diff options
Diffstat (limited to 'hosts/surtr')
| -rw-r--r-- | hosts/surtr/default.nix | 2 | ||||
| -rw-r--r-- | hosts/surtr/dns/default.nix | 44 | ||||
| -rw-r--r-- | hosts/surtr/dns/keys/.sops.yaml | 3 | ||||
| -rw-r--r-- | hosts/surtr/dns/keys/rheperire.org_acme.yaml | 38 | ||||
| -rw-r--r-- | hosts/surtr/tls/default.nix (renamed from hosts/surtr/tls.nix) | 52 | ||||
| -rw-r--r-- | hosts/surtr/tls/tsig_keys/rheperire.org | 26 |
6 files changed, 154 insertions, 11 deletions
diff --git a/hosts/surtr/default.nix b/hosts/surtr/default.nix index 30a9e165..add50653 100644 --- a/hosts/surtr/default.nix +++ b/hosts/surtr/default.nix | |||
| @@ -2,7 +2,7 @@ | |||
| 2 | { | 2 | { |
| 3 | imports = with flake.nixosModules.systemProfiles; [ | 3 | imports = with flake.nixosModules.systemProfiles; [ |
| 4 | qemu-guest openssh rebuild-machines zfs | 4 | qemu-guest openssh rebuild-machines zfs |
| 5 | ./zfs.nix ./dns ./tls.nix ./http.nix ./bifrost | 5 | ./zfs.nix ./dns ./tls ./http.nix ./bifrost |
| 6 | ]; | 6 | ]; |
| 7 | 7 | ||
| 8 | config = { | 8 | config = { |
diff --git a/hosts/surtr/dns/default.nix b/hosts/surtr/dns/default.nix index feb56195..9a72a2c6 100644 --- a/hosts/surtr/dns/default.nix +++ b/hosts/surtr/dns/default.nix | |||
| @@ -1,5 +1,18 @@ | |||
| 1 | { pkgs, ... }: | 1 | { pkgs, lib, ... }: |
| 2 | { | 2 | |
| 3 | with lib; | ||
| 4 | |||
| 5 | let | ||
| 6 | acmeChallengeZonefile = domain: let | ||
| 7 | reverseDomain = concatStringsSep "." (reverseList ("_acme-challenge" ++ splitString "." domain)); | ||
| 8 | in pkgs.writeText "${reverseDomain}.zone" '' | ||
| 9 | $ORIGIN ${domain}. | ||
| 10 | @ 3600 IN SOA _acme-challenge.${domain}. root.yggdrasil.li. 2022022102 7200 3600 86400 300 | ||
| 11 | $TTL 300 | ||
| 12 | |||
| 13 | IN NS ns.yggdrasil.li. | ||
| 14 | ''; | ||
| 15 | in { | ||
| 3 | config = { | 16 | config = { |
| 4 | fileSystems."/var/lib/knot" = | 17 | fileSystems."/var/lib/knot" = |
| 5 | { device = "surtr/safe/var-lib-knot"; | 18 | { device = "surtr/safe/var-lib-knot"; |
| @@ -10,6 +23,9 @@ | |||
| 10 | 23 | ||
| 11 | services.knot = { | 24 | services.knot = { |
| 12 | enable = true; | 25 | enable = true; |
| 26 | keyFiles = [ | ||
| 27 | config.sops.secrets."acme_rheperire.org_key".path | ||
| 28 | ]; | ||
| 13 | extraConfig = '' | 29 | extraConfig = '' |
| 14 | server: | 30 | server: |
| 15 | listen: 127.0.0.1@53 | 31 | listen: 127.0.0.1@53 |
| @@ -27,6 +43,9 @@ | |||
