Compare commits
	
		
			14 Commits
		
	
	
		
			systemd-jo
			...
			backup-dat
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 4521d404ae | |||
| 
						
						
							
						
						f498b82b07
	
				 | 
					
					
						|||
| 
						
						
							
						
						9034a71927
	
				 | 
					
					
						|||
| 
						
						
							
						
						f85d18769f
	
				 | 
					
					
						|||
| 
						
						
							
						
						b47a626427
	
				 | 
					
					
						|||
| 
						
						
							
						
						4d65b9fd1d
	
				 | 
					
					
						|||
| 
						
						
							
						
						f3e094520e
	
				 | 
					
					
						|||
| 
						
						
							
						
						69f98933a4
	
				 | 
					
					
						|||
| 
						
						
							
						
						bf2959c68d
	
				 | 
					
					
						|||
| 
						
						
							
						
						17f0268d12
	
				 | 
					
					
						|||
| 
						
						
							
						
						ebce0eb67a
	
				 | 
					
					
						|||
| 
						
						
							
						
						b48230e811
	
				 | 
					
					
						|||
| 914eb35c5a | |||
| 
						
						
							
						
						8610a59f35
	
				 | 
					
					
						
							
								
								
									
										190
									
								
								base.nix
									
									
									
									
									
								
							
							
						
						
									
										190
									
								
								base.nix
									
									
									
									
									
								
							@@ -1,190 +0,0 @@
 | 
			
		||||
{ config, lib, pkgs, inputs, values, ... }:
 | 
			
		||||
 | 
			
		||||
{
 | 
			
		||||
  imports = [
 | 
			
		||||
    ./users
 | 
			
		||||
    ./modules/snakeoil-certs.nix
 | 
			
		||||
  ];
 | 
			
		||||
 | 
			
		||||
  networking.domain = "pvv.ntnu.no";
 | 
			
		||||
  networking.useDHCP = false;
 | 
			
		||||
  # networking.search = [ "pvv.ntnu.no" "pvv.org" ];
 | 
			
		||||
  # networking.nameservers = lib.mkDefault [ "129.241.0.200" "129.241.0.201" ];
 | 
			
		||||
  # networking.tempAddresses = lib.mkDefault "disabled";
 | 
			
		||||
  # networking.defaultGateway = values.hosts.gateway;
 | 
			
		||||
 | 
			
		||||
  systemd.network.enable = true;
 | 
			
		||||
 | 
			
		||||
  services.resolved = {
 | 
			
		||||
    enable = lib.mkDefault true;
 | 
			
		||||
    dnssec = "false"; # Supposdly this keeps breaking and the default is to allow downgrades anyways...
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  time.timeZone = "Europe/Oslo";
 | 
			
		||||
 | 
			
		||||
  i18n.defaultLocale = "en_US.UTF-8";
 | 
			
		||||
  console = {
 | 
			
		||||
    font = "Lat2-Terminus16";
 | 
			
		||||
    keyMap = "no";
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  system.autoUpgrade = {
 | 
			
