put pihole password in secrets file and use systemd to auto change it
This commit is contained in:
parent
35d46ca712
commit
a1b24090aa
3 changed files with 22 additions and 2 deletions
|
@ -1,4 +1,4 @@
|
||||||
{ lib, ... }:
|
{ config, lib, ... }:
|
||||||
let
|
let
|
||||||
ip = "10.0.0.203";
|
ip = "10.0.0.203";
|
||||||
interface = "eno1";
|
interface = "eno1";
|
||||||
|
@ -22,13 +22,26 @@ in
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
TZ = "America/Detroit";
|
TZ = "America/Detroit";
|
||||||
WEBPASSWORD = "CHANGE_ME_PLEASE!";
|
|
||||||
FTLCONF_LOCAL_IPV4 = ip;
|
FTLCONF_LOCAL_IPV4 = ip;
|
||||||
INTERFACE = interface;
|
INTERFACE = interface;
|
||||||
};
|
};
|
||||||
extraOptions = [ "--network=host" ];
|
extraOptions = [ "--network=host" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
age.secrets.piholeAdminPass = {
|
||||||
|
file = ../../secrets/piholeAdminPass.age;
|
||||||
|
mode = "770";
|
||||||
|
owner = "share";
|
||||||
|
group = "share";
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services.podman-pihole.postStart =
|
||||||
|
let
|
||||||
|
password = config.age.secrets.piholeAdminPass.path;
|
||||||
|
in ''
|
||||||
|
podman exec -it pihole pihole -a -p ${password}
|
||||||
|
'';
|
||||||
|
|
||||||
networking.firewall = {
|
networking.firewall = {
|
||||||
allowedTCPPorts = [ 53 80 ];
|
allowedTCPPorts = [ 53 80 ];
|
||||||
allowedUDPPorts = [ 53 ];
|
allowedUDPPorts = [ 53 ];
|
||||||
|
|
5
secrets/piholeAdminPass.age
Normal file
5
secrets/piholeAdminPass.age
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 VoJMUA CGfkrC5LHa88XpHrxGJAELHXi+fcoSILipOJjxWPWhQ
|
||||||
|
ZSlQrcKXSeaevABSk8Xf76PPZZGC3jp+fdhxvB2u60I
|
||||||
|
--- m/rAZBuJimyZwQF5Q7AR3bmJoIcyekaprdxpZzZM0Go
|
||||||
|
nT÷½(гÈwiÄVÆÍÄâÊÎq='*u<Ž=
ÃsO)iµ«.p cï®V¤1¹Ç] JÅyà*®ÊnQ›v
|
|
@ -2,12 +2,14 @@ let
|
||||||
systems = {
|
systems = {
|
||||||
eden = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIByi8x1IgXBC6iw6MJoO7xIkkU4bdIaQ3Mi6zEtm+IJh";
|
eden = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIByi8x1IgXBC6iw6MJoO7xIkkU4bdIaQ3Mi6zEtm+IJh";
|
||||||
oasis = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICCvgPNEJrWjeCUmF/izLhIzaAwSNYHW9o5meYmGHGzj";
|
oasis = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICCvgPNEJrWjeCUmF/izLhIzaAwSNYHW9o5meYmGHGzj";
|
||||||
|
raindog = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINq0rMkFlizGPijlHKMYS9CGWJ2T1ZJHqaLozWdoySz2";
|
||||||
};
|
};
|
||||||
allSystems = builtins.attrValues systems;
|
allSystems = builtins.attrValues systems;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
"forgejoAdminPass.age".publicKeys = [ systems.oasis ];
|
"forgejoAdminPass.age".publicKeys = [ systems.oasis ];
|
||||||
"forgejoRunnerToken.age".publicKeys = [ systems.oasis ];
|
"forgejoRunnerToken.age".publicKeys = [ systems.oasis ];
|
||||||
|
"piholeAdminPass.age".publicKeys = [ systems.raindog ];
|
||||||
"pushoverAppToken.age".publicKeys = allSystems;
|
"pushoverAppToken.age".publicKeys = allSystems;
|
||||||
"pushoverUserToken.age".publicKeys = allSystems;
|
"pushoverUserToken.age".publicKeys = allSystems;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue