dd5ce78dbd
Rather than defining all system users inline on whitby, move them into a module that can be imported on multiple machines. Configuration for terminfos that we've added follows along. Note that while doing this I've disabled logins for riking and isomer since they are currently inactive in TVL. Change-Id: Id18031d355afc34079c5e6e49dc6943e61809a8f Reviewed-on: https://cl.tvl.fyi/c/depot/+/5298 Tested-by: BuildkiteCI Reviewed-by: sterni <sternenseemann@systemli.org> Autosubmit: tazjin <tazjin@tvl.su>
660 lines
17 KiB
Nix
660 lines
17 KiB
Nix
{ depot, lib, pkgs, ... }: # readTree options
|
|
{ config, ... }: # passed by module system
|
|
|
|
let
|
|
inherit (builtins) listToAttrs;
|
|
inherit (lib) range;
|
|
in
|
|
{
|
|
imports = [
|
|
"${depot.path}/ops/modules/atward.nix"
|
|
"${depot.path}/ops/modules/cgit/default.nix"
|
|
"${depot.path}/ops/modules/clbot.nix"
|
|
"${depot.path}/ops/modules/gerrit-queue.nix"
|
|
"${depot.path}/ops/modules/irccat.nix"
|
|
"${depot.path}/ops/modules/josh.nix"
|
|
"${depot.path}/ops/modules/monorepo-gerrit.nix"
|
|
"${depot.path}/ops/modules/nixery.nix"
|
|
"${depot.path}/ops/modules/oauth2_proxy.nix"
|
|
"${depot.path}/ops/modules/owothia.nix"
|
|
"${depot.path}/ops/modules/panettone.nix"
|
|
"${depot.path}/ops/modules/paroxysm.nix"
|
|
"${depot.path}/ops/modules/restic.nix"
|
|
"${depot.path}/ops/modules/smtprelay.nix"
|
|
"${depot.path}/ops/modules/sourcegraph.nix"
|
|
"${depot.path}/ops/modules/tvl-buildkite.nix"
|
|
"${depot.path}/ops/modules/tvl-slapd/default.nix"
|
|
"${depot.path}/ops/modules/tvl-users.nix"
|
|
"${depot.path}/ops/modules/www/atward.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/auth.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/b.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/cache.tvl.su.nix"
|
|
"${depot.path}/ops/modules/www/cl.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/code.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/cs.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/deploys.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/images.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/nixery.dev.nix"
|
|
"${depot.path}/ops/modules/www/static.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/status.tvl.su.nix"
|
|
"${depot.path}/ops/modules/www/tazj.in.nix"
|
|
"${depot.path}/ops/modules/www/todo.tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/tvl.fyi.nix"
|
|
"${depot.path}/ops/modules/www/tvl.su.nix"
|
|
"${depot.path}/ops/modules/www/wigglydonke.rs.nix"
|
|
"${depot.third_party.agenix.src}/modules/age.nix"
|
|
"${pkgs.path}/nixos/modules/services/web-apps/gerrit.nix"
|
|
];
|
|
|
|
hardware = {
|
|
enableRedistributableFirmware = true;
|
|
cpu.amd.updateMicrocode = true;
|
|
};
|
|
|
|
boot = {
|
|
tmpOnTmpfs = true;
|
|
kernelModules = [ "kvm-amd" ];
|
|
supportedFilesystems = [ "zfs" ];
|
|
|
|
initrd = {
|
|
availableKernelModules = [
|
|
"igb"
|
|
"xhci_pci"
|
|
"nvme"
|
|
"ahci"
|
|
"usbhid"
|
|
"usb_storage"
|
|
"sr_mod"
|
|
];