		||||
    enable = true;
 | 
			
		||||
    flake = "git+https://git.pvv.ntnu.no/Drift/pvv-nixos-config.git";
 | 
			
		||||
    flags = [
 | 
			
		||||
      "--update-input" "nixpkgs"
 | 
			
		||||
      "--update-input" "nixpkgs-unstable"
 | 
			
		||||
      "--no-write-lock-file"
 | 
			
		||||
    ];
 | 
			
		||||
  };
 | 
			
		||||
  nix.gc.automatic = true;
 | 
			
		||||
  nix.gc.options = "--delete-older-than 2d";
 | 
			
		||||
 | 
			
		||||
  nix.settings.experimental-features = [ "nix-command" "flakes" ];
 | 
			
		||||
 | 
			
		||||
  /* This makes commandline tools like
 | 
			
		||||
  ** nix run nixpkgs#hello
 | 
			
		||||
  ** and nix-shell -p hello
 | 
			
		||||
  ** use the same channel the system
 | 
			
		||||
  ** was built with
 | 
			
		||||
  */
 | 
			
		||||
  nix.registry = {
 | 
			
		||||
    nixpkgs.flake = inputs.nixpkgs;
 | 
			
		||||
  };
 | 
			
		||||
  nix.nixPath = [ "nixpkgs=${inputs.nixpkgs}" ];
 | 
			
		||||
 | 
			
		||||
  environment.systemPackages = with pkgs; [
 | 
			
		||||
    file
 | 
			
		||||
    git
 | 
			
		||||
    gnupg
 | 
			
		||||
    htop
 | 
			
		||||
    nano
 | 
			
		||||
    ripgrep
 | 
			
		||||
    rsync
 | 
			
		||||
    screen
 | 
			
		||||
    tmux
 | 
			
		||||
    vim
 | 
			
		||||
    wget
 | 
			
		||||
 | 
			
		||||
    kitty.terminfo
 | 
			
		||||
  ];
 | 
			
		||||
 | 
			
		||||
  programs.zsh.enable = true;
 | 
			
		||||
 | 
			
		||||
  users.groups."drift".name = "drift";
 | 
			
		||||
 | 
			
		||||
  # Trusted users on the nix builder machines
 | 
			
		||||
  users.groups."nix-builder-users".name = "nix-builder-users";
 | 
			
		||||
 | 
			
		||||
  # Let's not thermal throttle
 | 
			
		||||
  services.thermald.enable = lib.mkIf (lib.all (x: x) [
 | 
			
		||||
      (config.nixpkgs.system == "x86_64-linux")
 | 
			
		||||
      (!config.boot.isContainer or false)
 | 
			
		||||
    ]) true;
 | 
			
		||||
 | 
			
		||||
  services.openssh = {
 | 
			
		||||
    enable = true;
 | 
			
		||||
    extraConfig = ''
 | 
			
		||||
      PubkeyAcceptedAlgorithms=+ssh-rsa
 | 
			
		||||
      Match Group wheel
 | 
			
		||||
        PasswordAuthentication no
 | 
			
		||||
      Match All
 | 
			
		||||
    '';
 | 
			
		||||
    settings.PermitRootLogin = "yes";
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  # nginx return 444 for all nonexistent virtualhosts
 | 
			
		||||
 | 
			
		||||
  systemd.services.nginx.after = [ "generate-snakeoil-certs.service" ];
 | 
			
		||||
 | 
			
		||||
  environment.snakeoil-certs = lib.mkIf config.services.nginx.enable {
 | 
			
		||||
    "/etc/certs/nginx" = {
 | 
			
		||||
      owner = "nginx";
 | 
			
		||||
      group = "nginx";
 | 
			
		||||
    };
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  services.nginx = {
 | 
			
		||||
    recommendedTlsSettings = true;
 | 
			
		||||
    recommendedProxySettings = true;
 | 
			
		||||
    recommendedOptimisation = true;
 | 
			
		||||
    recommendedGzipSettings = true;
 | 
			
		||||
 | 
			
		||||
    appendConfig = ''
 | 
			
		||||
      pcre_jit on;
 | 
			
		||||
      worker_processes auto;
 | 
			
		||||
      worker_rlimit_nofile 100000;
 | 
			
		||||
    '';
 | 
			
		||||
    eventsConfig = ''
 | 
			
		||||
      worker_connections 2048;
 | 
			
		||||
      use epoll;
 | 
			
		||||
      multi_accept on;
 | 
			
		||||
    '';
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  systemd.services.nginx.serviceConfig = lib.mkIf config.services.nginx.enable {
 | 
			
		||||
    LimitNOFILE = 65536;
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  services.nginx.virtualHosts."_" = lib.mkIf config.services.nginx.enable {
 | 
			
		||||
    sslCertificate = "/etc/certs/nginx.crt";
 | 
			
		||||
    sslCertificateKey = "/etc/certs/nginx.key";
 | 
			
		||||
    addSSL = true;
 | 
			
		||||
    extraConfig = "return 444;";
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  # source: https://github.com/logrotate/logrotate/blob/main/examples/logrotate.service
 | 
			
		||||
  systemd.services.logrotate = {
 | 
			
		||||
    documentation = [ "man:logrotate(8)" "man:logrotate.conf(5)" ];
 | 
			
		||||
    unitConfig.RequiresMountsFor = "/var/log";
 | 
			
		||||
    serviceConfig = {
 | 
			
		||||
      Nice = 19;
 | 
			
		||||
      IOSchedulingClass = "best-effort";
 | 
			
		||||
      IOSchedulingPriority = 7;
 | 
			
		||||
 | 
			
		||||
      ReadWritePaths = [ "/var/log" ];
 | 
			
		||||
 | 
			
		||||
      AmbientCapabilities = [ "" ];
 | 
			
		||||
      CapabilityBoundingSet = [ "" ];
 | 
			
		||||
      DeviceAllow = [ "" ];
 | 
			
		||||
      LockPersonality = true;
 | 
			
		||||
      MemoryDenyWriteExecute = true;
 | 
			
		||||
      NoNewPrivileges = true; # disable for third party rotate scripts
 | 
			
		||||
      PrivateDevices = true;
 | 
			
		||||
      PrivateNetwork = true; # disable for mail delivery
 | 
			
		||||
      PrivateTmp = true;
 | 
			
		||||
      ProtectClock = true;
 | 
			
		||||
      ProtectControlGroups = true;
 | 
			
		||||
      ProtectHome = true; # disable for userdir logs
 | 
			
		||||
      ProtectHostname = true;
 | 
			
		||||
      ProtectKernelLogs = true;
 | 
			
		||||
      ProtectKernelModules = true;
 | 
			
		||||
      ProtectKernelTunables = true;
 | 
			
		||||
      ProtectProc = "invisible";
 | 
			
		||||
      ProtectSystem = "full";
 | 
			
		||||
      RestrictNamespaces = true;
 | 
			
		||||
      RestrictRealtime = true;
 | 
			
		||||
      RestrictSUIDSGID = true; # disable for creating setgid directories
 | 
			
		||||
      SocketBindDeny = [ "any" ];
 | 
			
		||||
      SystemCallArchitectures = "native";
 | 
			
		||||
      SystemCallFilter = [
 | 
			
		||||
        "@system-service"
 | 
			
		||||
      ];
 | 
			
		||||
    };
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  networking.firewall.allowedTCPPorts = lib.mkIf config.services.nginx.enable [ 80 443 ];
 | 
			
