aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFranck Cuny <franck@fcuny.net>2025-11-27 11:08:09 -0800
committerFranck Cuny <franck@fcuny.net>2025-11-27 11:11:30 -0800
commitd16d72592137bd9df18c00f34e59a9cd753cb97a (patch)
tree17b0b9396e5747b2fb0a7caca8bab192ded4534a
parentmove reverse proxy configuration to a profile (diff)
downloadinfra-d16d72592137bd9df18c00f34e59a9cd753cb97a.tar.gz
rename synology-vm to bree
-rw-r--r--machines/nixos/x86_64-linux/bree.nix (renamed from machines/nixos/x86_64-linux/synology-vm.nix)42
-rw-r--r--machines/nixos/x86_64-linux/rivendell.nix7
-rw-r--r--secrets/bree/wireguard.age (renamed from secrets/vm-synology/wireguard.age)0
-rw-r--r--secrets/secrets.nix13
4 files changed, 14 insertions, 48 deletions
diff --git a/machines/nixos/x86_64-linux/synology-vm.nix b/machines/nixos/x86_64-linux/bree.nix
index 600312d..7c8a661 100644
--- a/machines/nixos/x86_64-linux/synology-vm.nix
+++ b/machines/nixos/x86_64-linux/bree.nix
@@ -13,43 +13,15 @@
../../../profiles/server.nix
];
- age = {
- secrets = {
- restic_gcs_credentials = {
- file = ../../../secrets/restic_gcs_credentials.age;
- };
- restic_password = {
- file = ../../../secrets/restic_password.age;
- };
- nas_client_credentials = {
- file = ../../../secrets/nas_client.age;
- };
- wireguard = {
- file = ../../../secrets/vm-synology/wireguard.age;
- };
- };
- };
+ age.secrets.wireguard.file = ../../../secrets/bree/wireguard.age;
boot.loader.efi.canTouchEfiVariables = true;
boot.loader.systemd-boot.enable = true;
- networking.hostName = "synology-vm";
+ networking.hostName = "bree";
networking.useDHCP = lib.mkDefault true;
systemd.network.wait-online.anyInterface = lib.mkDefault config.networking.useDHCP;
- users.users.builder = {
- openssh.authorizedKeys.keys = [
- # my personal key
- "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINBkozy+X96u5ciX766bJ/AyQ3xm1tXZTIr5+4PVFZFi"
- # remote builder ssh key
- "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGFGxdplt9WwGjdhoYkmPe2opZMJShtpqnGCI+swrgvw"
- ];
- isNormalUser = true;
- group = "nogroup";
- };
-
- nix.settings.trusted-users = [ "builder" ];
-
networking.wireguard = {
enable = true;
interfaces.wg0 = {
@@ -58,21 +30,23 @@
privateKeyFile = config.age.secrets.wireguard.path;
peers = [
{
- publicKey = "I+l/sWtfXcdunz2nZ05rlDexGew30ZuDxL0DVTTK318=";
- allowedIPs = [ "10.100.0.0/24" ];
- endpoint = "165.232.158.110:51871";
+ # argonath
+ publicKey = "vTItDh9YPnA+8hL1kIK+7EHv0ol3qvhfAfz790miw1w=";
+ allowedIPs = [ "10.100.0.51/32" ];
+ endpoint = "157.230.146.234:51871";
persistentKeepalive = 25;
}
{
# rivendell
publicKey = "jf7T7TMKQWSgSXhUplldZDV9G2y2BjMmHIAhg5d26ng=";
- allowedIPs = [ "10.100.0.0/24" ];
+ allowedIPs = [ "10.100.0.60/32" ];
persistentKeepalive = 25;
}
];
};
};
+ networking.firewall.trustedInterfaces = [ "wg0" ];
networking.firewall.allowedUDPPorts = [ 51871 ];
home-manager = {
diff --git a/machines/nixos/x86_64-linux/rivendell.nix b/machines/nixos/x86_64-linux/rivendell.nix
index e07e876..1e7abcf 100644
--- a/machines/nixos/x86_64-linux/rivendell.nix
+++ b/machines/nixos/x86_64-linux/rivendell.nix
@@ -54,13 +54,6 @@
privateKeyFile = config.age.secrets.wireguard.path;
peers = [
{
- # digital ocean droplet
- publicKey = "I+l/sWtfXcdunz2nZ05rlDexGew30ZuDxL0DVTTK318=";
- allowedIPs = [ "10.100.0.50/32" ];
- endpoint = "165.232.158.110:51871";
- persistentKeepalive = 25;
- }
- {
# argonath
publicKey = "vTItDh9YPnA+8hL1kIK+7EHv0ol3qvhfAfz790miw1w=";
allowedIPs = [ "10.100.0.51/32" ];
diff --git a/secrets/vm-synology/wireguard.age b/secrets/bree/wireguard.age
index b12c816..b12c816 100644
--- a/secrets/vm-synology/wireguard.age
+++ b/secrets/bree/wireguard.age
diff --git a/secrets/secrets.nix b/secrets/secrets.nix
index 2639a8c..a4092c6 100644
--- a/secrets/secrets.nix
+++ b/secrets/secrets.nix
@@ -1,7 +1,7 @@
let
hosts = {
- vm-synology = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHKZAKlqOU6bSuMaaZAsYJdZnmNASWuIbbrrOjB6yGb8 root@vm-synology";
- mba = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDLQTIPZraE+jpMqGkh8yUhNFzRJbMarX5Mky3nETw6c root@mba-m2";
+ bree = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHKZAKlqOU6bSuMaaZAsYJdZnmNASWuIbbrrOjB6yGb8";
+ mba = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDLQTIPZraE+jpMqGkh8yUhNFzRJbMarX5Mky3nETw6c";
rivendell = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID76U5kt8DfBbuP16rMzfBTVTpjjPFKWnnheMALaCQEd";
argonath = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHi9jHqRjpMzXlznTXi4nEtlRlFfyIzB6Ur9A+HDfFoq";
};
@@ -18,20 +18,19 @@ in
"restic-pw.age".publicKeys = [
users.fcuny
- hosts.vm-synology
+ hosts.bree
hosts.rivendell
];
"nas_client.age".publicKeys = [
users.fcuny
- hosts.vm-synology
+ hosts.bree
hosts.rivendell
];
# this is the SSH key we use to access the remote builder.
"ssh-remote-builder.age".publicKeys = [
users.fcuny
- hosts.vm-synology
hosts.mba
];
@@ -66,9 +65,9 @@ in
hosts.rivendell
];
- "vm-synology/wireguard.age".publicKeys = [
+ "bree/wireguard.age".publicKeys = [
users.fcuny
- hosts.vm-synology
+ hosts.bree
];
"rivendell/wireguard.age".publicKeys = [