blob: 102a517007594be2177a9ee94f45522e300c17c4 (
plain) (
tree)
|
|
{ privateFiles }:
{ config, pkgs, lib, ... }:
{
deployment = {
targetUser = "root";
targetHost = config.hostEnv.ips.main.ip4;
substituteOnDestination = true;
};
boot = {
kernelModules = [ "kvm-intel" ];
blacklistedKernelModules = [ "nvidiafb" ];
loader.timeout = 1;
loader.grub.devices = [ "/dev/sda" "/dev/sdb" ];
kernel.sysctl = {
# https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
"net.ipv4.tcp_sack" = 0;
};
supportedFilesystems = [ "zfs" ];
kernelParams = ["zfs.zfs_arc_max=6442450944"];
kernelPackages = pkgs.linuxPackages_latest;
initrd.availableKernelModules = [ "ahci" "sd_mod" ];
initrd.secrets = {
"/boot/pass.key" = "/boot/pass.key";
};
};
services.udev.extraRules = ''
ACTION=="add", SUBSYSTEM=="net", ATTR{address}=="c8:60:00:56:a0:88", NAME="eth0"
'';
nix.maxJobs = 8;
powerManagement.cpuFreqGovernor = "powersave";
myEnv = import "${privateFiles}/environment.nix" // { inherit privateFiles; };
fileSystems = {
"/" = { fsType = "zfs"; device = "zpool/root"; };
"/boot" = { fsType = "ext4"; device = "/dev/disk/by-uuid/e6bb18fb-ff56-4b5f-ae9f-e60d40dc0622"; };
"/etc" = { fsType = "zfs"; device = "zpool/root/etc"; };
"/nix" = { fsType = "zfs"; device = "zpool/root/nix"; };
"/tmp" = { fsType = "zfs"; device = "zpool/root/tmp"; };
"/var" = { fsType = "zfs"; device = "zpool/root/var"; };
};
swapDevices = [ { label = "swap1"; } { label = "swap2"; } ];
hardware.enableRedistributableFirmware = true;
services.zfs = {
autoScrub = {
enable = false;
};
};
networking = {
hostId = "8262ca33"; # generated with head -c4 /dev/urandom | od -A none -t x4
firewall.enable = true;
# FIXME: on next reboot, remove the /27 and the localCommands
interfaces."eth0".ipv4.addresses =
pkgs.lib.attrsets.mapAttrsToList
(n: ips: { address = ips.ip4; prefixLength = 32; })
(pkgs.lib.attrsets.filterAttrs (n: v: n != "main") config.hostEnv.ips)
++ [ { address = config.hostEnv.ips.main.ip4; prefixLength = 27; } ];
interfaces."eth0".ipv6.addresses = pkgs.lib.flatten (pkgs.lib.attrsets.mapAttrsToList
(n: ips: map (ip: { address = ip; prefixLength = (if n == "main" && ip == pkgs.lib.head ips.ip6 then 64 else 128); }) (ips.ip6 or []))
config.hostEnv.ips);
defaultGateway = "176.9.151.65";
localCommands = ''
# FIXME: Those commands were added by nixops and may not be
# actually needed
ip -6 addr add '2a01:4f8:160:3445::/64' dev 'eth0' || true
ip -4 route change '176.9.151.64/27' via '176.9.151.65' dev 'eth0' || true
ip -6 route add default via 'fe80::1' dev eth0 || true
'';
nameservers = [
"213.133.98.98"
"213.133.99.99"
"213.133.100.100"
"2a01:4f8:0:a0a1::add:1010"
"2a01:4f8:0:a102::add:9999"
"2a01:4f8:0:a111::add:9898"
];
};
imports = builtins.attrValues (import ../..);
myServices.buildbot.enable = true;
myServices.databases.enable = true;
myServices.gitolite.enable = true;
myServices.monitoring.enable = true;
myServices.irc.enable = true;
myServices.pub.enable = true;
myServices.tasks.enable = true;
myServices.mpd.enable = true;
myServices.dns.enable = true;
myServices.certificates.enable = true;
