2024-03-25 19:13:05 +00:00
# SPDX-FileCopyrightText: 2024 Luke Granger-Brown <depot@lukegb.com>
#
# SPDX-License-Identifier: Apache-2.0
{ depot , lib , pkgs , config , . . . }:
{
imports = [
../lib/zfs.nix
2024-03-28 00:19:18 +00:00
./bgp.nix
2024-03-25 19:13:05 +00:00
../lib/bgp.nix
2024-03-26 19:00:40 +00:00
../lib/gitlab-runner-cacher.nix
#../lib/nixbuild-distributed.nix # error: build of '/nix/store/3r7456yr8r9g4fl7w6xbgqlbsdjwfvr4-stdlib-pkgs.json.drv' on 'ssh://eu.nixbuild.net' failed: unexpected: Built outputs are invalid
2024-06-21 21:34:53 +00:00
../lib/hackyplayer.nix
../lib/emfminiserv.nix
2024-10-20 13:37:47 +00:00
../lib/seaweedfs.nix
2024-10-20 16:21:54 +00:00
../lib/fup.nix
2024-10-21 03:56:28 +00:00
./bsky-pds.nix
2024-03-25 19:13:05 +00:00
] ;
# Otherwise _this_ machine won't enumerate things properly.
boot . zfs . devNodes = " / d e v / d i s k / b y - i d " ;
boot . initrd = {
availableKernelModules = [
" n v m e "
" x h c i _ p c i "
" a h c i "
" u s b _ s t o r a g e "
" u s b h i d "
" s d _ m o d "
" s r _ m o d "
] ;
2024-03-25 20:17:52 +00:00
systemd . enable = true ;
2024-03-25 19:13:05 +00:00
} ;
2024-03-25 20:17:52 +00:00
security . tpm2 . enable = true ;
2024-03-25 19:13:05 +00:00
boot . kernelModules = [ " k v m - a m d " ] ;
hardware . cpu . amd . updateMicrocode = true ;
boot . kernelParams = [
" n o m o d e s e t "
] ;
2024-03-25 20:17:52 +00:00
environment . systemPackages = with pkgs ; [
clevis
] ;
2024-03-25 19:13:05 +00:00
# Use the systemd-boot EFI boot loader.
boot . loader . systemd-boot . enable = true ;
boot . loader . efi . canTouchEfiVariables = true ;
powerManagement . cpuFreqGovernor = lib . mkDefault " p e r f o r m a n c e " ;
fileSystems = let
zfs = device : {
device = device ;
fsType = " z f s " ;
} ;
in {
" / " = zfs " z b o o t / l o c a l / r o o t " ;
" / n i x " = zfs " z b o o t / l o c a l / n i x " ;
" / p e r s i s t " = zfs " z b o o t / s a f e / p e r s i s t " ;
" / s t o r e " = zfs " z u 2 / s a f e / s t o r e " ;
2024-03-25 22:14:11 +00:00
" / h o m e " = zfs " z u 2 / s a f e / h o m e " ;
2024-03-25 19:13:05 +00:00
2024-06-21 21:34:53 +00:00
" / s t o r e / e m f " = zfs " z u 2 / s a f e / s t o r e / e m f " ;
" / s t o r e / e m f / 2 0 2 4 " = zfs " z u 2 / s a f e / s t o r e / e m f / 2 0 2 4 " ;
" / s t o r e / e m f / 2 0 2 4 / v i d e o " = zfs " z u 2 / s a f e / s t o r e / e m f / 2 0 2 4 / v i d e o " ;
" / s t o r e / e m f / 2 0 2 4 / v i d e o / s o u r c e " = zfs " z u 2 / s a f e / s t o r e / e m f / 2 0 2 4 / v i d e o / s o u r c e " ;
" / s t o r e / e m f / 2 0 2 4 / v i d e o / i n p u t " = zfs " z u 2 / s a f e / s t o r e / e m f / 2 0 2 4 / v i d e o / i n p u t " ;
" / s t o r e / e m f / 2 0 2 4 / v i d e o / o u t p u t " = zfs " z u 2 / s a f e / s t o r e / e m f / 2 0 2 4 / v i d e o / o u t p u t " ;
