{ privateFiles }: { config, pkgs, lib, ... }: { deployment = { targetUser = "root"; targetHost = config.hostEnv.ips.main.ip4; substituteOnDestination = true; }; boot = { kernelModules = [ "kvm-intel" ]; blacklistedKernelModules = [ "nvidiafb" ]; loader.timeout = 1; loader.grub.devices = [ "/dev/sda" "/dev/sdb" ]; kernel.sysctl = { # https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md "net.ipv4.tcp_sack" = 0; }; supportedFilesystems = [ "zfs" ]; kernelParams = ["zfs.zfs_arc_max=6442450944"]; kernelPackages = pkgs.linuxPackages_latest; initrd.availableKernelModules = [ "ahci" "sd_mod" ]; initrd.secrets = { "/boot/pass.key" = "/boot/pass.key"; }; }; services.udev.extraRules = '' ACTION=="add", SUBSYSTEM=="net", ATTR{address}=="c8:60:00:56:a0:88", NAME="eth0" ''; nix.maxJobs = 8; powerManagement.cpuFreqGovernor = "powersave"; myEnv = import "${privateFiles}/environment.nix" // { inherit privateFiles; }; fileSystems = { # pools: # zpool: ashift=12 # zfast: ashift=12 # zfs: # zpool/: acltype=posixacl ; xattr=sa ; atime=off ; mountpoint=legacy # zpool/root: encryption=on ; keyformat=passphrase ; keylocation=file:///boot/pass.key # zpool/root/var: atime=on # zfast/: acltype=posixacl ; xattr=sa ; atime=off ; mountpoint=legacy # zfast/root: encryption=on ; keyformat=passphrase ; keylocation=file:///boot/pass.key # zfast/root/etc: ø # zfast/root/nix: ø # zfast/root/tmp: async=disabled # zfast/root/var: atime=on # zfast/root/var/lib: ø # zfast/root/var/lib/mysql: logbias=throughput ; atime=off ; primarycache=metadata # zfast/root/var/lib/postgresql: recordsize=8K ; atime=off ; logbias=throughput # zfast/root/var/lib/postgresql/11.0: ø # zfast/root/var/lib/postgresql/11.0/pg_wal: ø "/" = { fsType = "zfs"; device = "zpool/root"; }; "/boot" = { fsType = "ext4"; device = "/dev/disk/by-uuid/e6bb18fb-ff56-4b5f-ae9f-e60d40dc0622"; }; "/etc" = { fsType = "zfs"; device = "zpool/root/etc"; }; "/nix" = { fsType = "zfs"; device = "zfast/root/nix"; }; "/tmp" = { fsType = "zfs"; device = "zfast/root/tmp"; }; "/var" = { fsType = "zfs"; device = "zpool/root/var"; }; "/var/lib/mysql" = { fsType = "zfs"; device = "zfast/root/var/lib/mysql"; }; "/var/lib/postgresql" = { fsType = "zfs"; device = "zfast/root/var/lib/postgresql"; }; "/var/lib/postgresql/11.0" = { fsType = "zfs"; device = "zfast/root/var/lib/postgresql/11.0"; }; "/var/lib/postgresql/11.0/pg_wal" = { fsType = "zfs"; device = "zfast/root/var/lib/postgresql/11.0/pg_wal"; }; }; swapDevices = [ { label = "swap1"; } { label = "swap2"; } ]; hardware.enableRedistributableFirmware = true; services.zfs = { autoScrub = { enable = false; }; }; networking = { hostId = "8262ca33"; # generated with head -c4 /dev/urandom | od -A none -t x4 firewall.enable = true; # FIXME: on next reboot, remove the /27 and the localCommands interfaces."eth0".ipv4.addresses = pkgs.lib.attrsets.mapAttrsToList (n: ips: { address = ips.ip4; prefixLength = 32; }) (pkgs.lib.attrsets.filterAttrs (n: v: n != "main") config.hostEnv.ips) ++ [ { address = config.hostEnv.ips.main.ip4; prefixLength = 27; } ]; interfaces."eth0".ipv6.addresses = pkgs.lib.flatten (pkgs.lib.attrsets.mapAttrsToList (n: ips: map (ip: { address = ip; prefixLength = (if n == "main" && ip == pkgs.lib.head ips.ip6 then 64 else 128); }) (ips.ip6 or [])) config.hostEnv.ips); defaultGateway = "176.9.151.65"; localCommands = '' # FIXME: Those commands were added by nixops and may not be # actually needed ip -6 addr add '2a01:4f8:160:3445::/64' dev 'eth0' || true ip -4 route change '176.9.151.64/27' via '176.9.151.65' dev 'eth0' || true ip -6 route add default via 'fe80::1' dev eth0 || true ''; nameservers = [ "213.133.98.98" "213.133.99.99" "213.133.100.100" "2a01:4f8:0:a0a1::add:1010" "2a01:4f8:0:a102::add:9999" "2a01:4f8:0:a111::add:9898" ]; }; imports = builtins.attrValues (import ../..); myServices.buildbot.enable = true; myServices.databases.enable = true; myServices.gitolite.enable = true; myServices.monitoring.enable = true; myServices.irc.enable = true; myServices.pub.enable = true; myServices.tasks.enable = true; myServices.mpd.enable = true; myServices.dns.enable = true; myServices.certificates.enable = true; myServices.websites.enable = true; myServices.mail.enable = true; myServices.ejabberd.enable = true; myServices.vpn.enable = true; services.pure-ftpd.enable = true; services.duplyBackup.enable = false; services.duplyBackup.profiles.oldies.rootDir = "/var/lib/oldies"; services.netdata.enable = true; services.netdata.config.global."memory mode" = "none"; services.netdata.config.health."enabled" = "no"; services.netdata.config.web.mode = "none"; environment.etc."netdata/stream.conf".text = '' [stream] enabled = yes destination = ${config.myEnv.monitoring.netdata_aggregator} api key = ${config.myEnv.monitoring.netdata_keys.eldiron} ''; secrets.keys = [ { dest = "zrepl_backup/identity"; user = "root"; group = "root"; permissions = "0400"; text = config.myEnv.zrepl_backup.ssh_key.private; } ]; programs.ssh.knownHosts.dilion = { hostNames = ["dilion.immae.eu"]; publicKey = let profile = config.myEnv.rsync_backup.profiles.dilion; in "${profile.host_key_type} ${profile.host_key}"; }; services.cron = { enable = true; mailto = "cron@immae.eu"; systemCronJobs = [ '' 0 0 * * * root journalctl -q --since="25 hours ago" -u postfix -t postfix/smtpd -g "immae.eu.*Recipient address rejected" # Need a way to blacklist properly # 0 0 * * * root journalctl -q --since="25 hours ago" -u postfix -t postfix/smtpd -g "NOQUEUE:" 0 0 * * * root journalctl -q --since="25 hours ago" -u postfix -t postfix/smtp -g "status=bounced" '' ]; }; fileSystems."/var/lib/pub/immae/devtools" = { device = "/run/current-system/sw/bin/bindfs#/var/lib/ftp/devtools.immae.eu/"; fsType = "fuse"; options = [ "force-user=pub" "create-for-user=wwwrun" "create-for-group=wwwrun" ]; }; environment.systemPackages = [ pkgs.bindfs ]; services.zrepl = { enable = true; config = let redis_dump = pkgs.writeScript "redis-dump" '' #! ${pkgs.stdenv.shell} ${pkgs.redis}/bin/redis-cli bgsave ''; in '' jobs: - type: push # must not change name: "backup-to-dilion" filesystems: "zpool/root": true "zpool/root/etc": true "zpool/root/var<": true connect: type: ssh+stdinserver host: dilion.immae.eu user: backup port: 22 identity_file: ${config.secrets.fullPaths."zrepl_backup/identity"} snapshotting: type: periodic prefix: zrepl_ interval: 1h #hooks: # - type: mysql-lock-tables # dsn: "${config.myEnv.zrepl_backup.mysql.user}:${config.myEnv.zrepl_backup.mysql.password}@tcp(localhost)/" # filesystems: # "zpool/root/var": true # - type: command # path: ${redis_dump} # err_is_fatal: false # filesystems: # "zpool/root/var": true send: encrypted: true pruning: keep_sender: - type: regex regex: "^manual_.*" - type: grid grid: 24x1h | 7x1d | 4x7d | 6x30d regex: "^zrepl_.*" keep_receiver: - type: regex regex: "^manual_.*" - type: grid grid: 6x4h | 7x1d | 4x7d | 6x30d regex: "^zrepl_.*" ''; }; # This value determines the NixOS release with which your system is # to be compatible, in order to avoid breaking some software such as # database servers. You should change this only after NixOS release # notes say you should. # https://nixos.org/nixos/manual/release-notes.html system.stateVersion = "20.03"; # Did you read the comment? }