diff options
| author | Franck Cuny <franck@fcuny.net> | 2025-11-27 11:08:09 -0800 |
|---|---|---|
| committer | Franck Cuny <franck@fcuny.net> | 2025-11-27 11:11:30 -0800 |
| commit | d16d72592137bd9df18c00f34e59a9cd753cb97a (patch) | |
| tree | 17b0b9396e5747b2fb0a7caca8bab192ded4534a | |
| parent | move reverse proxy configuration to a profile (diff) | |
| download | infra-d16d72592137bd9df18c00f34e59a9cd753cb97a.tar.gz | |
rename synology-vm to bree
| -rw-r--r-- | machines/nixos/x86_64-linux/bree.nix (renamed from machines/nixos/x86_64-linux/synology-vm.nix) | 42 | ||||
| -rw-r--r-- | machines/nixos/x86_64-linux/rivendell.nix | 7 | ||||
| -rw-r--r-- | secrets/bree/wireguard.age (renamed from secrets/vm-synology/wireguard.age) | 0 | ||||
| -rw-r--r-- | secrets/secrets.nix | 13 |
4 files changed, 14 insertions, 48 deletions
diff --git a/machines/nixos/x86_64-linux/synology-vm.nix b/machines/nixos/x86_64-linux/bree.nix index 600312d..7c8a661 100644 --- a/machines/nixos/x86_64-linux/synology-vm.nix +++ b/machines/nixos/x86_64-linux/bree.nix @@ -13,43 +13,15 @@ ../../../profiles/server.nix ]; - age = { - secrets = { - restic_gcs_credentials = { - file = ../../../secrets/restic_gcs_credentials.age; - }; - restic_password = { - file = ../../../secrets/restic_password.age; - }; - nas_client_credentials = { - file = ../../../secrets/nas_client.age; - }; - wireguard = { - file = ../../../secrets/vm-synology/wireguard.age; - }; - }; - }; + age.secrets.wireguard.file = ../../../secrets/bree/wireguard.age; boot.loader.efi.canTouchEfiVariables = true; boot.loader.systemd-boot.enable = true; - networking.hostName = "synology-vm"; + networking.hostName = "bree"; networking.useDHCP = lib.mkDefault true; systemd.network.wait-online.anyInterface = lib.mkDefault config.networking.useDHCP; - users.users.builder = { - openssh.authorizedKeys.keys = [ - # my personal key - "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINBkozy+X96u5ciX766bJ/AyQ3xm1tXZTIr5+4PVFZFi" - # remote builder ssh key - "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGFGxdplt9WwGjdhoYkmPe2opZMJShtpqnGCI+swrgvw" - ]; - isNormalUser = true; - group = "nogroup"; - }; - - nix.settings.trusted-users = [ "builder" ]; - networking.wireguard = { enable = true; interfaces.wg0 = { @@ -58,21 +30,23 @@ privateKeyFile = config.age.secrets.wireguard.path; peers = [ { - publicKey = "I+l/sWtfXcdunz2nZ05rlDexGew30ZuDxL0DVTTK318="; - allowedIPs = [ "10.100.0.0/24" ]; - endpoint = "165.232.158.110:51871"; + # argonath + publicKey = "vTItDh9YPnA+8hL1kIK+7EHv0ol3qvhfAfz790miw1w="; + allowedIPs = [ "10.100.0.51/32" ]; + endpoint = "157.230.146.234:51871"; persistentKeepalive = 25; } { # rivendell publicKey = "jf7T7TMKQWSgSXhUplldZDV9G2y2BjMmHIAhg5d26ng="; - allowedIPs = [ "10.100.0.0/24" ]; + allowedIPs = [ "10.100.0.60/32" ]; persistentKeepalive = 25; } ]; }; }; + networking.firewall.trustedInterfaces = [ "wg0" ]; networking.firewall.allowedUDPPorts = [ 51871 ]; home-manager = { diff --git a/machines/nixos/x86_64-linux/rivendell.nix b/machines/nixos/x86_64-linux/rivendell.nix index e07e876..1e7abcf 100644 --- a/machines/nixos/x86_64-linux/rivendell.nix +++ b/machines/nixos/x86_64-linux/rivendell.nix @@ -54,13 +54,6 @@ privateKeyFile = config.age.secrets.wireguard.path; peers = [ { - # digital ocean droplet - publicKey = "I+l/sWtfXcdunz2nZ05rlDexGew30ZuDxL0DVTTK318="; - allowedIPs = [ "10.100.0.50/32" ]; - endpoint = "165.232.158.110:51871"; - persistentKeepalive = 25; - } - { # argonath publicKey = "vTItDh9YPnA+8hL1kIK+7EHv0ol3qvhfAfz790miw1w="; allowedIPs = [ "10.100.0.51/32" ]; diff --git a/secrets/vm-synology/wireguard.age b/secrets/bree/wireguard.age index b12c816..b12c816 100644 --- a/secrets/vm-synology/wireguard.age +++ b/secrets/bree/wireguard.age diff --git a/secrets/secrets.nix b/secrets/secrets.nix index 2639a8c..a4092c6 100644 --- a/secrets/secrets.nix +++ b/secrets/secrets.nix @@ -1,7 +1,7 @@ let hosts = { - vm-synology = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHKZAKlqOU6bSuMaaZAsYJdZnmNASWuIbbrrOjB6yGb8 root@vm-synology"; - mba = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDLQTIPZraE+jpMqGkh8yUhNFzRJbMarX5Mky3nETw6c root@mba-m2"; + bree = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHKZAKlqOU6bSuMaaZAsYJdZnmNASWuIbbrrOjB6yGb8"; + mba = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDLQTIPZraE+jpMqGkh8yUhNFzRJbMarX5Mky3nETw6c"; rivendell = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID76U5kt8DfBbuP16rMzfBTVTpjjPFKWnnheMALaCQEd"; argonath = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHi9jHqRjpMzXlznTXi4nEtlRlFfyIzB6Ur9A+HDfFoq"; }; @@ -18,20 +18,19 @@ in "restic-pw.age".publicKeys = [ users.fcuny - hosts.vm-synology + hosts.bree hosts.rivendell ]; "nas_client.age".publicKeys = [ users.fcuny - hosts.vm-synology + hosts.bree hosts.rivendell ]; # this is the SSH key we use to access the remote builder. "ssh-remote-builder.age".publicKeys = [ users.fcuny - hosts.vm-synology hosts.mba ]; @@ -66,9 +65,9 @@ in hosts.rivendell ]; - "vm-synology/wireguard.age".publicKeys = [ + "bree/wireguard.age".publicKeys = [ users.fcuny - hosts.vm-synology + hosts.bree ]; "rivendell/wireguard.age".publicKeys = [ |
