All checks were successful
Check meta / check_dns (pull_request) Successful in 15s
Check workflows / check_workflows (pull_request) Successful in 18s
Check meta / check_meta (pull_request) Successful in 19s
Build all the nodes / Jaccess04 (pull_request) Successful in 25s
Build all the nodes / Jaccess01 (pull_request) Successful in 30s
Build all the nodes / netcore01 (pull_request) Successful in 28s
Build all the nodes / netcore02 (pull_request) Successful in 28s
Run pre-commit on all files / pre-commit (push) Successful in 32s
Run pre-commit on all files / pre-commit (pull_request) Successful in 32s
Build all the nodes / ap01 (pull_request) Successful in 48s
Build all the nodes / bridge01 (pull_request) Successful in 58s
Build all the nodes / geo01 (pull_request) Successful in 58s
Build all the nodes / hypervisor02 (pull_request) Successful in 58s
Build all the nodes / hypervisor03 (pull_request) Successful in 1m3s
Build all the nodes / cof02 (pull_request) Successful in 1m6s
Build all the nodes / lab-router01 (pull_request) Successful in 1m6s
Build all the nodes / geo02 (pull_request) Successful in 1m8s
Build all the nodes / hypervisor01 (pull_request) Successful in 1m8s
Build all the nodes / build01 (pull_request) Successful in 1m13s
Build all the nodes / tower01 (pull_request) Successful in 54s
Build all the nodes / iso (pull_request) Successful in 1m12s
Build the shell / build-shell (pull_request) Successful in 26s
Build all the nodes / vault01 (pull_request) Successful in 1m12s
Build all the nodes / compute01 (pull_request) Successful in 1m43s
Build all the nodes / web02 (pull_request) Successful in 1m13s
Build all the nodes / zulip01 (pull_request) Successful in 1m13s
Build all the nodes / web03 (pull_request) Successful in 1m18s
Build all the nodes / rescue01 (pull_request) Successful in 1m36s
Build all the nodes / krz01 (pull_request) Successful in 1m51s
Build all the nodes / storage01 (pull_request) Successful in 1m36s
Build all the nodes / web01 (pull_request) Successful in 1m26s
108 lines
3 KiB
Nix
108 lines
3 KiB
Nix
# SPDX-FileCopyrightText: 2025 Lubin Bailly <lubin@dgnum.eu>
|
|
#
|
|
# SPDX-License-Identifier: EUPL-1.2
|
|
|
|
{
|
|
lib,
|
|
config,
|
|
pkgs,
|
|
...
|
|
}:
|
|
let
|
|
inherit (lib)
|
|
escapeShellArg
|
|
getExe
|
|
mkEnableOption
|
|
mkIf
|
|
mkOption
|
|
;
|
|
inherit (lib.types)
|
|
attrsOf
|
|
package
|
|
path
|
|
str
|
|
;
|
|
|
|
# from nixpkgs, commit b1371135b5db3fcf728114d92d5bd0218109598a
|
|
# FIXME: Should be replaced by nixpkgs lib when going to nixos-25.05
|
|
concatMapAttrsStringSep =
|
|
sep: f: attrs:
|
|
lib.concatStringsSep sep (lib.attrValues (lib.mapAttrs f attrs));
|
|
|
|
cfg = config.services.nimbolus-tf;
|
|
in
|
|
{
|
|
options.services.nimbolus-tf = {
|
|
enable = mkEnableOption "the nimbolus terraform http backend";
|
|
package = mkOption {
|
|
type = package;
|
|
description = ''
|
|
The hello package to use.
|
|
'';
|
|
example = "kat-pkgs.nimbolus-tf-backend";
|
|
};
|
|
environment = mkOption {
|
|
type = attrsOf str;
|
|
default = { };
|
|
description = ''
|
|
Environment variables for nimbolus configuration.
|
|
'';
|
|
};
|
|
secretEnvironment = mkOption {
|
|
type = attrsOf path;
|
|
default = { };
|
|
description = ''
|
|
Files for secret environment variables for nimbolus configuration.
|
|
'';
|
|
};
|
|
};
|
|
config = mkIf cfg.enable {
|
|
systemd.services."nimbolus-tf" = {
|
|
description = "Nimbolus terraform http backend";
|
|
wantedBy = [ "multi-user.target" ];
|
|
serviceConfig = {
|
|
EnvironmentFile = "-/run/nimbolus-tf/env-file";
|
|
ExecStart = "${getExe cfg.package}";
|
|
ExecStartPre = "+${pkgs.writeShellScript "nimbolus-prestart" ''
|
|
echo -n > /run/nimbolus-tf/env-file
|
|
${concatMapAttrsStringSep "\n" (
|
|
key: value: "echo ${escapeShellArg "${key}=${value}"} >> /run/nimbolus-tf/env-file"
|
|
) cfg.environment}
|
|
${concatMapAttrsStringSep "\n" (
|
|
key: value: ''echo "${key}=$(cat ${value})" >> /run/nimbolus-tf/env-file''
|
|
) cfg.secretEnvironment}
|
|
chmod a+r /run/nimbolus-tf/env-file
|
|
''}";
|
|
|
|
RuntimeDirectory = "nimbolus-tf";
|
|
RuntimeDirectoryMode = "0700";
|
|
StateDirectory = "nimbolus-tf";
|
|
StateDirectoryMode = "0700";
|
|
WorkingDirectory = "/var/lib/nimbolus-tf";
|
|
|
|
# Hardening
|
|
DynamicUser = true;
|
|
CapabilityBoundingSet = "";
|
|
PrivateDevices = true;
|
|
ProtectClock = true;
|
|
ProtectKernelLogs = true;
|
|
ProtectControlGroups = true;
|
|
ProtectKernelModules = true;
|
|
RestrictNamespaces = true;
|
|
ProtectHostname = true;
|
|
LockPersonality = true;
|
|
RestrictRealtime = true;
|
|
ProtectHome = true;
|
|
ProtectProc = "noaccess";
|
|
ProcSubset = "pid";
|
|
PrivateUsers = true;
|
|
UMask = "0077";
|
|
ProtectKernelTunables = true;
|
|
RestrictAddressFamilies = "AF_INET AF_INET6";
|
|
SystemCallFilter = "~@clock @cpu-emulation @debug @module @mount @obsolete @privileged @raw-io @reboot @resources @swap";
|
|
MemoryDenyWriteExecute = true;
|
|
SystemCallArchitectures = "native";
|
|
};
|
|
};
|
|
};
|
|
}
|