2024-10-20 13:37:47 +00:00
" / v a r / l i b / p r i v a t e / s e a w e e d f s - m a s t e r " = zfs " z u 2 / s a f e / v a r / l i b / p r i v a t e / s e a w e e d f s - m a s t e r " ;
" / v a r / l i b / p r i v a t e / s e a w e e d f s - f i l e r " = zfs " z u 2 / s a f e / v a r / l i b / p r i v a t e / s e a w e e d f s - f i l e r " ;
" / v a r / l i b / p r i v a t e / s e a w e e d f s - v o l u m e " = zfs " z u 2 / s a f e / v a r / l i b / p r i v a t e / s e a w e e d f s - v o l u m e " ;
" / v a r / l i b / p r i v a t e / s e a w e e d f s - v o l u m e / d a t a " = zfs " z u 2 / s a f e / v a r / l i b / p r i v a t e / s e a w e e d f s - v o l u m e / d a t a " ;
" / v a r / l i b / p r i v a t e / s e a w e e d f s - v o l u m e / i d x " = zfs " z u 2 / s a f e / v a r / l i b / p r i v a t e / s e a w e e d f s - v o l u m e / i d x " ;
2024-03-25 19:13:05 +00:00
" / b o o t " = {
device = " / d e v / d i s k / b y - l a b e l / E S P " ;
fsType = " v f a t " ;
} ;
" / b o o t 2 " = {
device = " / d e v / d i s k / b y - l a b e l / E S P 2 " ;
fsType = " v f a t " ;
} ;
} ;
boot . loader . systemd-boot . extraInstallCommands = ''
rsync - a /boot / /boot2 /
'' ;
2024-03-26 19:00:40 +00:00
nix . settings . max-jobs = lib . mkDefault 64 ;
2024-03-25 19:13:05 +00:00
# Networking!
networking = {
hostName = " r e x x a r " ;
domain = " a s 2 0 5 4 7 9 . n e t " ;
hostId = " b 4 6 c 2 a e 9 " ;
useNetworkd = true ;
2024-04-04 22:51:55 +00:00
firewall = {
allowedUDPPorts = [
51821 51822 51823
2024-06-09 22:43:57 +00:00
34197 # factorio
2024-06-21 21:34:53 +00:00
443
2024-07-13 16:57:05 +00:00
3784 # BFD
2024-06-21 21:34:53 +00:00
] ;
allowedTCPPorts = [
80 443
2024-04-04 22:51:55 +00:00
] ;
} ;
2024-03-25 19:13:05 +00:00
} ;
2024-04-04 22:51:55 +00:00
systemd . network = let
wireguard = { name , listenPort , privateKey , publicKey , endpoint ? null }: {
netdevConfig = {
Name = name ;
Kind = " w i r e g u a r d " ;
Description = " W i r e G u a r d t u n n e l ${ name } " ;
} ;
wireguardConfig = {
ListenPort = listenPort ;
PrivateKeyFile = privateKey ;
} ;
2024-10-13 19:39:49 +00:00
wireguardPeers = [ ( lib . mkMerge [ {
2024-06-08 23:53:59 +00:00
PublicKey = publicKey ;
AllowedIPs = [
" 0 . 0 . 0 . 0 / 0 "
" : : / 0 "
] ;
2024-10-13 19:39:49 +00:00
} ( lib . mkIf ( endpoint != null ) {
2024-06-08 23:53:59 +00:00
Endpoint = endpoint ;
2024-10-13 19:39:49 +00:00
} ) ] ) ] ;
2024-04-04 22:51:55 +00:00
} ;
swannWireguard = args : wireguard ( args // {
privateKey = config . my . vault . secrets . wg-swann-private . path ;
publicKey = " X y f o v U P 6 G U w I g 1 5 t 5 U W x i c f x o o e t o / U / 7 n L s 7 Z u 8 H H 4 = " ;
} ) ;
cofractalWireguard = args : wireguard ( args // {