|
|
|
|
# Enable SSH in the initrd so that we can enter disk encryption
|
|
# passwords remotely.
|
|
network = {
|
|
enable = true;
|
|
ssh = {
|
|
enable = true;
|
|
port = 2222;
|
|
authorizedKeys =
|
|
depot.users.tazjin.keys.all
|
|
++ depot.users.lukegb.keys.all
|
|
++ [ depot.users.grfn.keys.whitby ];
|
|
|
|
hostKeys = [
|
|
/etc/secrets/initrd_host_ed25519_key
|
|
];
|
|
};
|
|
|
|
# this will launch the zfs password prompt on login and kill the
|
|
# other prompt
|
|
postCommands = ''
|
|
echo "zfs load-key -a && killall zfs" >> /root/.profile
|
|
'';
|
|
};
|
|
};
|
|
|
|
kernel.sysctl = {
|
|
"net.ipv4.tcp_congestion_control" = "bbr";
|
|
};
|
|
|
|
loader.grub = {
|
|
enable = true;
|
|
version = 2;
|
|
efiSupport = true;
|
|
efiInstallAsRemovable = true;
|
|
device = "/dev/disk/by-id/nvme-SAMSUNG_MZQLB1T9HAJR-00007_S439NA0N201620";
|
|
};
|
|
|
|
zfs.requestEncryptionCredentials = true;
|
|
};
|
|
|
|
fileSystems = {
|
|
"/" = {
|
|
device = "zroot/root";
|
|
fsType = "zfs";
|
|
};
|
|
|
|
"/boot" = {
|
|
device = "/dev/disk/by-uuid/073E-7FBD";
|
|
fsType = "vfat";
|
|
};
|
|
|
|
"/nix" = {
|
|
device = "zroot/nix";
|
|
fsType = "zfs";
|
|
};
|
|
|
|
"/home" = {
|
|
device = "zroot/home";
|
|
fsType = "zfs";
|
|
};
|
|
};
|
|
|
|
networking = {
|
|
# Glass is boring, but Luke doesn't like Wapping - the Prospect of
|
|
# Whitby, however, is quite a pleasant establishment.
|
|
hostName = "whitby";
|
|
domain = "tvl.fyi";
|
|
hostId = "b38ca543";
|
|
useDHCP = false;
|
|
|
|
# Don't use Hetzner's DNS servers.
|
|
nameservers = [
|
|
"8.8.8.8"
|
|
"8.8.4.4"
|
|
];
|
|
|
|
defaultGateway6 = {
|
|
address = "fe80::1";
|
|
interface = "enp196s0";
|
|
};
|
|
|
|
firewall.allowedTCPPorts = [ 22 80 443 4238 8443 29418 ];
|
|
firewall.allowedUDPPorts = [ 8443 ];
|
|
|
|
interfaces.enp196s0.useDHCP = true;
|
|
interfaces.enp196s0.ipv6.addresses = [
|
|
{
|
|
address = "2a01:04f8:0242:5b21::feed:edef:beef";
|
|
prefixLength = 64;
|
|
}
|
|
];
|
|
};
|
|
|
|
# Generate an immutable /etc/resolv.conf from the nameserver settings
|
|
# above (otherwise DHCP overwrites it):
|
|
environment.etc."resolv.conf" = with lib; {
|
|
source = pkgs.writeText "resolv.conf" ''
|
|
${concatStringsSep "\n" (map (ns: "nameserver ${ns}") config.networking.nameservers)}
|
|
options edns0
|
|
'';
|
|
};
|
|
|
|
# Disable background git gc system-wide, as it has a tendency to break CI.
|
|
environment.etc."gitconfig".source = pkgs.writeText "gitconfig" ''
|
|
[gc]
|
|
autoDetach = false
|
|
'';
|
|
|
|
time.timeZone = "UTC";
|
|
|
|
nix = {
|
|
nrBuildUsers = 256;
|
|
maxJobs = lib.mkDefault 64;
|
|
extraOptions = ''
|
|
secret-key-files = /run/agenix/nix-cache-priv
|
|
'';
|
|
|
|
trustedUsers = [
|
|
"grfn"
|
|
"lukegb"
|
|
"tazjin"
|
|
"sterni"
|
|
];
|
|
|
|
sshServe = {
|
|
enable = true;
|
|
keys = with depot.users;
|
|
tazjin.keys.all
|
|
++ lukegb.keys.all
|
|
++ [ grfn.keys.whitby ]
|
|
++ sterni.keys.all
|
|
;
|
|
};
|
|
};
|
|
|
|
programs.mtr.enable = true;
|
|
programs.mosh.enable = true;
|
|
services.openssh = {
|
|
enable = true;
|
|
passwordAuthentication = false;
|
|
challengeResponseAuthentication = false;
|
|
};
|
|
|
|
# Configure secrets for services that need them.
|
|
age.secrets =
|
|
let
|
|
secretFile = name: depot.ops.secrets."${name}.age";
|
|
in
|
|
{
|
|
clbot.file = secretFile "clbot";
|
|
gerrit-queue.file = secretFile "gerrit-queue";
|
|
grafana.file = secretFile "grafana";
|
|
irccat.file = secretFile "irccat";
|
|
keycloak-db.file = secretFile "keycloak-db";
|
|
nix-cache-priv.file = secretFile "nix-cache-priv";
|
|
oauth2_proxy.file = secretFile "oauth2_proxy";
|
|
owothia.file = secretFile "owothia";
|
|
panettone.file = secretFile "panettone";
|
|
smtprelay.file = secretFile "smtprelay";
|
|
|
|
buildkite-agent-token = {
|
|
file = secretFile "buildkite-agent-token";
|
|
mode = "0440";
|
|
group = "buildkite-agents";
|
|
};
|
|
|
|
buildkite-graphql-token = {
|
|
file = secretFile "buildkite-graphql-token";
|
|
mode = "0440";
|
|
group = "buildkite-agents";
|
|
};
|
|
|
|
buildkite-besadii-config = {
|
|
file = secretFile "besadii";
|
|
mode = "0440";
|
|
group = "buildkite-agents";
|
|
};
|
|
|
|
gerrit-besadii-config = {
|
|
file = secretFile "besadii";
|
|
owner = "git";
|
|
};
|
|
|
|
gerrit-secrets = {
|
|
file = secretFile "gerrit-secrets";
|
|
path = "/var/lib/gerrit/etc/secure.config";
|
|
owner = "git";
|
|
mode = "0400";
|
|
};
|
|
|
|
clbot-ssh = {
|
|
file = secretFile "clbot-ssh";
|
|
owner = "clbot";
|
|
};
|
|
|
|
# Not actually a secret
|
|
nix-cache-pub = {
|
|
file = secretFile "nix-cache-pub";
|
|
mode = "0444";
|
|
};
|
|
};
|
|
|
|
# Automatically collect garbage from the Nix store.
|
|
services.depot.automatic-gc = {
|
|
enable = true;
|
|
interval = "1 hour";
|
|
diskThreshold = 200; # GiB
|
|
maxFreed = 420; # GiB
|
|
preserveGenerations = "90d";
|
|
};
|
|
|
|
# Run a handful of Buildkite agents to support parallel builds.
|
|
services.depot.buildkite = {
|
|
enable = true;
|
|
agentCount = 32;
|
|
};
|
|
|
|
# Start a local SMTP relay to Gmail (used by gerrit)
|
|
services.depot.smtprelay = {
|
|
enable = true;
|
|
args = {
|
|
listen = ":2525";
|
|
remote_host = "smtp.gmail.com:587";
|
|
remote_auth = "plain";
|
|
remote_user = "tvlbot@tazj.in";
|
|
};
|
|
};
|
|
|
|
# Start a ZNC instance which bounces for tvlbot and owothia.
|
|
services.znc = {
|
|
enable = true;
|
|
useLegacyConfig = false;
|
|
config = {
|
|
LoadModule = [
|
|
"webadmin"
|
|
"adminlog"
|
|
];
|
|
|
|
User.admin = {
|
|
Admin = true;
|
|
Pass.password = {
|
|
Method = "sha256";
|
|
Hash = "bb00aa8239de484c2925b1c3f6a196fb7612633f001daa9b674f83abe7e1103f";
|
|
Salt = "TiB0Ochb1CrtpMTl;2;j";
|
|
};
|
|
};
|
|
|
|
Listener.l = {
|
|
Host = "localhost";
|
|
Port = 2627; # bncr
|
|
SSL = false;
|
|
};
|
|
};
|
|
};
|
|
|
|
# Start the Gerrit->IRC bot
|
|
services.depot.clbot = {
|
|
enable = true;
|
|
channels = [ "#tvl" ];
|
|
|
|
# See //fun/clbot for details.
|
|
flags = {
|
|
gerrit_host = "cl.tvl.fyi:29418";
|
|
gerrit_ssh_auth_username = "clbot";
|
|
gerrit_ssh_auth_key = "/run/agenix/clbot-ssh";
|
|
|
|
irc_server = "localhost:${toString config.services.znc.config.Listener.l.Port}";
|
|
irc_user = "tvlbot";
|
|
irc_nick = "tvlbot";
|
|
|
|
notify_branches = "canon,refs/meta/config";
|
|
notify_repo = "depot";
|
|
|
|
# This secret is read from an environment variable, which is
|
|
# populated by a systemd EnvironmentFile.
|
|
irc_pass = "$CLBOT_PASS";
|
|
};
|
|
};
|
|
|
|
services.depot = {
|
|
# Run a SourceGraph code search instance
|
|
sourcegraph.enable = true;
|
|
|
|
# Run the Panettone issue tracker
|
|
panettone = {
|
|
enable = true;
|
|
dbUser = "panettone";
|
|
dbName = "panettone";
|
|
irccatChannel = "#tvl";
|
|
};
|
|
|
|
# Run the first cursed bot (quote bot)
|
|
paroxysm.enable = true;
|
|
|
|
# Run the second cursed bot
|
|
owothia = {
|
|
enable = true;
|
|
ircServer = "localhost";
|
|
ircPort = config.services.znc.config.Listener.l.Port;
|
|
};
|
|
|
|
# Run irccat to forward messages to IRC
|
|
irccat = {
|
|
enable = true;
|
|
config = {
|
|
tcp.listen = ":4722"; # "ircc"
|
|
irc = {
|
|
server = "localhost:${toString config.services.znc.config.Listener.l.Port}";
|
|
tls = false;
|
|
nick = "tvlbot";
|
|
# Note: irccat means 'ident' where it says 'realname', so
|
|
# this is critical for connecting to ZNC.
|
|
realname = "tvlbot";
|
|
channels = [
|
|
"#tvl"
|
|
];
|
|
};
|
|
};
|
|
};
|
|
|
|
# Run atward, the search engine redirection thing.
|
|
atward.enable = true;
|
|
|
|
# Run a Nixery instance
|
|
nixery.enable = true;
|
|
|
|
# Run cgit & josh to serve git
|
|
cgit.enable = true;
|
|
josh.enable = true;
|
|
|
|
# Configure backups to GleSYS
|
|
restic = {
|
|
enable = true;
|
|
paths = [
|
|
"/var/backup/postgresql"
|
|
"/var/lib/grafana"
|
|
"/var/lib/znc"
|
|
];
|
|
};
|
|
|
|
# Run autosubmit bot for Gerrit
|
|
gerrit-queue.enable = true;
|
|
|
|
# Run oauth2_proxy for internal service auth
|
|
oauth2_proxy.enable = true;
|
|
};
|
|
|
|
services.postgresql = {
|
|
enable = true;
|
|
enableTCPIP = true;
|
|
|
|
authentication = lib.mkForce ''
|
|
local all all trust
|
|
host all all 127.0.0.1/32 password
|
|
host all all ::1/128 password
|
|
hostnossl all all 127.0.0.1/32 password
|
|
hostnossl all all ::1/128 password
|
|
'';
|
|
|
|
ensureDatabases = [
|
|
"panettone"
|
|
];
|
|
|
|
ensureUsers = [{
|
|
name = "panettone";
|
|
ensurePermissions = {
|
|
"DATABASE panettone" = "ALL PRIVILEGES";
|
|
};
|
|
}];
|
|
};
|
|
|
|
services.postgresqlBackup = {
|
|
enable = true;
|
|
databases = [
|
|
"keycloak"
|
|
"panettone"
|
|
"tvldb"
|
|
];
|
|
};
|
|
|
|
services.nix-serve = {
|
|
enable = true;
|
|
port = 6443;
|
|
secretKeyFile = "/run/agenix/nix-cache-priv";
|
|
bindAddress = "localhost";
|
|
};
|
|
|
|
services.fail2ban.enable = true;
|
|
|
|
environment.systemPackages = (with pkgs; [
|
|
bat
|
|
bb
|
|
curl
|
|
direnv
|
|
emacs-nox
|
|
fd
|
|
git
|
|
htop
|
|
hyperfine
|
|
jq
|
|
nano
|
|
nvd
|
|
ripgrep
|
|
tree
|
|
unzip
|
|
vim
|
|
zfs
|
|
zfstools
|
|
]) ++ (with depot; [
|
|
ops.deploy-whitby
|
|
]);
|
|
|
|
services.journaldriver = {
|
|
enable = true;
|
|
googleCloudProject = "tvl-fyi";
|
|
logStream = "whitby";
|
|
applicationCredentials = "/var/lib/journaldriver/key.json";
|
|
};
|
|
|
|
# Required for prometheus to be able to scrape stats
|
|
services.nginx.statusPage = true;
|
|
|
|
# Configure Prometheus & Grafana. Exporter configuration for
|
|
# Prometheus is inside the respective service modules.
|
|
services.prometheus = {
|
|
enable = true;
|
|
|
|
exporters = {
|
|
node = {
|
|
enable = true;
|
|
|
|
enabledCollectors = [
|
|
"logind"
|
|
"processes"
|
|
"systemd"
|
|
];
|
|
};
|
|
|
|
nginx = {
|
|
enable = true;
|
|
sslVerify = false;
|
|
constLabels = [ "host=whitby" ];
|
|
};
|
|
};
|
|
|
|
scrapeConfigs = [{
|
|
job_name = "node";
|
|
scrape_interval = "5s";
|
|
static_configs = [{
|
|
targets = [ "localhost:${toString config.services.prometheus.exporters.node.port}" ];
|
|
}];
|
|
}
|
|
{
|
|
job_name = "nginx";
|
|
scrape_interval = "5s";
|
|
static_configs = [{
|
|
targets = [ "localhost:${toString config.services.prometheus.exporters.nginx.port}" ];
|
|
}];
|
|
}];
|
|
};
|
|
|
|
services.grafana = {
|
|
enable = true;
|
|
port = 4723; # "graf" on phone keyboard
|
|
domain = "status.tvl.su";
|
|
rootUrl = "https://status.tvl.su";
|
|
analytics.reporting.enable = false;
|
|
extraOptions =
|
|
let
|
|
options = {
|
|
auth = {
|
|
generic_oauth = {
|
|
enabled = true;
|
|
client_id = "grafana";
|
|
scopes = "openid profile email";
|
|
name = "TVL";
|
|
email_attribute_path = "mail";
|
|
login_attribute_path = "sub";
|
|
name_attribute_path = "displayName";
|
|
auth_url = "https://auth.tvl.fyi/auth/realms/TVL/protocol/openid-connect/auth";
|
|
token_url = "https://auth.tvl.fyi/auth/realms/TVL/protocol/openid-connect/token";
|
|
api_url = "https://auth.tvl.fyi/auth/realms/TVL/protocol/openid-connect/userinfo";
