nix machine / user configurations

use bnuuy dns

ptr.pet 3b13d24a 92f632c1

verified
Changed files
+43 -16
dns
hosts
trimounts
modules
secrets
+14 -7
dns/dnsconfig.js
···
var DSP_CLOUDFLARE = NewDnsProvider("cloudflare");
+
var DSP_BUNNY = NewDnsProvider("bunny_dns");
var REG_NONE = NewRegistrar("none");
var DZWONEK_IP4 = "94.237.26.47";
···
var TRIMOUNTS_IPS = [TRIMOUNTS_IP4, TRIMOUNTS_IP6];
function host(name, ips, opts) {
-
return [
-
A(name, ips[0], opts),
-
AAAA(name, ips[1], opts),
-
];
+
if (opts)
+
return [
+
A(name, ips[0], opts),
+
AAAA(name, ips[1], opts),
+
];
+
else
+
return [
+
A(name, ips[0]),
+
AAAA(name, ips[1]),
+
];
}
function hosts(_names, ips, opts) {
···
D(
"gaze.systems",
REG_NONE,
-
DnsProvider(DSP_CLOUDFLARE),
+
DnsProvider(DSP_BUNNY),
DefaultTTL(1),
TRIMOUNTS(
[
···
D(
"poor.dog",
REG_NONE,
-
DnsProvider(DSP_CLOUDFLARE),
+
DnsProvider(DSP_BUNNY),
DefaultTTL(1),
TRIMOUNTS("@", CF_PROXY_OFF),
TXT("@", "v=spf1 -all"),
···
D(
"ptr.pet",
REG_NONE,
-
DnsProvider(DSP_CLOUDFLARE),
+
DnsProvider(DSP_BUNNY),
DefaultTTL(1),
TRIMOUNTS("@", CF_PROXY_OFF),
DZWONEK(["nucleus", "trill"], CF_PROXY_OFF),
+3 -3
hosts/trimounts/modules/nginx.nix
···
users.users.nginx.extraGroups = [ "acme" ];
-
age.secrets.cfDnsEditToken.file = ../../../secrets/cloudflareDnsEdit.age;
+
age.secrets.bunnyApiKey.file = ../../../secrets/bunnyApiKey.age;
security.acme = {
acceptTerms = true;
defaults = {
group = "nginx";
email = (import "${inputs.self}/personal.nix").emails.primary;
-
dnsProvider = "cloudflare";
+
dnsProvider = "bunny";
credentialFiles = {
-
CF_DNS_API_TOKEN_FILE = config.age.secrets.cfDnsEditToken.path;
+
BUNNY_API_KEY_FILE = config.age.secrets.bunnyApiKey.path;
};
};
certs."poor.dog" = { };
+21
secrets/bunnyApiKey.age
···
+
age-encryption.org/v1
+
-> ssh-rsa Abmvag
+
XNh6H/W0srZXbGmkLGQ/YpXfamisyK/duLeSftkcrXU67b5s8x40HUv1NaKr/QQt
+
7ZBvKfm+8YsKcmmXaIINOHl6/LQ6GTpWprN91VDxTGOGzpO/GmD8MOUk8zfJYh+D
+
3soDoZuuk1gr8Q7+f8AIrfT+x3QwHA2h3hCm3un3MqhmAicTTip2C3NFQhlsEwHi
+
DhgOJ1Wy9/lSXwIzhg62s8KDOQ4cBETA8PRvspWh8GsV1oLU/brk2itwUaj0P8xA
+
uQrQzo71rbUttXeGnW4yBZjzzGMJe5iHY3H4aQxjklC1yGpInDf3HGaO6X/yaZBx
+
vRx2YxwCH4AdhgVpllbZo2++uGX8mye6fu5Lap04+dXU+ubglEvDQ1uRDrbXML9/
+
PpRszgmu5z7k9u+qWI/aBywUChvVSy4TDWKcj2JAqvCuU7QYiEi6SKhIiDLNd/BQ
+
7aa/GHSUpUu6TnpRwuBF4l2g5+jO27hsNWb3nAm/SV5YHEVCn+Tr5PiRPxBK8Fa0
+
ngJjBK5r4ra+uGulwGn1uoM0jYVCl6EtjtKgLeP5cvbdLylKWRXRYxyL7XTxqmHb
+
oLJsVvxuF1pFiaUkAmMBctaYdMw9EVwV8vTp4/eebVe6pU0Lmxv5B0u5nDiWar5o
+
RQzfwfGhtOaE0PUQNqVz7VfdoIzCcUjqnJMwInh+XwU
+
-> ssh-ed25519 y5W/qA rZ2rTM2n2bPULAefeeUvEFwskCNIEh5KdkC7uEnBcXM
+
P75OaqdeAt3BVa/xprDvJ/bLoGLkU6qdteVvwD9fO8M
+
-> ssh-ed25519 LaQclg Bnt8Z3Cve0gG6ItbJq+1+fUT/ykFsngstap8ymEr1m4
+
filHMr3njOkRpbu4UwutvqxVLf8joTBvqs3JT1gu7kk
+
--- pkIfClG050A3Kp8c+HUQJDwlxM1BbFaCRx8Vp0++xbI
+
4�dc���/\�ڦ �@:e��:e�o;�
+
�E�d\W�#m
+
��WA��#�uaJ��T�<���X�R���X�X"9 ���)�'U:7��+�,�hNϏ�Ul\� FSP8c
+5 -6
secrets/secrets.nix
···
let
yusdacra = builtins.readFile ./yusdacra.key.pub;
-
wolumonde = builtins.readFile ./wolumonde.key.pub;
dzwonek = builtins.readFile ./dzwonek.key.pub;
trimounts = builtins.readFile ./trimounts.key.pub;
develMobi = builtins.readFile ./develMobi.key.pub;
···
"nixGithubAccessToken.age".publicKeys = [ yusdacra ];
"websiteConfig.age".publicKeys = [
yusdacra
-
wolumonde
trimounts
];
"pdsConfig.age".publicKeys = [
yusdacra
-
wolumonde
trimounts
];
"clickeeProxyConfig.age".publicKeys = [
yusdacra
-
wolumonde
trimounts
];
"persesSecret.age".publicKeys = [
yusdacra
-
wolumonde
trimounts
];
"headscaleOidcSecret.age".publicKeys = [
···
"cloudflareDnsEdit.age".publicKeys = [
yusdacra
dzwonek
-
wolumonde
+
trimounts
+
];
+
"bunnyApiKey.age".publicKeys = [
+
yusdacra
+
dzwonek
trimounts
];
}