Secrets changed, ssh key, add new noreply email
This commit is contained in:
parent
04857582cf
commit
8f66c8bf92
14 changed files with 26 additions and 24 deletions
|
@ -3,7 +3,7 @@
|
||||||
networking = {
|
networking = {
|
||||||
firewall.extraInputRules = ''
|
firewall.extraInputRules = ''
|
||||||
ip saddr { ${config.ips.localSpan}.0/24, 10.100.0.0/24 } tcp dport 2049 accept comment "Accept NFS"
|
ip saddr { ${config.ips.localSpan}.0/24, 10.100.0.0/24 } tcp dport 2049 accept comment "Accept NFS"
|
||||||
ip saddr { ${config.ips.pc}, ${config.secrets.lunaIP}, ${config.secrets.cornIP} } tcp dport { 1935, 1945 } accept comment "Accept RTMP"
|
ip saddr { ${config.ips.pc}, ${config.secrets.ips.luna}, ${config.secrets.ips.corn} } tcp dport { 1935, 1945 } accept comment "Accept RTMP"
|
||||||
'';
|
'';
|
||||||
|
|
||||||
# Nftables configuration only if server is enabled
|
# Nftables configuration only if server is enabled
|
||||||
|
@ -24,9 +24,6 @@
|
||||||
udp dport { 37998, 37999, 38000 } dnat to ${config.ips.vm} comment "VM Sunshine UDP"
|
udp dport { 37998, 37999, 38000 } dnat to ${config.ips.vm} comment "VM Sunshine UDP"
|
||||||
|
|
||||||
udp dport { 7790, 7791, 7792 } dnat to ${config.ips.hx} comment "Deus Ex"
|
udp dport { 7790, 7791, 7792 } dnat to ${config.ips.hx} comment "Deus Ex"
|
||||||
|
|
||||||
ip saddr ${config.secrets.cornIP} tcp dport { 9943, 9944 } dnat to ${config.ips.vm} comment "VM ALVR TCP"
|
|
||||||
ip saddr ${config.secrets.cornIP} udp dport { 9943, 9944 } dnat to ${config.ips.vm} comment "VM ALVR UDP"
|
|
||||||
}
|
}
|
||||||
|
|
||||||
chain POSTROUTING {
|
chain POSTROUTING {
|
||||||
|
|
|
@ -1 +1 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICtxnPjkLdUIi5mVqBHXM9rW+Mmsqx1C1XnpRusVTWhm
|
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDXU+mo+lkFaGBV7wuzrGnlII15YS3/MkkG3KmGJRT0j
|
||||||
|
|
|
@ -6,7 +6,7 @@
|
||||||
networking = {
|
networking = {
|
||||||
firewall.trustedInterfaces = [ "wgc" ];
|
firewall.trustedInterfaces = [ "wgc" ];
|
||||||
wg-quick.interfaces.wgc = {
|
wg-quick.interfaces.wgc = {
|
||||||
privateKey = config.secrets.wgClientPriv;
|
privateKey = config.secrets.wg.clientKey;
|
||||||
peers = [
|
peers = [
|
||||||
{ # Kitty server
|
{ # Kitty server
|
||||||
publicKey = "qnOT/lXOJMaQgDUdXpyfGZB2IEyUouRje2m/bCe9ux8=";
|
publicKey = "qnOT/lXOJMaQgDUdXpyfGZB2IEyUouRje2m/bCe9ux8=";
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
wireguard.interfaces.wgs = {
|
wireguard.interfaces.wgs = {
|
||||||
ips = [ "10.100.0.1/24" ];
|
ips = [ "10.100.0.1/24" ];
|
||||||
listenPort = 51820;
|
listenPort = 51820;
|
||||||
privateKey = config.secrets.wgServerPriv;
|
privateKey = config.secrets.wg.serverKey;
|
||||||
peers = [
|
peers = [
|
||||||
{ # NixOS Config Key
|
{ # NixOS Config Key
|
||||||
publicKey = "OKUH/h6YSURI4vgeTZKQD15QsqaygdbTn1mAWzQp9S0=";
|
publicKey = "OKUH/h6YSURI4vgeTZKQD15QsqaygdbTn1mAWzQp9S0=";
|
||||||
|
|
Binary file not shown.