privateKey = config . my . vault . secrets . wg-cofractal-ams01-private . path ;
publicKey = " q K i 6 m W I h V 2 n 1 6 L G H 1 6 I u g 5 W + B x 4 F x 7 e p r x C g A / 1 R a 1 g = " ;
} ) ;
in {
netdevs . " 4 0 - w g - s w a n n - e e " = swannWireguard {
name = " w g - s w a n n - e e " ;
listenPort = 51821 ;
} ;
netdevs . " 4 0 - w g - s w a n n - g n e t " = swannWireguard {
name = " w g - s w a n n - g n e t " ;
listenPort = 51822 ;
endpoint = " 1 8 5 . 2 5 0 . 1 8 9 . 2 0 : 5 1 8 2 2 " ;
} ;
netdevs . " 4 0 - w g - c o f r a c t a l " = cofractalWireguard {
name = " w g - c o f r a c t a l " ;
listenPort = 51823 ;
endpoint = " [ 2 a 0 9 : a 4 4 6 : 1 3 3 7 : f f f f : : 1 0 ] : 5 1 8 2 3 " ;
} ;
networks . " 4 0 - w g - s w a n n - e e " = {
matchConfig . Name = " w g - s w a n n - e e " ;
address = [
" 9 2 . 1 1 8 . 3 0 . 3 / 3 1 "
2024-07-13 16:57:05 +00:00
" 2 a 0 9 : a 4 4 2 : : 2 : 2 / 1 1 2 "
2024-04-04 22:51:55 +00:00
] ;
} ;
networks . " 4 0 - w g - s w a n n - g n e t " = {
matchConfig . Name = " w g - s w a n n - g n e t " ;
address = [
" 9 2 . 1 1 8 . 3 0 . 5 / 3 1 "
2024-07-13 16:57:05 +00:00
" 2 a 0 9 : a 4 4 2 : : 3 : 2 / 1 1 2 "
2024-04-04 22:51:55 +00:00
] ;
2024-03-25 19:13:05 +00:00
} ;
2024-04-04 22:51:55 +00:00
networks . " 4 0 - w g - c o f r a c t a l " = {
matchConfig . Name = " w g - c o f r a c t a l " ;
address = [
" 1 6 9 . 2 5 4 . 2 0 0 . 0 / 3 1 "
] ;
} ;
networks . " 1 0 - u s b 0 " = {
matchConfig . Name = " u s b 0 " ;
address = [
" 1 6 9 . 2 5 4 . 0 . 1 / 2 4 "
# IPMI 169.254.0.17
] ;
} ;
networks . " 1 0 - e n p 1 9 3 s 0 f 0 n p 0 " = {
matchConfig . Name = " e n p 1 9 3 s 0 f 0 n p 0 " ;
# Telia
address = [
" 6 2 . 1 1 5 . 1 5 0 . 1 0 5 / 3 1 "
" 2 0 0 1 : 2 0 3 5 : 0 : 1 f 7 e : : 2 / 1 2 6 "
] ;
} ;
networks . " 1 0 - e n p 1 9 3 s 0 f 1 n p 1 " = {
matchConfig . Name = " e n p 1 9 3 s 0 f 1 n p 1 " ;
networkConfig . VLAN = [ " v l - v e l o x 1 " ] ;
} ;
# enp9s0f0 - previously velox copper cable 1, now enp193s0f1np1 via 10G
2024-03-25 19:13:05 +00:00
networks . " 1 0 - e n p 9 s 0 f 1 " = {
matchConfig . Name = " e n p 9 s 0 f 1 " ;
2024-04-24 09:46:43 +00:00
networkConfig . VLAN = [ " v l - v e l o x 2 " " v l - l i n x " ] ; # also IPMI, vlan 300
2024-03-25 19:13:05 +00:00
} ;
netdevs . " 2 0 - v l - v e l o x 1 " = {
netdevConfig = {
Name = " v l - v e l o x 1 " ;
Kind = " v l a n " ;
MACAddress = " 8 C : 1 F : 6 4 : 0 B : 6 F : 0 0 " ;
} ;
vlanConfig = {
Id = 100 ;
} ;
} ;
networks . " 2 0 - v l - v e l o x 1 " = {
matchConfig . Name = " v l - v e l o x 1 " ;
address = [
" 1 9 5 . 7 4 . 5 5 . 2 1 / 3 1 "
" 2 a 0 3 : e e 4 0 : 8 0 8 0 : 9 : 1 : : 2 / 1 2 6 "
] ;
networkConfig . DNS = [
" 2 0 0 1 : 4 8 6 0 : 4 8 6 0 : : 8 8 8 8 "
" 2 0 0 1 : 4 8 6 0 : 4 8 6 0 : : 8 8 4 4 "
" 8 . 8 . 8 . 8 "
" 8 . 8 . 4 . 4 "
" 1 . 1 . 1 . 1 "
] ;
networkConfig . DNSDefaultRoute = true ;
2024-06-08 23:53:59 +00:00
routes = [ {
2024-03-25 19:13:05 +00:00
Gateway = " 1 9 5 . 7 4 . 5 5 . 2 0 " ;
2024-06-08 23:53:59 +00:00
} {
2024-03-25 19:13:05 +00:00
Gateway = " 2 a 0 3 : e e 4 0 : 8 0 8 0 : 9 : 1 : : 1 " ;
2024-06-08 23:53:59 +00:00
} ] ;
2024-03-25 19:13:05 +00:00
} ;
netdevs . " 2 0 - v l - v e l o x 2 " = {
netdevConfig = {
Name = " v l - v e l o x 2 " ;
Kind = " v l a n " ;
MACAddress = " 8 C : 1 F : 6 4 : 0 B : 6 F : 0 1 " ;
} ;
vlanConfig = {
Id = 100 ;
} ;
} ;
networks . " 2 0 - v l - v e l o x 2 " = {
matchConfig . Name = " v l - v e l o x 2 " ;
address = [
" 1 9 5 . 7 4 . 5 5 . 2 3 / 3 1 "
" 2 a 0 3 : e e 4 0 : 8 0 8 0 : 9 : 2 : : 2 / 1 2 6 "
] ;
networkConfig . DNS = [
" 2 0 0 1 : 4 8 6 0 : 4 8 6 0 : : 8 8 8 8 "
" 2 0 0 1 : 4 8 6 0 : 4 8 6 0 : : 8 8 4 4 "
" 8 . 8 . 8 . 8 "
" 8 . 8 . 4 . 4 "
" 1 . 1 . 1 . 1 "
] ;
networkConfig . DNSDefaultRoute = true ;
2024-06-08 23:53:59 +00:00
routes = [ {
2024-03-25 19:13:05 +00:00
Gateway = " 1 9 5 . 7 4 . 5 5 . 2 2 " ;
2024-06-08 23:53:59 +00:00
} {
2024-03-25 19:13:05 +00:00
Gateway = " 2 a 0 3 : e e 4 0 : 8 0 8 0 : 9 : 2 : : 1 " ;
2024-06-08 23:53:59 +00:00
} ] ;
2024-03-25 19:13:05 +00:00
} ;
netdevs . " 2 0 - v l - l i n x " = {
netdevConfig = {
Name = " v l - l i n x " ;
Kind = " v l a n " ;
MACAddress = " 8 C : 1 F : 6 4 : 0 B : 6 F : 0 2 " ;
} ;
vlanConfig = {
Id = 200 ;
} ;
} ;
networks . " 2 0 - v l - l i n x " = {
matchConfig . Name = " v l - l i n x " ;
address = [
" 1 9 5 . 6 6 . 2 2 4 . 5 8 / 2 1 "
" 2 0 0 1 : 7 f 8 : 4 : : 3 : 2 2 a 7 : 1 / 4 8 "
] ;
networkConfig = {
IPv6LinkLocalAddressGenerationMode = " e u i 6 4 " ;
LLMNR = false ;
MulticastDNS = false ;
IPv6AcceptRA = false ;
IPv4ProxyARP = false ;
IPv6ProxyNDP = false ;
IPv6SendRA = false ;
} ;
} ;
2024-04-04 22:51:55 +00:00
networks . " 6 0 - l o " = {
matchConfig . Name = " l o " ;
addresses = [ {
2024-06-08 23:53:59 +00:00
Address = " 1 2 7 . 0 . 0 . 1 / 8 " ;
Scope = " h o s t " ;
2024-04-04 22:51:55 +00:00
} {
2024-06-08 23:53:59 +00:00
Address = " : : 1 / 1 2 8 " ;
2024-04-04 22:51:55 +00:00
} {
2024-06-08 23:53:59 +00:00
Address = " 9 2 . 1 1 8 . 3 0 . 2 5 1 / 3 2 " ;
2024-04-04 22:51:55 +00:00
} {
2024-06-08 23:53:59 +00:00
Address = " 2 a 0 9 : a 4 4 2 : 1 0 0 0 : : / 1 2 8 " ;
2024-04-04 22:51:55 +00:00
} ] ;
} ;
2024-03-25 19:13:05 +00:00
} ;
my . ip . tailscale = " 1 0 0 . 9 7 . 1 1 0 . 4 8 " ;
my . ip . tailscale6 = " f d 7 a : 1 1 5 c : a 1 e 0 : : 3 a 0 1 : 6 e 3 0 " ;
#my.coredns.bind = [ "bond0" "tailscale0" "127.0.0.1" "::1" ];
services . openssh . hostKeys = [
{
path = " / p e r s i s t / e t c / s s h / s s h _ h o s t _ e d 2 5 5 1 9 _ k e y " ;
type = " e d 2 5 5 1 9 " ;
}
{
path = " / p e r s i s t / e t c / s s h / s s h _ h o s t _ r s a _ k e y " ;
