even the best developers make typos, or so i've been told.

This commit is contained in:
root 2025-11-09 23:34:06 +00:00
parent b9c6c1da6a
commit f418e5ec19
11 changed files with 16 additions and 15 deletions

View file

@ -30,6 +30,7 @@
distrust-mini = lib.nixosSystem { distrust-mini = lib.nixosSystem {
system = "x86_64-linux"; system = "x86_64-linux";
modules = [./system/distrust-mini ./services/distrust-mini ./helpers/services.nix { networking.hostName = "distrust-mini"; }]; modules = [./system/distrust-mini ./services/distrust-mini ./helpers/services.nix { networking.hostName = "distrust-mini"; }];
};
}; };
}; };
} }

View file

@ -6,7 +6,7 @@
fediPort = 8083; fediPort = 8083;
inherit ((pkgs.formats.elixirConf {}).lib) mkAtom; inherit ((pkgs.formats.elixirConf {}).lib) mkAtom;
in { in {
age.secrets."hidden_service/akkoma".file = ../secrets/hidden_service/akkoma; age.secrets."hidden_service/akkoma".file = ../../secrets/hidden_service/akkoma;
services = { services = {
akkoma = { akkoma = {

View file

@ -2,7 +2,7 @@
forgejoPort = 8082; forgejoPort = 8082;
in { in {
age.secrets."hidden_service/forgejo" = { age.secrets."hidden_service/forgejo" = {
file = ../secrets/hidden_service/forgejo; file = ../../secrets/hidden_service/forgejo;
}; };
services.forgejo = { services.forgejo = {

View file

@ -2,9 +2,9 @@
lldapPort = 8089; lldapPort = 8089;
in { in {
age.secrets = { age.secrets = {
"hidden_service/lldap".file = ../secrets/hidden_service/lldap; "hidden_service/lldap".file = ../../secrets/hidden_service/lldap;
"lldap_root_pass" = { "lldap_root_pass" = {
file = ../secrets/lldap_root_pass; file = ../../secrets/lldap_root_pass;
mode = "0440"; mode = "0440";
group = "lldap-secrets"; group = "lldap-secrets";
}; };

View file

@ -1,5 +1,5 @@
{config, ...}: { {config, ...}: {
age.secrets."bind_pw".file = ../secrets/bind_pw; age.secrets."bind_pw".file = ../../secrets/bind_pw;
mailserver = { mailserver = {
stateVersion = 3; stateVersion = 3;

View file

@ -7,8 +7,8 @@
onionHostName = "znfdxs4e3rqvzxtkksiidomupgm2x44wtrzyxtpomczto3xg5qxpcbqd.onion"; onionHostName = "znfdxs4e3rqvzxtkksiidomupgm2x44wtrzyxtpomczto3xg5qxpcbqd.onion";
in { in {
age.secrets = { age.secrets = {
"nextcloud-admin-pass".file = ../secrets/nextcloud-admin-pass; "nextcloud-admin-pass".file = ../../secrets/nextcloud-admin-pass;
"hidden_service/nextcloud".file = ../secrets/hidden_service/nextcloud; "hidden_service/nextcloud".file = ../../secrets/hidden_service/nextcloud;
}; };
users.groups.nextcloud.members = ["nextcloud" "caddy"]; users.groups.nextcloud.members = ["nextcloud" "caddy"];

View file

@ -1,7 +1,7 @@
{config, ...}: let {config, ...}: let
pastePort = 8087; pastePort = 8087;
in { in {
age.secrets."hidden_service/microbin".file = ../secrets/hidden_service/microbin; age.secrets."hidden_service/microbin".file = ../../secrets/hidden_service/microbin;
services.microbin = { services.microbin = {
enable = true; enable = true;

View file

@ -3,7 +3,7 @@
config, config,
... ...
}: { }: {
age.secrets."prosody.env".file = ../secrets/prosody.env; age.secrets."prosody.env".file = ../../secrets/prosody.env;
services = { services = {
prosody = { prosody = {

View file

@ -3,10 +3,10 @@
pkgs, pkgs,
... ...
}: let }: let
distrust-homepage = import ../homepage/default.nix {inherit pkgs;}; distrust-homepage = import ../../homepage/default.nix {inherit pkgs;};
in { in {
age.secrets."hidden_service/site" = { age.secrets."hidden_service/site" = {
file = ../secrets/hidden_service/site; file = ../../secrets/hidden_service/site;
}; };
distrust.services."site" = { distrust.services."site" = {

View file

@ -2,8 +2,8 @@
vaultPort = 8222; vaultPort = 8222;
in { in {
age.secrets = { age.secrets = {
"vaultwarden.env".file = ../secrets/vaultwarden.env; "vaultwarden.env".file = ../../secrets/vaultwarden.env;
"hidden_service/vaultwarden".file = ../secrets/hidden_service/vaultwarden; "hidden_service/vaultwarden".file = ../../secrets/hidden_service/vaultwarden;
}; };
services.vaultwarden = { services.vaultwarden = {

View file

@ -1,6 +1,6 @@
{config, ...}: { {config, ...}: {
age.secrets."borg_ed25519".file = ../secrets/borg_ed25519; age.secrets."borg_ed25519".file = ../../secrets/borg_ed25519;
age.secrets."borg_pass".file = ../secrets/borg_pass; age.secrets."borg_pass".file = ../../secrets/borg_pass;
distrust.backups = { distrust.backups = {
borgRepository = "ssh://u506783@u506783.your-storagebox.de:23"; borgRepository = "ssh://u506783@u506783.your-storagebox.de:23";