persistence: Rename module

`impermanence` -> `persistence`
This commit is contained in:
SebastianStork 2025-11-11 15:29:17 +01:00
parent 3fd0e85151
commit 1fe43f5802
Signed by: SebastianStork
SSH key fingerprint: SHA256:iEM011ogNMG1q8+U500adGu/9rpPuZ2KnFtbdLeqTiI
21 changed files with 25 additions and 25 deletions

View file

@ -5,14 +5,14 @@
...
}:
let
cfg = config.custom.impermanence;
cfg = config.custom.persistence;
in
{
imports = [ inputs.impermanence.nixosModules.impermanence ];
options.custom = {
impermanence.enable = lib.mkEnableOption "";
persist.directories = lib.mkOption {
options.custom.persistence = {
enable = lib.mkEnableOption "";
directories = lib.mkOption {
type = lib.types.listOf lib.types.path;
default = [ ];
};
@ -32,7 +32,7 @@ in
"/var/lib/systemd"
"/var/log"
]
++ config.custom.persist.directories;
++ config.custom.persistence.directories;
files = [
"/etc/machine-id"

View file

@ -95,7 +95,7 @@ in
virtualHosts = virtualHosts |> lib.map mkVirtualHost |> lib.listToAttrs;
};
custom.persist.directories = [ "/var/lib/caddy" ];
custom.persistence.directories = [ "/var/lib/caddy" ];
}
(lib.mkIf publicHostsExist {

View file

@ -114,6 +114,6 @@ in
lib.mkAfter collectionsScript;
};
custom.persist.directories = [ "/var/lib/crowdsec" ];
custom.persistence.directories = [ "/var/lib/crowdsec" ];
};
}

View file

@ -142,7 +142,7 @@ in
};
};
persist.directories = [ dataDir ];
persistence.directories = [ dataDir ];
};
};
}

View file

@ -34,6 +34,6 @@ in
systemd.services.tailscaled-set.after = [ "tailscaled-autoconnect.service" ];
custom.persist.directories = [ "/var/lib/tailscale" ];
custom.persistence.directories = [ "/var/lib/tailscale" ];
};
}

View file

@ -32,7 +32,7 @@ in
config = lib.mkIf cfg.enable {
sops = {
age.sshKeyPaths = [
"${lib.optionalString config.custom.impermanence.enable "/persist"}/etc/ssh/ssh_host_ed25519_key"
"${lib.optionalString config.custom.persistence.enable "/persist"}/etc/ssh/ssh_host_ed25519_key"
];
defaultSopsFile = absoluteSecretsPath;
};

View file

@ -56,7 +56,7 @@ in
};
};
persist.directories = [ dataDir ];
persistence.directories = [ dataDir ];
};
};
}

View file

@ -62,7 +62,7 @@ in
};
};
persist.directories = [ dataDir ];
persistence.directories = [ dataDir ];
};
};
}

View file

@ -128,7 +128,7 @@ in
};
};
persist.directories = [ config.services.forgejo.stateDir ];
persistence.directories = [ config.services.forgejo.stateDir ];
};
};
}

View file

@ -53,7 +53,7 @@ in
};
};
persist.directories = [ dataDir ];
persistence.directories = [ dataDir ];
};
};
}

View file

@ -211,7 +211,7 @@ in
caddy.virtualHosts.${cfg.domain}.port = cfg.port;
};
persist.directories = [ dataDir ];
persistence.directories = [ dataDir ];
};
};
}

View file

@ -64,7 +64,7 @@ in
};
};
persist.directories = [ dataDir ];
persistence.directories = [ dataDir ];
};
};
}

View file

@ -86,7 +86,7 @@ in
};
};
persist.directories = [
persistence.directories = [
dataDir
config.services.postgresql.dataDir
];

View file

@ -116,7 +116,7 @@ in
};
};
persist.directories = [ dataDir ];
persistence.directories = [ dataDir ];
};
};
}

View file

@ -29,7 +29,7 @@ in
custom = {
services.caddy.virtualHosts.${cfg.domain}.port = cfg.port;
persist.directories = [ config.services.uptime-kuma.settings.DATA_DIR ];
persistence.directories = [ config.services.uptime-kuma.settings.DATA_DIR ];
};
};
}

View file

@ -60,7 +60,7 @@ in
custom = {
services.caddy.virtualHosts.${cfg.domain}.port = cfg.port;
persist.directories = [ "/var/lib/${config.services.victorialogs.stateDir}" ];
persistence.directories = [ "/var/lib/${config.services.victorialogs.stateDir}" ];
};
};
}

View file

@ -65,7 +65,7 @@ in
custom = {
services.caddy.virtualHosts.${cfg.domain}.port = cfg.port;
persist.directories = [ "/var/lib/${config.services.victoriametrics.stateDir}" ];
persistence.directories = [ "/var/lib/${config.services.victoriametrics.stateDir}" ];
};
};
}