2024-07-20 13:11:15 +01:00
|
|
|
{pkgs, ...}: {
|
2023-09-20 18:44:24 +01:00
|
|
|
services.secrets = {
|
|
|
|
enable = true;
|
|
|
|
|
|
|
|
vaultLogin = {
|
|
|
|
enable = true;
|
|
|
|
loginUsername = "hetzner-arm";
|
|
|
|
};
|
|
|
|
|
2024-07-20 13:11:15 +01:00
|
|
|
packages = with pkgs; [
|
|
|
|
apacheHttpd
|
|
|
|
];
|
|
|
|
|
2023-09-20 18:44:24 +01:00
|
|
|
requiredVaultPaths = [
|
2023-09-21 05:06:27 +01:00
|
|
|
"private-public-keys/data/ssh/root@hetzner-arm"
|
2023-09-20 19:02:27 +01:00
|
|
|
"private-public-keys/data/ssh/root@hetzner-arm-decrypt"
|
2024-07-20 12:24:27 +01:00
|
|
|
|
2024-07-20 12:34:15 +01:00
|
|
|
"api-keys/data/backblaze/Chaos-Backups"
|
2024-07-20 12:24:27 +01:00
|
|
|
|
|
|
|
"private-public-keys/data/restic/Social"
|
2024-07-20 12:33:03 +01:00
|
|
|
"api-keys/data/chaos_mail/gotosocial"
|
2024-07-20 12:58:45 +01:00
|
|
|
|
|
|
|
"private-public-keys/data/restic/Forgejo"
|
2024-07-20 13:11:15 +01:00
|
|
|
|
|
|
|
"api-keys/data/mpd"
|
|
|
|
"api-keys/data/music-stream"
|
2024-07-20 13:23:50 +01:00
|
|
|
|
|
|
|
"api-keys/data/radicale"
|
|
|
|
"private-public-keys/data/restic/Radicale"
|
2024-07-21 20:40:28 +01:00
|
|
|
|
|
|
|
"private-public-keys/data/restic/Vault"
|
2023-09-20 18:44:24 +01:00
|
|
|
];
|
|
|
|
|
|
|
|
secrets = {
|
|
|
|
vault_password = {
|
|
|
|
manual = true;
|
|
|
|
};
|
|
|
|
|
2023-09-21 05:06:27 +01:00
|
|
|
ssh_host_ed25519_key = {
|
|
|
|
path = "/etc/ssh/ssh_host_ed25519_key";
|
|
|
|
permissions = "600";
|
|
|
|
fetchScript = ''
|
|
|
|
[ ! -d "$SYSROOT/etc/ssh" ] && mkdir -p "$SYSROOT/etc/ssh/"
|
|
|
|
simple_get "/private-public-keys/ssh/root@hetzner-arm" .private | base64 -d > "$secretFile"
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
ssh_host_ed25519_key_pub = {
|
|
|
|
path = "/etc/ssh/ssh_host_ed25519_key.pub";
|
|
|
|
permissions = "600";
|
|
|
|
fetchScript = ''
|
|
|
|
[ ! -d "$SYSROOT/etc/ssh" ] && mkdir -p "$SYSROOT/etc/ssh/"
|
|
|
|
simple_get "/private-public-keys/ssh/root@hetzner-arm" .private | base64 -d > "$secretFile"
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2023-09-20 19:02:27 +01:00
|
|
|
# this doesn't need to be a secret and can be generated at install time
|
|
|
|
# but it makes it easier to install.
|
|
|
|
# it's stored in /nix store anyway
|
2023-09-21 05:06:27 +01:00
|
|
|
initrd_ssh_host_ed25519_key = {
|
|
|
|
path = "/initrd_ssh_host_ed25519_key";
|
2023-09-20 19:02:27 +01:00
|
|
|
permissions = "600";
|
|
|
|
fetchScript = ''
|
|
|
|
simple_get "/private-public-keys/ssh/root@hetzner-arm-decrypt" .private | base64 -d > "$secretFile"
|
|
|
|
'';
|
|
|
|
};
|
2024-07-20 12:24:27 +01:00
|
|
|
|
|
|
|
# B2 Keys for all backups
|
|
|
|
restic_backups_env = {
|
|
|
|
fetchScript = ''
|
|
|
|
cat << EOF > "$secretFile"
|
|
|
|
AWS_ACCESS_KEY_ID=$(simple_get "/api-keys/backblaze/Chaos-Backups" .keyID)
|
|
|
|
AWS_SECRET_ACCESS_KEY=$(simple_get "/api-keys/backblaze/Chaos-Backups" .applicationKey)
|
|
|
|
EOF
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
restic_password_social = {
|
|
|
|
fetchScript = ''
|
|
|
|
simple_get "/private-public-keys/restic/Social" .password > "$secretFile"
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
gotosocial_env = {
|
|
|
|
fetchScript = ''
|
|
|
|
smtp_password=$(simple_get "/api-keys/chaos_mail/gotosocial" .password)
|
|
|
|
echo "GTS_SMTP_PASSWORD=$smtp_password" > "$secretFile"
|
|
|
|
'';
|
|
|
|
};
|
2024-07-20 12:58:45 +01:00
|
|
|
|
|
|
|
restic_password_forgejo = {
|
|
|
|
fetchScript = ''
|
|
|
|
simple_get "/private-public-keys/restic/Forgejo" .password > "$secretFile"
|
|
|
|
'';
|
|
|
|
};
|
2024-07-20 13:11:15 +01:00
|
|
|
|
|
|
|
mpd_control_password = {
|
|
|
|
user = "mpd";
|
|
|
|
group = "mpd";
|
|
|
|
fetchScript = ''
|
|
|
|
simple_get "/api-keys/mpd" .password > "$secretFile"
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
music_stream_passwd = {
|
|
|
|
user = "nginx";
|
|
|
|
group = "nginx";
|
|
|
|
fetchScript = ''
|
|
|
|
username=$(simple_get "/api-keys/music-stream" .username)
|
|
|
|
password=$(simple_get "/api-keys/music-stream" .password)
|
|
|
|
htpasswd -bc "$secretFile" "$username" "$password" 2>/dev/null
|
|
|
|
'';
|
|
|
|
};
|
2024-07-20 13:23:50 +01:00
|
|
|
|
|
|
|
radicale_htpasswd = {
|
|
|
|
user = "radicale";
|
|
|
|
group = "radicale";
|
|
|
|
fetchScript = ''
|
|
|
|
if [ -f "$secretFile" ]; then
|
|
|
|
rm "$secretFile"
|
|
|
|
fi
|
|
|
|
|
|
|
|
touch "$secretFile"
|
|
|
|
|
|
|
|
data=$(kv_get "/api-keys/radicale" | base64)
|
|
|
|
for username in $(echo "$data" | base64 -d | jq -r ".data.data | keys | .[]"); do
|
|
|
|
password=$(echo "$data" | base64 -d | jq -r ".data.data.\"$username\"")
|
|
|
|
htpasswd -bB "$secretFile" "$username" "$password" 2>/dev/null
|
|
|
|
done
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
restic_password_radicale = {
|
|
|
|
fetchScript = ''
|
|
|
|
simple_get "/private-public-keys/restic/Radicale" .password > "$secretFile"
|
|
|
|
'';
|
|
|
|
};
|
2024-07-21 20:40:28 +01:00
|
|
|
|
|
|
|
restic_password_vault = {
|
|
|
|
fetchScript = ''
|
|
|
|
simple_get "/private-public-keys/restic/Vault" .password > "$secretFile"
|
|
|
|
'';
|
|
|
|
};
|
2023-09-20 18:44:24 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|