myServices.websites.enable = true;
myServices.mail.enable = true;
myServices.ejabberd.enable = true;
myServices.vpn.enable = true;
services.pure-ftpd.enable = true;
services.duplyBackup.enable = false;
services.duplyBackup.profiles.oldies.rootDir = "/var/lib/oldies";
services.netdata.enable = true;
services.netdata.config.global."memory mode" = "none";
services.netdata.config.health."enabled" = "no";
services.netdata.config.web.mode = "none";
environment.etc."netdata/stream.conf".text = ''
[stream]
enabled = yes
destination = ${config.myEnv.monitoring.netdata_aggregator}
api key = ${config.myEnv.monitoring.netdata_keys.eldiron}
'';
secrets.keys = [
{
dest = "zrepl_backup/identity";
user = "root";
group = "root";
permissions = "0400";
text = config.myEnv.zrepl_backup.ssh_key.private;
}
];
programs.ssh.knownHosts.dilion = {
hostNames = ["dilion.immae.eu"];
publicKey = let
profile = config.myEnv.rsync_backup.profiles.dilion;
in
"${profile.host_key_type} ${profile.host_key}";
};
services.cron = {
enable = true;
mailto = "cron@immae.eu";
systemCronJobs = [
''
0 0 * * * root journalctl -q --since="25 hours ago" -u postfix -t postfix/smtpd -g "immae.eu.*Recipient address rejected"
# Need a way to blacklist properly
# 0 0 * * * root journalctl -q --since="25 hours ago" -u postfix -t postfix/smtpd -g "NOQUEUE:"
0 0 * * * root journalctl -q --since="25 hours ago" -u postfix -t postfix/smtp -g "status=bounced"
''
];
};
fileSystems."/var/lib/pub/immae/devtools" = {
device = "/run/current-system/sw/bin/bindfs#/var/lib/ftp/devtools.immae.eu/";
fsType = "fuse";
options = [ "force-user=pub" "create-for-user=wwwrun" "create-for-group=wwwrun" ];
};
environment.systemPackages = [ pkgs.bindfs ];
services.zrepl = {
enable = true;
config = let
redis_dump = pkgs.writeScript "redis-dump" ''
#! ${pkgs.stdenv.shell}
${pkgs.redis}/bin/redis-cli bgsave
'';
in ''
jobs:
- type: push
# must not change
name: "backup-to-dilion"
filesystems:
"zpool/root": true
"zpool/root/etc": true
"zpool/root/var<": true
connect:
type: ssh+stdinserver
host: dilion.immae.eu
user: backup
port: 22
identity_file: ${config.secrets.fullPaths."zrepl_backup/identity"}
snapshotting:
type: periodic
prefix: zrepl_
interval: 1h
#hooks:
# - type: mysql-lock-tables
# dsn: "${config.myEnv.zrepl_backup.mysql.user}:${config.myEnv.zrepl_backup.mysql.password}@tcp(localhost)/"
# filesystems:
# "zpool/root/var": true
# - type: command
# path: ${redis_dump}
# err_is_fatal: false
# filesystems:
# "zpool/root/var": true
send:
encrypted: true
pruning:
keep_sender:
- type: regex
regex: "^manual_.*"
- type: grid
grid: 24x1h | 7x1d | 4x7d | 6x30d
regex: "^zrepl_.*"
keep_receiver:
- type: regex
regex: "^manual_.*"
- type: grid
grid: 6x4h | 7x1d | 4x7d | 6x30d
regex: "^zrepl_.*"
'';
};
# This value determines the NixOS release with which your system is
# to be compatible, in order to avoid breaking some software such as
# database servers. You should change this only after NixOS release
# notes say you should.
# https://nixos.org/nixos/manual/release-notes.html
system.stateVersion = "20.03"; # Did you read the comment?
}
|