refactor(ops): Split //ops/nixos into different locations
Splits //ops/nixos into: * //ops/nixos.nix - utility functions for building systems * //ops/machines - shared machine definitions (read by readTree) * //ops/modules - shared NixOS modules (skipped by readTree) This simplifies working with the configuration fixpoint in whitby, and is overall a bit more in line with how NixOS systems in user folders currently work. Change-Id: I1322ec5cc76c0207c099c05d44828a3df0b3ffc1 Reviewed-on: https://cl.tvl.fyi/c/depot/+/2931 Tested-by: BuildkiteCI Reviewed-by: sterni <sternenseemann@systemli.org> Reviewed-by: glittershark <grfn@gws.fyi>
This commit is contained in:
parent
7deabb8c8d
commit
90281c4eac
38 changed files with 41 additions and 60 deletions
6
ops/machines/whitby/OWNERS
Normal file
6
ops/machines/whitby/OWNERS
Normal file
|
@ -0,0 +1,6 @@
|
|||
inherited: false
|
||||
|
||||
# Want in on this list? Try paying!
|
||||
owners:
|
||||
- lukegb
|
||||
- tazjin
|
5
ops/machines/whitby/README.md
Normal file
5
ops/machines/whitby/README.md
Normal file
|
@ -0,0 +1,5 @@
|
|||
whitby
|
||||
======
|
||||
|
||||
`whitby.tvl.fyi` is our dedicated server providing continuous
|
||||
integration services and other random nonsense.
|
459
ops/machines/whitby/default.nix
Normal file
459
ops/machines/whitby/default.nix
Normal file
|
@ -0,0 +1,459 @@
|
|||
{ depot, lib, pkgs, ... }: # readTree options
|
||||
config: # passed by module system
|
||||
|
||||
let
|
||||
inherit (builtins) listToAttrs;
|
||||
inherit (lib) range;
|
||||
in lib.fix(self: {
|
||||
imports = [
|
||||
"${depot.depotPath}/ops/modules/clbot.nix"
|
||||
"${depot.depotPath}/ops/modules/irccat.nix"
|
||||
"${depot.depotPath}/ops/modules/monorepo-gerrit.nix"
|
||||
"${depot.depotPath}/ops/modules/panettone.nix"
|
||||
"${depot.depotPath}/ops/modules/paroxysm.nix"
|
||||
"${depot.depotPath}/ops/modules/smtprelay.nix"
|
||||
"${depot.depotPath}/ops/modules/sourcegraph.nix"
|
||||
"${depot.depotPath}/ops/modules/tvl-buildkite.nix"
|
||||
"${depot.depotPath}/ops/modules/tvl-slapd/default.nix"
|
||||
"${depot.depotPath}/ops/modules/tvl-sso/default.nix"
|
||||
"${depot.depotPath}/ops/modules/www/b.tvl.fyi.nix"
|
||||
"${depot.depotPath}/ops/modules/www/cache.tvl.su.nix"
|
||||
"${depot.depotPath}/ops/modules/www/cl.tvl.fyi.nix"
|
||||
"${depot.depotPath}/ops/modules/www/code.tvl.fyi.nix"
|
||||
"${depot.depotPath}/ops/modules/www/cs.tvl.fyi.nix"
|
||||
"${depot.depotPath}/ops/modules/www/login.tvl.fyi.nix"
|
||||
"${depot.depotPath}/ops/modules/www/tazj.in.nix"
|
||||
"${depot.depotPath}/ops/modules/www/todo.tvl.fyi.nix"
|
||||
"${depot.depotPath}/ops/modules/www/tvl.fyi.nix"
|
||||
"${depot.depotPath}/ops/modules/www/wigglydonke.rs.nix"
|
||||
"${pkgs.path}/nixos/modules/services/web-apps/gerrit.nix"
|
||||
];
|
||||
|
||||
hardware = {
|
||||
enableRedistributableFirmware = true;
|
||||
cpu.amd.updateMicrocode = true;
|
||||
};
|
||||
|
||||
boot = {
|
||||
tmpOnTmpfs = true;
|
||||
kernelModules = [ "kvm-amd" ];
|
||||
supportedFilesystems = [ "zfs" ];
|
||||
|
||||
initrd = {
|
||||
availableKernelModules = [
|
||||
"igb" "xhci_pci" "nvme" "ahci" "usbhid" "usb_storage" "sr_mod"
|
||||
];
