2020-07-02 20:19:08 +02:00
|
|
|
{ depot, lib, ... }:
|
|
|
|
|
|
|
|
let
|
2020-07-02 21:27:02 +02:00
|
|
|
inherit (builtins) listToAttrs;
|
|
|
|
inherit (lib) range;
|
|
|
|
|
2020-07-02 20:19:08 +02:00
|
|
|
nixpkgs = import depot.third_party.nixpkgsSrc {};
|
|
|
|
|
2020-07-02 21:27:02 +02:00
|
|
|
# All Buildkite hooks are actually besadii, but it's being invoked
|
|
|
|
# with different names.
|
|
|
|
buildkiteHooks = depot.third_party.runCommandNoCC "buildkite-hooks" {} ''
|
|
|
|
mkdir -p $out/bin
|
|
|
|
ln -s ${depot.ops.besadii}/bin/besadii $out/bin/post-command
|
|
|
|
'';
|
2020-07-18 00:25:20 +02:00
|
|
|
in lib.fix(self: {
|
2020-07-02 20:19:08 +02:00
|
|
|
inherit depot;
|
|
|
|
imports = [
|
2020-07-11 14:03:34 +02:00
|
|
|
"${depot.depotPath}/ops/nixos/clbot.nix"
|
2020-07-02 20:19:08 +02:00
|
|
|
"${depot.depotPath}/ops/nixos/depot.nix"
|
2020-11-08 03:16:16 +01:00
|
|
|
"${depot.depotPath}/ops/nixos/irccat.nix"
|
2020-07-12 15:02:50 +02:00
|
|
|
"${depot.depotPath}/ops/nixos/monorepo-gerrit.nix"
|
2020-07-22 01:40:49 +02:00
|
|
|
"${depot.depotPath}/ops/nixos/panettone.nix"
|
2020-07-31 23:30:52 +02:00
|
|
|
"${depot.depotPath}/ops/nixos/paroxysm.nix"
|
2020-07-11 13:51:04 +02:00
|
|
|
"${depot.depotPath}/ops/nixos/smtprelay.nix"
|
2020-07-12 13:54:16 +02:00
|
|
|
"${depot.depotPath}/ops/nixos/sourcegraph.nix"
|
2020-07-05 18:52:51 +02:00
|
|
|
"${depot.depotPath}/ops/nixos/tvl-slapd/default.nix"
|
2020-07-05 21:46:17 +02:00
|
|
|
"${depot.depotPath}/ops/nixos/tvl-sso/default.nix"
|
2021-01-16 21:44:28 +01:00
|
|
|
"${depot.depotPath}/ops/nixos/www/b.tvl.fyi.nix"
|
2020-07-12 15:02:50 +02:00
|
|
|
"${depot.depotPath}/ops/nixos/www/cl.tvl.fyi.nix"
|
|
|
|
"${depot.depotPath}/ops/nixos/www/code.tvl.fyi.nix"
|
2020-07-12 13:54:16 +02:00
|
|
|
"${depot.depotPath}/ops/nixos/www/cs.tvl.fyi.nix"
|
2020-07-11 13:51:04 +02:00
|
|
|
"${depot.depotPath}/ops/nixos/www/login.tvl.fyi.nix"
|
2021-01-16 21:44:28 +01:00
|
|
|
"${depot.depotPath}/ops/nixos/www/tazj.in.nix"
|
2020-07-20 01:38:40 +02:00
|
|
|
"${depot.depotPath}/ops/nixos/www/todo.tvl.fyi.nix"
|
2020-07-12 13:27:05 +02:00
|
|
|
"${depot.depotPath}/ops/nixos/www/tvl.fyi.nix"
|
2020-11-22 18:28:17 +01:00
|
|
|
"${depot.depotPath}/ops/nixos/www/wigglydonke.rs.nix"
|
2020-07-12 15:02:50 +02:00
|
|
|
"${depot.third_party.nixpkgsSrc}/nixos/modules/services/web-apps/gerrit.nix"
|
2020-07-02 20:19:08 +02:00
|
|
|
];
|
|
|
|
|
|
|
|
hardware = {
|
|
|
|
enableRedistributableFirmware = true;
|
|
|
|
cpu.amd.updateMicrocode = true;
|
|
|
|
};
|
|
|
|
|
|
|
|
boot = {
|
|
|
|
tmpOnTmpfs = true;
|
|
|
|
kernelModules = [ "kvm-amd" ];
|
|
|
|
supportedFilesystems = [ "zfs" ];
|
|
|
|
|
|
|
|
initrd = {
|
|
|
|
availableKernelModules = [
|
|
|
|
"igb" "xhci_pci" "nvme" "ahci" "usbhid" "usb_storage" "sr_mod"
|
|
|
|
];
