58 lines
1.4 KiB
Nix
58 lines
1.4 KiB
Nix
{ config
|
|
, lib
|
|
, pkgs
|
|
, inputs
|
|
, ...
|
|
}:
|
|
let
|
|
microcaBin = "${pkgs.microca}/bin/microca";
|
|
microca = pkgs.writeScriptBin "microca" ''
|
|
#!/usr/bin/env sh
|
|
${microcaBin} -ca-key /run/secrets/ca_key -ca-cert /run/secrets/ca_cert $@
|
|
'';
|
|
in
|
|
with lib; {
|
|
options = {
|
|
nixManager = {
|
|
enable = mkEnableOption "Configure host as nix-conf manager.";
|
|
user = mkOption {
|
|
type = types.str;
|
|
default = "root";
|
|
description = ''
|
|
User who will own the private key.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
#imports = [ ./tailnet.nix ];
|
|
|
|
config = mkIf config.nixManager.enable {
|
|
sops.defaultSopsFile = config.xin-secrets.manager;
|
|
sops.secrets = {
|
|
xin_status_key = { owner = config.nixManager.user; };
|
|
xin_status_pubkey = { owner = config.nixManager.user; };
|
|
manager_key = { owner = config.nixManager.user; };
|
|
manager_pubkey = { owner = config.nixManager.user; };
|
|
ca_key = { owner = config.nixManager.user; };
|
|
ca_cert = { owner = config.nixManager.user; };
|
|
po_env = { owner = config.nixManager.user; };
|
|
};
|
|
|
|
environment.systemPackages = [
|
|
microca
|
|
inputs.xintray.packages.${pkgs.system}.xintray
|
|
inputs.po.packages.${pkgs.system}.po
|
|
];
|
|
|
|
networking = {
|
|
hosts = {
|
|
"66.135.2.235" = [ "ns1" ];
|
|
"23.234.251.216" = [ "ns2" ];
|
|
"46.23.94.18" = [ "ns3" ];
|
|
"198.23.149.18" = [ "ns4" ];
|
|
};
|
|
};
|
|
};
|
|
}
|