back interdiff of round #2 and #1

local-infra: local, sandboxed atmosphere infra #684

closed
opened by boltless.me targeting master from sandboxed-atmosphere
ERROR
local-infra/Caddyfile

Failed to calculate interdiff for this file.

ERROR
local-infra/docker-compose.yml

Failed to calculate interdiff for this file.

ERROR
local-infra/pds.env

Failed to calculate interdiff for this file.

ERROR
local-infra/readme.md

Failed to calculate interdiff for this file.

ERROR
local-infra/scripts/create-test-account.sh

Failed to calculate interdiff for this file.

NEW
local-infra/cert/localtangled/intermediate.crt
···
+
-----BEGIN CERTIFICATE-----
+
MIIBuTCCAWCgAwIBAgIRALKb0dndMd7jlCHAzm0G+N4wCgYIKoZIzj0EAwIwKTEn
+
MCUGA1UEAxMeTG9jYWxUYW5nbGVkQ0EgLSAyMDI1IEVDQyBSb290MB4XDTI1MTAy
+
MTA3NDAwNloXDTI1MTAyODA3NDAwNlowLDEqMCgGA1UEAxMhTG9jYWxUYW5nbGVk
+
Q0EgLSBFQ0MgSW50ZXJtZWRpYXRlMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE
+
bX+zyr9rLxF3E8oCZwJluCKX/xmU4waabkjaTGbI5K0cemiAAmZRJ2lVhgh+KfXD
+
PpTmt+YE6FUF4xAWADOUuaNmMGQwDgYDVR0PAQH/BAQDAgEGMBIGA1UdEwEB/wQI
+
MAYBAf8CAQAwHQYDVR0OBBYEFIoGsfx3Qg/9qG7tm7CZ1pHYl3prMB8GA1UdIwQY
+
MBaAFCkl8dPP2IAMTPru6WEHLP1hySEQMAoGCCqGSM49BAMCA0cAMEQCIFc3gOEl
+
aUR/OWbQuWvYwoTZs81ERj73ZeQWy4a3i4ooAiAB7Mnih/7kEvLyfkjLRgRXrtlq
+
kVmXVyWHIncR6Bsktw==
+
-----END CERTIFICATE-----
NEW
local-infra/cert/localtangled/intermediate.key
···
+
-----BEGIN EC PRIVATE KEY-----
+
MHcCAQEEIB1EH4KZGLcfO0neWDuV3oWMXPEze8JTsyKFoQuYApFSoAoGCCqGSM49
+
AwEHoUQDQgAEbX+zyr9rLxF3E8oCZwJluCKX/xmU4waabkjaTGbI5K0cemiAAmZR
+
J2lVhgh+KfXDPpTmt+YE6FUF4xAWADOUuQ==
+
-----END EC PRIVATE KEY-----
NEW
local-infra/cert/localtangled/root.crt
···
+
-----BEGIN CERTIFICATE-----
+
MIIBlTCCATygAwIBAgIRAMDTcwNxYDMgtUNC5LkCeEQwCgYIKoZIzj0EAwIwKTEn
+
MCUGA1UEAxMeTG9jYWxUYW5nbGVkQ0EgLSAyMDI1IEVDQyBSb290MB4XDTI1MTAx
+
NzE2MTE0NVoXDTM1MDgyNjE2MTE0NVowKTEnMCUGA1UEAxMeTG9jYWxUYW5nbGVk
+
Q0EgLSAyMDI1IEVDQyBSb290MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7rFM
+
4oNfT0UMqMuc3L60TCLeTd58WFSUYnKl7R1HOHDWeWZhhoNdWguXJSHhFPiWmQ5E
+
+fiI7KvDAVQGHzfUAqNFMEMwDgYDVR0PAQH/BAQDAgEGMBIGA1UdEwEB/wQIMAYB
+
Af8CAQEwHQYDVR0OBBYEFCkl8dPP2IAMTPru6WEHLP1hySEQMAoGCCqGSM49BAMC
+
A0cAMEQCIFjSGjvie1gO/JuNtP2HqeUHQNEh82K1fXdks54up3KEAiBWQDaOYeZ2
+
zVTiKe8ZQHpH3glXsIS0USsxeKaohMp0zA==
+
-----END CERTIFICATE-----
NEW
local-infra/cert/localtangled/root.key
···
+
-----BEGIN EC PRIVATE KEY-----
+
MHcCAQEEIBqEj1iG3q+OLBgHjWQ3UkvKjq4sy5ej47syIYWn/Ql/oAoGCCqGSM49
+
AwEHoUQDQgAE7rFM4oNfT0UMqMuc3L60TCLeTd58WFSUYnKl7R1HOHDWeWZhhoNd
+
WguXJSHhFPiWmQ5E+fiI7KvDAVQGHzfUAg==
+
-----END EC PRIVATE KEY-----
NEW
nix/vm.nix
···
};
# This is fine because any and all ports that are forwarded to host are explicitly marked above, we don't need a separate guest firewall
networking.firewall.enable = false;
+
services.dnsmasq.enable = true;
+
services.dnsmasq.settings.address = "/tngl.boltless.dev/10.0.2.2";
+
security.pki.certificates = [
+
(builtins.readFile ../local-infra/cert/localtangled/root.crt)
+
];
time.timeZone = "Europe/London";
services.getty.autologinUser = "root";
environment.systemPackages = with pkgs; [curl vim git sqlite litecli];