Upgrade inputs to 24.11 #16
60 changed files with 1212 additions and 1328 deletions
|
@ -27,7 +27,6 @@
|
|||
|
||||
- [calanda](nixos-configurations/calanda/README.md)
|
||||
- [cyprianspitz](nixos-configurations/cyprianspitz/README.md)
|
||||
- [fulberg](nixos-configurations/fulberg/README.md)
|
||||
- [lindberg](nixos-configurations/lindberg/README.md)
|
||||
- [stompert](nixos-configurations/stompert/README.md)
|
||||
- [tierberg](nixos-configurations/tierberg/README.md)
|
||||
|
|
|
@ -1,58 +0,0 @@
|
|||
{
|
||||
pkgs,
|
||||
lib,
|
||||
config,
|
||||
...
|
||||
}:
|
||||
let
|
||||
hostName = config.networking.hostName;
|
||||
netName = "backplane";
|
||||
netConfig = config.qois.meta.network.virtual.${netName};
|
||||
hostNetConfig = netConfig.hosts.${hostName};
|
||||
wgDefaultPort = 51825;
|
||||
in
|
||||
{
|
||||
sops.secrets."wgautomesh/gossip-secret".restartUnits = [ "wgautomesh.service" ];
|
||||
|
||||
networking.wireguard.enable = true;
|
||||
networking.wireguard.interfaces."wg-${netName}" = {
|
||||
ips = [ "${hostNetConfig.v4.ip}/${builtins.toString netConfig.v4.prefixLength}" ];
|
||||
listenPort = if hostNetConfig.endpoint != null then hostNetConfig.endpoint.port else wgDefaultPort;
|
||||
privateKeyFile = "/secrets/wireguard/private/${netName}";
|
||||
generatePrivateKeyFile = true;
|
||||
};
|
||||
|
||||
systemd.network.wait-online.ignoredInterfaces = [ "wg-${netName}" ];
|
||||
|
||||
networking.firewall.allowedUDPPorts =
|
||||
if hostNetConfig.endpoint != null then [ hostNetConfig.endpoint.port ] else [ wgDefaultPort ];
|
||||
|
||||
# Configure wgautomesh to setup peers. Make sure that the name is not used in the VPN module
|
||||
services.wgautomesh = {
|
||||
enable = true;
|
||||
gossipSecretFile = builtins.toString config.sops.secrets."wgautomesh/gossip-secret".path;
|
||||
openFirewall = true;
|
||||
logLevel = "info";
|
||||
settings = {
|
||||
interface = "wg-${netName}";
|
||||
|
||||
# Map meta network configuration to the format of wgautomesh and filter out peers with endpoints
|
||||
peers =
|
||||
let
|
||||
reachableHosts = lib.filterAttrs (
|
||||
peerHostName: peerConfig: peerHostName != hostName # Not this host
|
||||
) netConfig.hosts;
|
||||
in
|
||||
lib.mapAttrsToList (_: peerConfig: {
|
||||
address = peerConfig.v4.ip;
|
||||
endpoint =
|
||||
if peerConfig.endpoint != null then
|
||||
with peerConfig.endpoint; "${fqdn}:${builtins.toString port}"
|
||||
else
|
||||
null;
|
||||
pubkey = peerConfig.publicKey;
|
||||
}) reachableHosts;
|
||||
};
|
||||
};
|
||||
systemd.services.wgautomesh.requires = [ "wireguard-wg-backplane.service" ];
|
||||
}
|
|
@ -52,27 +52,32 @@
|
|||
|
||||
# Package management
|
||||
nix = {
|
||||
settings = {
|
||||
trusted-users = [
|
||||
"root"
|
||||
"@wheel"
|
||||
];
|
||||
substituters = [
|
||||
"https://${inputs.self.nixosConfigurations.lindberg-build.config.qois.nixpkgs-cache.hostname}?priority=39"
|
||||
"https://cache.nixos.org?priority=40"
|
||||
"https://attic.qo.is/qois-infrastructure"
|
||||
];
|
||||
trusted-public-keys = [
|
||||
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
|
||||
"qois-infrastructure:lh35ymN7Aoxm5Hz0S6JusxE+cYzMU+x9OMKjDVIpfuE="
|
||||
];
|
||||
};
|
||||
settings =
|
||||
let
|
||||
substituters = [
|
||||
"https://${inputs.self.nixosConfigurations.lindberg-build.config.qois.nixpkgs-cache.hostname}?priority=39"
|
||||
"https://cache.nixos.org?priority=40"
|
||||
"https://attic.qo.is/qois-infrastructure"
|
||||
];
|
||||
in
|
||||
{
|
||||
trusted-users = [
|
||||
"root"
|
||||
"@wheel"
|
||||
];
|
||||
trusted-public-keys = [
|
||||
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
|
||||
"qois-infrastructure:lh35ymN7Aoxm5Hz0S6JusxE+cYzMU+x9OMKjDVIpfuE="
|
||||
];
|
||||
trusted-substituters = substituters; # For hosts that limit the subst list
|
||||
inherit substituters;
|
||||
};
|
||||
gc = {
|
||||
automatic = true;
|
||||
dates = "weekly";
|
||||
options = "--delete-older-than 90d";
|
||||
};
|
||||
package = pkgs.nixFlakes;
|
||||
package = pkgs.nixVersions.stable;
|
||||
extraOptions = ''
|
||||
experimental-features = nix-command flakes
|
||||
'';
|
||||
|
@ -87,10 +92,6 @@
|
|||
services.openssh = {
|
||||
enable = true;
|
||||
settings.PasswordAuthentication = false;
|
||||
|
||||
# temporary mitigation agains CVE-2024-6387 «regreSSHion» RCE
|
||||
# See https://github.com/NixOS/nixpkgs/pull/323753#issuecomment-2199762128
|
||||
settings.LoginGraceTime = 0;
|
||||
};
|
||||
|
||||
security.acme = {
|
||||
|
@ -105,7 +106,10 @@
|
|||
};
|
||||
|
||||
programs.autojump.enable = true;
|
||||
programs.vim.defaultEditor = true;
|
||||
programs.vim = {
|
||||
enable = true;
|
||||
defaultEditor = true;
|
||||
};
|
||||
|
||||
sops.defaultSopsFile =
|
||||
let
|
||||
|
|
|
@ -1,8 +1,4 @@
|
|||
{
|
||||
"fulberg": {
|
||||
"hostName": "fulberg",
|
||||
"sshKey": "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDCG9qqpUOJ2RsohIqhMuw3YZZSrnPqhf5ayh5y0Cq/I"
|
||||
},
|
||||
"calanda": {
|
||||
"hostName": "calanda",
|
||||
"sshKey": "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKdoOZcFFRXIqEWqUnwCk/kqP8DZw6/4omDefCT6aNN4"
|
||||
|
|
|
@ -36,9 +36,6 @@
|
|||
calanda = {
|
||||
v4.ip = "10.1.2.1";
|
||||
};
|
||||
fulberg = {
|
||||
v4.ip = "10.1.2.2";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -46,6 +43,7 @@
|
|||
v4 = {
|
||||
id = "10.1.1.0";
|
||||
prefixLength = 24;
|
||||
# Note: DHCP from .2 to .249, see calanda config
|
||||
};
|
||||
domain = "plessur-lan.net.qo.is";
|
||||
|
||||
|
@ -53,6 +51,7 @@
|
|||
calanda = {
|
||||
v4.ip = "10.1.1.1";
|
||||
};
|
||||
cyprianspitz.v4.ip = "10.1.1.250";
|
||||
};
|
||||
};
|
||||
|
||||
|
|
|
@ -15,7 +15,7 @@
|
|||
id = "100.64.0.0";
|
||||
prefixLength = 10;
|
||||
};
|
||||
domain = "vpn.qo.is";
|
||||
domain = "vpn.net.qo.is";
|
||||
hosts = { };
|
||||
};
|
||||
|
||||
|
@ -27,15 +27,6 @@
|
|||
domain = "backplane.net.qo.is";
|
||||
|
||||
hosts = {
|
||||
fulberg = {
|
||||
v4.ip = "10.250.0.1";
|
||||
endpoint = {
|
||||
fqdn = physical-network.plessur-ext.hosts.calanda.fqdn;
|
||||
port = 51821;
|
||||
};
|
||||
publicKey = "xcQOu+pp4ckNygcsLmJL1NmUzbbC+k3I7y+hJ9Ul4nk=";
|
||||
persistentKeepalive = 25;
|
||||
};
|
||||
lindberg = {
|
||||
v4.ip = "10.250.0.2";
|
||||
#endpoint = { # TODO: Port forwarding
|
||||
|
@ -102,7 +93,7 @@
|
|||
|
||||
cyprianspitz-vms-nat = {
|
||||
v4 = {
|
||||
id = "10.247.0.0";
|
||||
id = "10.248.0.0";
|
||||
prefixLength = 24;
|
||||
};
|
||||
domain = "cyprianspitz-vms-nat.net.qo.is";
|
||||
|
|
|
@ -18,7 +18,7 @@ package "plessur.net.qo.is" {
|
|||
]
|
||||
|
||||
node calanda
|
||||
node fulberg
|
||||
node cyprianspitz
|
||||
|
||||
cloud plessurnet [
|
||||
<i>LAN Plessur
|
||||
|
@ -26,7 +26,7 @@ package "plessur.net.qo.is" {
|
|||
|
||||
mediaconvchur - "enp4" calanda
|
||||
calanda "br0 (enp2, wlp1, wlp5)" --- plessurnet
|
||||
calanda "enp4" -- "eno1" fulberg
|
||||
plessurnet -- cyprianspitz
|
||||
}
|
||||
|
||||
package "riedbach.net.qo.is" {
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
owner = name;
|
||||
};
|
||||
|
||||
qois.postgresql.enable = true;
|
||||
services.postgresql.enable = true;
|
||||
qois.backup-client.includePaths = [ config.services.nextcloud.home ];
|
||||
|
||||
services.nextcloud = {
|
||||
|
@ -30,6 +30,24 @@
|
|||
dbtype = "pgsql";
|
||||
};
|
||||
|
||||
appstoreEnable = false;
|
||||
extraApps = {
|
||||
inherit (config.services.nextcloud.package.passthru.packages.apps)
|
||||
calendar
|
||||
contacts
|
||||
deck
|
||||
groupfolders
|
||||
maps
|
||||
memories
|
||||
music
|
||||
news
|
||||
notes
|
||||
notify_push
|
||||
tasks
|
||||
twofactor_webauthn
|
||||
;
|
||||
};
|
||||
|
||||
phpOptions = {
|
||||
"opcache.interned_strings_buffer" = "23";
|
||||
};
|
||||
|
|
218
