Secrets changed, ssh key, add new noreply email

This commit is contained in:
Vice 2025-03-05 05:44:01 -05:00
parent 04857582cf
commit 8f66c8bf92
14 changed files with 26 additions and 24 deletions

View file

@ -3,7 +3,7 @@
networking = { networking = {
firewall.extraInputRules = '' firewall.extraInputRules = ''
ip saddr { ${config.ips.localSpan}.0/24, 10.100.0.0/24 } tcp dport 2049 accept comment "Accept NFS" ip saddr { ${config.ips.localSpan}.0/24, 10.100.0.0/24 } tcp dport 2049 accept comment "Accept NFS"
ip saddr { ${config.ips.pc}, ${config.secrets.lunaIP}, ${config.secrets.cornIP} } tcp dport { 1935, 1945 } accept comment "Accept RTMP" ip saddr { ${config.ips.pc}, ${config.secrets.ips.luna}, ${config.secrets.ips.corn} } tcp dport { 1935, 1945 } accept comment "Accept RTMP"
''; '';
# Nftables configuration only if server is enabled # Nftables configuration only if server is enabled
@ -24,9 +24,6 @@
udp dport { 37998, 37999, 38000 } dnat to ${config.ips.vm} comment "VM Sunshine UDP" udp dport { 37998, 37999, 38000 } dnat to ${config.ips.vm} comment "VM Sunshine UDP"
udp dport { 7790, 7791, 7792 } dnat to ${config.ips.hx} comment "Deus Ex" udp dport { 7790, 7791, 7792 } dnat to ${config.ips.hx} comment "Deus Ex"
ip saddr ${config.secrets.cornIP} tcp dport { 9943, 9944 } dnat to ${config.ips.vm} comment "VM ALVR TCP"
ip saddr ${config.secrets.cornIP} udp dport { 9943, 9944 } dnat to ${config.ips.vm} comment "VM ALVR UDP"
} }
chain POSTROUTING { chain POSTROUTING {

View file

@ -1 +1 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICtxnPjkLdUIi5mVqBHXM9rW+Mmsqx1C1XnpRusVTWhm ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDXU+mo+lkFaGBV7wuzrGnlII15YS3/MkkG3KmGJRT0j

View file

@ -6,7 +6,7 @@
networking = { networking = {
firewall.trustedInterfaces = [ "wgc" ]; firewall.trustedInterfaces = [ "wgc" ];
wg-quick.interfaces.wgc = { wg-quick.interfaces.wgc = {
privateKey = config.secrets.wgClientPriv; privateKey = config.secrets.wg.clientKey;
peers = [ peers = [
{ # Kitty server { # Kitty server
publicKey = "qnOT/lXOJMaQgDUdXpyfGZB2IEyUouRje2m/bCe9ux8="; publicKey = "qnOT/lXOJMaQgDUdXpyfGZB2IEyUouRje2m/bCe9ux8=";

View file

@ -14,7 +14,7 @@
wireguard.interfaces.wgs = { wireguard.interfaces.wgs = {
ips = [ "10.100.0.1/24" ]; ips = [ "10.100.0.1/24" ];
listenPort = 51820; listenPort = 51820;
privateKey = config.secrets.wgServerPriv; privateKey = config.secrets.wg.serverKey;
peers = [ peers = [
{ # NixOS Config Key { # NixOS Config Key
publicKey = "OKUH/h6YSURI4vgeTZKQD15QsqaygdbTn1mAWzQp9S0="; publicKey = "OKUH/h6YSURI4vgeTZKQD15QsqaygdbTn1mAWzQp9S0=";

Binary file not shown.

View file

@ -24,7 +24,7 @@
mail_from_address = "noreply"; mail_from_address = "noreply";
mail_smtpauth = "true"; mail_smtpauth = "true";
mail_smtpname = "noreply@nixfox.ca"; mail_smtpname = "noreply@nixfox.ca";
mail_smtppassword = config.secrets.noreplyPassword; mail_smtppassword = config.secrets.mailPass.nixfoxNoReply;
mail_smtpmode = "smtp"; mail_smtpmode = "smtp";
mail_smtpport = 587; mail_smtpport = 587;
}; };

View file

@ -19,7 +19,7 @@
SMTP_ADDR = "mx.nixfox.ca"; SMTP_ADDR = "mx.nixfox.ca";
FROM = "NixFox Git <noreply@nixfox.ca>"; FROM = "NixFox Git <noreply@nixfox.ca>";
USER = "noreply@nixfox.ca"; USER = "noreply@nixfox.ca";
PASSWD = config.secrets.noreplyPassword; PASSWD = config.secrets.mailPass.nixfoxNoReply;
PROTOCOL = "smtps"; PROTOCOL = "smtps";
}; };
service = { service = {

View file

@ -11,11 +11,11 @@
hostname = "radio.nixfox.ca"; hostname = "radio.nixfox.ca";
admin = { admin = {
user = "${config.sysusers.main}"; user = "${config.sysusers.main}";
password = "${config.secrets.castAdminPass}"; password = "${config.secrets.cast.adminPass}";
}; };
extraConf = '' extraConf = ''
<authentication> <authentication>
<source-password>${config.secrets.castSourcePass}</source-password> <source-password>${config.secrets.cast.sourcePass}</source-password>
</authentication> </authentication>
<location>Canada</location> <location>Canada</location>

