diff --git a/ops/nixos/panettone.nix b/ops/nixos/panettone.nix index 3d31d79ca..c95fb7ffd 100644 --- a/ops/nixos/panettone.nix +++ b/ops/nixos/panettone.nix @@ -15,21 +15,29 @@ in { dbHost = mkOption { description = "Postgresql host to connect to for Panettone"; - type = types.string; + type = types.str; default = "localhost"; }; dbName = mkOption { description = "Name of the database for Panettone"; - type = types.string; + type = types.str; default = "panettone"; }; dbUser = mkOption { description = "Name of the database user for Panettone"; - type = types.string; + type = types.str; default = "panettone"; }; + + secretsFile = mkOption { + description = '' + Path to a file containing secrets, in the format accepted + by systemd's EnvironmentFile + ''; + type = types.str; + }; }; config = lib.mkIf cfg.enable { @@ -63,6 +71,7 @@ in { DynamicUser = true; Restart = "always"; StateDirectory = "panettone"; + EnvironmentFile = cfg.secretsFile; }; environment = { diff --git a/ops/nixos/whitby/default.nix b/ops/nixos/whitby/default.nix index ad631e795..f28e8789f 100644 --- a/ops/nixos/whitby/default.nix +++ b/ops/nixos/whitby/default.nix @@ -221,6 +221,7 @@ in lib.fix(self: { enable = true; dbUser = "panettone"; dbName = "panettone"; + secretsFile = "/etc/secrets/panettone"; }; }; @@ -228,10 +229,12 @@ in lib.fix(self: { enable = true; enableTCPIP = true; - authentication = lib.mkOverride 10 '' + authentication = lib.mkForce '' local all all trust - host all all ::1/128 trust - hostnossl all all ::1/128 trust + host all all 127.0.0.1/32 password + host all all ::1/128 password + hostnossl all all 127.0.0.1/32 password + hostnossl all all ::1/128 password ''; ensureDatabases = [