diff options
| author | Fuwn <[email protected]> | 2024-09-20 05:36:20 -0700 |
|---|---|---|
| committer | Fuwn <[email protected]> | 2024-09-20 05:36:20 -0700 |
| commit | d9747c64b038943253eaafdc59a49d5face46dab (patch) | |
| tree | b452d15a7f20e9f4bb70ec9f9040137bec1072f8 /modules/server/systemd.nix | |
| parent | himeji: move containers over from seti (diff) | |
| download | nixos-config-d9747c64b038943253eaafdc59a49d5face46dab.tar.xz nixos-config-d9747c64b038943253eaafdc59a49d5face46dab.zip | |
modules: server and core modules
Diffstat (limited to 'modules/server/systemd.nix')
| -rw-r--r-- | modules/server/systemd.nix | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/modules/server/systemd.nix b/modules/server/systemd.nix new file mode 100644 index 0000000..acdcef4 --- /dev/null +++ b/modules/server/systemd.nix @@ -0,0 +1,27 @@ +{ secrets, ... }: +let + containerEngine = "podman"; +in +{ + systemd.services.tailscale-up = { + after = [ "tailscaled.service" ]; + requires = [ "tailscaled.service" ]; + wantedBy = [ "multi-user.target" ]; + + serviceConfig = { + ExecStart = "/run/current-system/sw/bin/tailscale up --authkey ${secrets.tailscale_authentication_key}"; + Restart = "on-failure"; + }; + }; + + systemd.services.ghcr-login = { + after = [ "${containerEngine}.service" ]; + requires = [ "${containerEngine}.service" ]; + wantedBy = [ "multi-user.target" ]; + + serviceConfig = { + ExecStart = "/run/current-system/sw/bin/${containerEngine} login ghcr.io -u ${secrets.ghcr.username} -p ${secrets.ghcr.token}"; + Restart = "on-failure"; + }; + }; +} |