flake.lock
218
flake.lock
|
@ -1,53 +1,9 @@
|
|||
{
|
||||
"nodes": {
|
||||
"attic": {
|
||||
"inputs": {
|
||||
"crane": "crane",
|
||||
"flake-compat": "flake-compat",
|
||||
"flake-parts": "flake-parts",
|
||||
"nix-github-actions": "nix-github-actions",
|
||||
"nixpkgs": "nixpkgs",
|
||||
"nixpkgs-stable": "nixpkgs-stable"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1731270564,
|
||||
"narHash": "sha256-6KMC/NH/VWP5Eb+hA56hz0urel3jP6Y6cF2PX6xaTkk=",
|
||||
"owner": "zhaofengli",
|
||||
"repo": "attic",
|
||||
"rev": "47752427561f1c34debb16728a210d378f0ece36",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "zhaofengli",
|
||||
"repo": "attic",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"crane": {
|
||||
"inputs": {
|
||||
"nixpkgs": [
|
||||
"attic",
|
||||
"nixpkgs"
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1722960479,
|
||||
"narHash": "sha256-NhCkJJQhD5GUib8zN9JrmYGMwt4lCRp6ZVNzIiYCl0Y=",
|
||||
"owner": "ipetkov",
|
||||
"repo": "crane",
|
||||
"rev": "4c6c77920b8d44cd6660c1621dea6b3fc4b4c4f4",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "ipetkov",
|
||||
"repo": "crane",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"deploy-rs": {
|
||||
"inputs": {
|
||||
"flake-compat": "flake-compat_2",
|
||||
"nixpkgs": "nixpkgs_2",
|
||||
"flake-compat": "flake-compat",
|
||||
"nixpkgs": "nixpkgs",
|
||||
"utils": "utils"
|
||||
},
|
||||
"locked": {
|
||||
|
@ -71,11 +27,11 @@
|
|||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1731274291,
|
||||
"narHash": "sha256-cZ0QMpv5p2a6WEE+o9uu0a4ma6RzQDOQTbm7PbixWz8=",
|
||||
"lastModified": 1734088167,
|
||||
"narHash": "sha256-OIitVU+IstPbX/NWn2jLF+/sT9dVKcO2FKeRAzlyX6c=",
|
||||
"owner": "nix-community",
|
||||
"repo": "disko",
|
||||
"rev": "486250f404f4a4f4f33f8f669d83ca5f6e6b7dfc",
|
||||
"rev": "d32f2d1750d61a476a236526b725ec5a32e16342",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
@ -100,129 +56,7 @@
|
|||
"type": "github"
|
||||
}
|
||||
},
|
||||
"flake-compat_2": {
|
||||
"flake": false,
|
||||
"locked": {
|
||||
"lastModified": 1696426674,
|
||||
"narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
|
||||
"owner": "edolstra",
|
||||
"repo": "flake-compat",
|
||||
"rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "edolstra",
|
||||
"repo": "flake-compat",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"flake-parts": {
|
||||
"inputs": {
|
||||
"nixpkgs-lib": [
|
||||
"attic",
|
||||
"nixpkgs"
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1722555600,
|
||||
"narHash": "sha256-XOQkdLafnb/p9ij77byFQjDf5m5QYl9b2REiVClC+x4=",
|
||||
"owner": "hercules-ci",
|
||||
"repo": "flake-parts",
|
||||
"rev": "8471fe90ad337a8074e957b69ca4d0089218391d",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "hercules-ci",
|
||||
"repo": "flake-parts",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nix-github-actions": {
|
||||
"inputs": {
|
||||
"nixpkgs": [
|
||||
"attic",
|
||||
"nixpkgs"
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1729742964,
|
||||
"narHash": "sha256-B4mzTcQ0FZHdpeWcpDYPERtyjJd/NIuaQ9+BV1h+MpA=",
|
||||
"owner": "nix-community",
|
||||
"repo": "nix-github-actions",
|
||||
"rev": "e04df33f62cdcf93d73e9a04142464753a16db67",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "nix-community",
|
||||
"repo": "nix-github-actions",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs": {
|
||||
"locked": {
|
||||
"lastModified": 1726042813,
|
||||
"narHash": "sha256-LnNKCCxnwgF+575y0pxUdlGZBO/ru1CtGHIqQVfvjlA=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "159be5db480d1df880a0135ca0bfed84c2f88353",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "NixOS",
|
||||
"ref": "nixpkgs-unstable",
|
||||
"repo": "nixpkgs",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs-nixos-stable": {
|
||||
"locked": {
|
||||
"lastModified": 1731239293,
|
||||
"narHash": "sha256-q2yjIWFFcTzp5REWQUOU9L6kHdCDmFDpqeix86SOvDc=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "9256f7c71a195ebe7a218043d9f93390d49e6884",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "NixOS",
|
||||
"ref": "nixos-24.05",
|
||||
"repo": "nixpkgs",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs-nixos-unstable": {
|
||||
"locked": {
|
||||
"lastModified": 1731139594,
|
||||
"narHash": "sha256-IigrKK3vYRpUu+HEjPL/phrfh7Ox881er1UEsZvw9Q4=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "76612b17c0ce71689921ca12d9ffdc9c23ce40b2",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "NixOS",
|
||||
"ref": "nixos-unstable",
|
||||
"repo": "nixpkgs",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs-stable": {
|
||||
"locked": {
|
||||
"lastModified": 1724316499,
|
||||
"narHash": "sha256-Qb9MhKBUTCfWg/wqqaxt89Xfi6qTD3XpTzQ9eXi3JmE=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "797f7dc49e0bc7fab4b57c021cdf68f595e47841",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "NixOS",
|
||||
"ref": "nixos-24.05",
|
||||
"repo": "nixpkgs",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs_2": {
|
||||
"locked": {
|
||||
"lastModified": 1702272962,
|
||||
"narHash": "sha256-D+zHwkwPc6oYQ4G3A1HuadopqRwUY/JkMwHz1YF7j4Q=",
|
||||
|
@ -238,6 +72,38 @@
|
|||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs-nixos-stable": {
|
||||
"locked": {
|
||||
"lastModified": 1733808091,
|
||||
"narHash": "sha256-KWwINTQelKOoQgrXftxoqxmKFZb9pLVfnRvK270nkVk=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "a0f3e10d94359665dba45b71b4227b0aeb851f8e",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "NixOS",
|
||||
"ref": "nixos-24.11",
|
||||
"repo": "nixpkgs",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs-nixos-unstable": {
|
||||
"locked": {
|
||||
"lastModified": 1733940404,
|
||||
"narHash": "sha256-Pj39hSoUA86ZePPF/UXiYHHM7hMIkios8TYG29kQT4g=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "5d67ea6b4b63378b9c13be21e2ec9d1afc921713",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "NixOS",
|
||||
"ref": "nixos-unstable",
|
||||
"repo": "nixpkgs",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"private": {
|
||||
"inputs": {
|
||||
"nixpkgs-nixos-unstable": [
|
||||
|
@ -259,7 +125,6 @@
|
|||
},
|
||||
"root": {
|
||||
"inputs": {
|
||||
"attic": "attic",
|
||||
"deploy-rs": "deploy-rs",
|
||||
"disko": "disko",
|
||||
"nixpkgs-nixos-stable": "nixpkgs-nixos-stable",
|
||||
|
@ -272,17 +137,14 @@
|
|||
"inputs": {
|
||||
"nixpkgs": [
|
||||
"nixpkgs-nixos-unstable"
|
||||
],
|
||||
"nixpkgs-stable": [
|
||||
"nixpkgs-nixos-stable"
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1731213149,
|
||||
"narHash": "sha256-jR8i6nFLmSmm0cIoeRQ8Q4EBARa3oGaAtEER/OMMxus=",
|
||||
"lastModified": 1733965552,
|
||||
"narHash": "sha256-GZ4YtqkfyTjJFVCub5yAFWsHknG1nS/zfk7MuHht4Fs=",
|
||||
"owner": "Mic92",
|
||||
"repo": "sops-nix",
|
||||
"rev": "f1675e3b0e1e663a4af49be67ecbc9e749f85eb7",
|
||||
"rev": "2d73fc6ac4eba4b9a83d3cb8275096fbb7ab4004",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
|
|
@ -5,19 +5,17 @@
|
|||
extra-trusted-public-keys = "qois-infrastructure:lh35ymN7Aoxm5Hz0S6JusxE+cYzMU+x9OMKjDVIpfuE=";
|
||||
};
|
||||
inputs = {
|
||||
attic.url = "github:zhaofengli/attic";
|
||||
deploy-rs.url = "github:serokell/deploy-rs";
|
||||
disko = {
|
||||
url = "github:nix-community/disko";
|
||||
inputs.nixpkgs.follows = "nixpkgs-nixos-stable";
|
||||
};
|
||||
nixpkgs-nixos-unstable.url = "github:NixOS/nixpkgs/nixos-unstable";
|
||||
nixpkgs-nixos-stable.url = "github:NixOS/nixpkgs/nixos-24.05";
|
||||
nixpkgs-nixos-stable.url = "github:NixOS/nixpkgs/nixos-24.11";
|
||||
sops-nix = {
|
||||
url = "github:Mic92/sops-nix";
|
||||
inputs = {
|
||||
nixpkgs.follows = "nixpkgs-nixos-unstable";
|
||||
nixpkgs-stable.follows = "nixpkgs-nixos-stable";
|
||||
};
|
||||
};
|
||||
private.url = "git+file:./private";
