Updating tailscale keys

This commit is contained in:
iFargle 2023-09-18 20:49:11 +09:00
parent 4d106d5331
commit 337309b248
4 changed files with 8 additions and 8 deletions

View file

@ -36,7 +36,7 @@
# Generic Tailscale configs are in /nixos/common/services/tailscale.nix # Generic Tailscale configs are in /nixos/common/services/tailscale.nix
# Set up the secrets file: # Set up the secrets file:
sops.secrets.tailscale.nixos-rpi4-01 = { sops.secrets.tailscale_keys.nixos-rpi4-01 = {
owner = "root"; owner = "root";
sopsFile = ../../../secrets/tailscale.yaml; sopsFile = ../../../secrets/tailscale.yaml;
restartUnits = [ restartUnits = [
@ -44,7 +44,7 @@
"tailscaled-autoconnect.service" "tailscaled-autoconnect.service"
]; ];
}; };
services.tailscale.authKeyFile = "/run/secrets/tailscale/nixos-rpi4-01"; services.tailscale.authKeyFile = "/run/secrets/tailscale_keys/nixos-rpi4-01";
services.tailscale.extraUpFlags = [ "--advertise-exit-node" ]; services.tailscale.extraUpFlags = [ "--advertise-exit-node" ];
boot.kernel.sysctl = { "net.ipv4.ip_forward" = true; }; boot.kernel.sysctl = { "net.ipv4.ip_forward" = true; };

View file

@ -36,7 +36,7 @@
# Generic Tailscale configs are in /nixos/common/services/tailscale.nix # Generic Tailscale configs are in /nixos/common/services/tailscale.nix
# Set up the secrets file: # Set up the secrets file:
sops.secrets.tailscale.nixos-rpi4-02 = { sops.secrets.tailscale_keys.nixos-rpi4-02 = {
owner = "root"; owner = "root";
sopsFile = ../../../secrets/tailscale.yaml; sopsFile = ../../../secrets/tailscale.yaml;
restartUnits = [ restartUnits = [
@ -44,7 +44,7 @@
"tailscaled-autoconnect.service" "tailscaled-autoconnect.service"
]; ];
}; };
services.tailscale.authKeyFile = "/run/secrets/tailscale/nixos-rpi4-02"; services.tailscale.authKeyFile = "/run/secrets/tailscale_keys/nixos-rpi4-02";
services.tailscale.extraUpFlags = [ "--advertise-exit-node" ]; services.tailscale.extraUpFlags = [ "--advertise-exit-node" ];
boot.kernel.sysctl = { "net.ipv4.ip_forward" = true; }; boot.kernel.sysctl = { "net.ipv4.ip_forward" = true; };

View file

@ -36,7 +36,7 @@
# Generic Tailscale configs are in /nixos/common/services/tailscale.nix # Generic Tailscale configs are in /nixos/common/services/tailscale.nix
# Set up the secrets file: # Set up the secrets file:
sops.secrets.tailscale.nixos-rpi4-03 = { sops.secrets.tailscale_keys.nixos-rpi4-03 = {
owner = "root"; owner = "root";
sopsFile = ../../../secrets/tailscale.yaml; sopsFile = ../../../secrets/tailscale.yaml;
restartUnits = [ restartUnits = [
@ -44,7 +44,7 @@
"tailscaled-autoconnect.service" "tailscaled-autoconnect.service"
]; ];
}; };
services.tailscale.authKeyFile = "/run/secrets/tailscale/nixos-rpi4-03"; services.tailscale.authKeyFile = "/run/secrets/tailscale_keys/nixos-rpi4-03";
services.tailscale.extraUpFlags = [ "--advertise-exit-node" ]; services.tailscale.extraUpFlags = [ "--advertise-exit-node" ];
boot.kernel.sysctl = { "net.ipv4.ip_forward" = true; }; boot.kernel.sysctl = { "net.ipv4.ip_forward" = true; };

View file

@ -29,7 +29,7 @@
# Generic Tailscale configs are in /nixos/common/services/tailscale.nix # Generic Tailscale configs are in /nixos/common/services/tailscale.nix
# Set up the secrets file: # Set up the secrets file:
sops.secrets.nixos-vm-01_tailscale_key = { sops.secrets.tailscals_keys.nixos-vm-01 = {
owner = "root"; owner = "root";
sopsFile = ../../../secrets/tailscale.yaml; sopsFile = ../../../secrets/tailscale.yaml;
restartUnits = [ restartUnits = [
@ -37,6 +37,6 @@
"tailscaled-autoconnect.service" "tailscaled-autoconnect.service"
]; ];
}; };
services.tailscale.authKeyFile = "/run/secrets/nixos-vm-01_tailscale_key"; services.tailscale.authKeyFile = "/run/secrets/tailscale_keys/nixos-vm-01";
# networking.firewall.allowedTCPPorts = [ 22 ]; # networking.firewall.allowedTCPPorts = [ 22 ];
} }