28a80e0251
Note that the login.tvl.fyi WWW configuration is still kind of hanging around until we've settled where Keycloak lives. Change-Id: Iaca4e394a7371cafa3716ca66ef09c4eca5b1520 Reviewed-on: https://cl.tvl.fyi/c/depot/+/4626 Autosubmit: tazjin <mail@tazj.in> Tested-by: BuildkiteCI Reviewed-by: lukegb <lukegb@tvl.fyi>
690 lines
18 KiB
Nix
690 lines
18 KiB
Nix
{ depot, lib, pkgs, ... }: # readTree options
|
|
{ config, ... }: # passed by module system
|
|
|
|
let
|
|
inherit (builtins) listToAttrs;
|
|
inherit (lib) range;
|
|
in {
|
|
imports = [
|
|
"${depot.path}/ops/modules/atward.nix"
|
|
"${depot.path}/ops/modules/clbot.nix"
|
|
"${depot.path}/ops/modules/gerrit-queue.nix"
|
|
"${depot.path}/ops/modules/git-serving.nix"
|
|
"${depot.path}/ops/modules/irccat.nix"
|
|
"${depot.path}/ops/modules/monorepo-gerrit.nix"
|
|
"${depot.path}/ops/modules/nixery.nix"
|
|
"${depot.path}/ops/modules/owothia.nix"
|
|
"${depot.path}/ops/modules/panettone.nix"
|
|
"${depot.path}/ops/modules/paroxysm.nix"
|
|
"${depot.path}/ops/modules/restic.nix"
|
|
"${depot.path}/ops/modules/smtprelay.nix"
|
|
"${depot.path}/ops/modules/sourcegraph.nix"
|
|
"${depot.path}/ops/modules/tvl-buildkite.nix"
|
|
"${depot.path}/ops/modules/tvl-slapd/default.nix"
|
|
"${depot.path}/ops/modules/www/atward.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/auth.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/b.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/cache.tvl.su.nix"
|
|
"${depot.path}/ops/modules/www/cl.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/code.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/cs.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/deploys.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/images.tvl.fyi.nix"
|
|
# "${depot.path}/ops/modules/www/login.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/nixery.dev.nix"
|
|
"${depot.path}/ops/modules/www/static.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/status.tvl.su.nix"
|
|
"${depot.path}/ops/modules/www/tazj.in.nix"
|
|
"${depot.path}/ops/modules/www/todo.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/tvl.su.nix"
|
|
"${depot.path}/ops/modules/www/wigglydonke.rs.nix"
|
|
"${depot.third_party.agenix.src}/modules/age.nix"
|
|
"${pkgs.path}/nixos/modules/services/web-apps/gerrit.nix"
|
|
];
|
|
|
|
hardware = {
|
|
enableRedistributableFirmware = true;
|
|
cpu.amd.updateMicrocode = true;
|
|
};
|
|
|
|
boot = {
|
|
tmpOnTmpfs = true;
|
|
kernelModules = [ "kvm-amd" ];
|
|
supportedFilesystems = [ "zfs" ];
|
|
|
|
initrd = {
|
|
availableKernelModules = [
|
|
"igb" "xhci_pci" "nvme" "ahci" "usbhid" "usb_storage" "sr_mod"
|
|
];