View file

@ -14,7 +14,7 @@
%ffmpeg(format="ogg", %audio(codec="libvorbis", samplerate=48000, b="256k", channels=2)), %ffmpeg(format="ogg", %audio(codec="libvorbis", samplerate=48000, b="256k", channels=2)),
host="127.0.0.1", host="127.0.0.1",
port=${toString config.services.icecast.listen.port}, port=${toString config.services.icecast.listen.port},
password="${config.secrets.castSourcePass}", password="${config.secrets.cast.sourcePass}",
encoding = "UTF-8", encoding = "UTF-8",
name="NixBops Radio", name="NixBops Radio",

View file

@ -14,7 +14,7 @@
%ffmpeg(format="ogg", %audio(codec="libvorbis", samplerate=48000, b="256k", channels=2)), %ffmpeg(format="ogg", %audio(codec="libvorbis", samplerate=48000, b="256k", channels=2)),
host="127.0.0.1", host="127.0.0.1",
port=${toString config.services.icecast.listen.port}, port=${toString config.services.icecast.listen.port},
password="${config.secrets.castSourcePass}", password="${config.secrets.cast.sourcePass}",
encoding = "UTF-8", encoding = "UTF-8",
name="Nixbops Scrap", name="Nixbops Scrap",

View file

@ -21,13 +21,8 @@
# Passwords made with 'mkpasswd -sm bcrypt' # Passwords made with 'mkpasswd -sm bcrypt'
loginAccounts = { loginAccounts = {
"noreply@nixfox.ca" = {
hashedPasswordFile = pkgs.writeText "noreply" config.secrets.noreplyMailHash;
sendOnly = true;
};
"jimbo@nixfox.ca" = { "jimbo@nixfox.ca" = {
hashedPasswordFile = pkgs.writeText "jimbo" config.secrets.jimboMailHash; hashedPasswordFile = pkgs.writeText "jimbo" config.secrets.mailHash.jimbo;
aliases = [ aliases = [
"james@nixfox.ca" "james@nixfox.ca"
"jimbo@bloxelcom.net" "jimbo@bloxelcom.net"
@ -41,7 +36,7 @@
}; };
"luna@lunamoonlight.xyz" = { "luna@lunamoonlight.xyz" = {
hashedPasswordFile = pkgs.writeText "luna" config.secrets.lunaMailHash; hashedPasswordFile = pkgs.writeText "luna" config.secrets.mailHash.luna;
aliases = [ aliases = [
"luna@bloxelcom.net" "luna@bloxelcom.net"
"contact@bloxelcom.net" "contact@bloxelcom.net"
@ -50,9 +45,19 @@
}; };
"contact@freecorn1854.win" = { "contact@freecorn1854.win" = {
hashedPasswordFile = pkgs.writeText "corn" config.secrets.cornMailHash; hashedPasswordFile = pkgs.writeText "corn" config.secrets.mailHash.corn;
aliases = [ "freecorn@bloxelcom.net" ]; aliases = [ "freecorn@bloxelcom.net" ];
}; };
# Noreply emails
"noreply@nixfox.ca" = {
hashedPasswordFile = pkgs.writeText "noreply" config.secrets.mailHash.nixfoxNoReply;
sendOnly = true;
};
"noreply@bloxelcom.net" = {
hashedPasswordFile = pkgs.writeText "noreply" config.secrets.mailHash.bloxelNoReply;
sendOnly = true;
};
}; };
}; };

View file

@ -13,7 +13,7 @@
authenticate = true; authenticate = true;
fromAddress = "NixFox Mastodon <noreply@nixfox.ca>"; fromAddress = "NixFox Mastodon <noreply@nixfox.ca>";
user = "noreply@nixfox.ca"; user = "noreply@nixfox.ca";
passwordFile = pkgs.writeText "smtp_pass.txt" config.secrets.noreplyPassword; passwordFile = pkgs.writeText "smtp_pass.txt" config.secrets.mailPass.nixfoxNoReply;
}; };
}; };
environment.persistence."/persist".directories = [ "/var/lib/mastodon" ]; environment.persistence."/persist".directories = [ "/var/lib/mastodon" ];

View file

@ -15,7 +15,7 @@
notif_from = "NixFox Matrix <noreply@nixfox.ca>"; notif_from = "NixFox Matrix <noreply@nixfox.ca>";
smtp_host = "mx.nixfox.ca"; smtp_host = "mx.nixfox.ca";
smtp_user = "noreply@nixfox.ca"; smtp_user = "noreply@nixfox.ca";
smtp_pass = config.secrets.noreplyPassword; smtp_pass = config.secrets.mailPass.nixfoxNoReply;
enable_tls = true; enable_tls = true;
smtp_port = 587; smtp_port = 587;
require_transport_security = true; require_transport_security = true;

View file

@ -17,7 +17,7 @@
SMTP_FROM = "noreply@nixfox.ca"; SMTP_FROM = "noreply@nixfox.ca";
SMTP_FROM_NAME = "Vaultwarden"; SMTP_FROM_NAME = "Vaultwarden";
SMTP_USERNAME = "noreply@nixfox.ca"; SMTP_USERNAME = "noreply@nixfox.ca";
SMTP_PASSWORD = config.secrets.noreplyPassword; SMTP_PASSWORD = config.secrets.mailPass.nixfoxNoReply;
SMTP_SECURITY = "starttls"; SMTP_SECURITY = "starttls";
SMTP_PORT = 587; SMTP_PORT = 587;
SMTP_TIMEOUT = 15; SMTP_TIMEOUT = 15;