|
||||
|
||||
# Enable SSH in the initrd so that we can enter disk encryption
|
||||
# passwords remotely.
|
||||
network = {
|
||||
enable = true;
|
||||
ssh = {
|
||||
enable = true;
|
||||
port = 2222;
|
||||
authorizedKeys =
|
||||
depot.users.tazjin.keys.all
|
||||
++ depot.users.lukegb.keys.all
|
||||
++ [ depot.users.glittershark.keys.whitby ];
|
||||
|
||||
hostKeys = [
|
||||
/etc/secrets/initrd_host_ed25519_key
|
||||
];
|
||||
};
|
||||
|
||||
# this will launch the zfs password prompt on login and kill the
|
||||
# other prompt
|
||||
postCommands = ''
|
||||
echo "zfs load-key -a && killall zfs" >> /root/.profile
|
||||
'';
|
||||
};
|
||||
};
|
||||
|
||||
kernel.sysctl = {
|
||||
"net.ipv4.tcp_congestion_control" = "bbr";
|
||||
};
|
||||
|
||||
loader.grub = {
|
||||
enable = true;
|
||||
version = 2;
|
||||
efiSupport = true;
|
||||
efiInstallAsRemovable = true;
|
||||
device = "/dev/disk/by-id/nvme-SAMSUNG_MZQLB1T9HAJR-00007_S439NA0N201620";
|
||||
};
|
||||
|
||||
zfs.requestEncryptionCredentials = true;
|
||||
};
|
||||
|
||||
fileSystems = {
|
||||
"/" = {
|
||||
device = "zroot/root";
|
||||
fsType = "zfs";
|
||||
};
|
||||
|
||||
"/boot" = {
|
||||
device = "/dev/disk/by-uuid/073E-7FBD";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
"/nix" = {
|
||||
device = "zroot/nix";
|
||||
fsType = "zfs";
|
||||
};
|
||||
|
||||
"/home" = {
|
||||
device = "zroot/home";
|
||||
fsType = "zfs";
|
||||
};
|
||||
};
|
||||
|
||||
networking = {
|
||||
# Glass is boring, but Luke doesn't like Wapping - the Prospect of
|
||||
# Whitby, however, is quite a pleasant establishment.
|
||||
hostName = "whitby";
|
||||
domain = "tvl.fyi";
|
||||
hostId = "b38ca543";
|
||||
useDHCP = false;
|
||||
|
||||
# Don't use Hetzner's DNS servers.
|
||||
nameservers = [
|
||||
"8.8.8.8"
|
||||
"8.8.4.4"
|
||||
];
|
||||
|
||||
defaultGateway6 = {
|
||||
address = "fe80::1";
|
||||
interface = "enp196s0";
|
||||
};
|
||||
|
||||
firewall.allowedTCPPorts = [ 22 80 443 4238 29418 ];
|
||||
|
||||
interfaces.enp196s0.useDHCP = true;
|
||||
interfaces.enp196s0.ipv6.addresses = [
|
||||
{
|
||||
address = "2a01:04f8:0242:5b21::feed:edef:beef";
|
||||
prefixLength = 64;
|
||||
}
|
||||
];
|
||||
};
|
||||
|
||||
# Generate an immutable /etc/resolv.conf from the nameserver settings
|
||||
# above (otherwise DHCP overwrites it):
|
||||
environment.etc."resolv.conf" = with lib; {
|
||||
source = pkgs.writeText "resolv.conf" ''
|
||||
${concatStringsSep "\n" (map (ns: "nameserver ${ns}") self.networking.nameservers)}
|
||||
options edns0
|
||||
'';
|
||||
};
|
||||
|
||||
# Disable background git gc system-wide, as it has a tendency to break CI.
|
||||
environment.etc."gitconfig".source = pkgs.writeText "gitconfig" ''
|
||||
[gc]
|
||||
autoDetach = false
|
||||
'';
|
||||
|
||||
time.timeZone = "UTC";
|
||||
|
||||
nix = {
|
||||
nrBuildUsers = 256;
|
||||
maxJobs = lib.mkDefault 64;
|
||||
extraOptions = ''
|
||||
secret-key-files = /etc/secrets/nix-cache-privkey
|
||||
'';
|
||||
|
||||
trustedUsers = [
|
||||
"grfn"
|
||||
"lukegb"
|
||||
"tazjin"
|
||||
"sterni"
|
||||
];
|
||||
|
||||
sshServe = {
|
||||
enable = true;
|
||||
keys = with depot.users;
|
||||
tazjin.keys.all
|
||||
++ lukegb.keys.all
|
||||
++ [ glittershark.keys.whitby ]
|
||||
++ sterni.keys.all
|
||||
;
|
||||
};
|
||||
};
|
||||
|
||||
programs.mtr.enable = true;
|
||||
programs.mosh.enable = true;
|
||||
services.openssh = {
|
||||
enable = true;
|
||||
passwordAuthentication = false;
|
||||
challengeResponseAuthentication = false;
|
||||
};