|
|
|
|
# Enable SSH in the initrd so that we can enter disk encryption
|
|
# passwords remotely.
|
|
network = {
|
|
enable = true;
|
|
ssh = {
|
|
enable = true;
|
|
port = 2222;
|
|
authorizedKeys =
|
|
depot.users.tazjin.keys.all
|
|
++ depot.users.lukegb.keys.all
|
|
++ [ depot.users.grfn.keys.whitby ];
|
|
|
|
hostKeys = [
|
|
/etc/secrets/initrd_host_ed25519_key
|
|
];
|
|
};
|
|
|
|
# this will launch the zfs password prompt on login and kill the
|
|
# other prompt
|
|
postCommands = ''
|
|
echo "zfs load-key -a && killall zfs" >> /root/.profile
|
|
'';
|
|
};
|
|
};
|
|
|
|
kernel.sysctl = {
|
|
"net.ipv4.tcp_congestion_control" = "bbr";
|
|
};
|
|
|
|
loader.grub = {
|
|
enable = true;
|
|
version = 2;
|
|
efiSupport = true;
|
|
efiInstallAsRemovable = true;
|
|
device = "/dev/disk/by-id/nvme-SAMSUNG_MZQLB1T9HAJR-00007_S439NA0N201620";
|
|
};
|
|
|
|
zfs.requestEncryptionCredentials = true;
|
|
};
|
|
|
|
fileSystems = {
|
|
"/" = {
|
|
device = "zroot/root";
|
|
fsType = "zfs";
|
|
};
|
|
|
|
"/boot" = {
|
|
device = "/dev/disk/by-uuid/073E-7FBD";
|
|
fsType = "vfat";
|
|
};
|
|
|
|
"/nix" = {
|
|
device = "zroot/nix";
|
|
fsType = "zfs";
|
|
};
|
|
|
|
"/home" = {
|
|
device = "zroot/home";
|
|
fsType = "zfs";
|
|
};
|
|
};
|
|
|
|
networking = {
|
|
# Glass is boring, but Luke doesn't like Wapping - the Prospect of
|
|
# Whitby, however, is quite a pleasant establishment.
|
|
hostName = "whitby";
|
|
domain = "tvl.fyi";
|
|
hostId = "b38ca543";
|
|
useDHCP = false;
|
|
|
|
# Don't use Hetzner's DNS servers.
|
|
nameservers = [
|
|
"8.8.8.8"
|
|
"8.8.4.4"
|
|
];
|
|
|
|
defaultGateway6 = {
|
|
address = "fe80::1";
|
|
interface = "enp196s0";
|
|
};
|
|
|
|
firewall.allowedTCPPorts = [ 22 80 443 4238 8443 29418 ];
|
|
firewall.allowedUDPPorts = [ 8443 ];
|
|
|
|
interfaces.enp196s0.useDHCP = true;
|
|
interfaces.enp196s0.ipv6.addresses = [
|
|
{
|
|
address = "2a01:04f8:0242:5b21::feed:edef:beef";
|
|
prefixLength = 64;
|
|
}
|
|
];
|
|
};
|
|
|
|
# Generate an immutable /etc/resolv.conf from the nameserver settings
|
|
# above (otherwise DHCP overwrites it):
|
|
environment.etc."resolv.conf" = with lib; {
|
|
source = pkgs.writeText "resolv.conf" ''
|
|
${concatStringsSep "\n" (map (ns: "nameserver ${ns}") config.networking.nameservers)}
|
|
options edns0
|
|
'';
|
|
};
|
|
|
|
# Disable background git gc system-wide, as it has a tendency to break CI.
|
|
environment.etc."gitconfig".source = pkgs.writeText "gitconfig" ''
|
|
[gc]
|
|
autoDetach = false
|
|
'';
|
|
|
|
time.timeZone = "UTC";
|
|
|
|
nix = {
|
|
nrBuildUsers = 256;
|
|
maxJobs = lib.mkDefault 64;
|
|
extraOptions = ''
|
|
secret-key-files = /run/agenix/nix-cache-priv
|
|
'';
|
|
|
|
trustedUsers = [
|
|
"grfn"
|
|
"lukegb"
|
|
"tazjin"
|
|
"sterni"
|
|
];
|
|
|
|
sshServe = {
|
|
enable = true;
|
|
keys = with depot.users;
|
|
tazjin.keys.all
|
|
++ lukegb.keys.all
|
|
++ [ grfn.keys.whitby ]
|
|
++ sterni.keys.all
|
|
;
|
|
};
|
|
};
|
|
|
|
programs.mtr.enable = true;
|
|
programs.mosh.enable = true;
|
|
services.openssh = {
|
|
enable = true;
|
|
passwordAuthentication = false;
|
|
challengeResponseAuthentication = false;
|
|
};