|
||||
|
|
|
@ -17,5 +17,5 @@
|
|||
# this value at the release version of the first install of this system.
|
||||
# Before changing this value read the documentation for this option
|
||||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||||
system.stateVersion = "23.05"; # Did you read the comment?
|
||||
system.stateVersion = "24.11"; # Did you read the comment?
|
||||
}
|
||||
|
|
|
@ -4,11 +4,10 @@ let
|
|||
meta = config.qois.meta;
|
||||
plessur-dmz-net = meta.network.physical.plessur-dmz;
|
||||
plessur-lan-net = meta.network.physical.plessur-lan;
|
||||
plessur-ext-net = meta.network.physical.plessur-ext;
|
||||
getCalandaIp4 = net: net.hosts.calanda.v4.ip;
|
||||
in
|
||||
{
|
||||
imports = [ ../../defaults/backplane-net ];
|
||||
|
||||
networking.hostName = meta.hosts.calanda.hostName;
|
||||
networking.domain = "ilanz.fh2.ch";
|
||||
networking.enableIPv6 = false; # TODO
|
||||
|
@ -30,6 +29,8 @@ in
|
|||
];
|
||||
};
|
||||
|
||||
qois.backplane-net.enable = true;
|
||||
|
||||
# TODO: Metaize ips
|
||||
services.qois.router = {
|
||||
enable = true;
|
||||
|
@ -53,6 +54,14 @@ in
|
|||
};
|
||||
};
|
||||
|
||||
# Assign the static address to cyprianspitz (required for ssh luks unlock at this time)
|
||||
services.dnsmasq.settings.dhcp-host =
|
||||
let
|
||||
cyprianspitzEnp0s31f6Mac = "9c:6b:00:58:6e:90";
|
||||
inherit (plessur-lan-net.hosts.cyprianspitz.v4) ip;
|
||||
in
|
||||
"${cyprianspitzEnp0s31f6Mac},${ip}";
|
||||
|
||||
# DMZ
|
||||
services.unbound.settings.server = {
|
||||
interface = [ plessur-dmz-net.hosts.calanda.v4.ip ];
|
||||
|
@ -66,43 +75,19 @@ in
|
|||
# DMZ Portforwarding
|
||||
networking.nat.forwardPorts =
|
||||
let
|
||||
fulbergPort = (
|
||||
proto: port: {
|
||||
destination = "10.1.2.2:${toString port}";
|
||||
proto = proto;
|
||||
sourcePort = port;
|
||||
loopbackIPs = [ "85.195.200.253" ];
|
||||
}
|
||||
);
|
||||
cyprianspitzPort = (
|
||||
proto: port: {
|
||||
destination = "10.1.1.11:${toString port}";
|
||||
proto = proto;
|
||||
sourcePort = port;
|
||||
loopbackIPs = [ "85.195.200.253" ];
|
||||
cyprianspitzPortDst = (
|
||||
proto: sourcePort: dstPort: {
|
||||
destination = "${plessur-lan-net.hosts.cyprianspitz.v4.ip}:${toString dstPort}";
|
||||
inherit proto;
|
||||
inherit sourcePort;
|
||||
loopbackIPs = [ plessur-ext-net.hosts.calanda.v4.ip ];
|
||||
}
|
||||
);
|
||||
cyprianspitzPort = proto: port: (cyprianspitzPortDst proto port port);
|
||||
in
|
||||
[
|
||||
{
|
||||
destination = "10.1.2.2:22";
|
||||
proto = "tcp";
|
||||
sourcePort = 8022;
|
||||
}
|
||||
{
|
||||
destination = "10.1.2.2:2222";
|
||||
proto = "tcp";
|
||||
sourcePort = 8222;
|
||||
}
|
||||
{
|
||||
destination = "10.1.1.11:2222";
|
||||
proto = "tcp";
|
||||
sourcePort = 8223;
|
||||
}
|
||||
]
|
||||
++ map (fulbergPort "udp") [
|
||||
51820
|
||||
51821
|
||||
(cyprianspitzPortDst "tcp" 8222 22)
|
||||
(cyprianspitzPortDst "tcp" 8223 2222)
|
||||
]
|
||||
++ map (cyprianspitzPort "tcp") [
|
||||
80
|
||||
|
|
|
@ -8,7 +8,14 @@ Reboot requires passphrase.
|
|||
# Get HDD Password:
|
||||
sops decrypt --extract '["system"]["hdd"]' private/nixos-configurations/cyprianspitz/secrets.sops.yaml
|
||||
|
||||
ssh -p 8223 -J root@calanda.plessur-ext.net.qo.is
|
||||
ssh -p 8223 root@calanda.plessur-ext.net.qo.is
|
||||
```
|
||||
|
||||
|
||||
Direct remote ssh access:
|
||||
|
||||
```
|
||||
ssh -p 8222 root@calanda.plessur-ext.net.qo.is
|
||||
```
|
||||
|
||||
## Hardware
|
||||
|
@ -29,4 +36,4 @@ TODO
|
|||
|
||||
### HDD Bay
|
||||
|
||||
Note that slot 5 (the leftmost) SATA bay is not connected due to the mainboard only having 4 SATA plugs.
|
||||
Note that the slot in the middle of the SATA bay is not connected due to the mainboard only having 4 SATA plugs.
|
||||
|
|
|
@ -1,4 +1,9 @@
|
|||
{ config, pkgs, ... }:
|
||||
{
|
||||
config,
|
||||
pkgs,
|
||||
lib,
|
||||
...
|
||||
}:
|
||||
{
|
||||
|
||||
imports = [
|
||||
|
@ -7,4 +12,5 @@
|
|||
];
|
||||
|
||||
qois.loadbalancer.enable = true;
|
||||
qois.backplane-net.hosts.loadbalancers = lib.mkForce [ "cyprianspitz" ];
|
||||
}
|
||||
|
|
|
@ -24,5 +24,5 @@
|
|||
# this value at the release version of the first install of this system.
|
||||
# Before changing this value read the documentation for this option
|
||||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||||
system.stateVersion = "24.05"; # Did you read the comment?
|
||||
system.stateVersion = "24.11"; # Did you read the comment?
