nix/server-conf.nix
2023-04-21 01:58:39 +10:00

339 lines
10 KiB
Nix
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Edit this configuration file to define what should be installed on
# your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running nixos-help).
{
lib,
config,
pkgs,
...
}: let
wekan-compose = pkgs.fetchurl {
url = "https://github.com/wekan/wekan/raw/v6.68/docker-compose.yml";
sha256 = "sha256-gLZ8bZZ8ZMo1NGz3ooIgXRH6JuMoEMp+to7lfqAvc6E=";
};
# wekan-private = pkgs.runCommand "wekan-private" {} ''
# cp ${wekan-compose} $out
# sed -i '/localtime/d' $out
# sed -i '/timezone/d' $out
# sed -i 's/80:8080/7897:8080/g' $out
# sed -i 's/ROOT_URL=.*/ROOT_URL=https:\/\/reflector\.beam\/kanban\//' $out
# '';
wekan-rhizome = pkgs.runCommand "wekan-rhizome" {} ''
cp ${wekan-compose} $out
sed -i '/localtime/d' $out
sed -i '/timezone/d' $out
sed -i 's/80:8080/7897:8080/g' $out
sed -i 's/ROOT_URL=.*/ROOT_URL=https:\/\/board\.rhizome\.tf\//' $out
'';
foswiki-compose = pkgs.fetchurl {
url = "https://raw.githubusercontent.com/timlegge/docker-foswiki/master/docker-compose.1-simple.yml";
sha256 = "sha256-XqGWGTZ/URKsIdDEEpBQUK7xoIdZ164lRhHEiWdnKpM=";
};
in {
imports = [
# Include the results of the hardware scan.
./hardware-configuration.nix
# ./cachix.nix
# (import (builtins.fetchTarball "https://github.com/jonascarpay/declarative-cachix/archive/master.tar.gz"))
];
# cachix = [
# "nix-community"
# ];
nix.settings.experimental-features = ["flakes" "nix-command"];
systemd.services.NetworkManager-wait-online.enable = false;
# Use the GRUB 2 boot loader.
boot.loader.grub.enable = true;
boot.loader.grub.version = 2;
boot.loader.grub.device = "/dev/vda"; # or "nodev" for efi only
networking.hostName = "reflector"; # Define your hostname.
networking.networkmanager.enable = true; # Easiest to use and most distros use this by default.
# Set your time zone.
time.timeZone = "Australia/Sydney";
# Define a user account. Don't forget to set a password with passwd.
users.users.sunshine = {
isNormalUser = true;
extraGroups = ["wheel"]; # Enable sudo for the user.
packages = with pkgs; [];
openssh.authorizedKeys.keys = [
"ssh-rsa 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 bolt@quiver"
];
};
nixpkgs.config.allowUnfree = true;
# List packages installed in system profile. To search, run:
# $ nix search wget
environment.systemPackages = with pkgs; [
helix
ripgrep
fd
curl
cachix
headscale
comma
woodpecker-agent
woodpecker-server
# podman
# podman-compose
# shadow
dufs
];
virtualisation = {
docker.enable = true;
# podman = {
# enable = true;
# dockerCompat = true;
# defaultNetwork.dnsname.enable = true;
# };
};
# services.resolved = {
# enable = true;
# fallbackDns = [ "103.1.206.179" "168.138.8.38" "168.138.12.137" ];
# dnssec = "false";
# };
services.fail2ban.enable = true;
services.tailscale.enable = true;
services.headscale = {
enable = true;
serverUrl = "https://net.atagen.co";
dns = {
nameservers = ["103.1.206.179" "168.138.8.38" "168.138.12.137"];
magicDns = true;
};
};
services.syncthing = {
enable = true;
extraOptions = {
gui = {
insecureSkipHostcheck = true;
};
};
};
services.gitea = {
enable = true;
appName = "atagen gitea";
domain = "git.atagen.co";
httpPort = 3033;
settings.server = {
START_SSH_SERVER = true;
SSH_PORT = 6660;
SSH_DOMAIN = "git.atagen.co";
DISABLE_SSH = false;
};
rootUrl = "https://git.atagen.co";
settings.service.DISABLE_REGISTRATION = true;
settings.webhook.ALLOWED_HOST_LIST = "external,loopback";
};
users.users.ci = {
isSystemUser = true;
createHome = true;
group = "ci";
extraGroups = ["docker" "wheel"];
};
users.groups.ci = {};
users.users.ci-agent = {
isSystemUser = true;
createHome = true;
group = "ci";
extraGroups = ["docker" "wheel"];
};
users.groups.ci = {};
users.users.dufs = {
isSystemUser = true;
createHome = true;
group = "dufs";
};
users.groups.dufs = {};
systemd.services.woodpecker-server = {
wantedBy = ["multi-user.target"];
description = "woodpecker CI/CD server";
serviceConfig = {
Environment = [
"WOODPECKER_OPEN=true"
"WOODPECKER_ADMIN=atagen"
"WOODPECKER_REPO_OWNERS=rhizome"
"WOODPECKER_HOST=https://ci.atagen.co"