|
|
|
|
# Configure secrets for services that need them.
|
|
age.secrets =
|
|
let
|
|
secretFile = name: depot.ops.secrets."${name}.age";
|
|
in {
|
|
clbot.file = secretFile "clbot";
|
|
gerrit-queue.file = secretFile "gerrit-queue";
|
|
grafana.file = secretFile "grafana";
|
|
irccat.file = secretFile "irccat";
|
|
keycloak-db.file = secretFile "keycloak-db";
|
|
nix-cache-priv.file = secretFile "nix-cache-priv";
|
|
owothia.file = secretFile "owothia";
|
|
panettone.file = secretFile "panettone";
|
|
|
|
buildkite-agent-token = {
|
|
file = secretFile "buildkite-agent-token";
|
|
mode = "0440";
|
|
group = "buildkite-agents";
|
|
};
|
|
|
|
buildkite-graphql-token = {
|
|
file = secretFile "buildkite-graphql-token";
|
|
mode = "0440";
|
|
group = "buildkite-agents";
|
|
};
|
|
|
|
buildkite-besadii-config = {
|
|
file = secretFile "besadii";
|
|
mode = "0440";
|
|
group = "buildkite-agents";
|
|
};
|
|
|
|
gerrit-besadii-config = {
|
|
file = secretFile "besadii";
|
|
owner = "git";
|
|
};
|
|
|
|
gerrit-secrets = {
|
|
file = secretFile "gerrit-secrets";
|
|
path = "/var/lib/gerrit/etc/secure.config";
|
|
owner = "git";
|
|
mode = "0400";
|
|
};
|
|
|
|
clbot-ssh = {
|
|
file = secretFile "clbot-ssh";
|
|
owner = "clbot";
|
|
};
|
|
|
|
# Not actually a secret
|
|
nix-cache-pub = {
|
|
file = secretFile "nix-cache-pub";
|
|
mode = "0444";
|
|
};
|
|
};
|
|
|
|
# Automatically collect garbage from the Nix store.
|
|
services.depot.automatic-gc = {
|
|
enable = true;
|
|
interval = "1 hour";
|
|
diskThreshold = 200; # GiB
|
|
maxFreed = 420; # GiB
|
|
preserveGenerations = "90d";
|
|
};
|
|
|
|
# Run a handful of Buildkite agents to support parallel builds.
|
|
services.depot.buildkite = {
|
|
enable = true;
|
|
agentCount = 32;
|
|
};
|
|
|
|
# Start a local SMTP relay to Gmail (used by gerrit)
|
|
services.depot.smtprelay = {
|
|
enable = true;
|
|
args = {
|
|
listen = ":2525";
|
|
remote_host = "smtp.gmail.com:587";
|
|
remote_auth = "plain";
|
|
remote_user = "tvlbot@tazj.in";
|
|
};
|
|
};
|
|
|
|
# Start a ZNC instance which bounces for tvlbot and owothia.
|
|
services.znc = {
|
|
enable = true;
|
|
useLegacyConfig = false;
|
|
config = {
|
|
LoadModule = [
|
|
"webadmin"
|
|
"adminlog"
|
|
];
|
|
|
|
User.admin = {
|
|
Admin = true;
|
|
Pass.password = {
|
|
Method = "sha256";
|
|
Hash = "bb00aa8239de484c2925b1c3f6a196fb7612633f001daa9b674f83abe7e1103f";
|
|
Salt = "TiB0Ochb1CrtpMTl;2;j";
|
|
};
|
|
};
|
|
|
|
Listener.l = {
|
|
Host = "localhost";
|
|
Port = 2627; # bncr
|
|
SSL = false;
|
|
};
|
|
};
|
|
};
|
|
|
|
# Start the Gerrit->IRC bot
|
|
services.depot.clbot = {
|
|
enable = true;
|
|
channels = [ "#tvl" ];
|
|
|
|
# See //fun/clbot for details.
|
|
flags = {
|
|
gerrit_host = "cl.tvl.fyi:29418";
|
|
gerrit_ssh_auth_username = "clbot";
|
|
gerrit_ssh_auth_key = "/run/agenix/clbot-ssh";
|
|
|
|
irc_server = "localhost:${toString config.services.znc.config.Listener.l.Port}";
|
|
irc_user = "tvlbot";
|
|
irc_nick = "tvlbot";
|
|
|
|
notify_branches = "canon,refs/meta/config";
|
|
notify_repo = "depot";