|
||||
}
|
||||
|
|
|
@ -2,29 +2,34 @@
|
|||
|
||||
let
|
||||
meta = config.qois.meta;
|
||||
getNetV4Ip = net: {
|
||||
address = net.hosts.cyprianspitz.v4.ip;
|
||||
prefixLength = net.v4.prefixLength;
|
||||
};
|
||||
calandaIp = meta.network.physical.plessur-lan.hosts.calanda.v4.ip;
|
||||
in
|
||||
{
|
||||
networking.enableIPv6 = false;
|
||||
networking.hostName = meta.hosts.cyprianspitz.hostName;
|
||||
|
||||
imports = [ ../../defaults/backplane-net ];
|
||||
|
||||
networking.nameservers = [ calandaIp ];
|
||||
networking.useDHCP = false;
|
||||
networking.interfaces.enp0s31f6.useDHCP = true;
|
||||
networking.interfaces.enp2s0.useDHCP = true;
|
||||
networking.interfaces.enp0s31f6.ipv4.addresses = [
|
||||
(getNetV4Ip meta.network.physical.plessur-lan)
|
||||
];
|
||||
|
||||
networking.defaultGateway = {
|
||||
address = calandaIp;
|
||||
interface = "enp0s31f6";
|
||||
};
|
||||
|
||||
# Virtualization
|
||||
networking.interfaces.vms-nat.useDHCP = false;
|
||||
networking.interfaces.vms-nat.ipv4.addresses = [
|
||||
(
|
||||
let
|
||||
netConfig = meta.network.virtual.cyprianspitz-vms-nat;
|
||||
in
|
||||
{
|
||||
address = netConfig.hosts.cyprianspitz.v4.ip;
|
||||
prefixLength = netConfig.v4.prefixLength;
|
||||
}
|
||||
)
|
||||
];
|
||||
networking.interfaces.vms-nat = {
|
||||
useDHCP = false;
|
||||
ipv4.addresses = [
|
||||
(getNetV4Ip meta.network.virtual.cyprianspitz-vms-nat)
|
||||
];
|
||||
};
|
||||
|
||||
networking.bridges.vms-nat.interfaces = [ ];
|
||||
networking.nat = {
|
||||
|
@ -41,8 +46,9 @@ in
|
|||
in
|
||||
{
|
||||
enable = true;
|
||||
resolveLocalQueries = false;
|
||||
resolveLocalQueries = true;
|
||||
settings = {
|
||||
server = [ calandaIp ];
|
||||
interface = "vms-nat";
|
||||
bind-interfaces = true;
|
||||
|
||||
|
@ -67,31 +73,17 @@ in
|
|||
};
|
||||
|
||||
# Boot
|
||||
boot.initrd.network.udhcpc.enable = true;
|
||||
|
||||
services.qois.luks-ssh = {
|
||||
enable = true;
|
||||
interface = "eth0";
|
||||
|
||||
sshPort = 2222;
|
||||
sshHostKey = "/secrets/system/initrd-ssh-key";
|
||||
# TODO Solve sops dependency porblem: config.sops.secrets."system/initrd-ssh-key".path;
|
||||
};
|
||||
|
||||
# Configure this node to be used as an vpn exit node
|
||||
qois.backup-client.includePaths = [ "/var/lib/tailscale" ];
|
||||
services.tailscale = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
useRoutingFeatures = "server";
|
||||
authKeyFile = config.sops.secrets."tailscale/key".path;
|
||||
extraUpFlags = [
|
||||
"--login-server=https://vpn.qo.is"
|
||||
"--advertise-exit-node"
|
||||
(
|
||||
with meta.network.virtual.backplane.v4; "--advertise-routes=${id}/${builtins.toString prefixLength}"
|
||||
)
|
||||
"--advertise-tags=tag:srv"
|
||||
];
|
||||
};
|
||||
qois.backplane-net.enable = true;
|
||||
|
||||
# Configure this node to be used as an vpn exit node
|
||||
qois.vpn-exit-node.enable = true;
|
||||
}
|
||||
|
|
|
@ -3,8 +3,5 @@
|
|||
sops.secrets = {
|
||||
"system/hdd" = { };
|
||||
"system/initrd-ssh-key" = { };
|
||||
"tailscale/key" = {
|
||||
restartUnits = [ "tailscaled.service" ];
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
|
@ -3,7 +3,6 @@
|
|||
pkgs,
|
||||
nixpkgs-nixos-stable,
|
||||
disko,
|
||||
attic,
|
||||
sops-nix,
|
||||
...
|
||||
}@inputs:
|
||||
|
@ -20,13 +19,6 @@ pkgs.lib.genAttrs configs (
|
|||
modules = [
|
||||
self.nixosModules.default
|
||||
./${config}/default.nix
|
||||
(
|
||||
{ ... }:
|
||||
{
|
||||
imports = [ "${attic}/nixos/atticd.nix" ];
|
||||
services.atticd.useFlakeCompatOverlay = false;
|
||||
}
|
||||
)
|
||||
disko.nixosModules.disko
|
||||
sops-nix.nixosModules.sops
|
||||
(
|
||||
|
|
|
@ -1 +0,0 @@
|
|||
# fulberg
|
|
@ -1 +0,0 @@
|
|||
{ ... }: { }
|
|
@ -1,35 +0,0 @@
|
|||
{ config, pkgs, ... }:
|
||||
{
|
||||
|
||||
qois.backup-server = {
|
||||
enable = true;
|
||||
backupStorageRoot = "/mnt/nas/backup";
|
||||
};
|
||||
|
||||
services.borgbackup.repos =
|
||||
let
|
||||
backupRoot = "/mnt/nas/backup";
|
||||
hostBackupRoot = "${backupRoot}/hosts";
|
||||
dataBackupRoot = "${backupRoot}/data";
|
||||
in
|
||||
{
|
||||
"lindberg-nextcloud" = {
|
||||
authorizedKeys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIpzfp9VqclbPJ42ZrkRpvjMSTeyq0qce03zCRXqIHMw backup@lindberg-nextcloud"
|
||||
];
|
||||
path = "${hostBackupRoot}/lindberg-nextcloud";
|
||||
};
|
||||
"lindberg-data" = {
|
||||
authorizedKeys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGTmyoVONC12MgOodvzdPpZzLSVwpkC6zkf+Rg0W36gy backup-data@lindberg"
|
||||
];
|
||||
path = "${dataBackupRoot}/lindberg";
|
||||
};
|
||||
"lindberg-build-system" = {
|
||||
authorizedKeys = [
|
||||
"ssh-ed25519 AAAATODOTODOTODONTE5AAAAIGTmyoVONC12MgOodvzdPpZzLSVwpkC6zkf+Rg0W36gy backup-system@lindberg-build"
|
||||
];
|
||||
path = "${dataBackupRoot}/lindberg-build-system";
|
||||
};
|
||||
};
|
||||
}
|
|
@ -1,22 +0,0 @@
|
|||
{ config, pkgs, ... }:
|
||||
{
|
||||
|
||||
imports = [
|
||||
../../defaults/base
|
||||
../../defaults/hardware/apu.nix
|
||||
../../defaults/meta
|
||||
./applications
|
||||
./backup.nix
|
||||
./filesystems.nix
|
||||
./networking.nix
|
||||
./secrets.nix
|
||||
];
|
||||
|
||||
# This value determines the NixOS release from which the default
|
||||
# settings for stateful data, like fi:le locations and database versions
|
||||
# on your system were taken. It‘s perfectly fine and recommended to leave
|
||||
# this value at the release version of the first install of this system.
|
||||
# Before changing this value read the documentation for this option
|
||||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||||
system.stateVersion = "23.05"; # Did you read the comment?
|
||||
}
|
|
@ -1,31 +0,0 @@
|
|||
{ config, pkgs, ... }:
|
||||
{
|
||||
|
||||
fileSystems = {
|
||||
"/" = {
|
||||
device = "/dev/disk/by-uuid/360a6bc9-fc4e-4803-bd53-69320ac32ac5";
|
||||
fsType = "btrfs";
|
||||
options = [
|
||||
"defaults"
|
||||
"subvol=nixos"
|
||||
"noatime"
|
||||
];
|
||||
};
|
||||
"/mnt/nas" = {
|
||||
device = "10.1.1.39:/qois";
|
||||
fsType = "nfs";
|
||||
options = [
|
||||
"defaults"
|
||||
"noatime"
|
||||
"soft"
|
||||
];
|
||||
};
|
||||
};
|
||||
|
||||
swapDevices = [ { device = "/dev/disk/by-uuid/73f91e99-d856-4504-b6b2-d60f855d6d95"; } ];
|
||||
|
||||
boot.loader.grub = {
|
||||
enable = true;
|
||||
device = "/dev/sda";
|
||||
};
|
||||
}
|
|
@ -1,48 +0,0 @@
|
|||
{ config, pkgs, ... }:
|
||||
let
|
||||
meta = config.qois.meta;
|
||||
plessur-dmz-net = meta.network.physical.plessur-dmz;
|
||||
getCalandaIp4 = net: net.hosts.calanda.v4.ip;
|
||||
in
|
||||
{
|
||||
networking.hostName = meta.hosts.fulberg.hostName;
|
||||
|
||||
imports = [ ../../defaults/backplane-net ];
|
||||
|
||||
# WWAN is currently not available due to a broken SIM-card.
|
||||
#services.qois.wwan = {
|
||||
# enable = true;
|
||||
# apn = "gprs.swisscom.ch";
|
||||
# networkInterface = "wwp0s19u1u3i12";
|
||||
#};
|
||||
|
||||
networking.interfaces.enp1s0 = {
|
||||
useDHCP = false;
|
||||
ipv4.addresses = [
|
||||
{
|
||||
inherit (plessur-dmz-net.v4) prefixLength;
|
||||
address = plessur-dmz-net.hosts.fulberg.v4.ip;
|
||||
}
|
||||
];
|
||||
};
|
||||
|
||||
networking.defaultGateway = plessur-dmz-net.v4.gateway;
|
||||
networking.nameservers = plessur-dmz-net.v4.nameservers;
|
||||
|
||||
# Configure this node to be used as an vpn exit node
|
||||
qois.backup-client.includePaths = [ "/var/lib/tailscale" ];
|
||||
services.tailscale = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
useRoutingFeatures = "server";
|
||||
authKeyFile = config.sops.secrets."tailscale/key".path;
|
||||
extraUpFlags = [
|
||||
"--login-server=https://vpn.qo.is"
|
||||
"--advertise-exit-node"
|
||||
(
|
||||
with meta.network.virtual.backplane.v4; "--advertise-routes=${id}/${builtins.toString prefixLength}"
|
||||
)
|
||||
"--advertise-tags=tag:srv"
|
||||
];
|
||||
};
|
||||
}
|
|
@ -1,8 +0,0 @@
|
|||
{ ... }:
|
||||
{
|
||||
sops.secrets = {
|
||||
"tailscale/key" = {
|
||||
restartUnits = [ "tailscale.service" ];
|
||||
};
|
||||
};
|
||||
}
|
|
@ -1,77 +0,0 @@
|
|||
{ config, pkgs, ... }:
|
||||
|
||||
let
|
||||
atticPort = 8080;
|
||||
atticHostname = "attic.qo.is";
|
||||
in
|
||||
|
||||
{
|
||||
|
||||
services.atticd = {
|
||||
enable = true;
|
||||
|
||||
# Replace with absolute path to your credentials file
|
||||
# generate secret with
|
||||
# nix run system#openssl rand 64 | base64 -w0
|
||||
# ATTIC_SERVER_TOKEN_HS256_SECRET_BASE64="output from openssl"
|
||||
credentialsFile = config.sops.secrets."attic/server_token".path;
|
||||
|
||||
settings = {
|
||||
listen = "127.0.0.1:${builtins.toString atticPort}";
|
||||
allowed-hosts = [ "attic.qo.is" ];
|
||||
api-endpoint = "https://attic.qo.is/";
|
||||
|
||||
# Data chunking
|
||||
#
|
||||
# Warning: If you change any of the values here, it will be
|
||||
# difficult to reuse existing chunks for newly-uploaded NARs
|
||||
# since the cutpoints will be different. As a result, the
|
||||
# deduplication ratio will suffer for a while after the change.
|
||||
chunking = {
|
||||
# The minimum NAR size to trigger chunking
|
||||
#
|
||||
# If 0, chunking is disabled entirely for newly-uploaded NARs.
|
||||
# If 1, all NARs are chunked.
|
||||
nar-size-threshold = 64 * 1024; # 64 KiB
|
||||
|
||||
# The preferred minimum size of a chunk, in bytes
|
||||
min-size = 16 * 1024; # 16 KiB
|
||||
|
||||
# The preferred average size of a chunk, in bytes
|
||||
avg-size = 64 * 1024; # 64 KiB
|
||||
|
||||
# The preferred maximum size of a chunk, in bytes
|
||||
max-size = 256 * 1024; # 256 KiB
|
||||
};
|
||||
|
||||
database.url = "postgresql:///atticd?host=/run/postgresql";
|
||||
};
|
||||
};
|
||||
|
||||
imports = [ ../../../defaults/webserver ];
|
||||
|
||||
qois.postgresql.enable = true;
|
||||
# Note: Attic cache availability is "best effort", so no artifacts are backed up.
|
||||
|
||||
services.postgresql = {
|
||||
ensureDatabases = [ "atticd" ];
|
||||
ensureUsers = [
|
||||
{
|
||||
name = "atticd";
|
||||
ensureDBOwnership = true;
|
||||
}
|
||||
];
|
||||
};
|
||||
|
||||
services.nginx = {
|
||||
enable = true;
|
||||
clientMaxBodySize = "1g";
|
||||
virtualHosts.${atticHostname} = {
|
||||
kTLS = true;
|
||||
forceSSL = true;
|
||||
enableACME = true;
|
||||
|
||||
locations."/".proxyPass = "http://127.0.0.1:${builtins.toString atticPort}";
|
||||
};
|
||||
};
|
||||
}
|
|
@ -1,10 +1,24 @@
|
|||
{ config, pkgs, ... }:
|
||||
{
|
||||
config,
|
||||
pkgs,
|
||||
lib,
|
||||
...
|
||||
}:
|
||||
{
|
||||
|
||||
imports = [
|
||||
./attic.nix
|
||||
./nixpkgs-cache.nix
|
||||
];
|
||||
|
||||
qois.git-ci-runner.enable = true;
|
||||
qois.attic.enable = true;
|
||||
qois.postgresql.package = pkgs.postgresql_15;
|
||||
|
||||
# Remove substituters that are hosted on this node, to prevent lockups
|
||||
# since the current nix implementation is not forgiving with unavailable subsituters.
|
||||
# The qois-infrastructure cache is not needed,
|
||||
# since the builds are done (and cached) on this host anyway.
|
||||
nix.settings.substituters = lib.mkForce [
|
||||
"https://cache.nixos.org?priority=40"
|
||||
];
|
||||
}
|
||||
|
|
|
@ -3,7 +3,6 @@
|
|||
let
|
||||
vnet = config.qois.meta.network.virtual.backplane.hosts;
|
||||
systemTargets = [
|
||||
"fulberg"
|
||||
"tierberg"
|
||||
];
|
||||
systemJobs = builtins.listToAttrs (
|
||||
|
|
|
@ -4,7 +4,6 @@
|
|||
imports = [
|
||||
../../defaults/base-vm
|
||||
../../defaults/meta
|
||||
../../defaults/backplane-net
|
||||
|
||||
./applications
|
||||
./backup.nix
|
||||
|
@ -22,5 +21,5 @@
|
|||
# this value at the release version of the first install of this system.
|
||||
# Before changing this value read the documentation for this option
|
||||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||||
system.stateVersion = "23.11"; # Did you read the comment?
|
||||
system.stateVersion = "24.11"; # Did you read the comment?
|
||||
}
|
||||
|
|
|
@ -6,6 +6,8 @@
|
|||
networking.useDHCP = false;
|
||||
networking.interfaces.enp11s0.useDHCP = true;
|
||||
|
||||
qois.backplane-net.enable = true;
|
||||
|
||||
networking.firewall.allowedTCPPorts = [
|
||||
80
|
||||
443
|
||||
|
|
|
@ -1,9 +1,6 @@
|
|||
{ ... }:
|
||||
{
|
||||
sops.secrets = {
|
||||
"attic/server_token" = {
|
||||
restartUnits = [ "atticd.service" ];
|
||||
};
|
||||
"gitlab-runner/default-registration" = {
|
||||
restartUnits = [ "gitlab-runner.service" ];
|
||||
};
|
||||
|
|
|
@ -6,7 +6,7 @@ in
|
|||
|
||||
imports = [ ../../../defaults/nextcloud ];
|
||||
|
||||
qois.postgresql.enable = true;
|
||||
services.postgresql.enable = true;
|
||||
|
||||
services.nextcloud = {
|
||||
hostName = host;
|
||||
|
|
|
@ -2,4 +2,6 @@
|
|||
{
|
||||
|
||||
imports = [ ./cloud.nix ];
|
||||
|
||||
qois.postgresql.package = pkgs.postgresql_14;
|
||||
}
|
||||
|
|
|
@ -2,10 +2,8 @@
|
|||
|
||||
{
|
||||
imports = [
|
||||
../../defaults/backplane-net
|
||||
../../defaults/base-vm
|
||||
../../defaults/meta
|
||||
../../defaults/webserver
|
||||
./applications
|
||||
./backup.nix
|
||||
./secrets.nix
|
||||
|
@ -32,6 +30,8 @@
|
|||
networking.useDHCP = false;
|
||||
networking.interfaces.enp2s0.useDHCP = true;
|
||||
|
||||
qois.backplane-net.enable = true;
|
||||
|
||||
networking.firewall.allowedTCPPorts = [
|
||||
80
|
||||
443
|
||||
|
@ -46,5 +46,5 @@
|
|||
# this value at the release version of the first install of this system.
|
||||
# Before changing this value read the documentation for this option
|
||||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||||
system.stateVersion = "22.05"; # Did you read the comment?
|
||||
system.stateVersion = "24.11"; # Did you read the comment?
|
||||
}
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
let
|
||||
backupConfiguration = {
|
||||
restartUnits = [
|
||||
"borgbackup-job-system-fulberg.service"
|
||||
"borgbackup-job-system-cyprianspitz.service"
|
||||
"borgbackup-job-system-tierberg.service"
|
||||
];
|
||||
};
|
||||
|
|
|
@ -6,4 +6,5 @@
|
|||
qois.vault.enable = true;
|
||||
qois.git.enable = true;
|
||||
qois.static-page.enable = true;
|
||||
qois.postgresql.package = pkgs.postgresql_15;
|
||||
}
|
||||
|
|
|
@ -4,7 +4,6 @@
|
|||
imports = [
|
||||
../../defaults/base-vm
|
||||
../../defaults/meta
|
||||
../../defaults/backplane-net
|
||||
|
||||
./applications
|
||||
./disko-config.nix
|
||||
|
@ -21,5 +20,5 @@
|
|||
# this value at the release version of the first install of this system.
|
||||
# Before changing this value read the documentation for this option
|
||||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||||
system.stateVersion = "23.11"; # Did you read the comment?
|
||||
system.stateVersion = "24.11"; # Did you read the comment?
|
||||
}
|
||||
|
|
|
@ -6,6 +6,8 @@
|
|||
networking.useDHCP = false;
|
||||
networking.interfaces.enp1s0.useDHCP = true;
|
||||
|
||||
qois.backplane-net.enable = true;
|
||||
|
||||
networking.firewall.allowedTCPPorts = [
|
||||
80
|
||||
443
|
||||
|
|
|
@ -25,5 +25,5 @@
|
|||
# this value at the release version of the first install of this system.
|
||||
# Before changing this value read the documentation for this option
|
||||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||||
system.stateVersion = "21.11"; # Did you read the comment?
|
||||
system.stateVersion = "24.11"; # Did you read the comment?
