persistence: Rename module

`impermanence` -> `persistence`
This commit is contained in:
SebastianStork 2025-11-11 15:29:17 +01:00
parent 3fd0e85151
commit 1fe43f5802
Signed by: SebastianStork
SSH key fingerprint: SHA256:iEM011ogNMG1q8+U500adGu/9rpPuZ2KnFtbdLeqTiI
21 changed files with 25 additions and 25 deletions

View file

@ -23,7 +23,7 @@ _: {
destination="$2" destination="$2"
root="/tmp/anywhere/$host" root="/tmp/anywhere/$host"
impermanence="$(nix eval ".#nixosConfigurations.$host.config.custom.impermanence.enable")" impermanence="$(nix eval ".#nixosConfigurations.$host.config.custom.persistence.enable")"
if [ "$impermanence" = true ]; then if [ "$impermanence" = true ]; then
ssh_dir="$root/persist/etc/ssh" ssh_dir="$root/persist/etc/ssh"
else else

View file

@ -14,7 +14,7 @@
}; };
custom = { custom = {
impermanence.enable = true; persistence.enable = true;
sops = { sops = {
enable = true; enable = true;

View file

@ -14,7 +14,7 @@
}; };
custom = { custom = {
impermanence.enable = true; persistence.enable = true;
sops = { sops = {
enable = true; enable = true;

View file

@ -14,7 +14,7 @@
}; };
custom = { custom = {
impermanence.enable = true; persistence.enable = true;
sops = { sops = {
enable = true; enable = true;

View file

@ -5,14 +5,14 @@
... ...
}: }:
let let
cfg = config.custom.impermanence; cfg = config.custom.persistence;
in in
{ {
imports = [ inputs.impermanence.nixosModules.impermanence ]; imports = [ inputs.impermanence.nixosModules.impermanence ];
options.custom = { options.custom.persistence = {
impermanence.enable = lib.mkEnableOption ""; enable = lib.mkEnableOption "";
persist.directories = lib.mkOption { directories = lib.mkOption {
type = lib.types.listOf lib.types.path; type = lib.types.listOf lib.types.path;
default = [ ]; default = [ ];
}; };
@ -32,7 +32,7 @@ in
"/var/lib/systemd" "/var/lib/systemd"
"/var/log" "/var/log"
] ]
++ config.custom.persist.directories; ++ config.custom.persistence.directories;
files = [ files = [
"/etc/machine-id" "/etc/machine-id"

View file

@ -95,7 +95,7 @@ in
virtualHosts = virtualHosts |> lib.map mkVirtualHost |> lib.listToAttrs; virtualHosts = virtualHosts |> lib.map mkVirtualHost |> lib.listToAttrs;
}; };
custom.persist.directories = [ "/var/lib/caddy" ]; custom.persistence.directories = [ "/var/lib/caddy" ];
} }
(lib.mkIf publicHostsExist { (lib.mkIf publicHostsExist {

View file

@ -114,6 +114,6 @@ in
lib.mkAfter collectionsScript; lib.mkAfter collectionsScript;
}; };
custom.persist.directories = [ "/var/lib/crowdsec" ]; custom.persistence.directories = [ "/var/lib/crowdsec" ];
}; };
} }

View file

@ -142,7 +142,7 @@ in
}; };
}; };
persist.directories = [ dataDir ]; persistence.directories = [ dataDir ];
}; };
}; };
} }

View file

@ -34,6 +34,6 @@ in
systemd.services.tailscaled-set.after = [ "tailscaled-autoconnect.service" ]; systemd.services.tailscaled-set.after = [ "tailscaled-autoconnect.service" ];
custom.persist.directories = [ "/var/lib/tailscale" ]; custom.persistence.directories = [ "/var/lib/tailscale" ];
}; };
} }

View file

@ -32,7 +32,7 @@ in
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
sops = { sops = {
age.sshKeyPaths = [ age.sshKeyPaths = [
"${lib.optionalString config.custom.impermanence.enable "/persist"}/etc/ssh/ssh_host_ed25519_key" "${lib.optionalString config.custom.persistence.enable "/persist"}/etc/ssh/ssh_host_ed25519_key"
]; ];
defaultSopsFile = absoluteSecretsPath; defaultSopsFile = absoluteSecretsPath;
}; };

View file

@ -56,7 +56,7 @@ in
}; };
}; };
persist.directories = [ dataDir ]; persistence.directories = [ dataDir ];
}; };
}; };
} }

View file

@ -62,7 +62,7 @@ in
}; };
}; };
persist.directories = [ dataDir ]; persistence.directories = [ dataDir ];
}; };
}; };
} }

View file

@ -128,7 +128,7 @@ in
}; };
}; };
persist.directories = [ config.services.forgejo.stateDir ]; persistence.directories = [ config.services.forgejo.stateDir ];
}; };
}; };
} }

View file

@ -53,7 +53,7 @@ in
}; };
}; };
persist.directories = [ dataDir ]; persistence.directories = [ dataDir ];
}; };
}; };
} }

View file

@ -211,7 +211,7 @@ in
caddy.virtualHosts.${cfg.domain}.port = cfg.port; caddy.virtualHosts.${cfg.domain}.port = cfg.port;
}; };
persist.directories = [ dataDir ]; persistence.directories = [ dataDir ];
}; };
}; };
} }

View file

@ -64,7 +64,7 @@ in
}; };
}; };
persist.directories = [ dataDir ]; persistence.directories = [ dataDir ];
}; };
}; };
} }

View file

@ -86,7 +86,7 @@ in
}; };
}; };
persist.directories = [ persistence.directories = [
dataDir dataDir
config.services.postgresql.dataDir config.services.postgresql.dataDir
]; ];

View file

@ -116,7 +116,7 @@ in
}; };
}; };
persist.directories = [ dataDir ]; persistence.directories = [ dataDir ];
}; };
}; };
} }

View file

@ -29,7 +29,7 @@ in
custom = { custom = {
services.caddy.virtualHosts.${cfg.domain}.port = cfg.port; services.caddy.virtualHosts.${cfg.domain}.port = cfg.port;
persist.directories = [ config.services.uptime-kuma.settings.DATA_DIR ]; persistence.directories = [ config.services.uptime-kuma.settings.DATA_DIR ];
}; };
}; };
} }

View file

@ -60,7 +60,7 @@ in
custom = { custom = {
services.caddy.virtualHosts.${cfg.domain}.port = cfg.port; services.caddy.virtualHosts.${cfg.domain}.port = cfg.port;
persist.directories = [ "/var/lib/${config.services.victorialogs.stateDir}" ]; persistence.directories = [ "/var/lib/${config.services.victorialogs.stateDir}" ];
}; };
}; };
} }

View file

@ -65,7 +65,7 @@ in
custom = { custom = {
services.caddy.virtualHosts.${cfg.domain}.port = cfg.port; services.caddy.virtualHosts.${cfg.domain}.port = cfg.port;
persist.directories = [ "/var/lib/${config.services.victoriametrics.stateDir}" ]; persistence.directories = [ "/var/lib/${config.services.victoriametrics.stateDir}" ];
}; };
}; };
} }