infrastructure/modules/nixos/nimbolus-tf.nix
catvayor 38ab34aaf3
All checks were successful
Check meta / check_dns (pull_request) Successful in 15s
Check workflows / check_workflows (pull_request) Successful in 18s
Check meta / check_meta (pull_request) Successful in 19s
Build all the nodes / Jaccess04 (pull_request) Successful in 25s
Build all the nodes / Jaccess01 (pull_request) Successful in 30s
Build all the nodes / netcore01 (pull_request) Successful in 28s
Build all the nodes / netcore02 (pull_request) Successful in 28s
Run pre-commit on all files / pre-commit (push) Successful in 32s
Run pre-commit on all files / pre-commit (pull_request) Successful in 32s
Build all the nodes / ap01 (pull_request) Successful in 48s
Build all the nodes / bridge01 (pull_request) Successful in 58s
Build all the nodes / geo01 (pull_request) Successful in 58s
Build all the nodes / hypervisor02 (pull_request) Successful in 58s
Build all the nodes / hypervisor03 (pull_request) Successful in 1m3s
Build all the nodes / cof02 (pull_request) Successful in 1m6s
Build all the nodes / lab-router01 (pull_request) Successful in 1m6s
Build all the nodes / geo02 (pull_request) Successful in 1m8s
Build all the nodes / hypervisor01 (pull_request) Successful in 1m8s
Build all the nodes / build01 (pull_request) Successful in 1m13s
Build all the nodes / tower01 (pull_request) Successful in 54s
Build all the nodes / iso (pull_request) Successful in 1m12s
Build the shell / build-shell (pull_request) Successful in 26s
Build all the nodes / vault01 (pull_request) Successful in 1m12s
Build all the nodes / compute01 (pull_request) Successful in 1m43s
Build all the nodes / web02 (pull_request) Successful in 1m13s
Build all the nodes / zulip01 (pull_request) Successful in 1m13s
Build all the nodes / web03 (pull_request) Successful in 1m18s
Build all the nodes / rescue01 (pull_request) Successful in 1m36s
Build all the nodes / krz01 (pull_request) Successful in 1m51s
Build all the nodes / storage01 (pull_request) Successful in 1m36s
Build all the nodes / web01 (pull_request) Successful in 1m26s
feat(nimbolus): init a http terraform backend
2025-06-14 21:33:00 +02:00

108 lines
3 KiB
Nix

# SPDX-FileCopyrightText: 2025 Lubin Bailly <lubin@dgnum.eu>
#
# SPDX-License-Identifier: EUPL-1.2
{
lib,
config,
pkgs,
...
}:
let
inherit (lib)
escapeShellArg
getExe
mkEnableOption
mkIf
mkOption
;
inherit (lib.types)
attrsOf
package
path
str
;
# from nixpkgs, commit b1371135b5db3fcf728114d92d5bd0218109598a
# FIXME: Should be replaced by nixpkgs lib when going to nixos-25.05
concatMapAttrsStringSep =
sep: f: attrs:
lib.concatStringsSep sep (lib.attrValues (lib.mapAttrs f attrs));
cfg = config.services.nimbolus-tf;
in
{
options.services.nimbolus-tf = {
enable = mkEnableOption "the nimbolus terraform http backend";
package = mkOption {
type = package;
description = ''
The hello package to use.
'';
example = "kat-pkgs.nimbolus-tf-backend";
};
environment = mkOption {
type = attrsOf str;
default = { };
description = ''
Environment variables for nimbolus configuration.
'';
};
secretEnvironment = mkOption {
type = attrsOf path;
default = { };
description = ''
Files for secret environment variables for nimbolus configuration.
'';
};
};
config = mkIf cfg.enable {
systemd.services."nimbolus-tf" = {
description = "Nimbolus terraform http backend";
wantedBy = [ "multi-user.target" ];
serviceConfig = {
EnvironmentFile = "-/run/nimbolus-tf/env-file";
ExecStart = "${getExe cfg.package}";
ExecStartPre = "+${pkgs.writeShellScript "nimbolus-prestart" ''
echo -n > /run/nimbolus-tf/env-file
${concatMapAttrsStringSep "\n" (
key: value: "echo ${escapeShellArg "${key}=${value}"} >> /run/nimbolus-tf/env-file"
) cfg.environment}
${concatMapAttrsStringSep "\n" (
key: value: ''echo "${key}=$(cat ${value})" >> /run/nimbolus-tf/env-file''
) cfg.secretEnvironment}
chmod a+r /run/nimbolus-tf/env-file
''}";
RuntimeDirectory = "nimbolus-tf";
RuntimeDirectoryMode = "0700";
StateDirectory = "nimbolus-tf";
StateDirectoryMode = "0700";
WorkingDirectory = "/var/lib/nimbolus-tf";
# Hardening
DynamicUser = true;
CapabilityBoundingSet = "";
PrivateDevices = true;
ProtectClock = true;
ProtectKernelLogs = true;
ProtectControlGroups = true;
ProtectKernelModules = true;
RestrictNamespaces = true;
ProtectHostname = true;
LockPersonality = true;
RestrictRealtime = true;
ProtectHome = true;
ProtectProc = "noaccess";
ProcSubset = "pid";
PrivateUsers = true;
UMask = "0077";
ProtectKernelTunables = true;
RestrictAddressFamilies = "AF_INET AF_INET6";
SystemCallFilter = "~@clock @cpu-emulation @debug @module @mount @obsolete @privileged @raw-io @reboot @resources @swap";
MemoryDenyWriteExecute = true;
SystemCallArchitectures = "native";
};
};
};
}