even the best developers make typos, or so i've been told.

This commit is contained in:
root 2025-11-09 23:34:06 +00:00
parent b9c6c1da6a
commit f418e5ec19
11 changed files with 16 additions and 15 deletions

View file

@ -30,6 +30,7 @@
distrust-mini = lib.nixosSystem {
system = "x86_64-linux";
modules = [./system/distrust-mini ./services/distrust-mini ./helpers/services.nix { networking.hostName = "distrust-mini"; }];
};
};
};
}

View file

@ -6,7 +6,7 @@
fediPort = 8083;
inherit ((pkgs.formats.elixirConf {}).lib) mkAtom;
in {
age.secrets."hidden_service/akkoma".file = ../secrets/hidden_service/akkoma;
age.secrets."hidden_service/akkoma".file = ../../secrets/hidden_service/akkoma;
services = {
akkoma = {

View file

@ -2,7 +2,7 @@
forgejoPort = 8082;
in {
age.secrets."hidden_service/forgejo" = {
file = ../secrets/hidden_service/forgejo;
file = ../../secrets/hidden_service/forgejo;
};
services.forgejo = {

View file

@ -2,9 +2,9 @@
lldapPort = 8089;
in {
age.secrets = {
"hidden_service/lldap".file = ../secrets/hidden_service/lldap;
"hidden_service/lldap".file = ../../secrets/hidden_service/lldap;
"lldap_root_pass" = {
file = ../secrets/lldap_root_pass;
file = ../../secrets/lldap_root_pass;
mode = "0440";
group = "lldap-secrets";
};

View file

@ -1,5 +1,5 @@
{config, ...}: {
age.secrets."bind_pw".file = ../secrets/bind_pw;
age.secrets."bind_pw".file = ../../secrets/bind_pw;
mailserver = {
stateVersion = 3;

View file

@ -7,8 +7,8 @@
onionHostName = "znfdxs4e3rqvzxtkksiidomupgm2x44wtrzyxtpomczto3xg5qxpcbqd.onion";
in {
age.secrets = {
"nextcloud-admin-pass".file = ../secrets/nextcloud-admin-pass;
"hidden_service/nextcloud".file = ../secrets/hidden_service/nextcloud;
"nextcloud-admin-pass".file = ../../secrets/nextcloud-admin-pass;
"hidden_service/nextcloud".file = ../../secrets/hidden_service/nextcloud;
};
users.groups.nextcloud.members = ["nextcloud" "caddy"];

View file

@ -1,7 +1,7 @@
{config, ...}: let
pastePort = 8087;
in {
age.secrets."hidden_service/microbin".file = ../secrets/hidden_service/microbin;
age.secrets."hidden_service/microbin".file = ../../secrets/hidden_service/microbin;
services.microbin = {
enable = true;

View file

@ -3,7 +3,7 @@
config,
...
}: {
age.secrets."prosody.env".file = ../secrets/prosody.env;
age.secrets."prosody.env".file = ../../secrets/prosody.env;
services = {
prosody = {

View file

@ -3,10 +3,10 @@
pkgs,
...
}: let
distrust-homepage = import ../homepage/default.nix {inherit pkgs;};
distrust-homepage = import ../../homepage/default.nix {inherit pkgs;};
in {
age.secrets."hidden_service/site" = {
file = ../secrets/hidden_service/site;
file = ../../secrets/hidden_service/site;
};
distrust.services."site" = {

View file

@ -2,8 +2,8 @@
vaultPort = 8222;
in {
age.secrets = {
"vaultwarden.env".file = ../secrets/vaultwarden.env;
"hidden_service/vaultwarden".file = ../secrets/hidden_service/vaultwarden;
"vaultwarden.env".file = ../../secrets/vaultwarden.env;
"hidden_service/vaultwarden".file = ../../secrets/hidden_service/vaultwarden;
};
services.vaultwarden = {

View file

@ -1,6 +1,6 @@
{config, ...}: {
age.secrets."borg_ed25519".file = ../secrets/borg_ed25519;
age.secrets."borg_pass".file = ../secrets/borg_pass;
age.secrets."borg_ed25519".file = ../../secrets/borg_ed25519;
age.secrets."borg_pass".file = ../../secrets/borg_pass;
distrust.backups = {
borgRepository = "ssh://u506783@u506783.your-storagebox.de:23";