|
|
|
|
# This secret is read from an environment variable, which is
|
|
# populated by a systemd EnvironmentFile.
|
|
irc_pass = "$CLBOT_PASS";
|
|
};
|
|
};
|
|
|
|
services.depot = {
|
|
# Run a SourceGraph code search instance
|
|
sourcegraph.enable = true;
|
|
|
|
# Run the Panettone issue tracker
|
|
panettone = {
|
|
enable = true;
|
|
dbUser = "panettone";
|
|
dbName = "panettone";
|
|
irccatChannel = "#tvl";
|
|
};
|
|
|
|
# Run the first cursed bot (quote bot)
|
|
paroxysm.enable = true;
|
|
|
|
# Run the second cursed bot
|
|
owothia = {
|
|
enable = true;
|
|
ircServer = "localhost";
|
|
ircPort = config.services.znc.config.Listener.l.Port;
|
|
};
|
|
|
|
# Run irccat to forward messages to IRC
|
|
irccat = {
|
|
enable = true;
|
|
config = {
|
|
tcp.listen = ":4722"; # "ircc"
|
|
irc = {
|
|
server = "localhost:${toString config.services.znc.config.Listener.l.Port}";
|
|
tls = false;
|
|
nick = "tvlbot";
|
|
# Note: irccat means 'ident' where it says 'realname', so
|
|
# this is critical for connecting to ZNC.
|
|
realname = "tvlbot";
|
|
channels = [
|
|
"#tvl"
|
|
];
|
|
};
|
|
};
|
|
};
|
|
|
|
# Run atward, the search engine redirection thing.
|
|
atward.enable = true;
|
|
|
|
# Run a Nixery instance
|
|
nixery.enable = true;
|
|
|
|
# Run cgit & josh to serve git
|
|
git-serving.enable = true;
|
|
|
|
# Configure backups to GleSYS
|
|
restic = {
|
|
enable = true;
|
|
paths = [
|
|
"/var/backup/postgresql"
|
|
"/var/lib/grafana"
|
|
"/var/lib/znc"
|
|
];
|
|
};
|
|
|
|
# Run autosubmit bot for Gerrit
|
|
gerrit-queue.enable = true;
|
|
};
|
|
|
|
services.postgresql = {
|
|
enable = true;
|
|
enableTCPIP = true;
|
|
|
|
authentication = lib.mkForce ''
|
|
local all all trust
|
|
host all all 127.0.0.1/32 password
|
|
host all all ::1/128 password
|
|
hostnossl all all 127.0.0.1/32 password
|
|
hostnossl all all ::1/128 password
|
|
'';
|
|
|
|
ensureDatabases = [
|
|
"panettone"
|
|
];
|
|
|
|
ensureUsers = [{
|
|
name = "panettone";
|
|
ensurePermissions = {
|
|
"DATABASE panettone" = "ALL PRIVILEGES";
|
|
};
|
|
}];
|
|
};
|
|
|
|
services.postgresqlBackup = {
|
|
enable = true;
|
|
databases = [
|
|
"keycloak"
|
|
"panettone"
|
|
"tvldb"
|
|
];
|
|
};
|
|
|
|
services.nix-serve = {
|
|
enable = true;
|
|
port = 6443;
|
|
secretKeyFile = "/run/agenix/nix-cache-priv";
|
|
bindAddress = "localhost";
|
|
};
|
|
|
|
services.fail2ban.enable = true;
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
bb
|
|
curl
|
|
direnv
|
|
emacs-nox
|
|
git
|
|
htop
|
|
jq
|
|
nano
|
|
ripgrep
|
|
rxvt_unicode.terminfo
|
|
foot.terminfo
|
|
kitty.terminfo
|
|
alacritty.terminfo
|
|
vim
|
|
zfs
|
|
zfstools
|
|
];
|
|
|
|
services.journaldriver = {
|
|
enable = true;
|
|
googleCloudProject = "tvl-fyi";
|
|
logStream = "whitby";
|
|
applicationCredentials = "/var/lib/journaldriver/key.json";
|
|
};
