even the best developers make typos, or so i've been told.
This commit is contained in:
parent
b9c6c1da6a
commit
f418e5ec19
11 changed files with 16 additions and 15 deletions
|
|
@ -32,4 +32,5 @@
|
||||||
modules = [./system/distrust-mini ./services/distrust-mini ./helpers/services.nix { networking.hostName = "distrust-mini"; }];
|
modules = [./system/distrust-mini ./services/distrust-mini ./helpers/services.nix { networking.hostName = "distrust-mini"; }];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -6,7 +6,7 @@
|
||||||
fediPort = 8083;
|
fediPort = 8083;
|
||||||
inherit ((pkgs.formats.elixirConf {}).lib) mkAtom;
|
inherit ((pkgs.formats.elixirConf {}).lib) mkAtom;
|
||||||
in {
|
in {
|
||||||
age.secrets."hidden_service/akkoma".file = ../secrets/hidden_service/akkoma;
|
age.secrets."hidden_service/akkoma".file = ../../secrets/hidden_service/akkoma;
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
akkoma = {
|
akkoma = {
|
||||||
|
|
|
||||||
|
|
@ -2,7 +2,7 @@
|
||||||
forgejoPort = 8082;
|
forgejoPort = 8082;
|
||||||
in {
|
in {
|
||||||
age.secrets."hidden_service/forgejo" = {
|
age.secrets."hidden_service/forgejo" = {
|
||||||
file = ../secrets/hidden_service/forgejo;
|
file = ../../secrets/hidden_service/forgejo;
|
||||||
};
|
};
|
||||||
|
|
||||||
services.forgejo = {
|
services.forgejo = {
|
||||||
|
|
|
||||||
|
|
@ -2,9 +2,9 @@
|
||||||
lldapPort = 8089;
|
lldapPort = 8089;
|
||||||
in {
|
in {
|
||||||
age.secrets = {
|
age.secrets = {
|
||||||
"hidden_service/lldap".file = ../secrets/hidden_service/lldap;
|
"hidden_service/lldap".file = ../../secrets/hidden_service/lldap;
|
||||||
"lldap_root_pass" = {
|
"lldap_root_pass" = {
|
||||||
file = ../secrets/lldap_root_pass;
|
file = ../../secrets/lldap_root_pass;
|
||||||
mode = "0440";
|
mode = "0440";
|
||||||
group = "lldap-secrets";
|
group = "lldap-secrets";
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,5 @@
|
||||||
{config, ...}: {
|
{config, ...}: {
|
||||||
age.secrets."bind_pw".file = ../secrets/bind_pw;
|
age.secrets."bind_pw".file = ../../secrets/bind_pw;
|
||||||
|
|
||||||
mailserver = {
|
mailserver = {
|
||||||
stateVersion = 3;
|
stateVersion = 3;
|
||||||
|
|
|
||||||
|
|
@ -7,8 +7,8 @@
|
||||||
onionHostName = "znfdxs4e3rqvzxtkksiidomupgm2x44wtrzyxtpomczto3xg5qxpcbqd.onion";
|
onionHostName = "znfdxs4e3rqvzxtkksiidomupgm2x44wtrzyxtpomczto3xg5qxpcbqd.onion";
|
||||||
in {
|
in {
|
||||||
age.secrets = {
|
age.secrets = {
|
||||||
"nextcloud-admin-pass".file = ../secrets/nextcloud-admin-pass;
|
"nextcloud-admin-pass".file = ../../secrets/nextcloud-admin-pass;
|
||||||
"hidden_service/nextcloud".file = ../secrets/hidden_service/nextcloud;
|
"hidden_service/nextcloud".file = ../../secrets/hidden_service/nextcloud;
|
||||||
};
|
};
|
||||||
|
|
||||||
users.groups.nextcloud.members = ["nextcloud" "caddy"];
|
users.groups.nextcloud.members = ["nextcloud" "caddy"];
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,7 @@
|
||||||
{config, ...}: let
|
{config, ...}: let
|
||||||
pastePort = 8087;
|
pastePort = 8087;
|
||||||
in {
|
in {
|
||||||
age.secrets."hidden_service/microbin".file = ../secrets/hidden_service/microbin;
|
age.secrets."hidden_service/microbin".file = ../../secrets/hidden_service/microbin;
|
||||||
|
|
||||||
services.microbin = {
|
services.microbin = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
|
||||||
|
|
@ -3,7 +3,7 @@
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
age.secrets."prosody.env".file = ../secrets/prosody.env;
|
age.secrets."prosody.env".file = ../../secrets/prosody.env;
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
prosody = {
|
prosody = {
|
||||||
|
|
|
||||||
|
|
@ -3,10 +3,10 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
distrust-homepage = import ../homepage/default.nix {inherit pkgs;};
|
distrust-homepage = import ../../homepage/default.nix {inherit pkgs;};
|
||||||
in {
|
in {
|
||||||
age.secrets."hidden_service/site" = {
|
age.secrets."hidden_service/site" = {
|
||||||
file = ../secrets/hidden_service/site;
|
file = ../../secrets/hidden_service/site;
|
||||||
};
|
};
|
||||||
|
|
||||||
distrust.services."site" = {
|
distrust.services."site" = {
|
||||||
|
|
|
||||||
|
|
@ -2,8 +2,8 @@
|
||||||
vaultPort = 8222;
|
vaultPort = 8222;
|
||||||
in {
|
in {
|
||||||
age.secrets = {
|
age.secrets = {
|
||||||
"vaultwarden.env".file = ../secrets/vaultwarden.env;
|
"vaultwarden.env".file = ../../secrets/vaultwarden.env;
|
||||||
"hidden_service/vaultwarden".file = ../secrets/hidden_service/vaultwarden;
|
"hidden_service/vaultwarden".file = ../../secrets/hidden_service/vaultwarden;
|
||||||
};
|
};
|
||||||
|
|
||||||
services.vaultwarden = {
|
services.vaultwarden = {
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,6 @@
|
||||||
{config, ...}: {
|
{config, ...}: {
|
||||||
age.secrets."borg_ed25519".file = ../secrets/borg_ed25519;
|
age.secrets."borg_ed25519".file = ../../secrets/borg_ed25519;
|
||||||
age.secrets."borg_pass".file = ../secrets/borg_pass;
|
age.secrets."borg_pass".file = ../../secrets/borg_pass;
|
||||||
|
|
||||||
distrust.backups = {
|
distrust.backups = {
|
||||||
borgRepository = "ssh://u506783@u506783.your-storagebox.de:23";
|
borgRepository = "ssh://u506783@u506783.your-storagebox.de:23";
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue