depot/ops/vault/cfg/config.nix

66 lines
1.3 KiB
Nix
Raw Normal View History

2022-03-14 23:34:33 +00:00
{ lib, config, ... }:
2022-03-14 21:29:15 +00:00
{
2022-03-14 23:34:33 +00:00
imports = [
./policies-raw.nix
./policies-app.nix
./authbackend-approle.nix
./authbackend-oidc.nix
./ssh-ca-client.nix
./ssh-ca-server.nix
./servers.nix
2022-03-16 00:18:47 +00:00
./acme-ca.nix
2022-04-05 21:04:32 +00:00
./lukegbcom-deployer.nix
2022-03-14 23:34:33 +00:00
];
2022-03-14 21:29:15 +00:00
terraform = {
backend.gcs = {
bucket = "lukegb-terraform-state";
prefix = "depot/vault";
};
required_providers.vault = {
source = "hashicorp/vault";
version = "3.3.1";
};
};
2022-03-14 23:34:33 +00:00
provider.vault = {
address = "https://vault.int.lukegb.com";
};
2022-04-05 21:04:32 +00:00
resource.vault_gcp_secret_backend.gcp = {
path = "gcp";
};
data.vault_generic_secret.misc = {
path = "kv/misc-input";
};
2022-04-09 19:59:11 +00:00
my.apps.deluge = {};
2022-03-14 23:34:33 +00:00
my.apps.pomerium = {};
2022-04-09 19:59:11 +00:00
my.apps.sslrenew-raritan.policy = ''
# sslrenew-raritan is permitted to issue certificates.
path "acme/certs/*" {
capabilities = ["create"]
}
'';
my.apps.deployer.policy = ''
# Allow reading nix-daemon secrets
path "kv/data/apps/nix-daemon" {
capabilities = ["read"]
}
path "kv/metadata/apps/nix-daemon" {
capabilities = ["read"]
}
'';
2022-04-09 19:59:11 +00:00
my.servers.etheroute-lon01.apps = [ "pomerium" ];
my.servers.totoro.apps = [ "sslrenew-raritan" "deluge" ];
my.servers.clouvider-fra01.apps = [ "deluge" ];
2022-03-14 21:29:15 +00:00
}