|
|
|
|
# Configure Prometheus & Grafana. Exporter configuration for
|
|
# Prometheus is inside the respective service modules.
|
|
services.prometheus = {
|
|
enable = true;
|
|
exporters.node = {
|
|
enable = true;
|
|
|
|
enabledCollectors = [
|
|
"logind"
|
|
"processes"
|
|
"systemd"
|
|
];
|
|
};
|
|
|
|
scrapeConfigs = [{
|
|
job_name = "node";
|
|
scrape_interval = "5s";
|
|
static_configs = [{
|
|
targets = ["localhost:${toString config.services.prometheus.exporters.node.port}"];
|
|
}];
|
|
}];
|
|
};
|
|
|
|
services.grafana = {
|
|
enable = true;
|
|
port = 4723; # "graf" on phone keyboard
|
|
domain = "status.tvl.su";
|
|
rootUrl = "https://status.tvl.su";
|
|
analytics.reporting.enable = false;
|
|
extraOptions = let
|
|
options = {
|
|
auth = {
|
|
generic_oauth = {
|
|
enabled = true;
|
|
client_id = "OAUTH-TVL-grafana-f1A1EmHLDT";
|
|
scopes = "openid profile email";
|
|
name = "TVL";
|
|
email_attribute_path = "mail";
|
|
login_attribute_path = "sub";
|
|
name_attribute_path = "displayName";
|
|
auth_url = "https://login.tvl.fyi/oidc/authorize";
|
|
token_url = "https://login.tvl.fyi/oidc/accessToken";
|
|
api_url = "https://login.tvl.fyi/oidc/profile";
|
|
|
|
# Give lukegb, grfn, tazjin "Admin" rights.
|
|
role_attribute_path = "((sub == 'lukegb' || sub == 'grfn' || sub == 'tazjin') && 'Admin') || 'Editor'";
|
|
|
|
# Allow creating new Grafana accounts from OAuth accounts.
|
|
allow_sign_up = true;
|
|
};
|
|
anonymous = {
|
|
enabled = true;
|
|
org_name = "The Virus Lounge";
|
|
org_role = "Viewer";
|
|
};
|
|
basic.enabled = false;
|
|
oauth_auto_login = true;
|
|
disable_login_form = true;
|
|
};
|
|
};
|
|
inherit (builtins) typeOf replaceStrings listToAttrs concatLists;
|
|
inherit (lib) toUpper mapAttrsToList nameValuePair concatStringsSep;
|
|
|
|
# Take ["auth" "generic_oauth" "enabled"] and turn it into OPTIONS_GENERIC_OAUTH_ENABLED.
|
|
encodeName = raw: replaceStrings ["."] ["_"] (toUpper (concatStringsSep "_" raw));
|
|
|
|
# Turn an option value into a string, but we want bools to be sensible strings and not "1" or "".
|
|
optionToString = value:
|
|
if (typeOf value) == "bool" then
|
|
if value then "true" else "false"
|
|
else builtins.toString value;
|
|
|
|
# Turn an nested options attrset into a flat listToAttrs-compatible list.
|
|
encodeOptions = prefix: inp: concatLists (mapAttrsToList (name: value:
|
|
if (typeOf value) == "set"
|
|
then encodeOptions (prefix ++ [name]) value
|
|
else [ (nameValuePair (encodeName (prefix ++ [name])) (optionToString value)) ]
|
|
) inp);
|
|
in listToAttrs (encodeOptions [] options);
|
|
|
|
provision = {
|
|
enable = true;
|
|
datasources = [{
|
|
name = "Prometheus";
|
|
type = "prometheus";
|
|
url = "http://localhost:9090";
|
|
}];
|
|
};
|
|
};
|
|
|
|
# Contains GF_AUTH_GENERIC_OAUTH_CLIENT_SECRET.
|
|
systemd.services.grafana.serviceConfig.EnvironmentFile = "/run/agenix/grafana";
|
|
|
|
services.keycloak = {
|
|
enable = true;
|
|
httpPort = "5925"; # "kycl"
|
|
frontendUrl = "https://auth.tvl.fyi/auth/";
|
|
|
|
database = {
|
|
type = "postgresql";
|
|
passwordFile = "/run/agenix/keycloak-db";
|
|
createLocally = false;
|
|
};
|
|
|
|
# Configure Keycloak to look at forwarded headers from the reverse
|
|
# proxy.
|
|
extraConfig = {
|
|
"subsystem=undertow" = {
|
|
"server=default-server" = {
|
|
"http-listener=default" = {
|
|
proxy-address-forwarding = "true";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
# Allow Keycloak access to the LDAP module by forcing in the JVM
|
|
# configuration
|
|
systemd.services.keycloak.environment.PREPEND_JAVA_OPTS =
|
|
"--add-exports=java.naming/com.sun.jndi.ldap=ALL-UNNAMED";
|
|
|
|
security.sudo.extraRules = [
|
|
{
|
|
groups = ["wheel"];
|
|
commands = [{ command = "ALL"; options = ["NOPASSWD"]; }];
|
|
}
|
|
];
|
|
|
|
users = {
|
|
users.tazjin = {
|
|
isNormalUser = true;
|
|
extraGroups = [ "git" "wheel" ];
|
|
shell = pkgs.fish;
|
|
openssh.authorizedKeys.keys = depot.users.tazjin.keys.all;
|
|
};
|
|
|
|
users.lukegb = {
|
|
isNormalUser = true;
|
|
extraGroups = [ "git" "wheel" ];
|
|
openssh.authorizedKeys.keys = depot.users.lukegb.keys.all;
|
|
};
|
|
|
|
users.grfn = {
|
|
isNormalUser = true;
|
|
extraGroups = [ "git" "wheel" ];
|
|
openssh.authorizedKeys.keys = [
|
|
depot.users.grfn.keys.whitby
|
|
];
|
|
};
|
|
|
|
users.isomer = {
|
|
isNormalUser = true;
|
|
extraGroups = [ "git" ];
|
|
openssh.authorizedKeys.keys = depot.users.isomer.keys.all;
|
|
};
|
|
|
|
users.riking = {
|
|
isNormalUser = true;
|
|
extraGroups = [ "git" ];
|
|
openssh.authorizedKeys.keys = depot.users.riking.keys.u2f ++ depot.users.riking.keys.passworded;
|
|
};
|
|
|
|
users.edef = {
|
|
isNormalUser = true;
|
|
extraGroups = [ "git" ];
|
|
openssh.authorizedKeys.keys = depot.users.edef.keys.all;
|
|
};
|
|
|
|
users.qyliss = {
|
|
isNormalUser = true;
|
|
extraGroups = [ "git" ];
|
|
openssh.authorizedKeys.keys = depot.users.qyliss.keys.all;
|
|
};
|
|
|
|
users.eta = {
|
|
isNormalUser = true;
|
|
extraGroups = [ "git" ];
|
|
openssh.authorizedKeys.keys = depot.users.eta.keys.whitby;
|
|
};
|
|
|
|
users.cynthia = {
|
|
isNormalUser = true; # I'm normal OwO :3
|
|
extraGroups = [ "git" ];
|
|
openssh.authorizedKeys.keys = depot.users.cynthia.keys.all;
|
|
};
|
|
|
|
users.firefly = {
|
|
isNormalUser = true;
|
|
extraGroups = [ "git" ];
|
|
openssh.authorizedKeys.keys = depot.users.firefly.keys.whitby;
|
|
};
|
|
|
|
users.sterni = {
|
|
isNormalUser = true;
|
|
extraGroups = [ "git" "wheel" ];
|
|
openssh.authorizedKeys.keys = depot.users.sterni.keys.all;
|
|
};
|
|
|
|
users.flokli = {
|
|
isNormalUser = true;
|
|
extraGroups = [ "git" ];
|
|
openssh.authorizedKeys.keys = depot.users.flokli.keys.all;
|
|
};
|
|
|
|
# Set up a user & group for git shenanigans
|
|
groups.git = {};
|
|
users.git = {
|
|
group = "git";
|
|
isSystemUser = true;
|
|
createHome = true;
|
|
home = "/var/lib/git";
|
|
};
|
|
};
|
|
|
|
security.acme = {
|
|
acceptTerms = true;
|
|
email = "certs@tvl.fyi";
|
|
};
|
|
|
|
system.stateVersion = "20.03";
|
|
}
|