		||||
 | 
			
		||||
  security.acme = {
 | 
			
		||||
    acceptTerms = true;
 | 
			
		||||
    defaults.email = "drift@pvv.ntnu.no";
 | 
			
		||||
  };
 | 
			
		||||
  # Let's not spam LetsEncrypt in `nixos-rebuild build-vm` mode:
 | 
			
		||||
  virtualisation.vmVariant = {
 | 
			
		||||
    security.acme.defaults.server = "https://127.0.0.1";
 | 
			
		||||
    security.acme.preliminarySelfsigned = true;
 | 
			
		||||
 | 
			
		||||
    users.users.root.initialPassword = "root";
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										60
									
								
								base/default.nix
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										60
									
								
								base/default.nix
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,60 @@
 | 
			
		||||
{ pkgs, lib, ... }:
 | 
			
		||||
 | 
			
		||||
{
 | 
			
		||||
  imports = [
 | 
			
		||||
    ../users
 | 
			
		||||
    ../modules/snakeoil-certs.nix
 | 
			
		||||
 | 
			
		||||
    ./networking.nix
 | 
			
		||||
    ./nix.nix
 | 
			
		||||
 | 
			
		||||
    ./services/acme.nix
 | 
			
		||||
    ./services/auto-upgrade.nix
 | 
			
		||||
    ./services/irqbalance.nix
 | 
			
		||||
    ./services/logrotate.nix
 | 
			
		||||
    ./services/nginx.nix
 | 
			
		||||
    ./services/openssh.nix
 | 
			
		||||
    ./services/postfix.nix
 | 
			
		||||
    ./services/smartd.nix
 | 
			
		||||
    ./services/thermald.nix
 | 
			
		||||
  ];
 | 
			
		||||
 | 
			
		||||
  boot.tmp.cleanOnBoot = lib.mkDefault true;
 | 
			
		||||
 | 
			
		||||
  time.timeZone = "Europe/Oslo";
 | 
			
		||||
 | 
			
		||||
  i18n.defaultLocale = "en_US.UTF-8";
 | 
			
		||||
  console = {
 | 
			
		||||
    font = "Lat2-Terminus16";
 | 
			
		||||
    keyMap = "no";
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  environment.systemPackages = with pkgs; [
 | 
			
		||||
    file
 | 
			
		||||
    git
 | 
			
		||||
    gnupg
 | 
			
		||||
    htop
 | 
			
		||||
    nano
 | 
			
		||||
    ripgrep
 | 
			
		||||
    rsync
 | 
			
		||||
    screen
 | 
			
		||||
    tmux
 | 
			
		||||
    vim
 | 
			
		||||
    wget
 | 
			
		||||
 | 
			
		||||
    kitty.terminfo
 | 
			
		||||
  ];
 | 
			
		||||
 | 
			
		||||
  programs.zsh.enable = true;
 | 
			
		||||
 | 
			
		||||
  security.sudo.execWheelOnly = true;
 | 
			
		||||
  security.sudo.extraConfig = ''
 | 
			
		||||
    Defaults lecture = never
 | 
			
		||||
  '';
 | 
			
		||||
 | 
			
		||||
  users.groups."drift".name = "drift";
 | 
			
		||||
 | 
			
		||||
  # Trusted users on the nix builder machines
 | 
			
		||||
  users.groups."nix-builder-users".name = "nix-builder-users";
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										16
									
								
								base/networking.nix
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								base/networking.nix
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,16 @@
 | 
			
		||||
{ lib, values, ... }:
 | 
			
		||||
{
 | 
			
		||||
  networking.domain = "pvv.ntnu.no";
 | 
			
		||||
  networking.useDHCP = false;
 | 
			
		||||
  # networking.search = [ "pvv.ntnu.no" "pvv.org" ];
 | 
			
		||||
  # networking.nameservers = lib.mkDefault [ "129.241.0.200" "129.241.0.201" ];
 | 
			
		||||
  # networking.tempAddresses = lib.mkDefault "disabled";
 | 
			
		||||
  # networking.defaultGateway = values.hosts.gateway;
 | 
			
		||||
 | 
			
		||||
  systemd.network.enable = true;
 | 
			
		||||
 | 
			
		||||
  services.resolved = {
 | 
			
		||||
    enable = lib.mkDefault true;
 | 
			
		||||
    dnssec = "false"; # Supposdly this keeps breaking and the default is to allow downgrades anyways...
 | 
			