|
|
|
|
|
|
|
|
# Enable SSH in the initrd so that we can enter disk encryption
|
|
|
|
# passwords remotely.
|
|
|
|
network = {
|
|
|
|
enable = true;
|
|
|
|
ssh = {
|
|
|
|
enable = true;
|
|
|
|
port = 2222;
|
2020-12-20 18:06:09 +01:00
|
|
|
authorizedKeys =
|
|
|
|
depot.users.tazjin.keys.all
|
|
|
|
++ depot.users.lukegb.keys.all
|
|
|
|
++ [ depot.users.glittershark.keys.whitby ];
|
2020-07-02 20:19:08 +02:00
|
|
|
|
|
|
|
hostKeys = [
|
|
|
|
/etc/secrets/initrd_host_ed25519_key
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
# this will launch the zfs password prompt on login and kill the
|
|
|
|
# other prompt
|
|
|
|
postCommands = ''
|
|
|
|
echo "zfs load-key -a && killall zfs" >> /root/.profile
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
loader.grub = {
|
|
|
|
enable = true;
|
|
|
|
version = 2;
|
|
|
|
efiSupport = true;
|
|
|
|
efiInstallAsRemovable = true;
|
|
|
|
device = "/dev/disk/by-id/nvme-SAMSUNG_MZQLB1T9HAJR-00007_S439NA0N201620";
|
|
|
|
};
|
|
|
|
|
|
|
|
zfs.requestEncryptionCredentials = true;
|
|
|
|
};
|
|
|
|
|
|
|
|
fileSystems = {
|
|
|
|
"/" = {
|
|
|
|
device = "zroot/root";
|
|
|
|
fsType = "zfs";
|
|
|
|
};
|
|
|
|
|
|
|
|
"/boot" = {
|
|
|
|
device = "/dev/disk/by-uuid/073E-7FBD";
|
|
|
|
fsType = "vfat";
|
|
|
|
};
|
|
|
|
|
|
|
|
"/nix" = {
|
|
|
|
device = "zroot/nix";
|
|
|
|
fsType = "zfs";
|
|
|
|
};
|
|
|
|
|
|
|
|
"/home" = {
|
|
|
|
device = "zroot/home";
|
|
|
|
fsType = "zfs";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
networking = {
|
|
|
|
# Glass is boring, but Luke doesn't like Wapping - the Prospect of
|
|
|
|
# Whitby, however, is quite a pleasant establishment.
|
|
|
|
hostName = "whitby";
|
2020-07-18 00:25:20 +02:00
|
|
|
domain = "tvl.fyi";
|
2020-07-02 20:19:08 +02:00
|
|
|
hostId = "b38ca543";
|
|
|
|
useDHCP = false;
|
2020-07-02 21:27:23 +02:00
|
|
|
|
2020-07-18 00:25:20 +02:00
|
|
|
# Don't use Hetzner's DNS servers.
|
|
|
|
nameservers = [
|
|
|
|
"8.8.8.8"
|
|
|
|
"8.8.4.4"
|
|
|
|
];
|
|
|
|
|
2020-07-02 21:27:23 +02:00
|
|
|
defaultGateway6 = {
|
|
|
|
address = "fe80::1";
|
|
|
|
interface = "enp196s0";
|
|
|
|
};
|
2020-07-02 20:19:08 +02:00
|
|
|
|
2020-07-12 15:02:50 +02:00
|
|
|
firewall.allowedTCPPorts = [ 22 80 443 4238 29418 ];
|
2020-07-02 20:19:08 +02:00
|
|
|
|
|
|
|
interfaces.enp196s0.useDHCP = true;
|
|
|
|
interfaces.enp196s0.ipv6.addresses = [
|
|
|
|
{
|
|
|
|
address = "2a01:04f8:0242:5b21::feed:edef:beef";
|
|
|
|
prefixLength = 64;
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2020-07-18 00:25:20 +02:00
|
|
|
# Generate an immutable /etc/resolv.conf from the nameserver settings
|
|
|
|
# above (otherwise DHCP overwrites it):
|
|
|
|
environment.etc."resolv.conf" = with lib; {
|
|
|
|
source = depot.third_party.writeText "resolv.conf" ''
|
|
|
|
${concatStringsSep "\n" (map (ns: "nameserver ${ns}") self.networking.nameservers)}
|
|
|
|
options edns0
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2020-12-20 17:55:38 +01:00
|
|
|
# Disable background git gc system-wide, as it has a tendency to break CI.
|
|
|
|
environment.etc."gitconfig".source = depot.third_party.writeText "gitconfig" ''
|
|
|
|
[gc]
|
|
|
|
autoDetach = false
|
|
|
|
'';
|
|
|
|
|
2020-07-02 20:19:08 +02:00
|
|
|
time.timeZone = "UTC";
|
|
|
|
|
|
|
|
nix = {
|
2020-12-26 15:23:26 +01:00
|
|
|
nrBuildUsers = 256;
|
2020-07-02 20:19:08 +02:00
|
|
|
maxJobs = lib.mkDefault 64;
|
2020-07-02 21:07:58 +02:00
|
|
|
extraOptions = ''
|
|
|
|
secret-key-files = /etc/secrets/nix-cache-privkey
|
|
|
|
'';
|
2020-07-02 23:31:15 +02:00
|
|
|
|
|
|
|
trustedUsers = [
|
|
|
|
"grfn"
|
2020-07-04 22:11:30 +02:00
|
|
|
"lukegb"
|
2020-08-06 02:18:04 +02:00
|
|
|
"tazjin"
|
2020-07-02 23:31:15 +02:00
|
|
|
];
|
2020-07-03 16:22:21 +02:00
|
|
|
|
|
|
|
sshServe = {
|
|
|
|
enable = true;
|
|
|
|
keys = with depot.users;
|
|
|
|
tazjin.keys.all
|
|
|
|
++ lukegb.keys.all
|
2021-01-23 19:17:10 +01:00
|
|
|
++ [ glittershark.keys.whitby ];
|
2020-07-03 16:22:21 +02:00
|
|
|
};
|
2020-07-02 20:19:08 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
programs.mtr.enable = true;
|
2020-08-14 20:17:33 +02:00
|
|
|
programs.mosh.enable = true;
|
2020-08-13 00:15:35 +02:00
|
|
|
services.openssh = {
|
|
|
|
enable = true;
|
|
|
|
passwordAuthentication = false;
|
|
|
|
challengeResponseAuthentication = false;
|
|
|
|
};
|
2020-07-02 20:19:08 +02:00
|
|
|
|
2020-07-02 21:27:02 +02:00
|
|
|
# Run a handful of Buildkite agents to support parallel builds.
|
|
|
|
services.buildkite-agents = listToAttrs (map (n: rec {
|
|
|
|
name = "whitby-${toString n}";
|
|
|
|
value = {
|
|
|
|
inherit name;
|
|
|
|
enable = true;
|
|
|
|
tokenPath = "/etc/secrets/buildkite-agent-token";
|
|
|
|
hooks.post-command = "${buildkiteHooks}/bin/post-command";
|
|
|
|
};
|
2020-09-06 13:44:03 +02:00
|
|
|
}) (range 1 32));
|
2020-07-02 21:27:02 +02:00
|
|
|
|
2020-07-11 13:51:04 +02:00
|
|
|
# Start a local SMTP relay to Gmail (used by gerrit)
|
|
|
|
services.depot.smtprelay = {
|
|
|
|
enable = true;
|
|
|
|
args = {
|
|
|
|
listen = ":2525";
|
|
|
|
remote_host = "smtp.gmail.com:587";
|
|
|
|
remote_auth = "plain";
|
|
|
|
remote_user = "tvlbot@tazj.in";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2020-07-11 14:03:34 +02:00
|
|
|
# Start the Gerrit->IRC bot
|
|
|
|
services.depot.clbot = {
|
|
|
|
enable = true;
|
|
|
|
|
|
|
|
# Almost all configuration values are already correct (well, duh),
|
|
|
|
# see //fun/clbot for details.
|
|
|
|
flags = {
|
|
|
|
gerrit_host = "cl.tvl.fyi:29418";
|
|
|
|
gerrit_ssh_auth_username = "clbot";
|
|
|
|
gerrit_ssh_auth_key = "/etc/secrets/clbot-key";
|
2020-11-05 14:36:42 +01:00
|
|
|
irc_server = "znc.lukegb.com:6697";
|
2020-07-11 14:03:34 +02:00
|
|
|
|
|
|
|
notify_branches = "canon,refs/meta/config";
|
|
|
|
notify_repo = "depot";
|
|
|
|
|
|
|
|
# This secret is read from an environment variable, which is
|
|
|
|
# populated from /etc/secrets/clbot
|
|
|
|
irc_pass = "$CLBOT_PASS";
|
|
|
|
};
|
2020-08-17 23:03:08 +02:00
|
|
|
|
|
|
|
channels = [
|
|
|
|
"##tvl"
|
|
|
|
"##tvl-dev"
|
|
|
|
];
|
2020-07-11 14:03:34 +02:00
|
|
|
};
|
|
|
|
|
2020-07-22 01:40:49 +02:00
|
|
|
services.depot = {
|
|
|
|
# Run a SourceGraph code search instance
|
|
|
|
sourcegraph.enable = true;
|
|
|
|
|
|
|
|
# Run the Panettone issue tracker
|
2020-07-26 21:41:15 +02:00
|
|
|
panettone = {
|
|
|
|
enable = true;
|
|
|
|
dbUser = "panettone";
|
|
|
|
dbName = "panettone";
|
2020-07-28 03:30:47 +02:00
|
|
|
secretsFile = "/etc/secrets/panettone";
|
2020-11-17 22:56:28 +01:00
|
|
|
irccatChannel = "##tvl,##tvl-dev";
|
2020-07-26 21:41:15 +02:00
|
|
|
};
|
2020-07-31 23:30:52 +02:00
|
|
|
|
|
|
|
# Run the first cursed bot (quote bot)
|
|
|
|
paroxysm.enable = true;
|
2020-11-08 03:16:16 +01:00
|
|
|
|
|
|
|
# Run irccat to forward messages to IRC
|
|
|
|
irccat = {
|
|
|
|
enable = true;
|
|
|
|
config = {
|
|
|
|
tcp.listen = ":4722"; # "ircc"
|
|
|
|
irc = {
|
|
|
|
server = "chat.freenode.net:6697";
|
|
|
|
tls = true;
|
|
|
|
nick = "tvlbot";
|
|
|
|
realname = "TVL Bot";
|
|
|
|
channels = [
|
|
|
|
"##tvl"
|
|
|
|
"##tvl-dev"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
2020-07-26 21:41:15 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
services.postgresql = {
|
|
|
|
enable = true;
|
|
|
|
enableTCPIP = true;
|
|
|
|
|
2020-07-28 03:30:47 +02:00
|
|
|
authentication = lib.mkForce ''
|
2020-07-26 21:41:15 +02:00
|
|
|
local all all trust
|
2020-07-28 03:30:47 +02:00
|
|
|
host all all 127.0.0.1/32 password
|
|
|
|
host all all ::1/128 password
|
|
|
|
hostnossl all all 127.0.0.1/32 password
|
|
|
|
hostnossl all all ::1/128 password
|
2020-07-26 21:41:15 +02:00
|
|
|
'';
|
|
|
|
|
|
|
|
ensureDatabases = [
|
|
|
|
"panettone"
|
|
|
|
];
|
|
|
|
|
|
|
|
ensureUsers = [{
|
|
|
|
name = "panettone";
|
|
|
|
ensurePermissions = {
|
|
|
|
"DATABASE panettone" = "ALL PRIVILEGES";
|
|
|
|
};
|
|
|
|
}];
|
2020-07-22 01:40:49 +02:00
|
|
|
};
|
2020-07-12 13:54:16 +02:00
|
|
|
|
2020-08-01 18:41:30 +02:00
|
|
|
services.postgresqlBackup = {
|
|
|
|
enable = true;
|
|
|
|
databases = [
|
|
|
|
"tvldb"
|
|
|
|
"panettone"
|
|
|
|
];
|
|
|
|
};
|
2020-07-26 21:41:15 +02:00
|
|
|
|
2020-07-02 20:19:08 +02:00
|
|
|
environment.systemPackages = with nixpkgs; [
|
|
|
|
bb
|
|
|
|
curl
|
|
|
|
emacs-nox
|
|
|
|
git
|
|
|
|
htop
|
|
|
|
nano
|
2020-07-25 18:14:42 +02:00
|
|
|
rxvt_unicode.terminfo
|
2020-07-02 20:19:08 +02:00
|
|
|
vim
|
|
|
|
zfs
|
|
|
|
zfstools
|
|
|
|
];
|
|
|
|
|
2020-07-12 15:02:50 +02:00
|
|
|
# Run cgit for the depot. The onion here is nginx(thttpd(cgit)).
|
|
|
|
systemd.services.cgit = {
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
script = "${depot.web.cgit-taz}/bin/cgit-launch";
|
|
|
|
|
|
|
|
serviceConfig = {
|
|
|
|
Restart = "on-failure";
|
|
|
|
User = "git";
|
|
|
|
Group = "git";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2020-08-01 18:56:05 +02:00
|
|
|
# Regularly back up whitby to Google Cloud Storage.
|
|
|
|
systemd.services.restic = {
|
|
|
|
description = "Backups to Google Cloud Storage";
|
|
|
|
script = "${nixpkgs.restic}/bin/restic backup /var/lib/gerrit /var/backup/postgresql";
|
2020-07-12 15:46:55 +02:00
|
|
|
|
|
|
|
environment = {
|
|
|
|
GOOGLE_PROJECT_ID = "tazjins-infrastructure";
|
2020-08-01 18:56:05 +02:00
|
|
|
GOOGLE_APPLICATION_CREDENTIALS = "/var/backup/restic/gcp-key.json";
|
2020-07-12 15:46:55 +02:00
|
|
|
RESTIC_REPOSITORY = "gs:tvl-fyi-backups:/whitby";
|
2020-08-01 18:56:05 +02:00
|
|
|
RESTIC_PASSWORD_FILE = "/var/backup/restic/secret";
|
2020-08-02 00:27:40 +02:00
|
|
|
RESTIC_CACHE_DIR = "/var/backup/restic/cache";
|
2020-07-12 15:46:55 +02:00
|
|
|
RESTIC_EXCLUDE_FILE = builtins.toFile "exclude-files" ''
|
|
|
|
/var/lib/gerrit/tmp
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2020-08-02 00:22:51 +02:00
|
|
|
systemd.timers.restic = {
|
2020-07-12 15:46:55 +02:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
timerConfig.OnCalendar = "hourly";
|
|
|
|
};
|
|
|
|
|
2020-08-23 14:04:36 +02:00
|
|
|
services.journaldriver = {
|
|
|
|
enable = true;
|
|
|
|
googleCloudProject = "tvl-fyi";
|
|
|
|
logStream = "whitby";
|
|
|
|
applicationCredentials = "/var/lib/journaldriver/key.json";
|
|
|
|
};
|
|
|
|
|
2020-07-02 23:53:59 +02:00
|
|
|
security.sudo.extraRules = [
|
|
|
|
{
|
|
|
|
groups = ["wheel"];
|
|
|
|
commands = [{ command = "ALL"; options = ["NOPASSWD"]; }];
|
|
|
|
}
|
|
|
|
];
|
|
|
|
|
2020-07-02 20:19:08 +02:00
|
|
|
users = {
|
|
|
|
users.root.openssh.authorizedKeys.keys = [
|
|
|
|
depot.users.tazjin.keys.frog
|
|
|
|
];
|
|
|
|
|
|
|
|
users.tazjin = {
|
|
|
|
isNormalUser = true;
|
|
|
|
extraGroups = [ "git" "wheel" ];
|
2020-07-23 21:38:12 +02:00
|
|
|
shell = nixpkgs.fish;
|
2020-07-03 16:22:21 +02:00
|
|
|
openssh.authorizedKeys.keys = depot.users.tazjin.keys.all;
|
2020-07-02 20:19:08 +02:00
|
|
|
};
|
|
|
|
|
2020-07-02 21:05:39 +02:00
|
|
|
users.lukegb = {
|
|
|
|
isNormalUser = true;
|
|
|
|
extraGroups = [ "git" "wheel" ];
|
|
|
|
openssh.authorizedKeys.keys = depot.users.lukegb.keys.all;
|
|
|
|
};
|
|
