fix up some path names

This commit is contained in:
chaos 2023-09-20 18:17:50 +01:00
parent c3575e0d27
commit 6980726541
No known key found for this signature in database
16 changed files with 14 additions and 14 deletions

View file

@ -1,5 +1,5 @@
let let
internalWireGuard = import ./chaosInternalWireGuard.nix; internalWireGuard = import ../wireguard/chaosInternalWireGuard.nix;
ports = import ./pipedClusterPorts.nix; ports = import ./pipedClusterPorts.nix;
in rec { in rec {
inherit ports; inherit ports;
@ -27,6 +27,8 @@ in rec {
joinString = "${ip}:${toString ports.cockroachDB}"; joinString = "${ip}:${toString ports.cockroachDB}";
advertiseAddr = joinString; advertiseAddr = joinString;
resticBucket = "Piped-UK";
vaultUserName = "rapsberry-container-piped-uk"; vaultUserName = "rapsberry-container-piped-uk";
baseDomain = "piped-uk.owo.monster"; baseDomain = "piped-uk.owo.monster";

View file

@ -4,7 +4,7 @@
btrfs-progs, btrfs-progs,
writeShellApplication, writeShellApplication,
}: let }: let
externalDriveData = import ../data/raspberryExternalDrive.nix; externalDriveData = import ../data/drives/raspberryExternalDrive.nix;
in (writeShellApplication { in (writeShellApplication {
name = "mk-raspberry-ext-drive"; name = "mk-raspberry-ext-drive";
runtimeInputs = [ runtimeInputs = [

View file

@ -55,7 +55,7 @@ in {
] ]
++ (with hosts.hetzner-vm.containers.social; [ ++ (with hosts.hetzner-vm.containers.social; [
profiles.gotosocial profiles.gotosocial
profiles.backups profiles.restic
]); ]);
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [

View file

@ -1,5 +1,5 @@
{self, ...}: let {self, ...}: let
internalWireGuard = import "${self}/data/chaosInternalWireGuard.nix"; internalWireGuard = import "${self}/data/wireguard/chaosInternalWireGuard.nix";
in { in {
systemd.tmpfiles.rules = [ systemd.tmpfiles.rules = [
"d /var/lib/cockroachdb-certs - root root" "d /var/lib/cockroachdb-certs - root root"

View file

@ -3,7 +3,7 @@
pkgs, pkgs,
... ...
}: let }: let
externalDriveData = import "${self}/data/raspberryExternalDrive.nix"; externalDriveData = import "${self}/drives/data/raspberryExternalDrive.nix";
mountExternalDrive = let mountExternalDrive = let
jq = "${pkgs.jq}/bin/jq"; jq = "${pkgs.jq}/bin/jq";

View file

@ -27,9 +27,7 @@
manual = true; manual = true;
}; };
# this doesn't need to be a secret and can be generated at install time r
# but it makes it easier to install.
# it's stored in /nix store anyway
ssh_host_ed25519_key = { ssh_host_ed25519_key = {
path = "/ssh_host_ed25519_key"; path = "/ssh_host_ed25519_key";
permissions = "600"; permissions = "600";

View file

@ -8,7 +8,7 @@
inherit (lib.strings) concatStringsSep; inherit (lib.strings) concatStringsSep;
inherit (builtins) attrNames; inherit (builtins) attrNames;
wireguardData = import ../data/chaosInternalWireGuard.nix; wireguardData = import ../data/wireguard/chaosInternalWireGuard.nix;
wireguardHosts = wireguardData.hosts; wireguardHosts = wireguardData.hosts;
kvPathForHost = host: "/private-public-keys/wireguard/chaos-internal/${host}"; kvPathForHost = host: "/private-public-keys/wireguard/chaos-internal/${host}";

View file

@ -63,7 +63,7 @@ in
inherit pkgs; inherit pkgs;
}; };
wireguardData = import ./data/chaosInternalWireGuard.nix; wireguardData = import ./data/wireguard/chaosInternalWireGuard.nix;
hostsWithWireGuard = builtins.attrNames wireguardData.hosts; hostsWithWireGuard = builtins.attrNames wireguardData.hosts;
in { in {
packages = mergeAttrsList [ packages = mergeAttrsList [

View file

@ -7,8 +7,8 @@
}: let }: let
inherit (lib.modules) mkBefore; inherit (lib.modules) mkBefore;
encryptedUSB = import "${self}/data/encryptedUSB.nix"; encryptedUSB = import "${self}/data/drives/encryptedUSB.nix";
driveData = import "${self}/data/drives/normalEncryptedDrive.nix"; driveData = import "${self}/data/drives/encryptedDrive.nix";
in { in {
boot = { boot = {
initrd.availableKernelModules = [ initrd.availableKernelModules = [

View file

@ -11,7 +11,7 @@
# Assume this to be set # Assume this to be set
secrets = config.services.secrets.secrets; secrets = config.services.secrets.secrets;
wireguardData = import "${self}/data/chaosInternalWireGuard.nix"; wireguardData = import "${self}/data/wireguard/chaosInternalWireGuard.nix";
wireguardHosts = wireguardData.hosts; wireguardHosts = wireguardData.hosts;
currentHostName = config.networking.hostName; currentHostName = config.networking.hostName;

View file

@ -1,5 +1,5 @@
{pkgs, ...}: let {pkgs, ...}: let
encryptedUSB = import ../data/encryptedUSB.nix; encryptedUSB = import ../data/drives/encryptedUSB.nix;
encUSBMount = pkgs.writeShellScriptBin "enc_usb_mount" '' encUSBMount = pkgs.writeShellScriptBin "enc_usb_mount" ''
set -x set -x