		||||
  };
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										30
									
								
								base/nix.nix
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										30
									
								
								base/nix.nix
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,30 @@
 | 
			
		||||
{ inputs, ... }:
 | 
			
		||||
{
 | 
			
		||||
  nix = {
 | 
			
		||||
    gc = {
 | 
			
		||||
      automatic = true;
 | 
			
		||||
      options = "--delete-older-than 2d";
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    settings = {
 | 
			
		||||
      allow-dirty = true;
 | 
			
		||||
      auto-optimise-store = true;
 | 
			
		||||
      builders-use-substitutes = true;
 | 
			
		||||
      experimental-features = [ "nix-command" "flakes" ];
 | 
			
		||||
      log-lines = 50;
 | 
			
		||||
      use-xdg-base-directories = true;
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    /* This makes commandline tools like
 | 
			
		||||
    ** nix run nixpkgs#hello
 | 
			
		||||
    ** and nix-shell -p hello
 | 
			
		||||
    ** use the same channel the system
 | 
			
		||||
    ** was built with
 | 
			
		||||
    */
 | 
			
		||||
    registry = {
 | 
			
		||||
      "nixpkgs".flake = inputs.nixpkgs;
 | 
			
		||||
      "pvv-nix".flake = inputs.self;
 | 
			
		||||
    };
 | 
			
		||||
    nixPath = [ "nixpkgs=${inputs.nixpkgs}" ];
 | 
			
		||||
  };
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										15
									
								
								base/services/acme.nix
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										15
									
								
								base/services/acme.nix
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,15 @@
 | 
			
		||||
{ ... }:
 | 
			
		||||
{
 | 
			
		||||
  security.acme = {
 | 
			
		||||
    acceptTerms = true;
 | 
			
		||||
    defaults.email = "drift@pvv.ntnu.no";
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  # Let's not spam LetsEncrypt in `nixos-rebuild build-vm` mode:
 | 
			
		||||
  virtualisation.vmVariant = {
 | 
			
		||||
    security.acme.defaults.server = "https://127.0.0.1";
 | 
			
		||||
    security.acme.preliminarySelfsigned = true;
 | 
			
		||||
 | 
			
		||||
    users.users.root.initialPassword = "root";
 | 
			
		||||
  };
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										12
									
								
								base/services/auto-upgrade.nix
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										12
									
								
								base/services/auto-upgrade.nix
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,12 @@
 | 
			
		||||
{ ... }:
 | 
			
		||||
{
 | 
			
		||||
  system.autoUpgrade = {
 | 
			
		||||
    enable = true;
 | 
			
		||||
    flake = "git+https://git.pvv.ntnu.no/Drift/pvv-nixos-config.git";
 | 
			
		||||
    flags = [
 | 
			
		||||
      "--update-input" "nixpkgs"
 | 
			
		||||
      "--update-input" "nixpkgs-unstable"
 | 
			
		||||
      "--no-write-lock-file"
 | 
			
		||||
    ];
 | 
			
		||||
  };
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										4
									
								
								base/services/irqbalance.nix
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										4
									
								
								base/services/irqbalance.nix
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,4 @@
 | 
			
		||||
{ ... }:
 | 
			
		||||
{
 | 
			
		||||
  services.irqbalance.enable = true;
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										42
									
								
								base/services/logrotate.nix
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										42
									
								
								base/services/logrotate.nix
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,42 @@
 | 
			
		||||
{ ... }:
 | 
			
		||||
{
 | 
			
		||||
  # source: https://github.com/logrotate/logrotate/blob/main/examples/logrotate.service
 | 
			