| 27 | - id: inwx_acl | 43 | - id: inwx_acl |
| 28 | address: 185.181.104.96 | 44 | address: 185.181.104.96 |
| 29 | action: transfer | 45 | action: transfer |
| 46 | - id: rheperire.org_acme_acl | ||
| 47 | key: rheperire.org_acme_key | ||
| 48 | action: update | ||
| 30 | 49 | ||
| 31 | mod-rrl: | 50 | mod-rrl: |
| 32 | - id: default | 51 | - id: default |
| @@ -71,6 +90,15 @@ | |||
| 71 | dnssec-policy: ed25519 | 90 | dnssec-policy: ed25519 |
| 72 | notify: [inwx_notify] | 91 | notify: [inwx_notify] |
| 73 | acl: [inwx_acl] | 92 | acl: [inwx_acl] |
| 93 | - id: acme_zone | ||
| 94 | storage: /var/lib/knot | ||
| 95 | zonefile-sync: -1 | ||
| 96 | zonefile-load: difference-no-serial | ||
| 97 | serial-policy: dateserial | ||
| 98 | journal-content: all | ||
| 99 | semantic-checks: on | ||
| 100 | dnssec-signing: on | ||
| 101 | dnssec-policy: ed25519 | ||
| 74 | 102 | ||
| 75 | zone: | 103 | zone: |
| 76 | - domain: yggdrasil.li | 104 | - domain: yggdrasil.li |
| @@ -104,9 +132,21 @@ | |||
| 104 | - domain: rheperire.org | 132 | - domain: rheperire.org |
| 105 | template: inwx_zone | 133 | template: inwx_zone |
| 106 | file: ${./zones/org.rheperire.soa} | 134 | file: ${./zones/org.rheperire.soa} |
| 135 | - domain: _acme-challenge.rheperire.org | ||
| 136 | template: acme_zone | ||
| 137 | acl: [ rheperire.org_acme_acl ] | ||
| 138 | file: ${acmeChallengeZonefile "rheperire.org"} | ||
| 107 | ''; | 139 | ''; |
| 108 | }; | 140 | }; |
| 109 | 141 | ||
| 142 | sops.secrets = { | ||
| 143 | "rheperire.org_acme_key.yaml" = { | ||
| 144 | format = "yaml"; | ||
| 145 | owner = "knot"; | ||
| 146 | sopsFile = ./keys/rheperire.org_acme.yaml; | ||
| 147 | }; | ||
| 148 | }; | ||
| 149 | |||
| 110 | 150 | ||
| 111 | fileSystems."/var/lib/unbound" = | 151 | fileSystems."/var/lib/unbound" = |
| 112 | { device = "surtr/local/var-lib-unbound"; | 152 | { device = "surtr/local/var-lib-unbound"; |
diff --git a/hosts/surtr/dns/keys/.sops.yaml b/hosts/surtr/dns/keys/.sops.yaml new file mode 100644 index 00000000..4f536273 --- /dev/null +++ b/hosts/surtr/dns/keys/.sops.yaml | |||
| @@ -0,0 +1,3 @@ | |||
| 1 | creation_rules: | ||
| 2 | - path_regex: "\\.yaml$" | ||
| 3 | unencrypted_regex: "^(id|algorithm)$" | ||
diff --git a/hosts/surtr/dns/keys/rheperire.org_acme.yaml b/hosts/surtr/dns/keys/rheperire.org_acme.yaml new file mode 100644 index 00000000..16f6d19e --- /dev/null +++ b/hosts/surtr/dns/keys/rheperire.org_acme.yaml | |||
