diff --git a/configs/container_config.nix b/configs/container_config.nix index a848ec8..ceb8281 100644 --- a/configs/container_config.nix +++ b/configs/container_config.nix @@ -1,5 +1,8 @@ -{ modulesPath, pkgs, lib, ... }: { - imports = [ (modulesPath + "/virtualisation/proxmox-lxc.nix") ]; +{ modulesPath, pkgs, lib, inputs, ... }: { + imports = [ + (modulesPath + "/virtualisation/proxmox-lxc.nix") + inputs.sops-nix.nixosModules.sops + ]; time.timeZone = "Europe/Berlin"; @@ -45,7 +48,7 @@ # Enable networking networking = { networkmanager.enable = true; - + # configure firewall firewall = { enable = true; diff --git a/flake.lock b/flake.lock index 700d0e9..9482ff1 100644 --- a/flake.lock +++ b/flake.lock @@ -16,9 +16,44 @@ "type": "github" } }, + "nixpkgs_2": { + "locked": { + "lastModified": 1743689281, + "narHash": "sha256-y7Hg5lwWhEOgflEHRfzSH96BOt26LaYfrYWzZ+VoVdg=", + "owner": "NixOS", + "repo": "nixpkgs", + "rev": "2bfc080955153be0be56724be6fa5477b4eefabb", + "type": "github" + }, + "original": { + "owner": "NixOS", + "ref": "nixpkgs-unstable", + "repo": "nixpkgs", + "type": "github" + } + }, "root": { "inputs": { - "nixpkgs": "nixpkgs" + "nixpkgs": "nixpkgs", + "sops-nix": "sops-nix" + } + }, + "sops-nix": { + "inputs": { + "nixpkgs": "nixpkgs_2" + }, + "locked": { + "lastModified": 1744103455, + "narHash": "sha256-SR6+qjkPjGQG+8eM4dCcVtss8r9bre/LAxFMPJpaZeU=", + "owner": "Mic92", + "repo": "sops-nix", + "rev": "69d5a5a4635c27dae5a742f36108beccc506c1ba", + "type": "github" + }, + "original": { + "owner": "Mic92", + "repo": "sops-nix", + "type": "github" } } }, diff --git a/flake.nix b/flake.nix index 9ce2413..5626a7e 100644 --- a/flake.nix +++ b/flake.nix @@ -1,13 +1,15 @@ { inputs = { nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable"; + sops-nix.url = "github:Mic92/sops-nix"; }; - outputs = { nixpkgs, ... }: { + outputs = { nixpkgs, sops-nix, ... } @ inputs: { colmena = { meta = { nixpkgs = import nixpkgs { system = "x86_64-linux"; }; + specialArgs = { inherit inputs; }; }; mcserver = import ./configs/containers/mc_container.nix;