		||||
  systemd.services.logrotate = {
 | 
			
		||||
    documentation = [ "man:logrotate(8)" "man:logrotate.conf(5)" ];
 | 
			
		||||
    unitConfig.RequiresMountsFor = "/var/log";
 | 
			
		||||
    serviceConfig = {
 | 
			
		||||
      Nice = 19;
 | 
			
		||||
      IOSchedulingClass = "best-effort";
 | 
			
		||||
      IOSchedulingPriority = 7;
 | 
			
		||||
 | 
			
		||||
      ReadWritePaths = [ "/var/log" ];
 | 
			
		||||
 | 
			
		||||
      AmbientCapabilities = [ "" ];
 | 
			
		||||
      CapabilityBoundingSet = [ "" ];
 | 
			
		||||
      DeviceAllow = [ "" ];
 | 
			
		||||
      LockPersonality = true;
 | 
			
		||||
      MemoryDenyWriteExecute = true;
 | 
			
		||||
      NoNewPrivileges = true; # disable for third party rotate scripts
 | 
			
		||||
      PrivateDevices = true;
 | 
			
		||||
      PrivateNetwork = true; # disable for mail delivery
 | 
			
		||||
      PrivateTmp = true;
 | 
			
		||||
      ProtectClock = true;
 | 
			
		||||
      ProtectControlGroups = true;
 | 
			
		||||
      ProtectHome = true; # disable for userdir logs
 | 
			
		||||
      ProtectHostname = true;
 | 
			
		||||
      ProtectKernelLogs = true;
 | 
			
		||||
      ProtectKernelModules = true;
 | 
			
		||||
      ProtectKernelTunables = true;
 | 
			
		||||
      ProtectProc = "invisible";
 | 
			
		||||
      ProtectSystem = "full";
 | 
			
		||||
      RestrictNamespaces = true;
 | 
			
		||||
      RestrictRealtime = true;
 | 
			
		||||
      RestrictSUIDSGID = true; # disable for creating setgid directories
 | 
			
		||||
      SocketBindDeny = [ "any" ];
 | 
			
		||||
      SystemCallArchitectures = "native";
 | 
			
		||||
      SystemCallFilter = [
 | 
			
		||||
        "@system-service"
 | 
			
		||||
      ];
 | 
			
		||||
    };
 | 
			
		||||
  };
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										44
									
								
								base/services/nginx.nix
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										44
									
								
								base/services/nginx.nix
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,44 @@
 | 
			
		||||
{ config, lib, ... }:
 | 
			
		||||
{
 | 
			
		||||
  # nginx return 444 for all nonexistent virtualhosts
 | 
			
		||||
 | 
			
		||||
  systemd.services.nginx.after = [ "generate-snakeoil-certs.service" ];
 | 
			
		||||
 | 
			
		||||
  environment.snakeoil-certs = lib.mkIf config.services.nginx.enable {
 | 
			
		||||
    "/etc/certs/nginx" = {
 | 
			
		||||
      owner = "nginx";
 | 
			
		||||
      group = "nginx";
 | 
			
		||||
    };
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  networking.firewall.allowedTCPPorts = lib.mkIf config.services.nginx.enable [ 80 443 ];
 | 
			
		||||
 | 
			
		||||
  services.nginx = {
 | 
			
		||||
    recommendedTlsSettings = true;
 | 
			
		||||
    recommendedProxySettings = true;
 | 
			
		||||
    recommendedOptimisation = true;
 | 
			
		||||
    recommendedGzipSettings = true;
 | 
			
		||||
 | 
			
		||||
    appendConfig = ''
 | 
			
		||||
      pcre_jit on;
 | 
			
		||||
      worker_processes auto;
 | 
			
		||||
      worker_rlimit_nofile 100000;
 | 
			
		||||
    '';
 | 
			
		||||
    eventsConfig = ''
 | 
			
		||||
      worker_connections 2048;
 | 
			
		||||
      use epoll;
 | 
			
		||||
      multi_accept on;
 | 
			
		||||
    '';
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  systemd.services.nginx.serviceConfig = lib.mkIf config.services.nginx.enable {
 | 
			
		||||
    LimitNOFILE = 65536;
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  services.nginx.virtualHosts."_" = lib.mkIf config.services.nginx.enable {
 | 
			
		||||
    sslCertificate = "/etc/certs/nginx.crt";
 | 
			
		||||
    sslCertificateKey = "/etc/certs/nginx.key";
 | 
			
		||||
    addSSL = true;
 | 
			
		||||
    extraConfig = "return 444;";
 | 
			
		||||
  };
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										14
									
								
								base/services/openssh.nix
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										14
									
								
								base/services/openssh.nix
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,14 @@
 | 
			
		||||
{ ... }:
 | 
			
		||||
{
 | 
			
		||||
  services.openssh = {
 | 
			
		||||
    enable = true;
 | 
			
		||||
    startWhenNeeded = true;
 | 
			
		||||
    extraConfig = ''
 | 
			
		||||
      PubkeyAcceptedAlgorithms=+ssh-rsa
 | 
			
		||||
      Match Group wheel
 | 
			
		||||
        PasswordAuthentication no
 | 
			
		||||
      Match All
 | 
			
		||||
    '';
 | 
			
		||||
    settings.PermitRootLogin = "yes";
 | 
			
		||||
  };
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										23
									
								
								base/services/postfix.nix
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										23
									
								
								base/services/postfix.nix
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,23 @@
 | 
			
		||||
{ config, pkgs, lib, ... }:
 | 
			
		||||
let
 | 
			
		||||
  cfg = config.services.postfix;
 | 
			
		||||
in
 | 
			
		||||
{
 | 
			
		||||
  services.postfix = {
 | 
			
		||||
    enable = true;
 | 
			
		||||
 | 
			
		||||
    hostname = "${config.networking.hostName}.pvv.ntnu.no";
 | 
			
		||||
    domain = "pvv.ntnu.no";
 | 
			
		||||
 | 
			
		||||
    relayHost = "smtp.pvv.ntnu.no";
 | 
			
		||||
    relayPort = 465;
 | 
			
		||||
 | 
			
		||||
    config = {
 | 
			
		||||
      smtp_tls_wrappermode = "yes";
 | 
			
		||||
      smtp_tls_security_level = "encrypt";
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    # Nothing should be delivered to this machine
 | 
			