| @@ -0,0 +1,38 @@ | |||
| 1 | #ENC[AES256_GCM,data:exIBsQRSUnOhewl0P3WCqktpjsdFFIJ610rodabSsbKK/XF/0WwRU2ErAyv3wlmtXUJMY3jSugkzbRmnND9GIrj6n8M20BVoOeXzUA==,iv:SJBizi+kSa80964nQ78+43sapNDTGifSiV1kOheuujk=,tag:j4eowYRr4cmwUzXGwm3CAA==,type:comment] | ||
| 2 | key: | ||
| 3 | - id: rheperire.org_acme | ||
| 4 | algorithm: hmac-sha256 | ||
| 5 | secret: ENC[AES256_GCM,data:rgw4nQczDhEeI5JMl1fJA3HX5ZVBpjTQEEk2pkA3c9M1CWYpFvzFRtCAxe8=,iv:Y0G3+A161Lefpwknm+S2jj8rTfm/jlrP+pnR3vR6/mk=,tag:IHsCnkIU2p3hCmRokecbtw==,type:str] | ||
| 6 | sops: | ||
| 7 | kms: [] | ||
| 8 | gcp_kms: [] | ||
| 9 | azure_kv: [] | ||
| 10 | hc_vault: [] | ||
| 11 | age: [] | ||
| 12 | lastmodified: "2022-02-22T09:17:59Z" | ||
| 13 | mac: ENC[AES256_GCM,data:tYWQT6iDQGsYm4zCtNbqvZhIYIMm3+Q9faRbqVpeERdq3oJlEvKIL3MAP2fj6789EbCKf/6zdah5HzYK9k4RsZWxtPfqxYXZp7gWvWwKwm5MRZfQtYzR7ThhD/8QANJKLVffl+PknJqhUYsUq9aeYTbLnyuR2AHY1WkR/fPwcLg=,iv:wGmozslNHE1dc4tpmNVGQJw2hhojB4L3gf7qu963ItA=,tag:4WrPw6biusQDV1OTWmXv6Q==,type:str] | ||
| 14 | pgp: | ||
| 15 | - created_at: "2022-02-22T09:17:59Z" | ||
| 16 | enc: | | ||
| 17 | -----BEGIN PGP MESSAGE----- | ||
| 18 | |||
| 19 | hF4DyFKFNkTVG5oSAQdAcxKwhh0Poivpl/A7YU53ab+rMWLWKRpeUSwehL6LPEMw | ||
| 20 | zv+AtmWUPtAL1GpyruFTYoT0P7CJ/PJLYYUDZPH/4oNcaU+5XiBi6sj3svWH5HQE | ||
| 21 | 0l4BBkvxjYvgPNYSw68AJz/AlzRig4SL7q1VwaYH9w+UWnpwK2CeIZSn11lzDdcj | ||
| 22 | 8jUZK34aJFFcGWBM2ZKEtQDm3n5B2nRxwb5kLjqwith5zczJ289VNPDmnlVRU4BA | ||
| 23 | =i8zc | ||
| 24 | -----END PGP MESSAGE----- | ||
| 25 | fp: 7ED22F4AA7BB55728B643DC5471B7D88E4EF66F8 | ||
| 26 | - created_at: "2022-02-22T09:17:59Z" | ||
| 27 | enc: | | ||
| 28 | -----BEGIN PGP MESSAGE----- | ||
| 29 | |||
| 30 | hF4DXxoViZlp6dISAQdALxbhftpZmVeTmFU8ujPPR5w0Z8ljkZbI8SHAWmC2QEIw | ||
| 31 | iTS491iicbH7kzF+l3SZZ1XAFn9p4ZjQyZNeOHXD/q1KXxCWGn3UTRSbXlgzzmKZ | ||
| 32 | 0l4BSZpnpgmEgLospl5mS6smVEO58Q3XXjVTQVKAjQaxD9Oe1DRCgW4kOq4xKGWS | ||
| 33 | xF55QHP3bPt5ziF2nwF+Gs28HW4UzAFVcr7r7Bz9CxwHixFx5qjvzAWh+Pp+TdY0 | ||
| 34 | =hSUL | ||
| 35 | -----END PGP MESSAGE----- | ||
| 36 | fp: 30D3453B8CD02FE2A3E7C78C0FB536FB87AE8F51 | ||
| 37 | unencrypted_regex: ^(id|algorithm)$ | ||
| 38 | version: 3.7.1 | ||
diff --git a/hosts/surtr/tls.nix b/hosts/surtr/tls/default.nix index 2ff26e35..a1548feb 100644 --- a/hosts/surtr/tls.nix +++ b/hosts/surtr/tls/default.nix | |||
| @@ -1,8 +1,12 @@ | |||
