feat: add git server to tailnet
This commit is contained in:
parent
48c04a94fa
commit
01409f7ecb
|
@ -7,15 +7,17 @@ let
|
||||||
node = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIETLBnc8kJokmFiA28BaSYpeE7flY1W0SM5C1pWv/tOv";
|
node = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIETLBnc8kJokmFiA28BaSYpeE7flY1W0SM5C1pWv/tOv";
|
||||||
pi4 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK9fnNXzEmDdmtR+KWj/M9vQioFR0s/4jMnIkUFcj8As";
|
pi4 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK9fnNXzEmDdmtR+KWj/M9vQioFR0s/4jMnIkUFcj8As";
|
||||||
proxy = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAf6Z7SZEOH3H51T/GPIc/B0OpbaydM5l2PP3nMnwpFl";
|
proxy = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAf6Z7SZEOH3H51T/GPIc/B0OpbaydM5l2PP3nMnwpFl";
|
||||||
|
git = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN8JLy/ipBfOet3/KT7rXOXHDjjmt+VqqQb3V+ILIuDN";
|
||||||
};
|
};
|
||||||
in {
|
in {
|
||||||
"cf_dns_kilonull.age".publicKeys = [users.me machines.node machines.gospel machines.pi4 machines.proxy];
|
"cf_dns_kilonull.age".publicKeys = [users.me machines.node machines.gospel machines.pi4 machines.proxy];
|
||||||
"nextcloud_admin.age".publicKeys = [users.me machines.node machines.gospel];
|
|
||||||
"theengs_ble_mqtt.age".publicKeys = [users.me machines.pi4 machines.gospel];
|
|
||||||
"hass_mqtt.age".publicKeys = [users.me machines.pi4 machines.node machines.gospel];
|
|
||||||
"teslamate_db.age".publicKeys = [users.me machines.node machines.gospel];
|
|
||||||
"teslamate_mqtt.age".publicKeys = [users.me machines.pi4 machines.node machines.gospel];
|
|
||||||
"teslamate_encryption.age".publicKeys = [users.me machines.node machines.gospel];
|
|
||||||
"hydra-aws-creds.age".publicKeys = [users.me machines.gospel];
|
|
||||||
"gitea-runner-gospel.age".publicKeys = [users.me machines.gospel];
|
"gitea-runner-gospel.age".publicKeys = [users.me machines.gospel];
|
||||||
|
"hass_mqtt.age".publicKeys = [users.me machines.pi4 machines.node machines.gospel];
|
||||||
|
"hydra-aws-creds.age".publicKeys = [users.me machines.gospel];
|
||||||
|
"nextcloud_admin.age".publicKeys = [users.me machines.node machines.gospel];
|
||||||
|
"tailscale_git_server.age".publicKeys = [users.me machines.git]; # This key expires, might have to update
|
||||||
|
"teslamate_db.age".publicKeys = [users.me machines.node machines.gospel];
|
||||||
|
"teslamate_encryption.age".publicKeys = [users.me machines.node machines.gospel];
|
||||||
|
"teslamate_mqtt.age".publicKeys = [users.me machines.pi4 machines.node machines.gospel];
|
||||||
|
"theengs_ble_mqtt.age".publicKeys = [users.me machines.pi4 machines.gospel];
|
||||||
}
|
}
|
||||||
|
|
BIN
secrets/tailscale_git_server.age
Normal file
BIN
secrets/tailscale_git_server.age
Normal file
Binary file not shown.
|
@ -4,9 +4,12 @@
|
||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
domain = "git.alejandr0angul0.dev";
|
domain = "git.alejandr0angul0.dev";
|
||||||
|
secrets = config.age.secrets;
|
||||||
in {
|
in {
|
||||||
imports = ["${inputs.nixpkgs}/nixos/modules/virtualisation/digital-ocean-config.nix"];
|
imports = ["${inputs.nixpkgs}/nixos/modules/virtualisation/digital-ocean-config.nix"];
|
||||||
|
|
||||||
|
age.secrets.authKeyFile.file = ../../../secrets/tailscale_git_server.age;
|
||||||
|
|
||||||
aa = {
|
aa = {
|
||||||
nix.enable = true;
|
nix.enable = true;
|
||||||
|
|
||||||
|
@ -17,6 +20,10 @@ in {
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
openssh.enable = true;
|
openssh.enable = true;
|
||||||
|
tailscale = {
|
||||||
|
enable = true;
|
||||||
|
configureClientRouting = true;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -25,6 +32,11 @@ in {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
services.tailscale = {
|
||||||
|
authKeyFile = secrets.authKeyFile.path;
|
||||||
|
extraUpFlags = ["--ssh"];
|
||||||
|
};
|
||||||
|
|
||||||
security.acme = {
|
security.acme = {
|
||||||
acceptTerms = true;
|
acceptTerms = true;
|
||||||
defaults = {
|
defaults = {
|
||||||
|
|
Loading…
Reference in a new issue