|
||||
|
||||
# Run a handful of Buildkite agents to support parallel builds.
|
||||
services.depot.buildkite = {
|
||||
enable = true;
|
||||
agentCount = 32;
|
||||
};
|
||||
|
||||
# Start a local SMTP relay to Gmail (used by gerrit)
|
||||
services.depot.smtprelay = {
|
||||
enable = true;
|
||||
args = {
|
||||
listen = ":2525";
|
||||
remote_host = "smtp.gmail.com:587";
|
||||
remote_auth = "plain";
|
||||
remote_user = "tvlbot@tazj.in";
|
||||
};
|
||||
};
|
||||
|
||||
# Start the Gerrit->IRC bot
|
||||
services.depot.clbot = {
|
||||
enable = true;
|
||||
|
||||
# Almost all configuration values are already correct (well, duh),
|
||||
# see //fun/clbot for details.
|
||||
flags = {
|
||||
gerrit_host = "cl.tvl.fyi:29418";
|
||||
gerrit_ssh_auth_username = "clbot";
|
||||
gerrit_ssh_auth_key = "/etc/secrets/clbot-key";
|
||||
irc_server = "znc.lukegb.com:6697";
|
||||
|
||||
notify_branches = "canon,refs/meta/config";
|
||||
notify_repo = "depot";
|
||||
|
||||
# This secret is read from an environment variable, which is
|
||||
# populated from /etc/secrets/clbot
|
||||
irc_pass = "$CLBOT_PASS";
|
||||
};
|
||||
|
||||
channels = [
|
||||
"##tvl"
|
||||
"##tvl-dev"
|
||||
];
|
||||
};
|
||||
|
||||
services.depot = {
|
||||
# Run a SourceGraph code search instance
|
||||
sourcegraph.enable = true;
|
||||
|
||||
# Run the Panettone issue tracker
|
||||
panettone = {
|
||||
enable = true;
|
||||
dbUser = "panettone";
|
||||
dbName = "panettone";
|
||||
secretsFile = "/etc/secrets/panettone";
|
||||
irccatChannel = "##tvl,##tvl-dev";
|
||||
};
|
||||
|
||||
# Run the first cursed bot (quote bot)
|
||||
paroxysm.enable = true;
|
||||
|
||||
# Run irccat to forward messages to IRC
|
||||
irccat = {
|
||||
enable = true;
|
||||
config = {
|
||||
tcp.listen = ":4722"; # "ircc"
|
||||
irc = {
|
||||
server = "chat.freenode.net:6697";
|
||||
tls = true;
|
||||
nick = "tvlbot";
|
||||
realname = "TVL Bot";
|
||||
channels = [
|
||||
"##tvl"
|
||||
"##tvl-dev"
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
services.postgresql = {
|
||||
enable = true;
|
||||
enableTCPIP = true;
|
||||
|
||||
authentication = lib.mkForce ''
|
||||
local all all trust
|
||||
host all all 127.0.0.1/32 password
|
||||
host all all ::1/128 password
|
||||
hostnossl all all 127.0.0.1/32 password
|
||||
hostnossl all all ::1/128 password
|
||||
'';
|
||||
|
||||
ensureDatabases = [
|
||||
"panettone"
|
||||
];
|
||||
|
||||
ensureUsers = [{
|
||||
name = "panettone";
|
||||
ensurePermissions = {
|
||||
"DATABASE panettone" = "ALL PRIVILEGES";
|
||||
};
|
||||
}];
|
||||
};
|
||||
|
||||
services.postgresqlBackup = {
|
||||
enable = true;
|
||||
databases = [
|
||||
"tvldb"
|
||||
"panettone"
|
||||
];
|
||||
};
|
||||
|
||||
services.nix-serve = {
|
||||
enable = true;
|
||||
port = 6443;
|
||||
secretKeyFile = "/etc/secrets/nix-cache-key.sec";
|
||||
bindAddress = "localhost";
|
||||
};
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
bb
|
||||
curl
|
||||
emacs-nox
|
||||
git
|
||||
htop
|
||||
nano
|
||||
rxvt_unicode.terminfo
|
||||
vim
|
||||
zfs
|
||||
zfstools
|
||||
];