| 1 | { config, lib, pkgs, ... }: | 1 | { config, lib, customUtils, pkgs, ... }: |
| 2 | 2 | ||
| 3 | with lib; | 3 | with lib; |
| 4 | 4 | ||
| 5 | let | 5 | let |
| 6 | inherit (customUtils) mapFilterAttrs; | ||
| 7 | |||
| 8 | tsigSecretName = domain: "${domain}_tsig-secret"; | ||
| 9 | |||
| 6 | cfg = config.security.acme; | 10 | cfg = config.security.acme; |
| 7 | knotCfg = config.services.knot; | 11 | knotCfg = config.services.knot; |
| 8 | 12 | ||
| @@ -94,16 +98,48 @@ in { | |||
| 94 | }; | 98 | }; |
| 95 | certs = | 99 | certs = |
| 96 | let | 100 | let |
| 97 | domainAttrset = domain: { | 101 | domainAttrset = domain: let |
| 98 | inherit domain; | 102 | tsigPath = ./tsig_keys + "/${domain}"; |
| 99 | extraDomainNames = optional cfg.domains.${domain}.wildcard "*.${domain}"; | 103 | tsigSecret = config.sops.secrets.${tsigSecretName domain}; |
| 100 | dnsProvider = "exec"; | 104 | isTsig = pathExists tsigPath; |
| 101 | credentialsFile = knotDNSCredentials domain; | 105 | shared = { |
| 102 | dnsResolver = "1.1.1.1:53"; | 106 | inherit domain; |
| 103 | } // cfg.domains.${domain}.certCfg; | 107 | extraDomainNames = optional cfg.domains.${domain}.wildcard "*.${domain}"; |
| 108 | dnsResolver = "127.0.0.1:5353"; | ||
| 109 | }; | ||
| 110 | mkKnotc = shared // { | ||
| 111 | dnsProvider = "exec"; | ||
| 112 | credentialsFile = knotDNSCredentials domain; | ||
| 113 | }; | ||
| 114 | mkRFC2136 = let | ||
| 115 | tsigInfo = readYaml tsigPath; | ||
| 116 | in shared // { | ||
| 117 | dnsProvider = "rfc2136"; | ||
| 118 | credentialsFile = pkgs.writeText "${domain}_credentials.env" '' | ||
| 119 | RFC2136_NAMESERVER=127.0.0.1:53 | ||
| 120 | RFC2136_TSIG_ALGORITHM=hmac-sha256. | ||
| 121 | RFC2136_TSIG_KEY=${domain}_acme | ||
| 122 | RFC2136_TSIG_SECRET_FILE=${tsigSecret.path} | ||
| 123 | RFC2136_PROPAGATION_TIMEOUT=300 | ||
| 124 | RFC2136_POLLING_INTERVAL=5 | ||
| 125 | RFC2136_TTL=300 | ||
| 126 | ''; | ||
| 127 | }; | ||
| 128 | in // cfg.domains.${domain}.certCfg; | ||
| 104 | in genAttrs (attrNames cfg.domains) domainAttrset; | 129 | in genAttrs (attrNames cfg.domains) domainAttrset; |
| 105 | }; | 130 | }; |
| 106 | 131 | ||
| 132 | sops.secrets = let | ||
| 133 | toTSIGSecret = n: v: | ||
| 134 | if v == "regular" || v == "symlink" | ||
| 135 | then nameValuePair (tsigSecretName n) { | ||
| 136 | format = "binary"; | ||
| 137 | owner = if config.security.acme.useRoot then "root" else "acme"; | ||
| 138 | group = "acme"; | ||
