2023-12-09 15:22:01 +00:00
|
|
|
{ lib, ... }:
|
|
|
|
let
|
2024-01-08 23:31:06 +00:00
|
|
|
inherit (builtins) mapAttrs;
|
|
|
|
inherit (lib) mkMerge mkDefault;
|
2023-12-09 15:22:01 +00:00
|
|
|
inherit (lib.my) net;
|
2023-12-09 16:30:06 +00:00
|
|
|
inherit (lib.my.c) pubDomain;
|
2023-12-09 15:22:01 +00:00
|
|
|
inherit (lib.my.c.colony) domain prefixes;
|
2024-01-08 23:31:06 +00:00
|
|
|
inherit (lib.my.c.nginx) baseHttpConfig proxyHeaders;
|
2023-12-09 15:22:01 +00:00
|
|
|
in
|
|
|
|
{
|
|
|
|
nixos.systems.git = {
|
|
|
|
system = "x86_64-linux";
|
|
|
|
nixpkgs = "mine";
|
|
|
|
|
|
|
|
assignments = {
|
|
|
|
routing = {
|
|
|
|
name = "git-vm-routing";
|
|
|
|
inherit domain;
|
|
|
|
ipv4.address = net.cidr.host 4 prefixes.vms.v4;
|
|
|
|
};
|
|
|
|
internal = {
|
|
|
|
name = "git-vm";
|
|
|
|
inherit domain;
|
|
|
|
ipv4 = {
|
|
|
|
address = net.cidr.host 0 prefixes.vip3;
|
|
|
|
mask = 32;
|
|
|
|
gateway = null;
|
|
|
|
genPTR = false;
|
|
|
|
};
|
|
|
|
ipv6 = {
|
|
|
|
iid = "::4";
|
|
|
|
address = net.cidr.host 4 prefixes.vms.v6;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
configuration = { lib, pkgs, modulesPath, config, assignments, allAssignments, ... }:
|
|
|
|
let
|
|
|
|
inherit (lib) mkMerge;
|
|
|
|
inherit (lib.my) networkdAssignment;
|
|
|
|
in
|
|
|
|
{
|
|
|
|
imports = [
|
|
|
|
"${modulesPath}/profiles/qemu-guest.nix"
|
|
|
|
|
|
|
|
./gitea.nix
|
|
|
|
./gitea-actions.nix
|
|
|
|
];
|
|
|
|
|
|
|
|
config = mkMerge [
|
|
|
|
{
|
|
|
|
boot = {
|
|
|
|
kernelParams = [ "console=ttyS0,115200n8" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
fileSystems = {
|
|
|
|
"/boot" = {
|
|
|
|
device = "/dev/disk/by-label/ESP";
|
|
|
|
fsType = "vfat";
|
|
|
|
};
|
|
|
|
"/nix" = {
|
|
|
|
device = "/dev/disk/by-label/nix";
|
|
|
|
fsType = "ext4";
|
|
|
|
};
|
|
|
|
"/persist" = {
|
|
|
|
device = "/dev/disk/by-label/persist";
|
|
|
|
fsType = "ext4";
|
|
|
|
neededForBoot = true;
|
|
|
|
};
|
|
|
|
|
|
|
|
"/var/lib/containers" = {
|
|
|
|
device = "/dev/disk/by-label/oci";
|
|
|
|
fsType = "xfs";
|
|
|
|
options = [ "pquota" ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2024-01-08 23:31:06 +00:00
|
|
|
users = {
|
|
|
|
users = {
|
|
|
|
nginx.extraGroups = [ "acme" ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
security.acme = {
|
|
|
|
acceptTerms = true;
|
|
|
|
defaults = {
|
|
|
|
email = "dev@nul.ie";
|
|
|
|
server = "https://acme-v02.api.letsencrypt.org/directory";
|
|
|
|
reloadServices = [ "nginx" ];
|
|
|
|
dnsResolver = "8.8.8.8";
|
|
|
|
};
|
|
|
|
certs = {
|
|
|
|
"${pubDomain}" = {
|
|
|
|
extraDomainNames = [
|
|
|
|
"*.${pubDomain}"
|
|
|
|
];
|
|
|
|
dnsProvider = "cloudflare";
|
|
|
|
credentialsFile = config.age.secrets."middleman/cloudflare-credentials.conf".path;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2023-12-09 15:22:01 +00:00
|
|
|
services = {
|
|
|
|
fstrim = lib.my.c.colony.fstrimConfig;
|
|
|
|