type = " r s a " ;
bits = 4096 ;
}
] ;
systemd . mounts = let
bindMount' = dir : {
unitConfig . RequiresMountsFor = dir ;
options = " b i n d " ;
what = " / p e r s i s t ${ dir } " ;
where = dir ;
} ;
bindMountSvc = dir : svc : ( bindMount' dir ) // {
requiredBy = [ svc ] ;
before = [ svc ] ;
wantedBy = [ " m u l t i - u s e r . t a r g e t " ] ;
} ;
bindMountSvcDynamic = dir : svc : ( bindMount' " / v a r / l i b / p r i v a t e / ${ dir } " ) // {
requiredBy = [ svc ] ;
before = [ svc ] ;
wantedBy = [ " m u l t i - u s e r . t a r g e t " ] ;
} ;
bindMount = dir : ( bindMount' dir ) // {
wantedBy = [ " m u l t i - u s e r . t a r g e t " ] ;
} ;
in [
( bindMountSvc " / v a r / l i b / t a i l s c a l e " " t a i l s c a l e d . s e r v i c e " )
( bindMountSvc " / v a r / l i b / l i b v i r t " " l i b v i r t . s e r v i c e " )
2024-06-09 22:43:57 +00:00
( bindMountSvc " / v a r / l i b / p r i v a t e / f a c t o r i o " " f a c t o r i o . s e r v i c e " )
2024-03-25 19:13:05 +00:00
] ;
2024-03-28 00:19:18 +00:00
boot . kernel . sysctl = {
" n e t . i p v 4 . i p _ f o r w a r d " = 1 ;
" n e t . i p v 6 . c o n f . a l l . f o r w a r d i n g " = 1 ;
" n e t . i p v 4 . c o n f . v l - l i n x . a r p _ a n n o u n c e " = 1 ;
" n e t . i p v 4 . c o n f . v l - l i n x . a r p _ i g n o r e " = 1 ;
" n e t . i p v 4 . n e i g h . v l - l i n x . b a s e _ r e a c h a b l e _ t i m e _ m s " = 14400000 ;
" n e t . i p v 6 . n e i g h . v l - l i n x . b a s e _ r e a c h a b l e _ t i m e _ m s " = 14400000 ;
2024-05-18 14:44:43 +00:00
" n e t . i p v 4 . n e i g h . d e f a u l t . g c _ t h r e s h 1 " = 2048 ;
" n e t . i p v 6 . n e i g h . d e f a u l t . g c _ t h r e s h 1 " = 2048 ;
" n e t . i p v 4 . n e i g h . d e f a u l t . g c _ t h r e s h 2 " = 4096 ;
" n e t . i p v 6 . n e i g h . d e f a u l t . g c _ t h r e s h 2 " = 4096 ;
" n e t . i p v 4 . n e i g h . d e f a u l t . g c _ t h r e s h 3 " = 8192 ;
" n e t . i p v 6 . n e i g h . d e f a u l t . g c _ t h r e s h 3 " = 8192 ;
2024-03-28 00:19:18 +00:00
} ;
2024-03-26 19:00:40 +00:00
boot . binfmt . emulatedSystems = [ " a a r c h 6 4 - l i n u x " ] ;
2024-04-04 22:51:55 +00:00
my . vault . secrets = let
wireguardSecret = key : {
group = " s y s t e m d - n e t w o r k " ;
template = ''
{ { - with secret " k v / a p p s / w i r e g u a r d / r e x x a r " - } }
{ { - . Data . data . ${ key } - } }
{ { - end - } }
'' ;
} ;
in {
wg-swann-private = wireguardSecret " p r i v a t e K e y T o S w a n n " ;
wg-cofractal-ams01-private = wireguardSecret " p r i v a t e K e y T o C o f r a c t a l A m s 0 1 " ;
} ;
2024-06-21 21:34:53 +00:00
users . users . lukegb . extraGroups = lib . mkAfter [ " h a c k y p l a y e r " ] ;
2024-06-08 18:28:00 +00:00
