nixfiles/nixos/boxes/colony/vms/shill/containers/object.nix

289 lines
8.8 KiB
Nix
Raw Normal View History

{ lib, ... }:
let
inherit (lib.my) net;
inherit (lib.my.c) pubDomain;
2023-11-02 13:41:50 +00:00
inherit (lib.my.c.colony) domain prefixes;
in
{
nixos.systems.object = { config, ... }: {
2022-07-16 15:01:15 +01:00
system = "x86_64-linux";
nixpkgs = "mine";
rendered = config.configuration.config.my.asContainer;
2022-07-16 15:01:15 +01:00
assignments = {
internal = {
name = "object-ctr";
inherit domain;
ipv4.address = net.cidr.host 7 prefixes.ctrs.v4;
2022-07-16 15:01:15 +01:00
ipv6 = {
iid = "::7";
address = net.cidr.host 7 prefixes.ctrs.v6;
2022-07-16 15:01:15 +01:00
};
};
};
configuration = { lib, pkgs, config, assignments, ... }:
2022-07-16 15:01:15 +01:00
let
inherit (lib) mkMerge mkIf mkForce;
inherit (config.my.user.homeConfig.lib.file) mkOutOfStoreSymlink;
inherit (lib.my) networkdAssignment systemdAwaitPostgres;
2022-07-16 15:01:15 +01:00
in
{
config = mkMerge [
{
fileSystems = {
"/var/lib/harmonia" = {
device = "/mnt/nix-cache";
options = [ "bind" ];
};
};
2022-07-16 15:01:15 +01:00
my = {
deploy.enable = false;
server.enable = true;
secrets = {
key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFdHbZErWLmTPO/aEWB1Fup/aGMf31Un5Wk66FJwTz/8";
2022-11-20 18:41:49 +00:00
files = {
"object/minio.env" = {};
"object/sharry.conf" = {
owner = "sharry";
group = "sharry";
};
"object/minio-client-config.json" = {
owner = config.my.user.config.name;
group = config.my.user.config.group;
};
"object/atticd.env" = {};
"nix-cache.key" = {};
2024-01-08 21:40:20 +00:00
"object/hedgedoc.env" = {};
2024-01-10 15:21:40 +00:00
"object/wastebin.env" = {};
2022-11-20 18:41:49 +00:00
};
2022-07-16 15:01:15 +01:00
};
firewall = {
2024-01-08 21:40:20 +00:00
tcp.allowed = [
9000 9001
config.services.sharry.config.bind.port
8069
5000
2024-01-08 21:40:20 +00:00
config.services.hedgedoc.settings.port
2024-01-10 15:21:40 +00:00
8088
2024-01-08 21:40:20 +00:00
];
2022-07-16 15:01:15 +01:00
};
user.homeConfig = {
home.file.".mc/config.json".source = mkOutOfStoreSymlink config.age.secrets."object/minio-client-config.json".path;
};
2022-07-16 15:01:15 +01:00
};
users = with lib.my.c.ids; mkMerge [
(let inherit (config.services.atticd) user group; in {
users."${user}" = {
isSystemUser = true;
uid = uids.atticd;
group = group;
};
groups."${user}".gid = gids.atticd;
})
{
users = {
harmonia = {
shell = pkgs.bashInteractive;
openssh.authorizedKeys.keyFiles = [
lib.my.c.sshKeyFiles.harmonia
];
};
};
}
];
2022-07-16 15:01:15 +01:00
systemd = {
network.networks."80-container-host0" = networkdAssignment "host0" assignments.internal;
services =
let
awaitPostgres = systemdAwaitPostgres pkgs.postgresql "colony-psql";
in
{
2022-07-16 15:01:15 +01:00
minio = {
environment = {
MINIO_ROOT_USER = "minioadmin";
MINIO_DOMAIN = "s3.nul.ie";
MINIO_SERVER_URL = "https://s3.nul.ie";
MINIO_BROWSER_REDIRECT_URL = "https://minio.nul.ie";
};
};
sharry = awaitPostgres;
atticd = mkMerge [
awaitPostgres
{
serviceConfig = {
# Needs to be able to access its data
DynamicUser = mkForce false;
BindPaths = [ "/mnt/atticd:/var/lib/atticd/storage" ];
};
}
];
harmonia = {
environment.NIX_REMOTE = "/var/lib/harmonia";
