Marisa:added vault
This commit is contained in:
@@ -3,7 +3,7 @@
|
||||
networking = {
|
||||
hostName = "Marisa";
|
||||
firewall = {
|
||||
allowedTCPPorts = [ 22 80 8000 6060 5001 ];
|
||||
allowedTCPPorts = [ 22 80 6060 5001 8800 ];
|
||||
allowedUDPPorts = [ 17840 ];
|
||||
};
|
||||
wireless = {
|
||||
@@ -20,17 +20,15 @@
|
||||
};
|
||||
};
|
||||
wireguard.interfaces.wg0 = {
|
||||
ips = [ "100.0.0.2/24" ];
|
||||
ips = [ "10.55.0.2/24" ];
|
||||
listenPort = 17840;
|
||||
# postSetup = "${pkgs.iproute}/bin/ip route add weirdnatto.in via 192.168.0.1";
|
||||
# postShutdown = "${pkgs.iproute}/bin/ip route del weirdnatto.in via 192.168.0.1";
|
||||
privateKeyFile = "/var/secrets/wg";
|
||||
privateKeyFile = "/var/secrets/wg.key";
|
||||
peers = [
|
||||
{
|
||||
#Oracle VM1
|
||||
publicKey = "z0Y2VNEWcyVQVSqRHiwmiJ5/0MgSPM+HZfEcwIccSxM=";
|
||||
allowedIPs = [ "100.0.0.0/24" ];
|
||||
endpoint = "140.238.230.155:17840";
|
||||
allowedIPs = [ "10.55.0.0/24" ];
|
||||
endpoint = "weirdnatto.in:17840";
|
||||
persistentKeepalive = 25;
|
||||
}
|
||||
];
|
||||
|
@@ -9,17 +9,59 @@
|
||||
enable = true;
|
||||
enableImap = true;
|
||||
};
|
||||
/* vault = {
|
||||
vault = {
|
||||
package = pkgs.vault-bin;
|
||||
enable = true;
|
||||
address = "127.0.0.1:8000";
|
||||
tlsCertFile = "/var/certs/cert.pem";
|
||||
tlsKeyFile = "/var/certs/key.pem";
|
||||
address = "0.0.0.0:8800";
|
||||
extraSettingsPaths = [ /var/vault/vault.hcl ];
|
||||
storageBackend = "postgresql";
|
||||
};*/
|
||||
extraConfig = ''
|
||||
api_addr = "https://127.0.0.1:8800"
|
||||
ui = true
|
||||
'';
|
||||
};
|
||||
vault-agent = {
|
||||
enable = true;
|
||||
settings = {
|
||||
vault = {
|
||||
address = "https://10.55.0.2:8800";
|
||||
client_cert = "/var/vault/cert.pem";
|
||||
client_key = "/var/vault/key.pem";
|
||||
};
|
||||
auto_auth = {
|
||||
method = [
|
||||
{
|
||||
"cert" = {
|
||||
name = "Marisa";
|
||||
};
|
||||
}
|
||||
];
|
||||
};
|
||||
template = [
|
||||
{
|
||||
source = pkgs.writeText "gitea.tpl" ''
|
||||
{{ with secret "kv/systems/Marisa" }}{{ .Data.data.gitea }}{{ end }}
|
||||
'';
|
||||
destination = "/var/secrets/gitea.key";
|
||||
}
|
||||
{
|
||||
source = pkgs.writeText "wg.tpl" ''
|
||||
{{ with secret "kv/systems/Marisa/wg" }}{{ .Data.data.private }}{{ end }}
|
||||
'';
|
||||
destination = "/var/secrets/wg.key";
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
postgresql = {
|
||||
enable = true;
|
||||
port = 6060;
|
||||
enableTCPIP = true;
|
||||
authentication = ''
|
||||
local gitea all ident map=gitea-map
|
||||
host vault all 10.55.0.2/32 md5
|
||||
host all all 192.168.0.110/32 md5
|
||||
'';
|
||||
identMap = ''
|
||||
@@ -37,7 +79,7 @@
|
||||
port = 6060;
|
||||
name = "gitea";
|
||||
user = name;
|
||||
passwordFile = "/var/secrets/gitea";
|
||||
passwordFile = "/var/secrets/gitea.key";
|
||||
type = "postgres";
|
||||
};
|
||||
settings = {
|
||||
@@ -57,5 +99,7 @@
|
||||
users.users.root.openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJHingN2Aho+KGgEvBMjtoez+W1svl9uVoa4vG0d646j"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPX1HDzWpoaOcU8GDEGuDzXgxkCpyeqxRR6gLs/8JgHw"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK06ZUa9BKmZ6m+xapBjOAm10OCLzxIm8ais20wQC47m"
|
||||
];
|
||||
security.pki.certificateFiles = [ ../../../cert.pem ];
|
||||
}
|
||||
|
Reference in New Issue
Block a user