nixfiles/hosts/hetzner-arm/secrets.nix

111 lines
3.1 KiB
Nix
Raw Normal View History

2024-07-20 13:11:15 +01:00
{pkgs, ...}: {
2023-09-20 18:44:24 +01:00
services.secrets = {
enable = true;
vaultLogin = {
enable = true;
loginUsername = "hetzner-arm";
};
2024-07-20 13:11:15 +01:00
packages = with pkgs; [
apacheHttpd
];
2023-09-20 18:44:24 +01:00
requiredVaultPaths = [
"private-public-keys/data/ssh/root@hetzner-arm"
2023-09-20 19:02:27 +01:00
"private-public-keys/data/ssh/root@hetzner-arm-decrypt"
2024-07-20 12:24:27 +01:00
2024-07-20 12:34:15 +01:00
"api-keys/data/backblaze/Chaos-Backups"
2024-07-20 12:24:27 +01:00
"private-public-keys/data/restic/Social"
2024-07-20 12:33:03 +01:00
"api-keys/data/chaos_mail/gotosocial"
2024-07-20 12:58:45 +01:00
"private-public-keys/data/restic/Forgejo"
2024-07-20 13:11:15 +01:00
"api-keys/data/mpd"
"api-keys/data/music-stream"
2023-09-20 18:44:24 +01:00
];
secrets = {
vault_password = {
manual = true;
};
ssh_host_ed25519_key = {
path = "/etc/ssh/ssh_host_ed25519_key";
permissions = "600";
fetchScript = ''
[ ! -d "$SYSROOT/etc/ssh" ] && mkdir -p "$SYSROOT/etc/ssh/"
simple_get "/private-public-keys/ssh/root@hetzner-arm" .private | base64 -d > "$secretFile"
'';
};
ssh_host_ed25519_key_pub = {
path = "/etc/ssh/ssh_host_ed25519_key.pub";
permissions = "600";
fetchScript = ''
[ ! -d "$SYSROOT/etc/ssh" ] && mkdir -p "$SYSROOT/etc/ssh/"
simple_get "/private-public-keys/ssh/root@hetzner-arm" .private | base64 -d > "$secretFile"
'';
};
2023-09-20 19:02:27 +01:00
# this doesn't need to be a secret and can be generated at install time
# but it makes it easier to install.
# it's stored in /nix store anyway
initrd_ssh_host_ed25519_key = {
path = "/initrd_ssh_host_ed25519_key";
2023-09-20 19:02:27 +01:00
permissions = "600";
fetchScript = ''
simple_get "/private-public-keys/ssh/root@hetzner-arm-decrypt" .private | base64 -d > "$secretFile"
'';
};
2024-07-20 12:24:27 +01:00
# B2 Keys for all backups
restic_backups_env = {
fetchScript = ''
cat << EOF > "$secretFile"
AWS_ACCESS_KEY_ID=$(simple_get "/api-keys/backblaze/Chaos-Backups" .keyID)
AWS_SECRET_ACCESS_KEY=$(simple_get "/api-keys/backblaze/Chaos-Backups" .applicationKey)
EOF
'';
};
restic_password_social = {
fetchScript = ''
simple_get "/private-public-keys/restic/Social" .password > "$secretFile"
'';
};
gotosocial_env = {
fetchScript = ''
smtp_password=$(simple_get "/api-keys/chaos_mail/gotosocial" .password)
echo "GTS_SMTP_PASSWORD=$smtp_password" > "$secretFile"
'';
};
2024-07-20 12:58:45 +01:00
restic_password_forgejo = {
fetchScript = ''
simple_get "/private-public-keys/restic/Forgejo" .password > "$secretFile"
'';
};
2024-07-20 13:11:15 +01:00
mpd_control_password = {
user = "mpd";
group = "mpd";
fetchScript = ''
simple_get "/api-keys/mpd" .password > "$secretFile"
'';
};
music_stream_passwd = {
user = "nginx";
group = "nginx";
fetchScript = ''
username=$(simple_get "/api-keys/music-stream" .username)
password=$(simple_get "/api-keys/music-stream" .password)
htpasswd -bc "$secretFile" "$username" "$password" 2>/dev/null
'';
};
2023-09-20 18:44:24 +01:00
};
};
}