users . users . samw = {
isNormalUser = true ;
2024-09-04 20:41:37 +00:00
extraGroups = lib . mkAfter [ " h a c k y p l a y e r " ] ;
2024-06-08 18:28:00 +00:00
openssh . authorizedKeys . keys = [
" e c d s a - s h a 2 - n i s t p 2 5 6 A A A A E 2 V j Z H N h L X N o Y T I t b m l z d H A y N T Y A A A A I b m l z d H A y N T Y A A A B B B D Q d G z w Y i a l l v W X I H g S A f 2 G O w M J K A 8 b x P m w y u O + v s d 1 H w B 6 5 h M R P C p K S + F N L I p k r A D N n u h G S 3 x G C G S S u Q + z A u / g = "
" e c d s a - s h a 2 - n i s t p 2 5 6 A A A A E 2 V j Z H N h L X N o Y T I t b m l z d H A y N T Y A A A A I b m l z d H A y N T Y A A A B B B N L r J y U X m i F W b 9 v h l T W Z L Y r 6 4 I s K u t + c 9 T G q q 3 / u w P D e F 4 X 0 Q b 2 j z x q X f Q c D S z t j R 0 9 J H b C 8 B O q f p Y Y T 9 L H a h I o = "
" s s h - e d 2 5 5 1 9 A A A A C 3 N z a C 1 l Z D I 1 N T E 5 A A A A I O O i c o Y t z J 3 v X S k Y 7 M k r i Q r f y Z / g P 8 O N M 2 O H h O 0 z i 2 c l "
" e c d s a - s h a 2 - n i s t p 2 5 6 A A A A E 2 V j Z H N h L X N o Y T I t b m l z d H A y N T Y A A A A I b m l z d H A y N T Y A A A B B B G U o i 7 6 V Y n q s P Z 4 I j y f N b 8 N f a a A f c U 9 i A b A R F E f Y T u N w x m Y U j v + R p C B C 1 G q i 0 Y p d O N y r W i 9 X l j j A t Y 9 2 P 4 j Z f f Q = "
] ;
} ;
2024-06-09 22:43:57 +00:00
services . factorio = {
inherit ( depot . ops . secrets . factorio ) username token ;
enable = true ;
2024-11-10 19:02:51 +00:00
saveName = " l u k e g b 2 0 2 4 1 1 0 7 - s p a c e a g e " ;
2024-06-09 22:43:57 +00:00
game-name = " B r i e f c a s e F u l l o f B e e s " ;
2024-11-10 19:02:51 +00:00
#mods = depot.nix.pkgs.factorio-mods._all;
2024-06-09 22:43:57 +00:00
#mods-dat = ./mod-settings.dat;
admins = [ " l u k e g b " ] ;
2024-11-10 19:02:51 +00:00
package = pkgs . factorio-headless-experimental ;
2024-06-09 22:43:57 +00:00
extraSettings = {
auto_pause = true ;
only_admins_can_pause_the_game = false ;
game_password = depot . ops . secrets . factorioServerPassword ;
non_blocking_saving = true ;
autosave_only_on_server = true ;
autosave_interval = 5 ;
autosave_slots = 60 ;
} ;
} ;
2024-06-21 21:34:53 +00:00
my . hackyplayer = {
enable = true ;
hostname = " h a c k y p l a y e r . v o c . e m f . c a m p " ;
workerConcurrency = 13 ;
} ;
my . emfminiserv = {
enable = true ;
hostname = " p r e r e l e a s e . v o c . e m f . c a m p " ;
} ;
hardware . rasdaemon . enable = true ;
2024-06-22 21:54:47 +00:00
services . prometheus . exporters . ipmi = {
enable = true ;
} ;
2024-06-21 21:34:53 +00:00
2024-10-20 13:37:47 +00:00
my . services . seaweedfs = {
securitySettings = {
cors . allowed_origins . values = " * " ;
} ;
master = {
enable = true ;
options = {
port = 21000 ;
ip = " r e x x a r . i n t . a s 2 0 5 4 7 9 . n e t " ;
