aa122cbae7
This CL can be used to compare the style of nixpkgs-fmt against other formatters (nixpkgs, alejandra). Change-Id: I87c6abff6bcb546b02ead15ad0405f81e01b6d9e Reviewed-on: https://cl.tvl.fyi/c/depot/+/4397 Tested-by: BuildkiteCI Reviewed-by: sterni <sternenseemann@systemli.org> Reviewed-by: lukegb <lukegb@tvl.fyi> Reviewed-by: wpcarro <wpcarro@gmail.com> Reviewed-by: Profpatsch <mail@profpatsch.de> Reviewed-by: kanepyork <rikingcoding@gmail.com> Reviewed-by: tazjin <tazjin@tvl.su> Reviewed-by: cynthia <cynthia@tvl.fyi> Reviewed-by: edef <edef@edef.eu> Reviewed-by: eta <tvl@eta.st> Reviewed-by: grfn <grfn@gws.fyi>
179 lines
4.7 KiB
Nix
179 lines
4.7 KiB
Nix
{ depot, pkgs, ... }:
|
|
|
|
let
|
|
inherit (depot.users) wpcarro;
|
|
name = "diogenes";
|
|
domainName = "billandhiscomputer.com";
|
|
in
|
|
wpcarro.terraform.googleCloudVM {
|
|
project = "wpcarros-infrastructure";
|
|
name = "diogenes";
|
|
region = "us-central1";
|
|
zone = "us-central1-a";
|
|
|
|
# DNS configuration
|
|
extraConfig = {
|
|
# billandhiscomputer.com
|
|
resource.google_dns_managed_zone."${name}" = {
|
|
inherit name;
|
|
dns_name = "${domainName}.";
|
|
};
|
|
|
|
resource.google_dns_record_set."${name}" = {
|
|
name = "${domainName}.";
|
|
type = "A";
|
|
ttl = 300; # 5m
|
|
managed_zone = "\${google_dns_managed_zone.${name}.name}";
|
|
rrdatas = [ "\${google_compute_instance.${name}.network_interface[0].access_config[0].nat_ip}" ];
|
|
};
|
|
|
|
resource.google_compute_instance."${name}" = {
|
|
network_interface.access_config = {
|
|
public_ptr_domain_name = "${domainName}.";
|
|
};
|
|
};
|
|
|
|
# monsterpoker.app
|
|
resource.google_dns_managed_zone."monsterpoker" = {
|
|
name = "monsterpoker";
|
|
dns_name = "monsterpoker.app.";
|
|
};
|
|
|
|
resource.google_dns_record_set."monsterpoker" = {
|
|
name = "monsterpoker.app.";
|
|
type = "A";
|
|
ttl = 300; # 5m
|
|
managed_zone = "\${google_dns_managed_zone.monsterpoker.name}";
|
|
rrdatas = [ "\${google_compute_instance.${name}.network_interface[0].access_config[0].nat_ip}" ];
|
|
};
|
|
};
|
|
|
|
configuration = {
|
|
imports = [
|
|
"${depot.path}/ops/modules/quassel.nix"
|
|
];
|
|
|
|
networking = {
|
|
firewall.allowedTCPPorts = [
|
|
22 # ssh
|
|
80 # http
|
|
443 # https
|
|
6698 # quassel
|
|
];
|
|
firewall.allowedUDPPortRanges = [
|
|
{ from = 60000; to = 61000; } # mosh
|
|
];
|
|
};
|
|
|
|
# Use the TVL binary cache
|
|
tvl.cache.enable = true;
|
|
|
|
users = {
|
|
mutableUsers = true;
|
|
users = {
|
|
root = {
|
|
openssh.authorizedKeys.keys = wpcarro.keys.all;
|
|
};
|
|
wpcarro = {
|
|
isNormalUser = true;
|
|
extraGroups = [ "wheel" "quassel" ];
|
|
openssh.authorizedKeys.keys = wpcarro.keys.all;
|
|
shell = pkgs.fish;
|
|
};
|
|
# This is required so that quasselcore can read the ACME cert in
|
|
# /var/lib/acme, which is only available to user=acme or group=nginx.
|
|
quassel.extraGroups = [ "nginx" ];
|
|
};
|
|
};
|
|
|
|
security = {
|
|
acme = {
|
|
acceptTerms = true;
|
|
defaults.email = "wpcarro@gmail.com";
|
|
};
|
|
|
|
sudo.wheelNeedsPassword = false;
|
|
};
|
|
|
|
programs = wpcarro.common.programs // {
|
|
mosh.enable = true;
|
|
};
|
|
|
|
# I won't have an Emacs server running on diogenes, and I'll likely be in an
|
|
# SSH session from within vterm. As such, Vim is one of the few editors that
|
|
# I tolerably navigate this way.
|
|
environment.variables = {
|
|
EDITOR = "vim";
|
|
};
|
|
|
|
environment.systemPackages = wpcarro.common.shell-utils;
|
|
|
|
services = wpcarro.common.services // {
|
|
# TODO(wpcarro): Re-enable this when rebuild-system better supports
|
|
# terraform deployments.
|
|
# depot.auto-deploy = {
|
|
# enable = true;
|
|
# interval = "1h";
|
|
# };
|
|
|
|
# TODO(wpcarro): Re-enable this after debugging ACME and NXDOMAIN.
|
|
depot.quassel = {
|
|
enable = true;
|
|
acmeHost = domainName;
|
|
bindAddresses = [
|
|
"0.0.0.0"
|
|
];
|
|
};
|
|
|
|
journaldriver = {
|
|
enable = true;
|
|
logStream = "home";
|
|
googleCloudProject = "wpcarros-infrastructure";
|
|
applicationCredentials = "/etc/gcp/key.json";
|
|
};
|
|
|
|
nginx = {
|
|
enable = true;
|
|
enableReload = true;
|
|
|
|
recommendedTlsSettings = true;
|
|
recommendedGzipSettings = true;
|
|
recommendedProxySettings = true;
|
|
|
|
# for journaldriver
|
|
commonHttpConfig = ''
|
|
log_format json_combined escape=json
|
|
'{'
|
|
'"remote_addr":"$remote_addr",'
|
|
'"method":"$request_method",'
|
|
'"host":"$host",'
|
|
'"uri":"$request_uri",'
|
|
'"status":$status,'
|
|
'"request_size":$request_length,'
|
|
'"response_size":$body_bytes_sent,'
|
|
'"response_time":$request_time,'
|
|
'"referrer":"$http_referer",'
|
|
'"user_agent":"$http_user_agent"'
|
|
'}';
|
|
|
|
access_log syslog:server=unix:/dev/log,nohostname json_combined;
|
|
'';
|
|
|
|
virtualHosts = {
|
|
"${domainName}" = {
|
|
addSSL = true;
|
|
enableACME = true;
|
|
root = wpcarro.website.root;
|
|
};
|
|
"monsterpoker.app" = {
|
|
addSSL = true;
|
|
enableACME = true;
|
|
root = wpcarro.clients.monsterpoker;
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
system.stateVersion = "21.11";
|
|
};
|
|
}
|