		||||
    destination = [ ];
 | 
			
		||||
  };
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										8
									
								
								base/services/smartd.nix
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										8
									
								
								base/services/smartd.nix
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,8 @@
 | 
			
		||||
{ config, pkgs, lib, ... }:
 | 
			
		||||
{
 | 
			
		||||
  services.smartd.enable = lib.mkDefault true;
 | 
			
		||||
 | 
			
		||||
  environment.systemPackages = lib.optionals config.services.smartd.enable (with pkgs; [
 | 
			
		||||
    smartmontools
 | 
			
		||||
  ]);
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										8
									
								
								base/services/thermald.nix
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										8
									
								
								base/services/thermald.nix
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,8 @@
 | 
			
		||||
{ config, lib, ... }:
 | 
			
		||||
{
 | 
			
		||||
  # Let's not thermal throttle
 | 
			
		||||
  services.thermald.enable = lib.mkIf (lib.all (x: x) [
 | 
			
		||||
      (config.nixpkgs.system == "x86_64-linux")
 | 
			
		||||
      (!config.boot.isContainer or false)
 | 
			
		||||
    ]) true;
 | 
			
		||||
}
 | 
			
		||||
@@ -3,7 +3,7 @@
 | 
			
		||||
  imports = [
 | 
			
		||||
    ./hardware-configuration.nix
 | 
			
		||||
 | 
			
		||||
    ../../base.nix
 | 
			
		||||
    ../../base
 | 
			
		||||
    ../../misc/metrics-exporters.nix
 | 
			
		||||
 | 
			
		||||
    ./services/gitea/default.nix
 | 
			
		||||
@@ -32,6 +32,8 @@
 | 
			
		||||
    address = with values.hosts.bekkalokk; [ (ipv4 + "/25") (ipv6 + "/64") ];
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  services.btrfs.autoScrub.enable = true;
 | 
			
		||||
 | 
			
		||||
  # Do not change, even during upgrades.
 | 
			
		||||
  # See https://search.nixos.org/options?show=system.stateVersion
 | 
			
		||||
  system.stateVersion = "22.11";
 | 
			
		||||
 
 | 
			
		||||
@@ -3,7 +3,7 @@
 | 
			
		||||
  imports = [
 | 
			
		||||
    ./hardware-configuration.nix
 | 
			
		||||
 | 
			
		||||
    ../../base.nix
 | 
			
		||||
    ../../base
 | 
			
		||||
    ../../misc/metrics-exporters.nix
 | 
			
		||||
    ./services/nginx
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -11,7 +11,7 @@
 | 
			
		||||
  services.mjolnir = {
 | 
			
		||||
    enable = true;
 | 
			
		||||
    pantalaimon.enable = false;
 | 
			
		||||
    homeserverUrl = "http://127.0.0.1:8008";
 | 
			
		||||
    homeserverUrl = "https://matrix.pvv.ntnu.no";
 | 
			
		||||
    accessTokenFile = config.sops.secrets."matrix/mjolnir/access_token".path;
 | 
			
		||||
    managementRoom = "!gsdeCoWjvYRBrzuiRq:pvv.ntnu.no";
 | 
			
		||||
    protectedRooms = map (a: "https://matrix.to/#/${a}") [
 | 
			
		||||
 
 | 
			
		||||
@@ -157,6 +157,18 @@ in {
 | 
			
		||||
      '';
 | 
			
		||||
    };
 | 
			
		||||
  }
 | 
			
		||||
  {
 | 
			
		||||
    locations."/_synapse/admin" = {
 | 
			
		||||
      proxyPass = "http://$synapse_backend";
 | 
			
		||||
      extraConfig = ''
 | 
			
		||||
        allow 127.0.0.1;
 | 
			
		||||
        allow ::1;
 | 
			
		||||
        allow ${values.hosts.bicep.ipv4};
 | 
			
		||||
        allow ${values.hosts.bicep.ipv6};
 | 
			
		||||
        deny all;
 | 
			
		||||
      '';
 | 
			
		||||
    };
 | 
			
		||||
  }
 | 
			
		||||
  {
 | 
			
		||||
    locations = let
 | 
			
		||||
      connectionInfo = w: matrix-lib.workerConnectionResource "metrics" w;
 | 
			
		||||
 
 | 
			
		||||
@@ -1,4 +1,7 @@
 | 
			
		||||
{ pkgs, lib, config, values, ... }:
 | 
			
		||||
let
 | 
			
		||||
  backupDir = "/var/lib/mysql/backups";
 | 
			
		||||
in
 | 
			
		||||
{
 | 
			
		||||
  sops.secrets."mysql/password" = {
 | 
			
		||||
    owner = "mysql";
 | 
			
		||||
@@ -36,11 +39,6 @@
 | 
			
		||||
    }];
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  services.mysqlBackup = {
 | 
			