| 139 | sopsFile = ./tsig_keys + "/${n}"; | ||
| 140 | } else null; | ||
| 141 | in mapFilterAttrs (_: v: v != null) toTSIGSecret (readDir ./tsig_keys); | ||
| 142 | |||
| 107 | systemd.services = | 143 | systemd.services = |
| 108 | let | 144 | let |
| 109 | serviceAttrset = domain: { | 145 | serviceAttrset = domain: { |
diff --git a/hosts/surtr/tls/tsig_keys/rheperire.org b/hosts/surtr/tls/tsig_keys/rheperire.org new file mode 100644 index 00000000..1f3dc4a4 --- /dev/null +++ b/hosts/surtr/tls/tsig_keys/rheperire.org | |||
| @@ -0,0 +1,26 @@ | |||
| 1 | { | ||
| 2 | "data": "ENC[AES256_GCM,data:Lb1IWtwPdBxeXGrOr74MlR7lKBMIg2ix3enRMVN4MPEDh7CIFv1nhAfLCDU=,iv:TcyGtcKEL7yUXgHrfJ5pDjl8r5V7ltYQw2wcnsFN1bc=,tag:gBaYj6MkQKvD/uO+Pudnzg==,type:str]", | ||
| 3 | "sops": { | ||
| 4 | "kms": null, | ||
| 5 | "gcp_kms": null, | ||
| 6 | "azure_kv": null, | ||
| 7 | "hc_vault": null, | ||
| 8 | "age": null, | ||
| 9 | "lastmodified": "2022-02-22T09:46:27Z", | ||
| 10 | "mac": "ENC[AES256_GCM,data:vtymuSymOeh34ZbAumxCEcemtI0UFBoQwj4axpKf7AzVnQOubWYxPI5x23CiOE12Y+FThg1dYEnDWlkkQjMVWQvcJzfP1g25S98MuZ42E9R0nBxGzTrIaKS7kgNAriYDy8ib7Z3DUbajEGfvLLazCdHu3g9gE0dLewKcUTHaXwM=,iv:j8vS2Ej58HLf+CP9fe1rN+4UuniGlv/0M+Zzt3nlk5I=,tag:xn33GGm2knsIdH+EJ1zDcA==,type:str]", | ||
| 11 | "pgp": [ | ||
| 12 | { | ||
| 13 | "created_at": "2022-02-22T09:46:26Z", | ||
| 14 | "enc": "-----BEGIN PGP MESSAGE-----\n\nhF4DyFKFNkTVG5oSAQdA1++YsCSiRkVGoVF6uvYeY7JjZjsdjAUwubCF3fLDtS8w\nHFSQltgrqkul1Ei1fUFQqFbSpMSfBQhk0kMH0Xuk5SoDd1lWumqTP9gaJj/CM+yz\n0l4BHiQ4Ktyc01f127Az36nQZGKdJvL9etQAceNtNM7Y4XkLQ78OXFJoERrf81s/\n4wm5za7xqEBE1oE0QWAelzyjBqxI1iCjDl3p6heUdhqlcvAifXgqAk0qxq/4T4FG\n=2Bwl\n-----END PGP MESSAGE-----\n", | ||
| 15 | "fp": "7ED22F4AA7BB55728B643DC5471B7D88E4EF66F8" | ||
| 16 | }, | ||
| 17 | { | ||
| 18 | "created_at": "2022-02-22T09:46:26Z", | ||
| 19 | "enc": "-----BEGIN PGP MESSAGE-----\n\nhF4DXxoViZlp6dISAQdA4jg570qc5Zu3yAJPmjf11r20eYMyjAeEWw/RreZga3Uw\nmTy2jo/de11m3r/aIxp0Q/vFZ1m4JGeoIzIgQxGnhX0s0NpfCbCih0P7UMjZRatC\n0l4BCzWq7c0A2GbjPq+aKF2IYfQV5gdwjgCAJO3Oylb/SAltwnyGChANw4ckUCjV\n9DWYIcerMP2scxpjf5nJXpHNMjpGR7fcqS71PoVoJoActMqrG0deOMUSUEOVP8nR\n=+ux+\n-----END PGP MESSAGE-----\n", | ||
| 20 | "fp": "30D3453B8CD02FE2A3E7C78C0FB536FB87AE8F51" | ||
| 21 | } | ||
| 22 | ], | ||
| 23 | "unencrypted_suffix": "_unencrypted", | ||
| 24 | "version": "3.7.1" | ||
| 25 | } | ||
| 26 | } \ No newline at end of file | ||