|
||||
}
|
||||
|
|
|
@ -6,8 +6,6 @@ in
|
|||
{
|
||||
networking.hostName = meta.hosts.lindberg.hostName;
|
||||
|
||||
imports = [ ../../defaults/backplane-net ];
|
||||
|
||||
networking.useDHCP = false;
|
||||
networking.interfaces.enp5s0.useDHCP = true;
|
||||
|
||||
|
@ -40,7 +38,7 @@ in
|
|||
in
|
||||
{
|
||||
enable = true;
|
||||
resolveLocalQueries = false;
|
||||
resolveLocalQueries = true;
|
||||
settings = {
|
||||
interface = "vms-nat";
|
||||
bind-interfaces = true;
|
||||
|
@ -56,7 +54,14 @@ in
|
|||
dhcp-authoritative = true;
|
||||
};
|
||||
};
|
||||
systemd.services.dnsmasq.bindsTo = [ "network-addresses-vms-nat.service" ];
|
||||
systemd.services.dnsmasq =
|
||||
let
|
||||
vmsNat = [ "network-addresses-vms-nat.service" ];
|
||||
in
|
||||
{
|
||||
bindsTo = vmsNat;
|
||||
after = vmsNat;
|
||||
};
|
||||
networking.firewall.interfaces.vms-nat = {
|
||||
allowedUDPPorts = [
|
||||
53
|
||||
|
@ -74,20 +79,7 @@ in
|
|||
sshPort = 2222;
|
||||
};
|
||||
|
||||
# Use this node as vpn exit node
|
||||
qois.backup-client.includePaths = [ "/var/lib/tailscale" ];
|
||||
services.tailscale = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
useRoutingFeatures = "server";
|
||||
authKeyFile = config.sops.secrets."tailscale/key".path;
|
||||
extraUpFlags = [
|
||||
"--login-server=https://vpn.qo.is"
|
||||
"--advertise-exit-node"
|
||||
(
|
||||
with meta.network.virtual.backplane.v4; "--advertise-routes=${id}/${builtins.toString prefixLength}"
|
||||
)
|
||||
"--advertise-tags=tag:srv"
|
||||
];
|
||||
};
|
||||
qois.backplane-net.enable = true;
|
||||
|
||||
qois.vpn-exit-node.enable = true;
|
||||
}
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
let
|
||||
backupConfiguration = {
|
||||
restartUnits = [
|
||||
"borgbackup-job-data-fulberg.service"
|
||||
"borgbackup-job-data-cyprianspitz.service"
|
||||
"borgbackup-job-data-tierberg.service"
|
||||
];
|
||||
};
|
||||
|
|
|
@ -6,13 +6,13 @@
|
|||
|
||||
{
|
||||
imports = [
|
||||
../../defaults/backplane-net
|
||||
../../defaults/hardware/apu.nix
|
||||
../../defaults/base
|
||||
../../defaults/meta
|
||||
];
|
||||
|
||||
boot.initrd.luks.devices."systems".device = "/dev/disk/by-uuid/5718bd19-cb7a-4728-9ec4-6b2be48215fc";
|
||||
boot.initrd.luks.devices."systems".device =
|
||||
"/dev/disk/by-uuid/5718bd19-cb7a-4728-9ec4-6b2be48215fc";
|
||||
|
||||
fileSystems."/" = {
|
||||
device = "/dev/mapper/vg_systems-hv_stompert";
|
||||
|
@ -52,6 +52,8 @@
|
|||
networking.interfaces.enp3s0.useDHCP = true;
|
||||
networking.tempAddresses = "disabled";
|
||||
|
||||
qois.backplane-net.enable = true;
|
||||
|
||||
# Set your time zone.
|
||||
# time.timeZone = "Europe/Amsterdam";
|
||||
|
||||
|
@ -59,5 +61,5 @@
|
|||
# compatible, in order to avoid breaking some software such as database
|
||||
# servers. You should change this only after NixOS release notes say you
|
||||
# should.
|
||||
system.stateVersion = "22.11"; # Did you read the comment?
|
||||
system.stateVersion = "24.11"; # Did you read the comment?
|
||||
}
|
||||
|
|
|
@ -20,5 +20,5 @@
|
|||
# compatible, in order to avoid breaking some software such as database
|
||||
# servers. You should change this only after NixOS release notes say you
|
||||
# should.
|
||||
system.stateVersion = "23.05"; # Did you read the comment?
|
||||
system.stateVersion = "24.11"; # Did you read the comment?
|
||||
}
|
||||
|
|
|
@ -7,8 +7,6 @@ in
|
|||
{
|
||||
networking.hostName = meta.hosts.tierberg.hostName;
|
||||
|
||||
imports = [ ../../defaults/backplane-net ];
|
||||
|
||||
networking.enableIPv6 = false; # TODO
|
||||
|
||||
networking.useDHCP = false;
|
||||
|
@ -21,6 +19,8 @@ in
|
|||
];
|
||||
networking.interfaces.enp3s0.useDHCP = true;
|
||||
|
||||
qois.backplane-net.enable = true;
|
||||
|
||||
services.qois.luks-ssh = {
|
||||
enable = true;
|
||||
interface = "eth0";
|
||||
|
|
|
@ -146,7 +146,7 @@ in
|
|||
});
|
||||
};
|
||||
|
||||
# Taken from https://github.com/NixOS/nixpkgs/blob/nixos-21.11/nixos/modules/services/networking/wireguard.nix:
|
||||
# Taken from https://github.com/NixOS/nixpkgs/blob/nixos-21.11/nixos/modules/services/networking/wireguard.nix:
|
||||
publicKey = mkOption {
|
||||
example = "xTIBA5rboUvnH4htodjb6e697QjLERt1NAB4mZqp8Dg=";
|
||||
type = str;
|
||||
|
|
|
@ -11,11 +11,15 @@ in
|
|||
with lib;
|
||||
{
|
||||
options.qois.postgresql = {
|
||||
enable = mkEnableOption ''Enable postgresql services with defaults'';
|
||||
# Note: this module is auto-enabled if postgres is used.
|
||||
package = mkPackageOption pkgs "postgresql" {
|
||||
example = "postgresql_15";
|
||||
default = null;
|
||||
};
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
services.postgresql.enable = true;
|
||||
config = mkIf config.services.postgresql.enable {
|
||||
services.postgresql.package = cfg.package;
|
||||
services.postgresqlBackup.enable = true;
|
||||
qois.backup-client.includePaths = [ config.services.postgresqlBackup.location ];
|
||||
};
|
||||
|
|
98
nixos-modules/qois/attic/default.nix
Normal file
98
nixos-modules/qois/attic/default.nix
Normal file
|
@ -0,0 +1,98 @@
|
|||
{
|
||||
config,
|
||||
pkgs,
|
||||
lib,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.qois.attic;
|
||||
in
|
||||
{
|
||||
|
||||
options.qois.attic = {
|
||||
enable = mkEnableOption "Enable attic service";
|
||||
domain = mkOption {
|
||||
description = "Domain for attic server";
|
||||
type = types.str;
|
||||
default = "attic.qo.is";
|
||||
};
|
||||
port = mkOption {
|
||||
description = "Server Port";
|
||||
type = types.numbers.between 1 65536;
|
||||
default = 8080;
|
||||
};
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
sops.secrets."attic/server_token".restartUnits = [ "atticd.service" ];
|
||||
|
||||
services.atticd = {
|
||||
enable = true;
|
||||
|
||||
# Replace with absolute path to your credentials file
|
||||
# generate secret with
|
||||
# nix run system#openssl rand 64 | base64 -w0
|
||||
# ATTIC_SERVER_TOKEN_HS256_SECRET_BASE64="output from openssl"
|
||||
environmentFile = config.sops.secrets."attic/server_token".path;
|
||||
|
||||
settings = {
|
||||
listen = "127.0.0.1:${toString cfg.port}";
|
||||
allowed-hosts = [ cfg.domain ];
|
||||
api-endpoint = "https://${cfg.domain}/";
|
||||
|
||||
# Data chunking
|
||||
#
|
||||
# Warning: If you change any of the values here, it will be
|
||||
# difficult to reuse existing chunks for newly-uploaded NARs
|
||||
# since the cutpoints will be different. As a result, the
|
||||
# deduplication ratio will suffer for a while after the change.
|
||||
chunking = {
|
||||
# The minimum NAR size to trigger chunking
|
||||
#
|
||||
# If 0, chunking is disabled entirely for newly-uploaded NARs.
|
||||
# If 1, all NARs are chunked.
|
||||
nar-size-threshold = 64 * 1024; # 64 KiB
|
||||
|
||||
# The preferred minimum size of a chunk, in bytes
|
||||
min-size = 16 * 1024; # 16 KiB
|
||||
|
||||
# The preferred average size of a chunk, in bytes
|
||||
avg-size = 64 * 1024; # 64 KiB
|
||||
|
||||
# The preferred maximum size of a chunk, in bytes
|
||||
max-size = 256 * 1024; # 256 KiB
|
||||
};
|
||||
|
||||
garbage-collection.default-retention-period = "6 months";
|
||||
|
||||
database.url = "postgresql:///atticd?host=/run/postgresql";
|
||||
};
|
||||
};