		||||
    enable = true;
 | 
			
		||||
    location = "/var/lib/mysql/backups";
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  networking.firewall.allowedTCPPorts = [ 3306 ];
 | 
			
		||||
 | 
			
		||||
  systemd.services.mysql.serviceConfig = {
 | 
			
		||||
@@ -50,4 +48,58 @@
 | 
			
		||||
      values.ipv6-space
 | 
			
		||||
    ];
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  # NOTE: instead of having the upstream nixpkgs postgres backup unit trigger
 | 
			
		||||
  #       another unit, it was easier to just make one ourselves
 | 
			
		||||
  systemd.services."backup-mysql" = {
 | 
			
		||||
    description = "Backup MySQL data";
 | 
			
		||||
    requires = [ "mysql.service" ];
 | 
			
		||||
 | 
			
		||||
    path = [
 | 
			
		||||
      pkgs.coreutils
 | 
			
		||||
      pkgs.rsync
 | 
			
		||||
      pkgs.gzip
 | 
			
		||||
      config.services.mysql.package
 | 
			
		||||
    ];
 | 
			
		||||
 | 
			
		||||
    script = let
 | 
			
		||||
      rotations = 10;
 | 
			
		||||
      # rsyncTarget = "root@isvegg.pvv.ntnu.no:/mnt/backup1/bicep/mysql";
 | 
			
		||||
      rsyncTarget = "/data/backup/mysql";
 | 
			
		||||
    in ''
 | 
			
		||||
      set -eo pipefail
 | 
			
		||||
 | 
			
		||||
      mysqldump --all-databases | gzip -c -9 --rsyncable > "${backupDir}/$(date --iso-8601)-dump.sql.gz"
 | 
			
		||||
 | 
			
		||||
      while [ $(ls -1 "${backupDir}" | wc -l) -gt ${toString rotations} ]; do
 | 
			
		||||
        rm $(find "${backupDir}" -type f -printf '%T+ %p\n' | sort | head -n 1 | cut -d' ' -f2)
 | 
			
		||||
      done
 | 
			
		||||
 | 
			
		||||
      rsync -avz --delete "${backupDir}" '${rsyncTarget}'
 | 
			
		||||
    '';
 | 
			
		||||
 | 
			
		||||
    serviceConfig = {
 | 
			
		||||
      Type = "oneshot";
 | 
			
		||||
      User = "mysql";
 | 
			
		||||
      Group = "mysql";
 | 
			
		||||
      UMask = "0077";
 | 
			
		||||
 | 
			
		||||
      Nice = 19;
 | 
			
		||||
      IOSchedulingClass = "best-effort";
 | 
			
		||||
      IOSchedulingPriority = 7;
 | 
			
		||||
 | 
			
		||||
      ReadWritePaths = [
 | 
			
		||||
        backupDir
 | 
			
		||||
        "/data/backup/mysql" # NOTE: should not be part of this option once rsyncTarget is remote
 | 
			
		||||
      ];
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    startAt = "*-*-* 02:15:00";
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  systemd.tmpfiles.settings."10-mysql-backup".${backupDir}.d = {
 | 
			
		||||
    user = "mysql";
 | 
			
		||||
    group = "mysql";
 | 
			
		||||
    mode = "700";
 | 
			
		||||
  };
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -1,4 +1,7 @@
 | 
			
		||||
{ config, pkgs, ... }:
 | 
			
		||||
{ config, pkgs, lib, ... }:
 | 
			
		||||
let
 | 
			
		||||
  backupDir = "/var/lib/postgresql/backups";
 | 
			
		||||
in
 | 
			
		||||
{
 | 
			
		||||
  services.postgresql = {
 | 
			
		||||
    enable = true;
 | 
			
		||||
@@ -90,9 +93,57 @@
 | 
			
		||||
  networking.firewall.allowedTCPPorts = [ 5432 ];
 | 
			
		||||
  networking.firewall.allowedUDPPorts = [ 5432 ];
 | 
			
		||||
 | 
			
		||||
  services.postgresqlBackup = {
 | 
			
		||||
    enable = true;
 | 
			
		||||
    location = "/var/lib/postgres/backups";
 | 
			
		||||
    backupAll = true;
 | 
			
		||||
  # NOTE: instead of having the upstream nixpkgs postgres backup unit trigger
 | 
			
		||||
  #       another unit, it was easier to just make one ourselves
 | 
			
		||||
  systemd.services."backup-postgresql" = {
 | 
			
		||||
    description = "Backup PostgreSQL data";
 | 
			
		||||
    requires = [ "postgresql.service" ];
 | 
			
		||||
 | 
			
		||||
    path = [
 | 
			
		||||
      pkgs.coreutils
 | 
			
		||||
      pkgs.rsync
 | 
			
		||||
      pkgs.gzip
 | 
			
		||||
      config.services.postgresql.package
 | 
			
		||||
    ];
 | 
			
		||||
 | 
			
		||||
    script = let
 | 
			
		||||
      rotations = 10;
 | 
			
		||||
      # rsyncTarget = "root@isvegg.pvv.ntnu.no:/mnt/backup1/bicep/postgresql";
 | 
			
