changed root cert and TLS locations
This commit is contained in:
		@@ -7,6 +7,5 @@
 | 
			
		||||
    ./boot.nix
 | 
			
		||||
    ./services.nix
 | 
			
		||||
  ];
 | 
			
		||||
  programs.gnupg.agent.enable = pkgs.lib.mkForce false;
 | 
			
		||||
  system.stateVersion = "21.05";
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -3,7 +3,7 @@
 | 
			
		||||
  networking = {
 | 
			
		||||
    hostName = "Marisa";
 | 
			
		||||
    firewall = {
 | 
			
		||||
      allowedTCPPorts = [ 22 80 6060 5001 8800 8888 4444 4445 ];
 | 
			
		||||
      allowedTCPPorts = [ 22 80 6060 5001 8800 8888 4444 4445 4646 ];
 | 
			
		||||
      allowedUDPPorts = [ 17840 ];
 | 
			
		||||
    };
 | 
			
		||||
    wireless = {
 | 
			
		||||
 
 | 
			
		||||
@@ -1,36 +1,58 @@
 | 
			
		||||
{ lib, config, pkgs, ... }:
 | 
			
		||||
{
 | 
			
		||||
  systemd.services.nomad.after = [ "consul.service" ];
 | 
			
		||||
  services = {
 | 
			
		||||
    openssh = {
 | 
			
		||||
      enable = true;
 | 
			
		||||
      permitRootLogin = "yes";
 | 
			
		||||
    };
 | 
			
		||||
 /*   nomad = {
 | 
			
		||||
      enable = true;
 | 
			
		||||
    nomad = {
 | 
			
		||||
      enable = false;
 | 
			
		||||
      enableDocker = true;
 | 
			
		||||
      settings = {
 | 
			
		||||
        bind_addr = "0.0.0.0";
 | 
			
		||||
        data_dir = "/var/lib/nomad";
 | 
			
		||||
        datacenter = "n1";
 | 
			
		||||
        log_file = "/var/log/nomad/nomad.log";
 | 
			
		||||
        server = {
 | 
			
		||||
          enable = true;
 | 
			
		||||
          enabled = true;
 | 
			
		||||
          bootstrap_expect = 1;
 | 
			
		||||
          encrypt = "nY1vuN+1ecJkwJu0s2x6Ge6UX/txvTxVqNrDMqruMlg=";
 | 
			
		||||
        };
 | 
			
		||||
        client = {
 | 
			
		||||
          enabled = true;
 | 
			
		||||
        };
 | 
			
		||||
        vault = {
 | 
			
		||||
          enabled = true;
 | 
			
		||||
          address = "https://10.55.0.2:6060";
 | 
			
		||||
          ca_path = "../../cert.pem";
 | 
			
		||||
          token = "s.WaNfk6ZISRbwsEx43UokG3HU";
 | 
			
		||||
          address = "https://10.55.0.2:8800";
 | 
			
		||||
          ca_file = "/var/rootcert/cert.pem";
 | 
			
		||||
          cert_file = "/var/vault/cert.pem";
 | 
			
		||||
          key_file = "/var/vault/key.pem";
 | 
			
		||||
#          allow_unauthenticated = true;
 | 
			
		||||
          allow_unauthenticated = false;
 | 
			
		||||
          create_from_role = "nomad-cluster";
 | 
			
		||||
        };
 | 
			
		||||
 | 
			
		||||
        consul = {
 | 
			
		||||
          address = "10.55.0.2:4444";
 | 
			
		||||
          ssl = true;
 | 
			
		||||
          allow_unauthenticated = false;
 | 
			
		||||
          auto_advertise = true;
 | 
			
		||||
          server_auto_join = true;
 | 
			
		||||
          client_auto_join = true;
 | 
			
		||||
          ca_file = "/var/certs/cert.pem";
 | 
			
		||||
          cert_file = "/var/vault/cert.pem";
 | 
			
		||||
          key_file = "/var/vault/key.pem";
 | 
			
		||||
        };
 | 
			
		||||
        acl = {
 | 
			
		||||
          enabled = true;
 | 
			
		||||
        };
 | 
			
		||||
      };
 | 
			
		||||
    };*/
 | 
			
		||||
    };
 | 
			
		||||
    vault = {
 | 
			
		||||
      package = pkgs.vault-bin;
 | 
			
		||||
      enable = true;
 | 
			
		||||
      tlsCertFile = "/var/certs/cert.pem";
 | 
			
		||||
      tlsKeyFile = "/var/certs/key.pem";
 | 
			
		||||
      tlsCertFile = "/var/rootcert/cert.pem";
 | 
			
		||||
      tlsKeyFile = "/var/rootcert/key.pem";
 | 
			
		||||
