fix up some path names
This commit is contained in:
parent
c3575e0d27
commit
6980726541
|
@ -1,5 +1,5 @@
|
||||||
let
|
let
|
||||||
internalWireGuard = import ./chaosInternalWireGuard.nix;
|
internalWireGuard = import ../wireguard/chaosInternalWireGuard.nix;
|
||||||
ports = import ./pipedClusterPorts.nix;
|
ports = import ./pipedClusterPorts.nix;
|
||||||
in rec {
|
in rec {
|
||||||
inherit ports;
|
inherit ports;
|
||||||
|
@ -27,6 +27,8 @@ in rec {
|
||||||
joinString = "${ip}:${toString ports.cockroachDB}";
|
joinString = "${ip}:${toString ports.cockroachDB}";
|
||||||
advertiseAddr = joinString;
|
advertiseAddr = joinString;
|
||||||
|
|
||||||
|
resticBucket = "Piped-UK";
|
||||||
|
|
||||||
vaultUserName = "rapsberry-container-piped-uk";
|
vaultUserName = "rapsberry-container-piped-uk";
|
||||||
|
|
||||||
baseDomain = "piped-uk.owo.monster";
|
baseDomain = "piped-uk.owo.monster";
|
|
@ -4,7 +4,7 @@
|
||||||
btrfs-progs,
|
btrfs-progs,
|
||||||
writeShellApplication,
|
writeShellApplication,
|
||||||
}: let
|
}: let
|
||||||
externalDriveData = import ../data/raspberryExternalDrive.nix;
|
externalDriveData = import ../data/drives/raspberryExternalDrive.nix;
|
||||||
in (writeShellApplication {
|
in (writeShellApplication {
|
||||||
name = "mk-raspberry-ext-drive";
|
name = "mk-raspberry-ext-drive";
|
||||||
runtimeInputs = [
|
runtimeInputs = [
|
||||||
|
|
|
@ -55,7 +55,7 @@ in {
|
||||||
]
|
]
|
||||||
++ (with hosts.hetzner-vm.containers.social; [
|
++ (with hosts.hetzner-vm.containers.social; [
|
||||||
profiles.gotosocial
|
profiles.gotosocial
|
||||||
profiles.backups
|
profiles.restic
|
||||||
]);
|
]);
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
{self, ...}: let
|
{self, ...}: let
|
||||||
internalWireGuard = import "${self}/data/chaosInternalWireGuard.nix";
|
internalWireGuard = import "${self}/data/wireguard/chaosInternalWireGuard.nix";
|
||||||
in {
|
in {
|
||||||
systemd.tmpfiles.rules = [
|
systemd.tmpfiles.rules = [
|
||||||
"d /var/lib/cockroachdb-certs - root root"
|
"d /var/lib/cockroachdb-certs - root root"
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
externalDriveData = import "${self}/data/raspberryExternalDrive.nix";
|
externalDriveData = import "${self}/drives/data/raspberryExternalDrive.nix";
|
||||||
|
|
||||||
mountExternalDrive = let
|
mountExternalDrive = let
|
||||||
jq = "${pkgs.jq}/bin/jq";
|
jq = "${pkgs.jq}/bin/jq";
|
||||||
|
|
|
@ -27,9 +27,7 @@
|
||||||
manual = true;
|
manual = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
# this doesn't need to be a secret and can be generated at install time
|
r
|
||||||
# but it makes it easier to install.
|
|
||||||
# it's stored in /nix store anyway
|
|
||||||
ssh_host_ed25519_key = {
|
ssh_host_ed25519_key = {
|
||||||
path = "/ssh_host_ed25519_key";
|
path = "/ssh_host_ed25519_key";
|
||||||
permissions = "600";
|
permissions = "600";
|
||||||
|
|
|
@ -8,7 +8,7 @@
|
||||||
inherit (lib.strings) concatStringsSep;
|
inherit (lib.strings) concatStringsSep;
|
||||||
inherit (builtins) attrNames;
|
inherit (builtins) attrNames;
|
||||||
|
|
||||||
wireguardData = import ../data/chaosInternalWireGuard.nix;
|
wireguardData = import ../data/wireguard/chaosInternalWireGuard.nix;
|
||||||
wireguardHosts = wireguardData.hosts;
|
wireguardHosts = wireguardData.hosts;
|
||||||
|
|
||||||
kvPathForHost = host: "/private-public-keys/wireguard/chaos-internal/${host}";
|
kvPathForHost = host: "/private-public-keys/wireguard/chaos-internal/${host}";
|
||||||
|
|
|
@ -63,7 +63,7 @@ in
|
||||||
inherit pkgs;
|
inherit pkgs;
|
||||||
};
|
};
|
||||||
|
|
||||||
wireguardData = import ./data/chaosInternalWireGuard.nix;
|
wireguardData = import ./data/wireguard/chaosInternalWireGuard.nix;
|
||||||
hostsWithWireGuard = builtins.attrNames wireguardData.hosts;
|
hostsWithWireGuard = builtins.attrNames wireguardData.hosts;
|
||||||
in {
|
in {
|
||||||
packages = mergeAttrsList [
|
packages = mergeAttrsList [
|
||||||
|
|
|
@ -7,8 +7,8 @@
|
||||||
}: let
|
}: let
|
||||||
inherit (lib.modules) mkBefore;
|
inherit (lib.modules) mkBefore;
|
||||||
|
|
||||||
encryptedUSB = import "${self}/data/encryptedUSB.nix";
|
encryptedUSB = import "${self}/data/drives/encryptedUSB.nix";
|
||||||
driveData = import "${self}/data/drives/normalEncryptedDrive.nix";
|
driveData = import "${self}/data/drives/encryptedDrive.nix";
|
||||||
in {
|
in {
|
||||||
boot = {
|
boot = {
|
||||||
initrd.availableKernelModules = [
|
initrd.availableKernelModules = [
|
||||||
|
|
|
@ -11,7 +11,7 @@
|
||||||
# Assume this to be set
|
# Assume this to be set
|
||||||
secrets = config.services.secrets.secrets;
|
secrets = config.services.secrets.secrets;
|
||||||
|
|
||||||
wireguardData = import "${self}/data/chaosInternalWireGuard.nix";
|
wireguardData = import "${self}/data/wireguard/chaosInternalWireGuard.nix";
|
||||||
wireguardHosts = wireguardData.hosts;
|
wireguardHosts = wireguardData.hosts;
|
||||||
|
|
||||||
currentHostName = config.networking.hostName;
|
currentHostName = config.networking.hostName;
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
{pkgs, ...}: let
|
{pkgs, ...}: let
|
||||||
encryptedUSB = import ../data/encryptedUSB.nix;
|
encryptedUSB = import ../data/drives/encryptedUSB.nix;
|
||||||
|
|
||||||
encUSBMount = pkgs.writeShellScriptBin "enc_usb_mount" ''
|
encUSBMount = pkgs.writeShellScriptBin "enc_usb_mount" ''
|
||||||
set -x
|
set -x
|
||||||
|
|
Loading…
Reference in a new issue