|
||||
|
||||
# Note: Attic cache availability is "best effort", so no artifacts are backed up.
|
||||
|
||||
services.postgresql = {
|
||||
enable = true;
|
||||
ensureDatabases = [ "atticd" ];
|
||||
ensureUsers = [
|
||||
{
|
||||
name = "atticd";
|
||||
ensureDBOwnership = true;
|
||||
}
|
||||
];
|
||||
};
|
||||
|
||||
services.nginx = {
|
||||
enable = true;
|
||||
clientMaxBodySize = "1g";
|
||||
virtualHosts.${cfg.domain} = {
|
||||
kTLS = true;
|
||||
forceSSL = true;
|
||||
enableACME = true;
|
||||
|
||||
locations."/".proxyPass = "http://127.0.0.1:${toString cfg.port}";
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
42
nixos-modules/qois/backplane-net.hosts/default.nix
Normal file
42
nixos-modules/qois/backplane-net.hosts/default.nix
Normal file
|
@ -0,0 +1,42 @@
|
|||
{
|
||||
config,
|
||||
pkgs,
|
||||
lib,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.qois.backplane-net.hosts;
|
||||
defaultDomains = attrNames config.qois.loadbalancer.domains;
|
||||
defaultLoadbalancers = [ "lindberg" ];
|
||||
in
|
||||
{
|
||||
|
||||
options.qois.backplane-net.hosts = {
|
||||
enable = mkOption {
|
||||
default = true;
|
||||
description = "Whether to enable hosts aliases for loadbalanced services. This prevents turnarounds over external networks for these services.";
|
||||
type = types.bool;
|
||||
};
|
||||
|
||||
domains = mkOption {
|
||||
description = "Domains that are hosted by the backplane loadbalancer";
|
||||
type = with types; listOf str;
|
||||
default = defaultDomains;
|
||||
};
|
||||
loadbalancers = mkOption {
|
||||
description = "List of Loadbalancer hostnames as listed in the backplane network";
|
||||
type = with types; listOf str;
|
||||
default = defaultLoadbalancers;
|
||||
};
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
|
||||
networking.hosts = pipe cfg.loadbalancers [
|
||||
(map (hostname: config.qois.meta.network.virtual.backplane.hosts.${hostname}.v4.ip))
|
||||
(flip genAttrs (lb: cfg.domains))
|
||||
];
|
||||
|
||||
};
|
||||
}
|
83
nixos-modules/qois/backplane-net/default.nix
Normal file
83
nixos-modules/qois/backplane-net/default.nix
Normal file
|
@ -0,0 +1,83 @@
|
|||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.qois.backplane-net;
|
||||
hostName = config.networking.hostName;
|
||||
netConfig = config.qois.meta.network.virtual.${cfg.netName};
|
||||
hostNetConfig = netConfig.hosts.${hostName};
|
||||
interface = "wg-${cfg.netName}";
|
||||
wgService = [ "wireguard-${interface}.service" ];
|
||||
in
|
||||
|
||||
{
|
||||
options.qois.backplane-net = {
|
||||
enable = mkEnableOption "Enable backplane server services";
|
||||
netName = mkOption {
|
||||
description = "Network Name";
|
||||
type = types.str;
|
||||
default = "backplane";
|
||||
};
|
||||
domain = mkOption {
|
||||
description = "Domain";
|
||||
type = types.str;
|
||||
default = hostNetConfig;
|
||||
};
|
||||
port = mkOption {
|
||||
description = "Wireguard Default Port";
|
||||
type = types.number;
|
||||
default = 51825;
|
||||
};
|
||||
};
|
||||
|
||||
config = {
|
||||
sops.secrets."wgautomesh/gossip-secret".restartUnits = [ "wgautomesh.service" ];
|
||||
|
||||
networking.wireguard.enable = true;
|
||||
networking.wireguard.interfaces."wg-${cfg.netName}" = {
|
||||
ips = [ "${hostNetConfig.v4.ip}/${toString netConfig.v4.prefixLength}" ];
|
||||
listenPort = if hostNetConfig.endpoint != null then hostNetConfig.endpoint.port else cfg.port;
|
||||
privateKeyFile = "/secrets/wireguard/private/${cfg.netName}";
|
||||
generatePrivateKeyFile = true;
|
||||
};
|
||||
|
||||
systemd.network.wait-online.ignoredInterfaces = [ interface ];
|
||||
|
||||
networking.firewall.allowedUDPPorts =
|
||||
if hostNetConfig.endpoint != null then [ hostNetConfig.endpoint.port ] else [ cfg.port ];
|
||||
|
||||
# Configure wgautomesh to setup peers. Make sure that the name is not used in the VPN module
|
||||
services.wgautomesh = {
|
||||
enable = true;
|
||||
gossipSecretFile = config.sops.secrets."wgautomesh/gossip-secret".path;
|
||||
openFirewall = true;
|
||||
settings = {
|
||||
inherit interface;
|
||||
|
||||
# Map meta network configuration to the format of wgautomesh and filter out peers with endpoints
|
||||
peers = pipe netConfig.hosts [
|
||||
(filterAttrs (peerHostName: _: peerHostName != hostName)) # Not this host
|
||||
(mapAttrsToList (
|
||||
_: peerConfig: {
|
||||
address = peerConfig.v4.ip;
|
||||
endpoint =
|
||||
if (peerConfig.endpoint != null) then
|
||||
with peerConfig.endpoint; "${fqdn}:${toString port}"
|
||||
else
|
||||
null;
|
||||
pubkey = peerConfig.publicKey;
|
||||
}
|
||||
))
|
||||
];
|
||||
};
|
||||
};
|
||||
systemd.services.wgautomesh = {
|
||||
requires = wgService;
|
||||
after = wgService;
|
||||
};
|
||||
};
|
||||
}
|
|
@ -91,9 +91,10 @@ with lib;
|
|||
emptypassword='$6$1ero.LwbisiU.h3D$GGmnmECbPotJoPQ5eoSTD6tTjKnSWZcjHoVTkxFLZP17W9hRi/XkmCiAMOfWruUwy8gMjINrBMNODc7cYEo4K.'
|
||||
useradd --prefix $(pwd) -p "$emptypassword" -m -d /tmp -u "$userid" -g "$groupid" -G nixuser nixuser
|
||||
|
||||
cat <<NIX_CONFIG > etc/nix/nix.conf
|
||||
cp -a ${config.environment.etc."nix/nix.conf".source} etc/nix/nix.conf
|
||||
|
||||
cat <<NIX_CONFIG >> etc/nix/nix.conf
|
||||
accept-flake-config = true
|
||||
experimental-features = nix-command flakes
|
||||
NIX_CONFIG
|
||||
|
||||
cat <<NSSWITCH > etc/nsswitch.conf
|
||||
|
|
|
@ -21,10 +21,11 @@ with lib;
|
|||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
qois.postgresql.enable = true;
|
||||
services.postgresql.enable = true;
|
||||
|
||||
services.forgejo = {
|
||||
enable = true;
|
||||
package = pkgs.forgejo;
|
||||
database.type = "postgres";
|
||||
|
||||
lfs.enable = true;
|
||||
|
|
|
@ -79,7 +79,7 @@ let
|
|||
in
|
||||
{
|
||||
|
||||
options.qois.loadbalancer = with lib; {
|
||||
options.qois.loadbalancer = {
|
||||
enable = mkEnableOption "Enable services http+s loadbalancing";
|
||||
|
||||
domains = mkOption {
|
||||
|
|
|
@ -1,12 +1,9 @@
|
|||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
|
||||
{
|
||||
services.nginx = {
|
||||
config.services.nginx = {
|
||||
recommendedTlsSettings = true;
|
||||
recommendedOptimisation = true;
|
||||
recommendedProxySettings = true;
|
50
nixos-modules/qois/vpn-exit-node/default.nix
Normal file
50
nixos-modules/qois/vpn-exit-node/default.nix
Normal file
|
@ -0,0 +1,50 @@
|
|||
{
|
||||
config,
|
||||
pkgs,
|
||||
lib,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.qois.vpn-exit-node;
|
||||
in
|
||||
{
|
||||
|
||||
options.qois.vpn-exit-node = {
|
||||
enable = mkEnableOption "vpn exit node";
|
||||
domain = mkOption {
|
||||
description = "Domain for the VPN admin server";
|
||||
type = types.str;
|
||||
default = "vpn.qo.is";
|
||||
};
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
|
||||
qois.backup-client.includePaths = [ "/var/lib/tailscale" ];
|
||||
|
||||
sops.secrets."tailscale/key".restartUnits = [ "tailscaled.service" ];
|
||||
|
||||
services.tailscale = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
useRoutingFeatures = "server";
|
||||
authKeyFile = config.sops.secrets."tailscale/key".path;
|
||||
extraUpFlags =
|
||||
let
|
||||
backplaneRoute =
|
||||
with config.qois.meta.network.virtual.backplane.v4;
|
||||
"${id}/${builtins.toString prefixLength}";
|
||||
in
|
||||
[
|
||||
"--timeout 60s"
|
||||
"--accept-dns=false"
|
||||
"--accept-routes=false"
|
||||
"--login-server=https://${cfg.domain}"
|
||||
"--advertise-exit-node"
|
||||
"--advertise-routes=${backplaneRoute}"
|
||||
"--advertise-tags=tag:srv"
|
||||
];
|
||||
};
|
||||
};
|
||||
}
|
|
@ -8,14 +8,23 @@ with lib;
|
|||
let
|
||||
cfg = config.qois.vpn-server;
|
||||
cfgLoadbalancer = config.qois.loadbalancer;
|
||||