|
@ -24,7 +24,7 @@
|
||||||
mail_from_address = "noreply";
|
mail_from_address = "noreply";
|
||||||
mail_smtpauth = "true";
|
mail_smtpauth = "true";
|
||||||
mail_smtpname = "noreply@nixfox.ca";
|
mail_smtpname = "noreply@nixfox.ca";
|
||||||
mail_smtppassword = config.secrets.noreplyPassword;
|
mail_smtppassword = config.secrets.mailPass.nixfoxNoReply;
|
||||||
mail_smtpmode = "smtp";
|
mail_smtpmode = "smtp";
|
||||||
mail_smtpport = 587;
|
mail_smtpport = 587;
|
||||||
};
|
};
|
||||||
|
|
|
@ -19,7 +19,7 @@
|
||||||
SMTP_ADDR = "mx.nixfox.ca";
|
SMTP_ADDR = "mx.nixfox.ca";
|
||||||
FROM = "NixFox Git <noreply@nixfox.ca>";
|
FROM = "NixFox Git <noreply@nixfox.ca>";
|
||||||
USER = "noreply@nixfox.ca";
|
USER = "noreply@nixfox.ca";
|
||||||
PASSWD = config.secrets.noreplyPassword;
|
PASSWD = config.secrets.mailPass.nixfoxNoReply;
|
||||||
PROTOCOL = "smtps";
|
PROTOCOL = "smtps";
|
||||||
};
|
};
|
||||||
service = {
|
service = {
|
||||||
|
|
|
@ -11,11 +11,11 @@
|
||||||
hostname = "radio.nixfox.ca";
|
hostname = "radio.nixfox.ca";
|
||||||
admin = {
|
admin = {
|
||||||
user = "${config.sysusers.main}";
|
user = "${config.sysusers.main}";
|
||||||
password = "${config.secrets.castAdminPass}";
|
password = "${config.secrets.cast.adminPass}";
|
||||||
};
|
};
|
||||||
extraConf = ''
|
extraConf = ''
|
||||||
<authentication>
|
<authentication>
|
||||||
<source-password>${config.secrets.castSourcePass}</source-password>
|
<source-password>${config.secrets.cast.sourcePass}</source-password>
|
||||||
</authentication>
|
</authentication>
|
||||||
|
|
||||||
<location>Canada</location>
|
<location>Canada</location>
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
%ffmpeg(format="ogg", %audio(codec="libvorbis", samplerate=48000, b="256k", channels=2)),
|
%ffmpeg(format="ogg", %audio(codec="libvorbis", samplerate=48000, b="256k", channels=2)),
|
||||||
host="127.0.0.1",
|
host="127.0.0.1",
|
||||||
port=${toString config.services.icecast.listen.port},
|
port=${toString config.services.icecast.listen.port},
|
||||||
password="${config.secrets.castSourcePass}",
|
password="${config.secrets.cast.sourcePass}",
|
||||||
encoding = "UTF-8",
|
encoding = "UTF-8",
|
||||||
|
|
||||||
name="NixBops Radio",
|
name="NixBops Radio",
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
%ffmpeg(format="ogg", %audio(codec="libvorbis", samplerate=48000, b="256k", channels=2)),
|
%ffmpeg(format="ogg", %audio(codec="libvorbis", samplerate=48000, b="256k", channels=2)),
|
||||||
host="127.0.0.1",
|
host="127.0.0.1",
|
||||||
port=${toString config.services.icecast.listen.port},
|
port=${toString config.services.icecast.listen.port},
|
||||||
password="${config.secrets.castSourcePass}",
|
password="${config.secrets.cast.sourcePass}",
|
||||||
encoding = "UTF-8",
|
encoding = "UTF-8",
|
||||||
|
|
||||||
name="Nixbops Scrap",
|
name="Nixbops Scrap",
|
||||||
|
|
|
@ -21,13 +21,8 @@
|
||||||
|
|
||||||
# Passwords made with 'mkpasswd -sm bcrypt'
|
# Passwords made with 'mkpasswd -sm bcrypt'
|
||||||
loginAccounts = {
|
loginAccounts = {
|
||||||
"noreply@nixfox.ca" = {
|
|
||||||
hashedPasswordFile = pkgs.writeText "noreply" config.secrets.noreplyMailHash;
|
|
||||||
sendOnly = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
"jimbo@nixfox.ca" = {
|
"jimbo@nixfox.ca" = {
|
||||||
