2023-04-03 02:11:08 +02:00
|
|
|
{ pkgs, lib, config, tf, inputs, ... }:
|
2022-07-31 11:03:59 +02:00
|
|
|
with lib;
|
|
|
|
let
|
|
|
|
in
|
|
|
|
{
|
2023-04-03 01:31:37 +02:00
|
|
|
systemd.services.hashicorp-vault-agent =
|
|
|
|
let
|
|
|
|
config = pkgs.writeText "hashicorp-vault-agent-tmpfiles.d" ''
|
|
|
|
d /run/secrets 0750 root root 0
|
2023-05-02 14:41:55 +02:00
|
|
|
x /run/secrets/monitor 0755 root root -
|
|
|
|
d /run/secrets/monitor 0755 root root 0
|
2023-04-03 01:31:37 +02:00
|
|
|
'';
|
|
|
|
in
|
|
|
|
{
|
|
|
|
preStart = "systemd-tmpfiles --create " + config;
|
|
|
|
postStop = "systemd-tmpfiles --clean " + config;
|
|
|
|
};
|
2023-02-02 15:07:56 +01:00
|
|
|
|
2022-07-31 11:03:59 +02:00
|
|
|
services.hashicorp.vault-agent =
|
|
|
|
{ enable = true;
|
2023-04-03 02:11:08 +02:00
|
|
|
package = inputs.nixpkgs-hashicorp.legacyPackages.${pkgs.stdenv.system}.vault;
|
2022-07-31 11:03:59 +02:00
|
|
|
|
|
|
|
command = "agent";
|
|
|
|
|
|
|
|
extraPackages = with pkgs;
|
|
|
|
[ sudo getent ];
|
|
|
|
|
|
|
|
settings =
|
|
|
|
{ vault =
|
2022-10-11 07:55:27 +02:00
|
|
|
{ address = "https://vault.in.redalder.org:8200";
|
2022-07-31 11:03:59 +02:00
|
|
|
retry =
|
|
|
|
{ num_retries = 5;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2022-10-11 07:55:27 +02:00
|
|
|
auto_auth = {
|
|
|
|
method = singleton
|
|
|
|
{ "approle" =
|
|
|
|
{ mount_path = "auth/approle";
|
|
|
|
config =
|
|
|
|
{ role_id_file_path = "/var/secrets/approle.roleid";
|
|
|
|
secret_id_file_path = "/var/secrets/approle.secretid";
|
|
|
|
remove_secret_id_file_after_reading = false;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
sink =
|
|
|
|
[ { type = "file";
|
2022-07-31 11:03:59 +02:00
|
|
|
config =
|
2022-10-11 07:55:27 +02:00
|
|
|
{ path = "/run/secrets/vault-token";
|
2022-07-31 11:03:59 +02:00
|
|
|
};
|
2022-10-11 07:55:27 +02:00
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
2022-07-31 11:03:59 +02:00
|
|
|
|
|
|
|
template = [
|
2023-03-06 00:30:29 +01:00
|
|
|
{
|
|
|
|
source = pkgs.writeText "id_ed_camera" ''
|
|
|
|
{{ with secret "kv/data/homelab-1/blowhole/id_ed_camera" }}{{ .Data.data.private }}{{ end }}
|
2022-07-31 11:03:59 +02:00
|
|
|
'';
|
2023-03-06 00:30:29 +01:00
|
|
|
destination = "/run/secrets/id_ed_camera";
|
|
|
|
command = pkgs.writeShellScript "id_ed_camera-command" ''
|
|
|
|
export PATH=${pkgs.util-linux}/bin:$PATH
|
|
|
|
chown root:root /run/secrets/id_ed_camera
|
|
|
|
chmod 600 /run/secrets/id_ed_camera
|
2022-07-31 11:03:59 +02:00
|
|
|
'';
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|