      address = "0.0.0.0:8800";
 | 
			
		||||
      storageBackend = "file";
 | 
			
		||||
      storagePath = "/var/lib/vault";
 | 
			
		||||
@@ -40,7 +62,7 @@
 | 
			
		||||
      '';
 | 
			
		||||
    };
 | 
			
		||||
    consul = {
 | 
			
		||||
      enable = true;
 | 
			
		||||
      enable = false;
 | 
			
		||||
      webUi = true;
 | 
			
		||||
      extraConfig = rec {
 | 
			
		||||
        bootstrap = true;
 | 
			
		||||
@@ -55,8 +77,10 @@
 | 
			
		||||
        connect = {
 | 
			
		||||
          enabled = true;
 | 
			
		||||
        };
 | 
			
		||||
        encrypt = "zdlcIl2Z4D01SdNQMv6fSfBN6OkQU10LAyPvwdQDwn4=";
 | 
			
		||||
        ca_file = "../../cert.pem";
 | 
			
		||||
        encrypt = "dXoYbVt1Rb1cTFTWVBGO6CaFIBmc90MPCjhqttBlXi0=";
 | 
			
		||||
        ca_file = "/var/rootcert/cert.pem";
 | 
			
		||||
        cert_file = "/var/certs/cert.pem";
 | 
			
		||||
        key_file = "/var/certs/key.pem";
 | 
			
		||||
        ports = {
 | 
			
		||||
          http = 4444;
 | 
			
		||||
          grpc = 4445;
 | 
			
		||||
@@ -68,8 +92,8 @@
 | 
			
		||||
      settings = {
 | 
			
		||||
        vault = {
 | 
			
		||||
          address = "https://10.55.0.2:8800";
 | 
			
		||||
          client_cert = "/var/vault/cert.pem";
 | 
			
		||||
          client_key = "/var/vault/key.pem";
 | 
			
		||||
          client_cert = "/var/certs/cert.pem";
 | 
			
		||||
          client_key = "/var/certs/key.pem";
 | 
			
		||||
        };
 | 
			
		||||
        auto_auth = {
 | 
			
		||||
          method = [
 | 
			
		||||
@@ -125,7 +149,7 @@
 | 
			
		||||
      };
 | 
			
		||||
      settings = {
 | 
			
		||||
        oauth2_client = {
 | 
			
		||||
         UPDATE_AVATAR = true;
 | 
			
		||||
          UPDATE_AVATAR = true;
 | 
			
		||||
        };
 | 
			
		||||
        ui = {
 | 
			
		||||
          DEFAULT_THEME = "arc-green";
 | 
			
		||||
@@ -139,7 +163,6 @@
 | 
			
		||||
      };
 | 
			
		||||
    };
 | 
			
		||||
  };
 | 
			
		||||
  #  systemd.services.consul.serviceConfig.Type = "notify";
 | 
			
		||||
  users.users.root.openssh.authorizedKeys.keys = [
 | 
			
		||||
    "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJHingN2Aho+KGgEvBMjtoez+W1svl9uVoa4vG0d646j"
 | 
			
		||||
    "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPX1HDzWpoaOcU8GDEGuDzXgxkCpyeqxRR6gLs/8JgHw"
 | 
			
		||||
 
 | 
			
		||||
@@ -33,8 +33,8 @@
 | 
			
		||||
      settings = {
 | 
			
		||||
        vault = {
 | 
			
		||||
          address = "https://10.55.0.2:8800";
 | 
			
		||||
          client_cert = "/var/vault/cert.pem";
 | 
			
		||||
          client_key = "/var/vault/key.pem";
 | 
			
		||||
          client_cert = "/var/certs/cert.pem";
 | 
			
		||||
          client_key = "/var/certs/key.pem";
 | 
			
		||||
        };
 | 
			
		||||
        auto_auth = {
 | 
			
		||||
          method = [
 | 
			
		||||
 
 | 
			
		||||
@@ -13,12 +13,12 @@
 | 
			
		||||
      };
 | 
			
		||||
    };*/
 | 
			
		||||
    vault-agent = {
 | 
			
		||||
      enable = true;
 | 
			
		||||
      enable = false;
 | 
			
		||||
      settings = {
 | 
			
		||||
        vault = {
 | 
			
		||||
          address = "https://10.55.0.2:8800";
 | 
			
		||||
          client_cert = "/var/vault/cert.pem";
 | 
			
		||||
          client_key = "/var/vault/key.pem";
 | 
			
		||||
          client_cert = "/var/certs/cert.pem";
 | 
			
		||||
          client_key = "/var/certs/key.pem";
 | 
			
		||||
        };
 | 
			
		||||
        auto_auth = {
 | 
			
		||||
          method = [
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user