hashedPasswordFile = pkgs.writeText "jimbo" config.secrets.jimboMailHash;
|
hashedPasswordFile = pkgs.writeText "jimbo" config.secrets.mailHash.jimbo;
|
||||||
aliases = [
|
aliases = [
|
||||||
"james@nixfox.ca"
|
"james@nixfox.ca"
|
||||||
"jimbo@bloxelcom.net"
|
"jimbo@bloxelcom.net"
|
||||||
|
@ -41,7 +36,7 @@
|
||||||
};
|
};
|
||||||
|
|
||||||
"luna@lunamoonlight.xyz" = {
|
"luna@lunamoonlight.xyz" = {
|
||||||
hashedPasswordFile = pkgs.writeText "luna" config.secrets.lunaMailHash;
|
hashedPasswordFile = pkgs.writeText "luna" config.secrets.mailHash.luna;
|
||||||
aliases = [
|
aliases = [
|
||||||
"luna@bloxelcom.net"
|
"luna@bloxelcom.net"
|
||||||
"contact@bloxelcom.net"
|
"contact@bloxelcom.net"
|
||||||
|
@ -50,9 +45,19 @@
|
||||||
};
|
};
|
||||||
|
|
||||||
"contact@freecorn1854.win" = {
|
"contact@freecorn1854.win" = {
|
||||||
hashedPasswordFile = pkgs.writeText "corn" config.secrets.cornMailHash;
|
hashedPasswordFile = pkgs.writeText "corn" config.secrets.mailHash.corn;
|
||||||
aliases = [ "freecorn@bloxelcom.net" ];
|
aliases = [ "freecorn@bloxelcom.net" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# Noreply emails
|
||||||
|
"noreply@nixfox.ca" = {
|
||||||
|
hashedPasswordFile = pkgs.writeText "noreply" config.secrets.mailHash.nixfoxNoReply;
|
||||||
|
sendOnly = true;
|
||||||
|
};
|
||||||
|
"noreply@bloxelcom.net" = {
|
||||||
|
hashedPasswordFile = pkgs.writeText "noreply" config.secrets.mailHash.bloxelNoReply;
|
||||||
|
sendOnly = true;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -13,7 +13,7 @@
|
||||||
authenticate = true;
|
authenticate = true;
|
||||||
fromAddress = "NixFox Mastodon <noreply@nixfox.ca>";
|
fromAddress = "NixFox Mastodon <noreply@nixfox.ca>";
|
||||||
user = "noreply@nixfox.ca";
|
user = "noreply@nixfox.ca";
|
||||||
passwordFile = pkgs.writeText "smtp_pass.txt" config.secrets.noreplyPassword;
|
passwordFile = pkgs.writeText "smtp_pass.txt" config.secrets.mailPass.nixfoxNoReply;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
environment.persistence."/persist".directories = [ "/var/lib/mastodon" ];
|
environment.persistence."/persist".directories = [ "/var/lib/mastodon" ];
|
||||||
|
|
|
@ -15,7 +15,7 @@
|
||||||
notif_from = "NixFox Matrix <noreply@nixfox.ca>";
|
notif_from = "NixFox Matrix <noreply@nixfox.ca>";
|
||||||
smtp_host = "mx.nixfox.ca";
|
smtp_host = "mx.nixfox.ca";
|
||||||
smtp_user = "noreply@nixfox.ca";
|
smtp_user = "noreply@nixfox.ca";
|
||||||
smtp_pass = config.secrets.noreplyPassword;
|
smtp_pass = config.secrets.mailPass.nixfoxNoReply;
|
||||||
enable_tls = true;
|
enable_tls = true;
|
||||||
smtp_port = 587;
|
smtp_port = 587;
|
||||||
require_transport_security = true;
|
require_transport_security = true;
|
||||||
|
|
|
@ -17,7 +17,7 @@
|
||||||
SMTP_FROM = "noreply@nixfox.ca";
|
SMTP_FROM = "noreply@nixfox.ca";
|
||||||
SMTP_FROM_NAME = "Vaultwarden";
|
SMTP_FROM_NAME = "Vaultwarden";
|
||||||
SMTP_USERNAME = "noreply@nixfox.ca";
|
SMTP_USERNAME = "noreply@nixfox.ca";
|
||||||
SMTP_PASSWORD = config.secrets.noreplyPassword;
|
SMTP_PASSWORD = config.secrets.mailPass.nixfoxNoReply;
|
||||||
SMTP_SECURITY = "starttls";
|
SMTP_SECURITY = "starttls";
|
||||||
SMTP_PORT = 587;
|
SMTP_PORT = 587;
|
||||||
SMTP_TIMEOUT = 15;
|
SMTP_TIMEOUT = 15;
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue