depot/ops/nixos/bvm-netbox/default.nix

284 lines
7.7 KiB
Nix
Raw Normal View History

2021-08-15 22:46:57 +00:00
# SPDX-FileCopyrightText: 2020 Luke Granger-Brown <depot@lukegb.com>
#
# SPDX-License-Identifier: Apache-2.0
2023-05-14 14:04:26 +00:00
{ config, lib, depot, pkgs, ... }:
2021-08-16 02:09:47 +00:00
let
inherit (depot.ops) secrets;
netboxConfiguration = ''
SECRET_KEY = '${secrets.netbox.secretKey}'
2021-08-16 02:09:47 +00:00
ADMINS = []
ALLOWED_URL_SCHEMES = (
'file', 'ftp', 'ftps', 'http', 'https', 'irc', 'mailto', 'sftp', 'ssh', 'tel', 'telnet', 'tftp', 'vnc', 'xmpp',
)
2021-08-16 02:09:47 +00:00
BANNER_TOP = ""
BANNER_BOTTOM = ""
BANNER_LOGIN = ""
BASE_PATH = ""
2021-08-16 02:09:47 +00:00
CHANGELOG_RETENTION = 0
2021-08-16 02:09:47 +00:00
CORS_ORIGIN_ALLOW_ALL = False
CORS_ORIGIN_WHITELIST = []
CORS_ORIGIN_REGEX_WHITELIST = []
2021-08-16 02:09:47 +00:00
CUSTOM_VALIDATORS = {}
2021-08-16 02:09:47 +00:00
DEBUG = False
2021-08-16 02:09:47 +00:00
EMAIL = {}
2021-08-16 02:09:47 +00:00
ENFORCE_GLOBAL_UNIQUE = True
2021-08-16 02:09:47 +00:00
EXEMPT_VIEW_PERMISSIONS = []
2021-08-16 02:09:47 +00:00
GRAPHQL_ENABLED = False
2021-08-16 02:09:47 +00:00
INTERNAL_IPS = ('127.0.0.1', '::1')
2021-08-16 02:09:47 +00:00
LOGIN_REQUIRED = True
LOGIN_TIMEOUT = None
2021-08-16 02:09:47 +00:00
MAINTENANCE_MODE = False
2021-08-16 02:09:47 +00:00
MAPS_URL = 'https://maps.google.com/?q='
2021-08-16 02:09:47 +00:00
MAX_PAGE_SIZE = 1000
2021-08-16 02:09:47 +00:00
MEDIA_ROOT = '/srv/netbox/media'
2021-08-16 02:09:47 +00:00
STORAGE_BACKEND = 'storages.backends.s3boto3.S3Boto3Storage'
STORAGE_CONFIG = {
'AWS_ACCESS_KEY_ID': "${secrets.netbox.s3.accessKey}",
'AWS_SECRET_ACCESS_KEY': "${secrets.netbox.s3.secretAccessKey}",
'AWS_STORAGE_BUCKET_NAME': 'netbox',
'AWS_S3_ENDPOINT_URL': 'https://objdump.zxcvbnm.ninja',
'AWS_S3_REGION_NAME': 'london',
}
2021-08-16 02:09:47 +00:00
METRICS_ENABLED = False
2021-08-16 02:09:47 +00:00
NAPALM_USERNAME = ""
NAPALM_PASSWORD = ""
NAPALM_TIMEOUT = 30
NAPALM_ARGS = {}
2021-08-16 02:09:47 +00:00
PAGINATE_COUNT = 50
2021-08-16 02:09:47 +00:00
PLUGINS = []
2021-08-16 02:09:47 +00:00
PREFER_IPV4 = False
2021-08-16 02:09:47 +00:00
RACK_ELEVATION_DEFAULT_UNIT_HEIGHT = 22
RACK_ELEVATION_DEFAULT_UNIT_WIDTH = 220
2021-08-16 02:09:47 +00:00
REMOTE_AUTH_ENABLED = False
REMOTE_AUTH_BACKEND = 'netbox.authentication.RemoteUserBackend'
REMOTE_AUTH_HEADER = 'HTTP_REMOTE_USER'
REMOTE_AUTH_AUTO_CREATE_USER = True
REMOTE_AUTH_DEFAULT_GROUPS = []
REMOTE_AUTH_DEFAULT_PERMISSIONS = {}
2021-08-16 02:09:47 +00:00
RELEASE_CHECK_URL = None
2021-08-16 02:09:47 +00:00
REPORTS_ROOT = '/srv/netbox/reports'
2021-08-16 02:09:47 +00:00
RQ_DEFAULT_TIMEOUT = 300
2021-08-16 02:09:47 +00:00
SCRIPTS_ROOT = '/srv/netbox/scripts'
2021-08-16 02:09:47 +00:00
SESSION_COOKIE_NAME = 'netboxsess'
2021-08-16 02:09:47 +00:00
TIME_ZONE = 'UTC'
2021-08-16 02:09:47 +00:00
DATE_FORMAT = 'Y-m-d'
SHORT_DATE_FORMAT = 'Y-m-d'
TIME_FORMAT = 'g:i a'
SHORT_TIME_FORMAT = 'H:i:s'
DATETIME_FORMAT = 'Y-m-d g:i a'
SHORT_DATETIME_FORMAT = 'Y-m-d H:i'
'';
2021-08-16 02:09:47 +00:00
in {
2021-08-15 22:46:57 +00:00
imports = [
../lib/bvm.nix
];
# Networking!
networking = {
hostName = "bvm-netbox";
hostId = "e70e18a5";
interfaces.enp1s0 = {
ipv4.addresses = [{ address = "10.100.0.206"; prefixLength = 23; }];
};
2021-08-15 22:48:46 +00:00
interfaces.enp2s0 = {
2021-08-15 22:46:57 +00:00
ipv4.addresses = [{ address = "92.118.28.8"; prefixLength = 24; }];
ipv6.addresses = [{ address = "2a09:a441::8"; prefixLength = 32; }];
};
2021-08-15 22:48:46 +00:00
defaultGateway = { address = "92.118.28.1"; interface = "enp2s0"; };
defaultGateway6 = { address = "2a09:a441::1"; interface = "enp2s0"; };
2021-08-15 22:46:57 +00:00
};
2023-05-14 14:04:26 +00:00
networking.firewall.allowedTCPPorts = [ 80 443 ];
2021-08-15 22:57:26 +00:00
my.ip.tailscale = "100.81.27.52";
2022-09-01 23:22:16 +00:00
my.ip.tailscale6 = "fd7a:115c:a1e0:ab12:4843:cd96:6251:1b34";
2021-08-15 22:46:57 +00:00
2021-08-15 22:57:36 +00:00
services.postgresqlBackup.enable = true;
my.vault.secrets.netbox-secret-key = {
restartUnits = ["netbox.service"];
group = "root";
template = ''
{{ with secret "kv/apps/netbox" }}
{{ .Data.data.secret-key }}
{{ end }}
'';
2021-08-15 22:57:36 +00:00
};
my.vault.secrets.netbox-s3-access-key = {
restartUnits = ["netbox.service"];
group = "root";
template = ''
{{ with secret "kv/apps/netbox" }}
{{ .Data.data.s3-access-key }}
{{ end }}
'';
2021-08-15 22:57:36 +00:00
};
my.vault.secrets.netbox-s3-secret-access-key = {
restartUnits = ["netbox.service"];
group = "root";
template = ''
{{ with secret "kv/apps/netbox" }}
{{ .Data.data.s3-secret-access-key }}
{{ end }}
'';
2021-08-16 02:09:47 +00:00
};
services.netbox = {
enable = true;
dataDir = "/srv/netbox";
extraConfig = lib.mkAfter (netboxConfiguration + ''
with open("${config.my.vault.secrets.netbox-s3-access-key.path}", "r") as f:
STORAGE_CONFIG['AWS_ACCESS_KEY_ID'] = f.readline()
with open("${config.my.vault.secrets.netbox-s3-secret-access-key.path}", "r") as f:
STORAGE_CONFIG['AWS_SECRET_ACCESS_KEY'] = f.readline()
'');
listenAddress = "127.0.0.1";
port = 8001;
package = pkgs.netbox_3_6;
secretKeyFile = config.my.vault.secrets.netbox-secret-key.path;
settings = {
ALLOWED_HOSTS = ["netbox.int.lukegb.com"];
2021-08-16 02:09:47 +00:00
};
};
services.nginx = {
enable = true;
recommendedProxySettings = true;
virtualHosts."netbox.int.lukegb.com" = {
locations."/static/" = {
alias = "/srv/netbox/static";
2021-08-16 02:09:47 +00:00
};
locations."/" = {
proxyPass = "http://127.0.0.1:8001";
};
};
2023-05-14 14:04:26 +00:00
virtualHosts."livetaild.lukegb.dev" = {
forceSSL = true;
sslCertificate = "/var/lib/acme/livetaild.lukegb.dev/fullchain.pem";
sslCertificateKey = "/var/lib/acme/livetaild.lukegb.dev/privkey.pem";
sslTrustedCertificate = "/var/lib/acme/livetaild.lukegb.dev/chain.pem";
locations."/" = {
extraConfig = ''
return 403;
'';
};
locations."/.auth/return" = {
extraConfig = ''
if ($arg_state ~ ^a-) {
return 303 https://a.livetaild.lukegb.dev$request_uri;
}
if ($arg_state ~ ^b-) {
return 303 https://b.livetaild.lukegb.dev$request_uri;
}
if ($arg_state ~ ^localhost-) {
return 303 http://localhost:13371$request_uri;
}
return 403;
'';
};
};
virtualHosts."a.livetaild.lukegb.dev" = {
forceSSL = true;
sslCertificate = "/var/lib/acme/livetaild.lukegb.dev/fullchain.pem";
sslCertificateKey = "/var/lib/acme/livetaild.lukegb.dev/privkey.pem";
sslTrustedCertificate = "/var/lib/acme/livetaild.lukegb.dev/chain.pem";
locations."/" = {
proxyPass = "http://10.222.0.2:13371";
};
};
virtualHosts."b.livetaild.lukegb.dev" = {
forceSSL = true;
sslCertificate = "/var/lib/acme/livetaild.lukegb.dev/fullchain.pem";
sslCertificateKey = "/var/lib/acme/livetaild.lukegb.dev/privkey.pem";
sslTrustedCertificate = "/var/lib/acme/livetaild.lukegb.dev/chain.pem";
locations."/" = {
proxyPass = "http://10.222.0.3:13371";
};
};
};
my.vault.acmeCertificates."livetaild.lukegb.dev" = {
hostnames = [
"livetaild.lukegb.dev"
"*.livetaild.lukegb.dev"
];
reloadOrRestartUnits = [ "nginx.service" ];
2021-08-16 02:09:47 +00:00
};
2023-05-14 14:04:26 +00:00
users.groups.acme = {};
users.users.nginx.extraGroups = lib.mkAfter [ "acme" ];
2021-08-16 02:09:47 +00:00
2022-08-19 18:26:44 +00:00
users.groups.ninovpn = {};
users.users.ninovpn = {
group = "ninovpn";
isNormalUser = true;
openssh.authorizedKeys.keys = [
"command=\"/bin/false\",restrict,port-forwarding ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIISTSUEIzxpqa9kZwfryFlYA5FJaHJiDJHnw13Vg4NHg root@nino-010-worker"
"command=\"/bin/false\",restrict,port-forwarding ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHGK5a+5jekPlsI+44PCy9CZWQFqFzNVEuCo4LVZxo3O root@nino-011-worker"
];
};
2023-05-14 14:04:26 +00:00
systemd.network.netdevs."20-wg0" = {
netdevConfig = {
Kind = "wireguard";
Name = "wg0";
};
wireguardConfig = {
Address = "10.222.0.1/24";
PrivateKeyFile = "/home/ninovpn/wg-priv";
};
wireguardPeers = [{
wireguardPeerConfig = {
PublicKey = "0WX1QmQaSDavNTAIp5vRsoG+UNXOP1ttZ+2VahoHR0c=";
AllowedIPs = ["10.222.0.2/32"];
};
} {
wireguardPeerConfig = {
PublicKey = "oeRBlP5C3vHc3GDqgRT9F2qly6MAoy1+CjRHsU4F6Bo=";
AllowedIPs = ["10.222.0.3/32"];
};
}];
};
systemd.network.networks."20-wg0" = {
matchConfig.Name = "wg0";
linkConfig.RequiredForOnline = "no";
addresses = [{
addressConfig = {
Address = "10.222.0.1/24";
};
}];
};
2024-01-01 17:13:25 +00:00
system.stateVersion = "23.11";
2021-08-15 22:46:57 +00:00
}