		||||
      rsyncTarget = "/data/backup/postgresql";
 | 
			
		||||
    in ''
 | 
			
		||||
      set -eo pipefail
 | 
			
		||||
 | 
			
		||||
      pg_dumpall -U postgres | gzip -c -9 --rsyncable > "${backupDir}/$(date --iso-8601)-dump.sql.gz"
 | 
			
		||||
 | 
			
		||||
      while [ $(ls -1 "${backupDir}" | wc -l) -gt ${toString rotations} ]; do
 | 
			
		||||
        rm $(find "${backupDir}" -type f -printf '%T+ %p\n' | sort | head -n 1 | cut -d' ' -f2)
 | 
			
		||||
      done
 | 
			
		||||
 | 
			
		||||
      rsync -avz --delete "${backupDir}" '${rsyncTarget}'
 | 
			
		||||
    '';
 | 
			
		||||
 | 
			
		||||
    serviceConfig = {
 | 
			
		||||
      Type = "oneshot";
 | 
			
		||||
      User = "postgres";
 | 
			
		||||
      Group = "postgres";
 | 
			
		||||
      UMask = "0077";
 | 
			
		||||
 | 
			
		||||
      Nice = 19;
 | 
			
		||||
      IOSchedulingClass = "best-effort";
 | 
			
		||||
      IOSchedulingPriority = 7;
 | 
			
		||||
 | 
			
		||||
      ReadWritePaths = [
 | 
			
		||||
        backupDir
 | 
			
		||||
        "/data/backup/postgresql" # NOTE: should not be part of this option once rsyncTarget is remote
 | 
			
		||||
      ];
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    startAt = "*-*-* 01:15:00";
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  systemd.tmpfiles.settings."10-postgresql-backup".${backupDir}.d = {
 | 
			
		||||
    user = "postgres";
 | 
			
		||||
    group = "postgres";
 | 
			
		||||
    mode = "700";
 | 
			
		||||
  };
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -3,7 +3,7 @@
 | 
			
		||||
  imports = [
 | 
			
		||||
      # Include the results of the hardware scan.
 | 
			
		||||
      ./hardware-configuration.nix
 | 
			
		||||
      ../../base.nix
 | 
			
		||||
      ../../base
 | 
			
		||||
      ../../misc/metrics-exporters.nix
 | 
			
		||||
      ./disks.nix
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -3,7 +3,7 @@
 | 
			
		||||
  imports = [
 | 
			
		||||
      # Include the results of the hardware scan.
 | 
			
		||||
      ./hardware-configuration.nix
 | 
			
		||||
      ../../base.nix
 | 
			
		||||
      ../../base
 | 
			
		||||
      ../../misc/metrics-exporters.nix
 | 
			
		||||
 | 
			
		||||
      ./services/grzegorz.nix
 | 
			
		||||
 
 | 
			
		||||
@@ -2,7 +2,7 @@
 | 
			
		||||
{
 | 
			
		||||
  imports = [
 | 
			
		||||
    ./hardware-configuration.nix
 | 
			
		||||
    ../../base.nix
 | 
			
		||||
    ../../base
 | 
			
		||||
    ../../misc/metrics-exporters.nix
 | 
			
		||||
 | 
			
		||||
    ./services/libvirt.nix
 | 
			
		||||
 
 | 
			
		||||
@@ -3,7 +3,7 @@
 | 
			
		||||
  imports = [
 | 
			
		||||
      # Include the results of the hardware scan.
 | 
			
		||||
      ./hardware-configuration.nix
 | 
			
		||||
      ../../base.nix
 | 
			
		||||
      ../../base
 | 
			
		||||
      ../../misc/metrics-exporters.nix
 | 
			
		||||
 | 
			
		||||
      ../../modules/grzegorz.nix
 | 
			
		||||
 
 | 
			
		||||
@@ -3,7 +3,7 @@
 | 
			
		||||
  imports = [
 | 
			
		||||
      # Include the results of the hardware scan.
 | 
			
		||||
      ./hardware-configuration.nix
 | 
			
		||||
      ../../base.nix
 | 
			
		||||
      ../../base
 | 
			
		||||
      ../../misc/metrics-exporters.nix
 | 
			
		||||
 | 
			
		||||
      ./services/monitoring
 | 
			
		||||
 
 | 
			
		||||
@@ -3,7 +3,7 @@
 | 
			
		||||
  imports = [
 | 
			
		||||
      # Include the results of the hardware scan.
 | 
			
		||||
      ./hardware-configuration.nix
 | 
			
		||||
      ../../base.nix
 | 
			
		||||
      ../../base
 | 
			
		||||
      ../../misc/metrics-exporters.nix
 | 
			
		||||
    ];
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user