defaultDnsRecords = mapAttrs (
|
||||
name: value: mkIf (cfgLoadbalancer.hostmap ? ${value}) cfgLoadbalancer.hostmap.${value}
|
||||
) cfgLoadbalancer.domains;
|
||||
defaultDnsRecords =
|
||||
(mapAttrs (
|
||||
name: value: mkIf (cfgLoadbalancer.hostmap ? ${value}) cfgLoadbalancer.hostmap.${value}
|
||||
) cfgLoadbalancer.domains)
|
||||
// {
|
||||
"vpn.qo.is" = config.services.headscale.address;
|
||||
};
|
||||
in
|
||||
{
|
||||
|
||||
options.qois.vpn-server = {
|
||||
enable = mkEnableOption "Enable vpn server services";
|
||||
domain = mkOption {
|
||||
description = "Domain for the VPN admin server";
|
||||
type = types.str;
|
||||
default = "vpn.qo.is";
|
||||
};
|
||||
dnsRecords = mkOption {
|
||||
description = "DNS records to add to Hosts";
|
||||
type = with types; attrsOf str;
|
||||
|
@ -32,18 +41,22 @@ in
|
|||
|
||||
environment.systemPackages = [ pkgs.headscale ];
|
||||
|
||||
# We bind to the backplane vpn IP, so wait for the wireguard net to be available
|
||||
systemd.services.headscale.after = [ "wireguard-wg-backplane.service" ];
|
||||
|
||||
qois.backup-client.includePaths =
|
||||
with config.services.headscale.settings;
|
||||
(
|
||||
[
|
||||
db_path
|
||||
private_key_path
|
||||
database.sqlite.path
|
||||
derp.server.private_key_path
|
||||
noise.private_key_path
|
||||
]
|
||||
++ derp.paths
|
||||
);
|
||||
|
||||
networking.firewall.checkReversePath = "loose";
|
||||
networking.firewall.allowedTCPPorts = [ config.services.headscale.port ];
|
||||
networking.firewall.allowedUDPPorts = [
|
||||
41641
|
||||
];
|
||||
|
@ -51,7 +64,7 @@ in
|
|||
let
|
||||
vnet = config.qois.meta.network.virtual;
|
||||
vpnNet = vnet.vpn;
|
||||
vpnNetPrefix = "${vpnNet.v4.id}/${builtins.toString vpnNet.v4.prefixLength}";
|
||||
vpnNetPrefix = "${vpnNet.v4.id}/${toString vpnNet.v4.prefixLength}";
|
||||
backplaneNetPrefix = "${vnet.backplane.v4.id}/${builtins.toString vnet.backplane.v4.prefixLength}";
|
||||
in
|
||||
{
|
||||
|
@ -59,19 +72,19 @@ in
|
|||
address = vnet.backplane.hosts.cyprianspitz.v4.ip;
|
||||
port = 46084;
|
||||
settings = {
|
||||
server_url = "https://${vpnNet.domain}:443";
|
||||
server_url = "https://${cfg.domain}:443";
|
||||
|
||||
tls_letsencrypt_challenge_type = "TLS-ALPN-01";
|
||||
tls_letsencrypt_hostname = vpnNet.domain;
|
||||
|
||||
dns_config = {
|
||||
nameservers = [ vnet.backplane.hosts.calanda.v4.ip ];
|
||||
domains = [
|
||||
vpnNet.domain
|
||||
dns = {
|
||||
base_domain = vpnNet.domain;
|
||||
magic_dns = true;
|
||||
nameservers.global = [ "127.0.0.1" ];
|
||||
search_domains = [
|
||||
# First is base_domain by default with magic_dns
|
||||
vnet.backplane.domain
|
||||
];
|
||||
magic_dns = true;
|
||||
base_domain = vpnNet.domain;
|
||||
extra_records = pipe cfg.dnsRecords [
|
||||
attrsToList
|
||||
(map (val: val // { type = "A"; }))
|
||||
|
@ -80,56 +93,64 @@ in
|
|||
|
||||
ip_prefixes = [ vpnNetPrefix ];
|
||||
|
||||
acl_policy_path = pkgs.writeTextFile {
|
||||
name = "acls";
|
||||
text = builtins.toJSON {
|
||||
hosts = {
|
||||
"clients" = vpnNetPrefix;
|
||||
};
|
||||
groups = {
|
||||
"group:wheel" = cfg.wheelUsers;
|
||||
};
|
||||
tagOwners = {
|
||||
"tag:srv" = [ "srv" ]; # srv tag ist owned by srv user
|
||||
};
|
||||
autoApprovers = {
|
||||
exitNode = [
|
||||
"tag:srv"
|
||||
"group:wheel"
|
||||
];
|
||||
routes = {
|
||||
${backplaneNetPrefix} = [ "tag:srv" ];
|
||||
policy =
|
||||
let
|
||||
# Note: headscale has limited acl support currently. This might change in the future.
|
||||
aclPolicy = {
|
||||
hosts = {
|
||||
"clients" = vpnNetPrefix;
|
||||
};
|
||||
};
|
||||
|
||||
acls = [
|
||||
# Allow all communication from and to srv tagged hosts
|
||||
{
|
||||
action = "accept";
|
||||
src = [
|
||||
groups = {
|
||||
"group:wheel" = cfg.wheelUsers;
|
||||
};
|
||||
tagOwners = {
|
||||
"tag:srv" = [ "srv" ]; # srv tag ist owned by srv user
|
||||
};
|
||||
autoApprovers = {
|
||||
exitNode = [
|
||||
"tag:srv"
|
||||
"srv"
|
||||
"group:wheel"
|
||||
];
|
||||
dst = [ "*:*" ];
|
||||
}
|
||||
{
|
||||
action = "accept";
|
||||
src = [ "*" ];
|
||||
dst = [
|
||||
"tag:srv:*"
|
||||
"srv:*"
|
||||
];
|
||||
}
|
||||
routes = {
|
||||
${backplaneNetPrefix} = [ "tag:srv" ];
|
||||
};
|
||||
};
|
||||
|
||||
# Allow access to all connected hosts for wheels
|
||||
{
|
||||
action = "accept";
|
||||
src = [ "group:wheel" ];
|
||||
dst = [ "*:*" ];
|
||||
}
|
||||
];
|
||||
acls = [
|
||||
# Allow all communication from and to srv tagged hosts
|
||||
{
|
||||
action = "accept";
|
||||
src = [
|
||||
"tag:srv"
|
||||
"srv"
|
||||
];
|
||||
dst = [ "*:*" ];
|
||||
}
|
||||
{
|
||||
action = "accept";
|
||||
src = [ "*" ];
|
||||
dst = [
|
||||
"tag:srv:*"
|
||||
"srv:*"
|
||||
];
|
||||
}
|
||||
|
||||
# Allow access to all connected hosts for wheels
|
||||
{
|
||||
action = "accept";
|
||||
src = [ "group:wheel" ];
|
||||
dst = [ "*:*" ];
|
||||
}
|
||||
];
|
||||
};
|
||||
in
|
||||
{
|
||||
mode = "file";
|
||||
path = pkgs.writeTextFile {
|
||||
name = "acls";
|
||||
text = builtins.toJSON aclPolicy;
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
});
|
||||
|
|
File diff suppressed because it is too large
Load diff
|
@ -63,6 +63,7 @@ in
|
|||
enable = wle24GhzEnabled;
|
||||
|
||||
radios.${cfg.wleInterface24Ghz} = {
|
||||
channel = 6;
|
||||
wifi4.enable = true;
|
||||
wifi4.capabilities = [
|
||||
"HT40-"
|
||||
|
|
|
@ -48,8 +48,6 @@ with lib;
|
|||
};
|
||||
};
|
||||
|
||||
qois.postgresql.enable = true;
|
||||
|
||||
qois.backup-client.includePaths = [ config.services.vaultwarden.config.DATA_FOLDER ];
|
||||
|
||||
services.postgresql =
|
||||
|
@ -57,6 +55,7 @@ with lib;
|
|||
name = config.users.users.vaultwarden.name;
|
||||
in
|
||||
{
|
||||
enable = true;
|
||||
ensureUsers = [
|
||||
{
|
||||
inherit name;
|
||||
|
@ -81,7 +80,7 @@ with lib;
|
|||
forceSSL = true;
|
||||
enableACME = true;
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost:${toString config.services.vaultwarden.config.ROCKET_PORT}";
|
||||
proxyPass = "http://127.0.0.1:${toString config.services.vaultwarden.config.ROCKET_PORT}";
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
};
|
||||
|
|
12
updates.md
12
updates.md
|
@ -28,7 +28,7 @@ deploy-qois .#lindberg-nextcloud .#lindberg-build
|
|||
deploy-qois .#lindberg
|
||||
|
||||
# Deploy slow physical hosts (maybe do individually)
|
||||
deploy-qois --confirm-timeout 600 --activation-timeout 600 --targets .#fulberg .#tierberg .#stompert .#stompert
|
||||
deploy-qois --confirm-timeout 600 --activation-timeout 600 --targets .#tierberg .#stompert .#stompert
|
||||
|
||||
```
|
||||
|
||||
|
@ -39,7 +39,13 @@ For kernel updates, it might be required to reboot machines, which can be done i
|
|||
pssh -l root -H lindberg-nextcloud.backplane.net.qo.is -H lindberg-build.backplane.net.qo.is reboot
|
||||
```
|
||||
|
||||
## Aplication Updates
|
||||
## `systemVersion` upgrades
|
||||
|
||||
- Make sure to read through the nixpkgs changelog to catch configuration scheme changes,
|
||||
successor applications or for the need for manual interventions.
|
||||
- Pay special attention the applications listed below.
|
||||
|
||||
## Application Updates
|
||||
|
||||
Some applications have pinned versions to prevent problems due to accidental upgrades.
|
||||
The version switch has to be done manually by switching the package used.
|
||||
|
@ -47,3 +53,5 @@ The version switch has to be done manually by switching the package used.
|
|||
This includes the modules for:
|
||||
|
||||
- `nextcloud`
|
||||
- `postgresql`, [→ Nixpkgs manual page](https://nixos.org/manual/nixos/stable/#module-services-postgres-upgrading)
|
||||
|
||||
|
|
Loading…
Reference in a new issue