"WOODPECKER_GITEA=true"
"WOODPECKER_GITEA_URL=https://git.atagen.co"
"WOODPECKER_GITEA_CLIENT=1418f1d9-e2ce-4e8f-b8b2-7cf714baa07e"
"WOODPECKER_GITEA_SECRET=gto_chpk65trvfbnrqs4cog62kn7sgmvpizg5wbr4zknb54o4gxlssba"
"WOODPECKER_GITEA_SKIP_VERIFY=true"
"WOODPECKER_AGENT_SECRET=71a0ac7d617aef46fb93811c6e2a300e041a324727df12b4805d5f4e9e1f3326"
"WOODPECKER_DATABASE_DATASOURCE=/var/lib/woodpecker/woodpecker.sqlite"
];
Restart = "always";
ExecStart = "${pkgs.woodpecker-server}/bin/woodpecker-server";
User = "ci";
Group = "ci";
};
};
systemd.services.woodpecker-agent = {
wantedBy = ["multi-user.target"];
description = "woodpecker CI/CD agent";
serviceConfig = {
Environment = [
"WOODPECKER_SERVER=localhost:9000"
"WOODPECKER_AGENT_SECRET=71a0ac7d617aef46fb93811c6e2a300e041a324727df12b4805d5f4e9e1f3326"
];
Restart = "always";
ExecStart = "${pkgs.woodpecker-agent}/bin/woodpecker-agent";
User = "ci-agent";
};
};
# systemd.services.wekan-private = {
# wantedBy = [ "multi-user.target" ];
# after = [ "network.target" "docker.service" ];
# requires = [ "docker.service" ];
# description = "wekan kanban board";
# serviceConfig = {
# Restart = "always";
# User = "root";
# ExecStart = "${pkgs.docker}/bin/docker compose -f ${wekan-private} up";
# ExecStop = "${pkgs.docker}/bin/docker compose -f ${wekan-private} down";
# };
# };
systemd.services.wekan-rhizome = {
wantedBy = ["multi-user.target"];
after = ["network.target" "docker.service"];
requires = ["docker.service"];
description = "wekan kanban board for rhizomers";
serviceConfig = {
Restart = "always";
User = "root";
ExecStart = "${pkgs.docker}/bin/docker compose -f ${wekan-rhizome} up";
ExecStop = "${pkgs.docker}/bin/docker compose -f ${wekan-rhizome} down";
};
};
systemd.services.dufs = {
wantedBy = ["multi-user.target"];
after = ["network.target"];
description = "dufs webdav server";
serviceConfig = {
User = "dufs";
Restart = "always";
ExecStart = "${pkgs.dufs}/bin/dufs -b 127.0.0.1 -p 8083 /home/dufs/files";
};
};
# systemd.services.foswiki = {
# wantedBy = [ "multi-user.target" ];
# after = [ "network.target" "docker.service" ];
# requires = [ "docker.service" ];
# description = "foswiki wiki site";
# serviceConfig = {
# Restart = "always";
# User = "root";
# ExecStart = "${pkgs.docker}/bin/docker compose -f ${foswiki-compose} up";
# ExecStop = "${pkgs.docker}/bin/docker compose -f ${foswiki-compose} down";
# };
# };
services.caddy = {
enable = true;
virtualHosts = {
"atagen.co" = {
serverAliases = ["www.atagen.co"];
extraConfig = ''
respond "i live.. again"
'';
};
"iced-rs.info".extraConfig = ''
reverse_proxy http://127.0.0.1:8765
'';
"ci.atagen.co".extraConfig = ''
reverse_proxy http://127.0.0.1:8000
'';
# "ci.rhizome.tf".extraConfig = ''
# reverse_proxy http://127.0.0.1:8000
# '';
"git.atagen.co".extraConfig = ''
reverse_proxy http://127.0.0.1:3033
'';
# "git.rhizome.tf".extraConfig = ''
# reverse_proxy http://127.0.0.1:3033
# '';
"board.rhizome.tf".extraConfig = ''
reverse_proxy http://127.0.0.1:7897
'';
"net.atagen.co".extraConfig = ''
reverse_proxy http://127.0.0.1:8080
'';
"reflector.beam".extraConfig = ''
tls /etc/selfsigned/cert.pem /etc/selfsigned/key.pem
route /sync/* {
uri strip_prefix /sync
reverse_proxy http://127.0.0.1:8384
}
route /philez/* {
uri strip_prefix /philez
reverse_proxy http://127.0.0.1:8083
}
'';
};
};
# Enable the OpenSSH daemon.
services.openssh = {
enable = true;
passwordAuthentication = false;
kbdInteractiveAuthentication = false;
permitRootLogin = "no";
};
networking.firewall = {
enable = true;
trustedInterfaces = ["tailscale0"];
checkReversePath = "loose";
allowedTCPPorts = [80 443 6660];
allowedUDPPorts = [80 443 41641 6660];
};
# Copy the NixOS configuration file and link it from the resulting system
# (/run/current-system/configuration.nix). This is useful in case you
# accidentally delete configuration.nix.
system.copySystemConfiguration = true;
# This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions
# on your system were taken. Its perfectly fine and recommended to leave
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "22.11"; # Did you read the comment?
}