fix: remove dependence on secrets.json in most modules (#170)

VaultWarden reads admin token from secrets.json too, but it will not error out if it's not set and it is not set by infect.

Reviewed-on: https://git.selfprivacy.org/SelfPrivacy/selfprivacy-nixos-config/pulls/170
Reviewed-by: Inex Code <inex.code@selfprivacy.org>
Co-authored-by: nhnn <nhnn@nhnn.dev>
Co-committed-by: nhnn <nhnn@nhnn.dev>
This commit is contained in:
nhnn
2025-09-02 15:13:17 +03:00
committed by Inex Code
parent 59806327d1
commit 522dfa8dde
5 changed files with 6 additions and 38 deletions

View File

@@ -5,9 +5,8 @@
...
}:
let
secrets-filepath = "/etc/selfprivacy/secrets.json";
cfg = config.selfprivacy.modules.pleroma;
inherit (import ./common.nix config) secrets-exs sp;
sp = config.selfprivacy;
in
{
options.selfprivacy.modules.pleroma = {
@@ -106,16 +105,12 @@ in
serviceConfig.Type = "oneshot";
path = with pkgs; [
coreutils
jq
];
script = ''
set -o nounset
password="$(jq -re '.databasePassword' ${secrets-filepath})"
filecontents=$(cat <<- EOF
import Config
config :pleroma, Pleroma.Repo,
password: "$password"
EOF
)