|
|
|
2020-07-02 21:07:22 +02:00
|
|
|
users.grfn = {
|
|
|
|
isNormalUser = true;
|
|
|
|
extraGroups = [ "git" "wheel" ];
|
|
|
|
openssh.authorizedKeys.keys = [
|
|
|
|
depot.users.glittershark.keys.whitby
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2020-07-15 20:23:59 +02:00
|
|
|
users.isomer = {
|
|
|
|
isNormalUser = true;
|
|
|
|
extraGroups = [ "git" ];
|
2020-07-23 21:23:37 +02:00
|
|
|
openssh.authorizedKeys.keys = depot.users.isomer.keys.all;
|
2020-07-15 20:23:59 +02:00
|
|
|
};
|
|
|
|
|
2020-07-17 22:51:09 +02:00
|
|
|
users.riking = {
|
|
|
|
isNormalUser = true;
|
|
|
|
extraGroups = [ "git" ];
|
|
|
|
openssh.authorizedKeys.keys = depot.users.riking.keys.u2f ++ depot.users.riking.keys.passworded;
|
|
|
|
};
|
|
|
|
|
2020-08-05 03:28:52 +02:00
|
|
|
users.edef = {
|
|
|
|
isNormalUser = true;
|
|
|
|
extraGroups = [ "git" ];
|
|
|
|
openssh.authorizedKeys.keys = depot.users.edef.keys.all;
|
|
|
|
};
|
|
|
|
|
2020-07-23 21:26:37 +02:00
|
|
|
users.qyliss = {
|
|
|
|
isNormalUser = true;
|
|
|
|
extraGroups = [ "git" ];
|
|
|
|
openssh.authorizedKeys.keys = depot.users.qyliss.keys.all;
|
|
|
|
};
|
|
|
|
|
2020-08-18 00:24:12 +02:00
|
|
|
users.eta = {
|
|
|
|
isNormalUser = true;
|
|
|
|
extraGroups = [ "git" ];
|
|
|
|
openssh.authorizedKeys.keys = depot.users.eta.keys.whitby;
|
|
|
|
};
|
|
|
|
|
2020-09-28 01:24:45 +02:00
|
|
|
users.cynthia = {
|
|
|
|
isNormalUser = true; # I'm normal OwO :3
|
|
|
|
extraGroups = [ "git" ];
|
|
|
|
openssh.authorizedKeys.keys = depot.users.cynthia.keys.all;
|
|
|
|
};
|
|
|
|
|
2020-09-28 15:22:23 +02:00
|
|
|
users.firefly = {
|
|
|
|
isNormalUser = true;
|
|
|
|
extraGroups = [ "git" ];
|
|
|
|
openssh.authorizedKeys.keys = depot.users.firefly.keys.whitby;
|
|
|
|
};
|
|
|
|
|
2021-01-13 21:13:24 +01:00
|
|
|
users.sterni = {
|
|
|
|
isNormalUser = true;
|
|
|
|
extraGroups = [ "git" ];
|
|
|
|
openssh.authorizedKeys.keys = depot.users.sterni.keys.all;
|
|
|
|
};
|
|
|
|
|
2020-07-02 20:19:08 +02:00
|
|
|
# Set up a user & group for git shenanigans
|
|
|
|
groups.git = {};
|
|
|
|
users.git = {
|
|
|
|
group = "git";
|
|
|
|
isNormalUser = false;
|
2020-07-12 15:44:24 +02:00
|
|
|
createHome = true;
|
|
|
|
home = "/var/lib/git";
|
2020-07-02 20:19:08 +02:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2020-07-07 00:18:43 +02:00
|
|
|
security.acme = {
|
|
|
|
acceptTerms = true;
|
2021-01-17 10:42:37 +01:00
|
|
|
email = "certs@tvl.fyi";
|
2020-07-07 00:18:43 +02:00
|
|
|
};
|
|
|
|
|
2020-07-02 20:19:08 +02:00
|
|
|
system.stateVersion = "20.03";
|
2020-07-18 00:25:20 +02:00
|
|
|
})
|