From 525ddb5dbd9cb8d13a8325280d4c21949c0a9d95 Mon Sep 17 00:00:00 2001
From: Florian Sesser <florian@privatestorage.io>
Date: Sun, 30 May 2021 18:53:53 +0000
Subject: [PATCH] Rename monitoringvpnSecretKeyDir -> monitoringvpnKeyDir
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

... clean up 🧹
---
 morph/grid/local/config.json  | 2 +-
 morph/lib/make-issuer.nix     | 8 ++++----
 morph/lib/make-monitoring.nix | 6 +++---
 morph/lib/make-testing.nix    | 8 ++++----
 4 files changed, 12 insertions(+), 12 deletions(-)

diff --git a/morph/grid/local/config.json b/morph/grid/local/config.json
index 7c4b95a5..09074b3a 100644
--- a/morph/grid/local/config.json
+++ b/morph/grid/local/config.json
@@ -1,7 +1,7 @@
 { "publicStoragePort": 8898
 , "ristrettoSigningKeyPath": "../../PrivateStorageSecrets/ristretto.signing-key"
 , "stripeSecretKeyPath": "../../PrivateStorageSecrets/privatestorageio-testing-stripe.secret"
-, "monitoringvpnSecretKeyDir": "../../PrivateStorageSecrets/monitoringvpn"
+, "monitoringvpnKeyDir": "../../PrivateStorageSecrets/monitoringvpn"
 , "passValue": 1000000
 , "issuerDomain": "payments.localdev"
 , "letsEncryptAdminEmail": "florian@privatestorage.io"
diff --git a/morph/lib/make-issuer.nix b/morph/lib/make-issuer.nix
index 17382c4b..b5573a15 100644
--- a/morph/lib/make-issuer.nix
+++ b/morph/lib/make-issuer.nix
@@ -7,18 +7,18 @@
 , sshUsers
 , stateVersion
 , publicIPv4
-, monitoringvpnSecretKeyDir ? null
+, monitoringvpnKeyDir ? null
 , monitoringvpnIPv4 ? null
 , ...
 }: let
 
-  enableVpn = if (monitoringvpnSecretKeyDir != null &&
+  enableVpn = if (monitoringvpnKeyDir != null &&
                   monitoringvpnIPv4 != null)
               then true else false;
 
   vpnSecrets = if !enableVpn then {} else {
     "monitoringvpn-secret-key" = {
-      source = monitoringvpnSecretKeyDir + "/${monitoringvpnIPv4}.key";
+      source = monitoringvpnKeyDir + "/${monitoringvpnIPv4}.key";
       destination = "/run/keys/monitoringvpn/client.key";
       owner.user = "root";
       owner.group = "root";
@@ -26,7 +26,7 @@
       action = ["sudo" "systemctl" "restart" "wireguard-monitoringvpn.service"];
     };
     "monitoringvpn-preshared-key" = {
-      source = monitoringvpnSecretKeyDir + "/preshared.key";
+      source = monitoringvpnKeyDir + "/preshared.key";
       destination = "/run/keys/monitoringvpn/preshared.key";
       owner.user = "root";
       owner.group = "root";
diff --git a/morph/lib/make-monitoring.nix b/morph/lib/make-monitoring.nix
index c557e270..1ee2db34 100644
--- a/morph/lib/make-monitoring.nix
+++ b/morph/lib/make-monitoring.nix
@@ -2,7 +2,7 @@
 , hardware
 , publicStoragePort
 , ristrettoSigningKeyPath
-, monitoringvpnSecretKeyDir
+, monitoringvpnKeyDir
 , passValue
 , sshUsers
 , stateVersion
@@ -15,7 +15,7 @@
 
     secrets = {
       "monitoringvpn-private-key" = {
-        source = monitoringvpnSecretKeyDir + "/server.key";
+        source = monitoringvpnKeyDir + "/server.key";
         destination = "/run/keys/monitoringvpn/server.key";
         owner.user = "root";
         owner.group = "root";
@@ -23,7 +23,7 @@
         action = ["sudo" "systemctl" "restart" "wireguard-monitoringvpn.service"];
       };
       "monitoringvpn-preshared-key" = {
-        source = monitoringvpnSecretKeyDir + "/preshared.key";
+        source = monitoringvpnKeyDir + "/preshared.key";
         destination = "/run/keys/monitoringvpn/preshared.key";
         owner.user = "root";
         owner.group = "root";
diff --git a/morph/lib/make-testing.nix b/morph/lib/make-testing.nix
index 149ae740..023c9202 100644
--- a/morph/lib/make-testing.nix
+++ b/morph/lib/make-testing.nix
@@ -5,17 +5,17 @@
 , passValue
 , sshUsers
 , stateVersion
-, monitoringvpnSecretKeyDir ? null
+, monitoringvpnKeyDir ? null
 , monitoringvpnIPv4 ? null
 , ... }: let
 
-  enableVpn = if (monitoringvpnSecretKeyDir != null &&
+  enableVpn = if (monitoringvpnKeyDir != null &&
                   monitoringvpnIPv4 != null)
               then true else false;
 
   vpnSecrets = if !enableVpn then {} else {
     "monitoringvpn-secret-key" = {
-      source = monitoringvpnSecretKeyDir + "/${monitoringvpnIPv4}.key";
+      source = monitoringvpnKeyDir + "/${monitoringvpnIPv4}.key";
       destination = "/run/keys/monitoringvpn/client.key";
       owner.user = "root";
       owner.group = "root";
@@ -23,7 +23,7 @@
       action = ["sudo" "systemctl" "restart" "wireguard-monitoringvpn.service"];
     };
     "monitoringvpn-preshared-key" = {
-      source = monitoringvpnSecretKeyDir + "/preshared.key";
+      source = monitoringvpnKeyDir + "/preshared.key";
       destination = "/run/keys/monitoringvpn/preshared.key";
       owner.user = "root";
       owner.group = "root";
-- 
GitLab