{ config, globals, nodes, ... }: let mealieDomain = "mealie.${globals.domains.me}"; in { globals.wireguard.proxy-home.hosts.${config.node.name}.firewallRuleForNode.ward-web-proxy.allowedTCPPorts = [ config.services.mealie.port ]; # Mirror the original oauth2 secret, but prepend OIDC_CLIENT_SECRET= # so it can be used as an EnvironmentFile age.secrets.oauth2-client-secret = { generator.dependencies = [ nodes.ward-kanidm.config.age.secrets.kanidm-oauth2-mealie ]; generator.script = { lib, decrypt, deps, ... }: '' echo -n "OIDC_CLIENT_SECRET=" ${decrypt} ${lib.escapeShellArg (lib.head deps).file} ''; mode = "440"; }; globals.services.mealie.domain = mealieDomain; # FIXME: internal monitoring not possible because DNS resolves to sentinel # since adguardhome is not active in server's dns # globals.monitoring.http.mealie = { # url = "https://${mealieDomain}"; # expectedBodyRegex = ''