|
|
|
|
# Give lukegb, grfn, tazjin "Admin" rights.
|
|
role_attribute_path = "((sub == 'lukegb' || sub == 'grfn' || sub == 'tazjin') && 'Admin') || 'Editor'";
|
|
|
|
# Allow creating new Grafana accounts from OAuth accounts.
|
|
allow_sign_up = true;
|
|
};
|
|
|
|
anonymous = {
|
|
enabled = true;
|
|
org_name = "The Virus Lounge";
|
|
org_role = "Viewer";
|
|
};
|
|
|
|
basic.enabled = false;
|
|
oauth_auto_login = true;
|
|
disable_login_form = true;
|
|
};
|
|
};
|
|
inherit (builtins) typeOf replaceStrings listToAttrs concatLists;
|
|
inherit (lib) toUpper mapAttrsToList nameValuePair concatStringsSep;
|
|
|
|
# Take ["auth" "generic_oauth" "enabled"] and turn it into OPTIONS_GENERIC_OAUTH_ENABLED.
|
|
encodeName = raw: replaceStrings [ "." ] [ "_" ] (toUpper (concatStringsSep "_" raw));
|
|
|
|
# Turn an option value into a string, but we want bools to be sensible strings and not "1" or "".
|
|
optionToString = value:
|
|
if (typeOf value) == "bool" then
|
|
if value then "true" else "false"
|
|
else builtins.toString value;
|
|
|
|
# Turn an nested options attrset into a flat listToAttrs-compatible list.
|
|
encodeOptions = prefix: inp: concatLists (mapAttrsToList
|
|
(name: value:
|
|
if (typeOf value) == "set"
|
|
then encodeOptions (prefix ++ [ name ]) value
|
|
else [ (nameValuePair (encodeName (prefix ++ [ name ])) (optionToString value)) ]
|
|
)
|
|
inp);
|
|
in
|
|
listToAttrs (encodeOptions [ ] options);
|
|
|
|
provision = {
|
|
enable = true;
|
|
datasources = [{
|
|
name = "Prometheus";
|
|
type = "prometheus";
|
|
url = "http://localhost:9090";
|
|
}];
|
|
};
|
|
};
|
|
|
|
# Contains GF_AUTH_GENERIC_OAUTH_CLIENT_SECRET.
|
|
systemd.services.grafana.serviceConfig.EnvironmentFile = "/run/agenix/grafana";
|
|
|
|
services.keycloak = {
|
|
enable = true;
|
|
httpPort = "5925"; # "kycl"
|
|
frontendUrl = "https://auth.tvl.fyi/auth/";
|
|
|
|
database = {
|
|
type = "postgresql";
|
|
passwordFile = "/run/agenix/keycloak-db";
|
|
createLocally = false;
|
|
};
|
|
|
|
# Configure Keycloak to look at forwarded headers from the reverse
|
|
# proxy.
|
|
extraConfig = {
|
|
"subsystem=undertow" = {
|
|
"server=default-server" = {
|
|
"http-listener=default" = {
|
|
proxy-address-forwarding = "true";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
# Allow Keycloak access to the LDAP module by forcing in the JVM
|
|
# configuration
|
|
systemd.services.keycloak.environment.PREPEND_JAVA_OPTS =
|
|
"--add-exports=java.naming/com.sun.jndi.ldap=ALL-UNNAMED";
|
|
|
|
security.sudo.extraRules = [
|
|
{
|
|
groups = [ "wheel" ];
|
|
commands = [{ command = "ALL"; options = [ "NOPASSWD" ]; }];
|
|
}
|
|
];
|
|
|
|
users = {
|
|
# Set up a user & group for git shenanigans
|
|
groups.git = { };
|
|
users.git = {
|
|
group = "git";
|
|
isSystemUser = true;
|
|
createHome = true;
|
|
home = "/var/lib/git";
|
|
};
|
|
};
|
|
|
|
security.acme = {
|
|
acceptTerms = true;
|
|
defaults.email = "certs@tvl.fyi";
|
|
};
|
|
|
|
system.stateVersion = "20.03";
|
|
}
|