent
7bd175ca3b
commit
76362dd7eb
1 changed files with 18 additions and 1 deletions
|
@ -81,6 +81,23 @@ in {
|
||||||
<link xlink:href="https://github.com/dani-garcia/bitwarden_rs/blob/${bitwarden_rs.version}/.env.template">the environment template file</link>.
|
<link xlink:href="https://github.com/dani-garcia/bitwarden_rs/blob/${bitwarden_rs.version}/.env.template">the environment template file</link>.
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
|
environmentFile = mkOption {
|
||||||
|
type = with types; nullOr path;
|
||||||
|
default = null;
|
||||||
|
example = "/root/bitwarden_rs.env";
|
||||||
|
description = ''
|
||||||
|
Additional environment file as defined in <citerefentry>
|
||||||
|
<refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum>
|
||||||
|
</citerefentry>.
|
||||||
|
|
||||||
|
Secrets like <envar>ADMIN_TOKEN</envar> and <envar>SMTP_PASSWORD</envar>
|
||||||
|
may be passed to the service without adding them to the world-readable Nix store.
|
||||||
|
|
||||||
|
Note that this file needs to be available on the host on which
|
||||||
|
<literal>bitwarden_rs</literal> is running.
|
||||||
|
'';
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
config = mkIf cfg.enable {
|
||||||
|
@ -101,7 +118,7 @@ in {
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
User = user;
|
User = user;
|
||||||
Group = group;
|
Group = group;
|
||||||
EnvironmentFile = configFile;
|
EnvironmentFile = [ configFile ] ++ optional (cfg.environmentFile != null) cfg.environmentFile;
|
||||||
ExecStart = "${bitwarden_rs}/bin/bitwarden_rs";
|
ExecStart = "${bitwarden_rs}/bin/bitwarden_rs";
|
||||||
LimitNOFILE = "1048576";
|
LimitNOFILE = "1048576";
|
||||||
LimitNPROC = "64";
|
LimitNPROC = "64";
|
||||||
|
|
Loading…
Reference in a new issue