" i p . b i n d " = config . my . ip . tailscale6 ;
mdir = " / v a r / l i b / s e a w e e d f s - m a s t e r / m e t a d a t a " ;
defaultReplication = " 0 0 0 " ;
} ;
} ;
filer = {
enable = true ;
2024-10-20 16:23:44 +00:00
earlyOptions = {
v = 4 ;
} ;
2024-10-20 13:37:47 +00:00
options = {
port = 21010 ;
ip = " r e x x a r . i n t . a s 2 0 5 4 7 9 . n e t " ;
" i p . b i n d " = config . my . ip . tailscale6 ;
master = " [ ${ config . my . ip . tailscale6 } ] : 2 1 0 0 0 " ;
encryptVolumeData = true ;
s3 = true ;
" s 3 . d o m a i n N a m e " = " o b j d u m p . z x c v b n m . n i n j a " ;
" s 3 . l o c a l S o c k e t " = " / r u n / s e a w e e d f s - f i l e r / s 3 . s o c k " ;
" s 3 . p o r t " = 21012 ;
webdav = true ;
" w e b d a v . p o r t " = 21014 ;
iam = true ;
" i a m . i p " = " 1 2 7 . 0 . 0 . 1 " ;
" i a m . p o r t " = 21015 ;
defaultReplicaPlacement = " 0 0 0 " ;
} ;
settings = {
leveldb2 = {
enabled = true ;
dir = " / v a r / l i b / s e a w e e d f s - f i l e r / l e v e l d b 2 " ;
} ;
} ;
} ;
volume = {
enable = true ;
2024-10-20 16:23:44 +00:00
earlyOptions = {
v = 4 ;
} ;
2024-10-20 13:37:47 +00:00
options = {
port = 21100 ;
ip = " r e x x a r . i n t . a s 2 0 5 4 7 9 . n e t " ;
" i p . b i n d " = config . my . ip . tailscale6 ;
dataCenter = " i x n - l o n 1 " ;
rack = " v l x - l u k e g b 1 " ;
max = 0 ;
mserver = " [ ${ config . my . ip . tailscale6 } ] : 2 1 0 0 0 " ;
} ;
} ;
cli . settings = {
cluster . default = " r e x x a r " ;
cluster . rexxar = {
master = " [ ${ config . my . ip . tailscale6 } ] : 2 1 0 0 0 " ;
} ;
} ;
} ;
my . vault . acmeCertificates . " o b j d u m p . z x c v b n m . n i n j a " = {
hostnames = [
" o b j d u m p . z x c v b n m . n i n j a "
" * . o b j d u m p . z x c v b n m . n i n j a "
] ;
reloadOrRestartUnits = [ " c a d d y . s e r v i c e " ] ;
} ;
services . caddy = {
enable = true ;
virtualHosts . " o b j d u m p . z x c v b n m . n i n j a " = {
serverAliases = [ " * . o b j d u m p . z x c v b n m . n i n j a " ] ;
extraConfig = ''
tls /var/lib/acme/objdump.zxcvbnm.ninja/fullchain.pem /var/lib/acme/objdump.zxcvbnm.ninja/privkey.pem
reverse_proxy unix // run/seaweedfs-filer/s3.sock
'' ;
} ;
2024-11-10 19:02:51 +00:00
virtualHosts . " h t t p : / / o b j d u m p . z x c v b n m . n i n j a " = {
serverAliases = [ " h t t p : / / * . o b j d u m p . z x c v b n m . n i n j a " ] ;
extraConfig = ''
reverse_proxy unix // run/seaweedfs-filer/s3.sock
'' ;
} ;
2024-10-20 13:37:47 +00:00
} ;
systemd . services . caddy . serviceConfig = {
SupplementaryGroups = lib . mkAfter [ " a c m e " ] ;
ReadOnlyPaths = lib . mkAfter [ " / v a r / l i b / a c m e " ] ;
} ;
2024-10-20 16:21:54 +00:00
my . fup . listen = [ ] ;
2024-03-25 19:13:05 +00:00
system . stateVersion = " 2 4 . 0 5 " ;
}