|
||||
|
||||
# Run cgit for the depot. The onion here is nginx(thttpd(cgit)).
|
||||
systemd.services.cgit = {
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
script = "${depot.web.cgit-taz}/bin/cgit-launch";
|
||||
|
||||
serviceConfig = {
|
||||
Restart = "on-failure";
|
||||
User = "git";
|
||||
Group = "git";
|
||||
};
|
||||
};
|
||||
|
||||
# Regularly back up whitby to Google Cloud Storage.
|
||||
systemd.services.restic = {
|
||||
description = "Backups to Google Cloud Storage";
|
||||
script = "${pkgs.restic}/bin/restic backup /var/lib/gerrit /var/backup/postgresql";
|
||||
|
||||
environment = {
|
||||
GOOGLE_PROJECT_ID = "tazjins-infrastructure";
|
||||
GOOGLE_APPLICATION_CREDENTIALS = "/var/backup/restic/gcp-key.json";
|
||||
RESTIC_REPOSITORY = "gs:tvl-fyi-backups:/whitby";
|
||||
RESTIC_PASSWORD_FILE = "/var/backup/restic/secret";
|
||||
RESTIC_CACHE_DIR = "/var/backup/restic/cache";
|
||||
RESTIC_EXCLUDE_FILE = builtins.toFile "exclude-files" ''
|
||||
/var/lib/gerrit/tmp
|
||||
'';
|
||||
};
|
||||
};
|
||||
|
||||
systemd.timers.restic = {
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
timerConfig.OnCalendar = "hourly";
|
||||
};
|
||||
|
||||
services.journaldriver = {
|
||||
enable = true;
|
||||
googleCloudProject = "tvl-fyi";
|
||||
logStream = "whitby";
|
||||
applicationCredentials = "/var/lib/journaldriver/key.json";
|
||||
};
|
||||
|
||||
security.sudo.extraRules = [
|
||||
{
|
||||
groups = ["wheel"];
|
||||
commands = [{ command = "ALL"; options = ["NOPASSWD"]; }];
|
||||
}
|
||||
];
|
||||
|
||||
users = {
|
||||
users.tazjin = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "git" "wheel" ];
|
||||
shell = pkgs.fish;
|
||||
openssh.authorizedKeys.keys = depot.users.tazjin.keys.all;
|
||||
};
|
||||
|
||||
users.lukegb = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "git" "wheel" ];
|
||||
openssh.authorizedKeys.keys = depot.users.lukegb.keys.all;
|
||||
};
|
||||
|
||||
users.grfn = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "git" "wheel" ];
|
||||
openssh.authorizedKeys.keys = [
|
||||
depot.users.glittershark.keys.whitby
|
||||
];
|
||||
};
|
||||
|
||||
users.isomer = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "git" ];
|
||||
openssh.authorizedKeys.keys = depot.users.isomer.keys.all;
|
||||
};
|
||||
|
||||
users.riking = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "git" ];
|
||||
openssh.authorizedKeys.keys = depot.users.riking.keys.u2f ++ depot.users.riking.keys.passworded;
|
||||
};
|
||||
|
||||
users.edef = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "git" ];
|
||||
openssh.authorizedKeys.keys = depot.users.edef.keys.all;
|
||||
};
|
||||
|
||||
users.qyliss = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "git" ];
|
||||
openssh.authorizedKeys.keys = depot.users.qyliss.keys.all;
|
||||
};
|
||||
|
||||
users.eta = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "git" ];
|
||||
openssh.authorizedKeys.keys = depot.users.eta.keys.whitby;
|
||||
};
|
||||
|
||||
users.cynthia = {
|
||||
isNormalUser = true; # I'm normal OwO :3
|
||||
extraGroups = [ "git" ];
|
||||
openssh.authorizedKeys.keys = depot.users.cynthia.keys.all;
|
||||
};
|
||||
|
||||
users.firefly = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "git" ];
|
||||
openssh.authorizedKeys.keys = depot.users.firefly.keys.whitby;
|
||||
};
|
||||
|
||||
users.sterni = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "git" ];
|
||||
openssh.authorizedKeys.keys = depot.users.sterni.keys.all;
|
||||
};
|
||||
|
||||
users.flokli = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "git" ];
|
||||
openssh.authorizedKeys.keys = depot.users.flokli.keys.all;
|
||||
};
|
||||
|
||||
# Set up a user & group for git shenanigans
|
||||
groups.git = {};
|
||||
users.git = {
|
||||
group = "git";
|
||||
isNormalUser = false;
|
||||
createHome = true;
|
||||
home = "/var/lib/git";
|
||||
};
|
||||
};
|
||||
|
||||
security.acme = {
|
||||
acceptTerms = true;
|
||||
email = "certs@tvl.fyi";
|
||||
};
|
||||
|
||||
system.stateVersion = "20.03";
|
||||
})
|
Loading…
Add table
Add a link
Reference in a new issue