netdata.enable = true;
|
2024-01-08 23:31:06 +00:00
|
|
|
nginx = {
|
|
|
|
enable = true;
|
|
|
|
enableReload = true;
|
|
|
|
|
|
|
|
logError = "stderr info";
|
|
|
|
recommendedTlsSettings = true;
|
|
|
|
clientMaxBodySize = "0";
|
|
|
|
serverTokens = true;
|
|
|
|
sslDhparam = config.age.secrets."dhparams.pem".path;
|
|
|
|
|
|
|
|
# Based on recommended*Settings, but probably better to be explicit about these
|
|
|
|
appendHttpConfig = ''
|
|
|
|
${baseHttpConfig}
|
|
|
|
|
|
|
|
# caching
|
|
|
|
proxy_cache_path /var/cache/nginx levels=1:2 keys_zone=CACHE:10m inactive=7d max_size=512m;
|
|
|
|
'';
|
|
|
|
|
|
|
|
virtualHosts =
|
|
|
|
let
|
|
|
|
hosts = {
|
|
|
|
"_" = {
|
|
|
|
default = true;
|
|
|
|
forceSSL = true;
|
|
|
|
onlySSL = false;
|
|
|
|
locations = {
|
|
|
|
"/".root = "${pkgs.nginx}/html";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
"git.${pubDomain}" = {
|
|
|
|
locations."/".proxyPass = "http://localhost:3000";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
defaultsFor = mapAttrs (n: _: {
|
|
|
|
onlySSL = mkDefault true;
|
|
|
|
useACMEHost = mkDefault pubDomain;
|
|
|
|
kTLS = mkDefault true;
|
|
|
|
http2 = mkDefault true;
|
|
|
|
});
|
|
|
|
in
|
|
|
|
mkMerge [
|
|
|
|
hosts
|
|
|
|
(defaultsFor hosts)
|
|
|
|
];
|
|
|
|
};
|
2023-12-09 15:22:01 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
virtualisation = {
|
|
|
|
podman = {
|
|
|
|
enable = true;
|
|
|
|
};
|
|
|
|
oci-containers = {
|
|
|
|
backend = "podman";
|
|
|
|
};
|
2023-12-09 17:19:18 +00:00
|
|
|
containers.containersConf.settings.network.default_subnet = "10.88.0.0/16";
|
2023-12-09 15:22:01 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
systemd.network = {
|
|
|
|
links = {
|
|
|
|
"10-vms" = {
|
|
|
|
matchConfig.MACAddress = "52:54:00:75:78:a8";
|
|
|
|
linkConfig.Name = "vms";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
networks = {
|
|
|
|
"80-vms" = mkMerge [
|
|
|
|
(networkdAssignment "vms" assignments.routing)
|
|
|
|
(networkdAssignment "vms" assignments.internal)
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
my = {
|
2024-01-08 23:31:06 +00:00
|
|
|
secrets = {
|
|
|
|
key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP+KINpHLMduBuW96JzfSRDLUzkI+XaCBghu5/wHiW5R";
|
|
|
|
files = {
|
|
|
|
"dhparams.pem" = {
|
|
|
|
owner = "acme";
|
|
|
|
group = "acme";
|
|
|
|
mode = "440";
|
|
|
|
};
|
|
|
|
"middleman/cloudflare-credentials.conf" = {
|
|
|
|
owner = "acme";
|
|
|
|
group = "acme";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
2023-12-09 15:22:01 +00:00
|
|
|
server.enable = true;
|
|
|
|
|
|
|
|
firewall = {
|
2024-01-08 23:31:06 +00:00
|
|
|
tcp.allowed = [ 19999 "http" "https" ];
|
2023-12-09 17:19:18 +00:00
|
|
|
extraRules = ''
|
|
|
|
table inet filter {
|
|
|
|
chain forward {
|
|
|
|
ip saddr 10.88.0.0/16 accept
|
|
|
|
}
|
|
|
|
}
|
|
|
|
'';
|
2023-12-09 15:22:01 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|