preStart = ''
${config.nix.package}/bin/nix store ping
'';
serviceConfig = {
StateDirectory = "harmonia";
};
};
2022-07-16 15:01:15 +01:00
};
};
environment = {
systemPackages = with pkgs; [
minio-client
];
};
2022-07-16 15:01:15 +01:00
services = {
minio = {
enable = true;
region = "eu-central-1";
browser = true;
2022-11-20 18:41:49 +00:00
rootCredentialsFile = config.age.secrets."object/minio.env".path;
2022-07-16 21:01:18 +01:00
dataDir = [ "/mnt/minio" ];
2022-07-16 15:01:15 +01:00
};
2022-11-20 18:41:49 +00:00
sharry = {
enable = true;
configOverridesFile = config.age.secrets."object/sharry.conf".path;
config = {
2023-11-02 13:41:50 +00:00
base-url = "https://share.${lib.my.c.pubDomain}";
2023-04-15 21:17:27 +01:00
bind.address = "::";
2022-11-20 18:41:49 +00:00
alias-member-enabled = true;
webapp = {
chunk-size = "64M";
};
backend = {
auth = {
fixed = {
enabled = true;
user = "dev";
};
internal = {
enabled = true;
order = 50;
};
};
jdbc = {
url = "jdbc:postgresql://colony-psql:5432/sharry";
user = "sharry";
};
files = {
default-store = "minio";
stores = {
database.enabled = false;
minio = {
enabled = true;
type = "s3";
endpoint = "https://s3.nul.ie";
access-key = "share";
bucket = "share";
};
};
};
compute-checksum.parallel = 4;
signup.mode = "invite";
share = {
max-size = "128G";
max-validity = "3650 days";
};
mail = {
enabled = true;
smtp = {
host = "mail.nul.ie";
port = 587;
user = "sharry@nul.ie";
ssl-type = "starttls";
default-from = "Sharry <sharry@nul.ie>";
timeout = "30 seconds";
};
};
};
};
};
atticd = {
enable = false;
credentialsFile = config.age.secrets."object/atticd.env".path;
settings = {
listen = "[::]:8069";
allowed-hosts = [ "nix-cache.${pubDomain}" ];
api-endpoint = "https://nix-cache.${pubDomain}/";
database = mkForce {}; # blank to pull from env
storage = {
type = "local";
path = "/var/lib/atticd/storage";
};
chunking = {
nar-size-threshold = 65536;
min-size = 16384;
avg-size = 65536;
max-size = 262144;
};
};
};
2024-01-08 21:40:20 +00:00
harmonia = {
enable = true;
signKeyPath = config.age.secrets."nix-cache.key".path;
settings = {
priority = 30;
};
};
2024-01-08 21:40:20 +00:00
hedgedoc = {
enable = true;
environmentFile = config.age.secrets."object/hedgedoc.env".path;
settings = {
domain = "md.${pubDomain}";
protocolUseSSL = true;
db = {
dialect = "postgresql";
username = "hedgedoc";
database = "hedgedoc";
host = "colony-psql";
};
host = "::";
allowAnonymous = false;
allowAnonymousEdits = true;
email = true;
allowEmailRegister = false;
};
};
2024-01-10 15:21:40 +00:00
wastebin = {
enable = true;
settings = {
2024-04-04 19:08:12 +01:00
WASTEBIN_MAX_BODY_SIZE = 67108864; # 16 MiB
2024-01-10 15:21:40 +00:00
WASTEBIN_PASSWORD_SALT = "TeGhaemeer0Siez3";
};
2024-04-04 19:08:12 +01:00
secretFile = config.age.secrets."object/wastebin.env".path;
2024-01-10 15:21:40 +00:00
};
2022-07-16 15:01:15 +01:00
};
}
(mkIf config.my.build.isDevVM {
virtualisation = {
forwardPorts = [
{ from = "host"; host.port = 9000; guest.port = 9000; }
{ from = "host"; host.port = 9001; guest.port = 9001; }
2022-11-20 18:41:49 +00:00
{ from = "host"; guest.port = config.services.sharry.config.bind.port; }
2022-07-16 15:01:15 +01:00
];
};
})
];
};
};
}