nixfiles/nixos/boxes/colony/vms/shill/containers/object.nix

212 lines
6.6 KiB
Nix
Raw Normal View History

{ lib, ... }:
let
inherit (lib.my) net;
inherit (lib.my.c) pubDomain;
2023-11-02 13:41:50 +00:00
inherit (lib.my.c.colony) domain prefixes;
in
{
nixos.systems.object = { config, ... }: {
2022-07-16 15:01:15 +01:00
system = "x86_64-linux";
nixpkgs = "mine";
rendered = config.configuration.config.my.asContainer;
2022-07-16 15:01:15 +01:00
assignments = {
internal = {
name = "object-ctr";
inherit domain;
ipv4.address = net.cidr.host 7 prefixes.ctrs.v4;
2022-07-16 15:01:15 +01:00
ipv6 = {
iid = "::7";
address = net.cidr.host 7 prefixes.ctrs.v6;
2022-07-16 15:01:15 +01:00
};
};
};
configuration = { lib, pkgs, config, assignments, ... }:
2022-07-16 15:01:15 +01:00
let
inherit (lib) mkMerge mkIf mkForce;
inherit (config.my.user.homeConfig.lib.file) mkOutOfStoreSymlink;
inherit (lib.my) networkdAssignment systemdAwaitPostgres;
2022-07-16 15:01:15 +01:00
in
{
config = mkMerge [
{
my = {
deploy.enable = false;
server.enable = true;
secrets = {
key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFdHbZErWLmTPO/aEWB1Fup/aGMf31Un5Wk66FJwTz/8";
2022-11-20 18:41:49 +00:00
files = {
"object/minio.env" = {};
"object/sharry.conf" = {
owner = "sharry";
group = "sharry";
};
"object/minio-client-config.json" = {
owner = config.my.user.config.name;
group = config.my.user.config.group;
};
"object/atticd.env" = {};
2022-11-20 18:41:49 +00:00
};
2022-07-16 15:01:15 +01:00
};
firewall = {
tcp.allowed = [ 9000 9001 config.services.sharry.config.bind.port 8069 ];
2022-07-16 15:01:15 +01:00
};
user.homeConfig = {
home.file.".mc/config.json".source = mkOutOfStoreSymlink config.age.secrets."object/minio-client-config.json".path;
};
2022-07-16 15:01:15 +01:00
};
users = with lib.my.c.ids; let inherit (config.services.atticd) user group; in {
users."${user}" = {
isSystemUser = true;
uid = uids.atticd;
group = group;
};
groups."${user}".gid = gids.atticd;
};
2022-07-16 15:01:15 +01:00
systemd = {
network.networks."80-container-host0" = networkdAssignment "host0" assignments.internal;
services =
let
awaitPostgres = systemdAwaitPostgres pkgs.postgresql "colony-psql";
in
{
2022-07-16 15:01:15 +01:00
minio = {
environment = {
MINIO_ROOT_USER = "minioadmin";
MINIO_DOMAIN = "s3.nul.ie";
MINIO_SERVER_URL = "https://s3.nul.ie";
MINIO_BROWSER_REDIRECT_URL = "https://minio.nul.ie";
};
};
sharry = awaitPostgres;
atticd = mkMerge [
awaitPostgres
{
serviceConfig = {
# Needs to be able to access its data
DynamicUser = mkForce false;
BindPaths = [ "/mnt/atticd:/var/lib/atticd/storage" ];
};
}
];
2022-07-16 15:01:15 +01:00
};
};
environment = {
systemPackages = with pkgs; [
minio-client
];
};
2022-07-16 15:01:15 +01:00
services = {
minio = {
enable = true;
region = "eu-central-1";
browser = true;
2022-11-20 18:41:49 +00:00
rootCredentialsFile = config.age.secrets."object/minio.env".path;
2022-07-16 21:01:18 +01:00
dataDir = [ "/mnt/minio" ];
2022-07-16 15:01:15 +01:00
};
2022-11-20 18:41:49 +00:00
sharry = {
enable = true;
configOverridesFile = config.age.secrets."object/sharry.conf".path;
config = {
2023-11-02 13:41:50 +00:00
base-url = "https://share.${lib.my.c.pubDomain}";
2023-04-15 21:17:27 +01:00
bind.address = "::";
2022-11-20 18:41:49 +00:00
alias-member-enabled = true;
webapp = {
chunk-size = "64M";
};
backend = {
auth = {
fixed = {
enabled = true;
user = "dev";
};
internal = {
enabled = true;
order = 50;
};
};
jdbc = {
url = "jdbc:postgresql://colony-psql:5432/sharry";
user = "sharry";
};
files = {
default-store = "minio";
stores = {
database.enabled = false;
minio = {
enabled = true;
type = "s3";
endpoint = "https://s3.nul.ie";
access-key = "share";
bucket = "share";
};
};
};
compute-checksum.parallel = 4;
signup.mode = "invite";
share = {
max-size = "128G";
max-validity = "3650 days";
};
mail = {
enabled = true;
smtp = {
host = "mail.nul.ie";
port = 587;
user = "sharry@nul.ie";
ssl-type = "starttls";
default-from = "Sharry <sharry@nul.ie>";
timeout = "30 seconds";
};
};
};
};
};
atticd = {
enable = true;
credentialsFile = config.age.secrets."object/atticd.env".path;
settings = {
listen = "[::]:8069";
allowed-hosts = [ "nix-cache.${pubDomain}" ];
api-endpoint = "https://nix-cache.${pubDomain}/";
database = mkForce {}; # blank to pull from env
storage = {
type = "local";
path = "/var/lib/atticd/storage";
};
chunking = {
nar-size-threshold = 65536;
min-size = 16384;
avg-size = 65536;
max-size = 262144;
};
};
};
2022-07-16 15:01:15 +01:00
};
}
(mkIf config.my.build.isDevVM {
virtualisation = {
forwardPorts = [
{ from = "host"; host.port = 9000; guest.port = 9000; }
{ from = "host"; host.port = 9001; guest.port = 9001; }
2022-11-20 18:41:49 +00:00
{ from = "host"; guest.port = config.services.sharry.config.bind.port; }
2022-07-16 15:01:15 +01:00
];
};
})
];
};
};
}