depot/ops/nixos/clouvider-fra01/default.nix

217 lines
5.1 KiB
Nix
Raw Normal View History

# SPDX-FileCopyrightText: 2020 Luke Granger-Brown <depot@lukegb.com>
#
# SPDX-License-Identifier: Apache-2.0
{ depot, lib, pkgs, rebuilder, config, ... }:
2020-05-05 23:28:23 +00:00
let
inherit (depot.ops) secrets;
2020-05-09 11:56:56 +00:00
machineSecrets = secrets.machineSpecific.clouvider-fra01;
vhostsConfig = {
int = rec {
proxy = _apply (value: { locations."/".proxyPass = value; }) {
"deluge.int.lukegb.com" = "http://localhost:8112";
"radarr.int.lukegb.com" = "http://localhost:7878";
"sonarr.int.lukegb.com" = "http://localhost:8989";
};
serve = _apply (value: { root = value; }) {
"int.lukegb.com" = depot.web.int;
"logged-out.int.lukegb.com" = depot.web.logged-out-int;
};
other = _apply lib.id {
"content.int.lukegb.com" = {
listen = [{
addr = config.my.ip.tailscale;
port = 80;
} {
addr = config.my.ip.tailscale;
port = 18081;
}];
locations."/" = {
alias = "/store/content/";
extraConfig = ''
autoindex on;
'';
};
};
};
2020-12-28 15:54:43 +00:00
_apply = f: builtins.mapAttrs (name: value: lib.recursiveUpdate hostBase (f value));
};
};
vhosts = vhostsConfig.int.proxy // vhostsConfig.int.serve // vhostsConfig.int.other;
2020-12-28 15:54:43 +00:00
hostBase = {
listen = [{
addr = config.my.ip.tailscale;
port = 80;
}];
};
2020-05-05 23:28:23 +00:00
in {
imports = [
../lib/zfs.nix
../lib/bgp.nix
2021-01-27 18:39:58 +00:00
../lib/ts3spotifybot.nix
2021-03-20 02:03:23 +00:00
../lib/coredns/default.nix
];
2020-05-05 23:28:23 +00:00
boot.initrd.availableKernelModules = [
"xhci_pci"
"ahci"
"nvme"
"usbhid"
"usb_storage"
"sd_mod"
"sr_mod"
];
boot.kernelModules = [ "kvm-intel" ];
2020-05-05 23:28:23 +00:00
powerManagement.cpuFreqGovernor = lib.mkDefault "performance";
fileSystems = let
zfs = device: {
device = device;
fsType = "zfs";
};
in {
"/" = zfs "zfast/local/root";
"/nix" = zfs "zfast/local/nix";
"/persist" = zfs "zfast/safe/persist";
"/home" = zfs "zfast/safe/home";
"/store" = zfs "zslow/local/store";
"/boot" = {
device = "/dev/disk/by-label/ESP";
fsType = "vfat";
};
};
nix.maxJobs = lib.mkDefault 12;
# Use systemd-boot.
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
# Networking!
networking = {
hostName = "clouvider-fra01";
domain = "as205479.net";
hostId = "9e983570";
nameservers = [
"2001:4860:4860::8888"
"2001:4860:4860::8844"
"8.8.8.8"
"8.8.4.4"
];
useDHCP = false;
defaultGateway = {
address = "193.228.196.56";
interface = "enp1s0";
};
defaultGateway6 = {
address = "2a0f:93c0:0:22::1";
interface = "enp1s0";
};
interfaces.enp1s0 = {
useDHCP = false;
ipv4.addresses = [{ address = "193.228.196.57"; prefixLength = 31; }];
ipv6.addresses = [{ address = "2a0f:93c0:0:22::2"; prefixLength = 126; }];
};
firewall.allowPing = true;
2021-01-15 00:58:36 +00:00
firewall.allowedTCPPorts = [
4001 # ipfs
];
firewall.allowedUDPPorts = [
4001 # ipfs
];
2020-05-05 23:28:23 +00:00
};
my.ip.tailscale = "100.75.142.119";
2020-05-05 23:28:23 +00:00
# List packages installed in system profile. To search, run:
# $ nix search wget
environment.systemPackages = with pkgs; [
rebuilder
];
# Define a user account.
users.mutableUsers = false;
users.users = {
lukegb.extraGroups = [ "wheel" "content" "deluge" ];
content = {
isSystemUser = true;
group = "content";
};
2020-05-09 10:14:37 +00:00
plex.extraGroups = [ "content" ];
deluge.extraGroups = [ "content" ];
2020-05-31 20:27:23 +00:00
sonarr.extraGroups = [ "deluge" "content" ];
radarr.extraGroups = [ "deluge" "content" ];
2020-09-30 17:39:34 +00:00
} // (lib.setAttrByPath [ config.services.nginx.user "extraGroups" ] [ "acme" ]);
users.groups = {
content = {};
2020-05-05 23:28:23 +00:00
};
services.openssh.hostKeys = [
{
path = "/persist/etc/ssh/ssh_host_ed25519_key";
type = "ed25519";
}
{
path = "/persist/etc/ssh/ssh_host_rsa_key";
type = "rsa";
bits = 4096;
}
];
services.plex = {
enable = true;
dataDir = "/store/plex";
openFirewall = true;
package = depot.nix.pkgs.plex-pass;
};
2020-05-09 10:14:37 +00:00
services.deluge = {
enable = true;
declarative = true;
openFirewall = true;
dataDir = "/store/deluge";
config = {
upnp = false;
natpmp = false;
2021-07-03 00:46:07 +00:00
max_active_seeding = 900;
2020-05-09 10:14:37 +00:00
max_active_downloading = 100;
2021-07-03 00:46:07 +00:00
max_active_limit = 1000;
2020-05-09 10:14:37 +00:00
move_completed_paths_list = [ "/store/content/Anime" "/store/content/Films" "/store/content/TV" ];
enabled_plugins = [ "Label" ];
2020-05-09 10:14:37 +00:00
};
2020-05-09 11:56:56 +00:00
authFile = machineSecrets.delugeAuthFile;
2020-05-09 10:14:37 +00:00
web.enable = true;
package = depot.pkgs.deluge;
2020-05-09 10:14:37 +00:00
};
2020-05-31 20:27:23 +00:00
services.sonarr = {
enable = true;
};
services.radarr = {
enable = true;
};
2020-05-09 10:14:37 +00:00
services.nginx = {
enable = true;
virtualHosts = vhosts;
};
systemd.services.nginx.serviceConfig = {
SupplementaryGroups = [ "content" ];
};
2021-01-15 00:58:36 +00:00
services.ipfs = {
enable = true;
extraConfig = {
Discovery.MDNS.Enabled = false;
Swarm.DisableNatPortMap = true;
Experimental.FilestoreEnabled = true;
2021-01-15 00:58:36 +00:00
};
dataDir = "/store/ipfs";
};
system.stateVersion = "20.09";
2020-09-30 17:39:34 +00:00
}