stockholm/krebs/3modules/default.nix

206 lines
6.8 KiB
Nix
Raw Normal View History

2015-07-24 18:48:00 +00:00
{ config, lib, ... }:
2015-10-20 22:08:18 +00:00
with lib;
2015-07-24 18:48:00 +00:00
let
cfg = config.krebs;
out = {
imports = [
./apt-cacher-ng.nix
2015-12-28 18:43:31 +00:00
./backup.nix
./bepasty-server.nix
2015-09-30 23:48:15 +00:00
./build.nix
2015-12-22 18:36:19 +00:00
./buildbot/master.nix
./buildbot/slave.nix
2015-10-25 13:15:21 +00:00
./current.nix
2015-08-13 09:46:09 +00:00
./exim-retiolum.nix
2015-08-14 13:48:17 +00:00
./exim-smarthost.nix
./fetchWallpaper.nix
2015-07-24 18:48:00 +00:00
./github-hosts-sync.nix
./git.nix
2015-11-13 00:16:15 +00:00
./go.nix
2015-10-01 20:10:21 +00:00
./iptables.nix
2015-07-24 18:48:00 +00:00
./nginx.nix
2015-11-06 20:37:58 +00:00
./per-user.nix
2015-08-31 12:22:21 +00:00
./Reaktor.nix
./retiolum-bootstrap.nix
2015-10-05 12:49:36 +00:00
./realwallpaper.nix
2015-07-24 18:48:00 +00:00
./retiolum.nix
./tinc_graphs.nix
2015-07-24 18:48:00 +00:00
./urlwatch.nix
];
options.krebs = api;
2015-07-24 19:38:41 +00:00
config = mkIf cfg.enable imp;
2015-07-24 18:48:00 +00:00
};
api = {
enable = mkEnableOption "krebs";
dns = {
providers = mkOption {
# TODO with types; tree dns.label dns.provider, so we can merge.
# Currently providers can only be merged if aliases occur just once.
type = with types; attrsOf unspecified;
};
};
2015-07-24 19:15:18 +00:00
hosts = mkOption {
type = with types; attrsOf host;
};
users = mkOption {
type = with types; attrsOf user;
};
# XXX is there a better place to define search-domain?
# TODO search-domains :: listOf hostname
search-domain = mkOption {
type = types.hostname;
default = "retiolum";
};
2015-08-16 21:58:02 +00:00
zone-head-config = mkOption {
type = with types; attrsOf str;
description = ''
The zone configuration head which is being used to create the
zone files. The string for each key is pre-pended to the zone file.
'';
# TODO: configure the default somewhere else,
# maybe use krebs.dns.providers
default = {
# github.io -> 192.30.252.154
2015-08-16 21:58:02 +00:00
"krebsco.de" = ''
$TTL 86400
@ IN SOA dns19.ovh.net. tech.ovh.net. (2015052000 86400 3600 3600000 86400)
IN NS ns19.ovh.net.
IN NS dns19.ovh.net.
IN A 192.30.252.154
IN A 192.30.252.153
'';
};
};
};
2015-07-24 19:38:41 +00:00
imp = mkMerge [
{ krebs = import ./lass { inherit lib; }; }
{ krebs = import ./makefu { inherit lib; }; }
2015-12-30 17:15:11 +00:00
{ krebs = import ./miefda { inherit lib; }; }
2015-11-17 18:04:32 +00:00
{ krebs = import ./mv { inherit lib; }; }
2015-10-25 13:07:51 +00:00
{ krebs = import ./shared { inherit lib; }; }
{ krebs = import ./tv { inherit lib; }; }
{
krebs.dns.providers = {
2015-08-13 10:02:26 +00:00
de.krebsco = "zones";
2015-10-18 14:12:14 +00:00
gg23 = "hosts";
2015-11-17 21:15:07 +00:00
shack = "hosts";
internet = "hosts";
retiolum = "hosts";
};
# XXX This overlaps with krebs.retiolum
networking.extraHosts = concatStringsSep "\n" (flatten (
mapAttrsToList (hostname: host:
mapAttrsToList (netname: net:
let
aliases = longs ++ shorts;
providers = dns.split-by-provider net.aliases cfg.dns.providers;
longs = providers.hosts;
shorts =
map (removeSuffix ".${cfg.search-domain}")
(filter (hasSuffix ".${cfg.search-domain}")
longs);
in
map (addr: "${addr} ${toString aliases}") net.addrs
) (filterAttrs (name: host: host.aliases != []) host.nets)
) cfg.hosts
));
2015-08-13 20:28:21 +00:00
2015-08-16 21:58:02 +00:00
# Implements environment.etc."zones/<zone-name>"
environment.etc = let
stripEmptyLines = s: (concatStringsSep "\n"
(remove "\n" (remove "" (splitString "\n" s)))) + "\n";
2015-08-16 21:58:02 +00:00
all-zones = foldAttrs (sum: current: sum + "\n" +current ) ""
2015-10-22 15:17:04 +00:00
([cfg.zone-head-config] ++ combined-hosts);
2015-08-16 21:58:02 +00:00
combined-hosts = (mapAttrsToList (name: value: value.extraZones) cfg.hosts );
2015-10-22 15:17:04 +00:00
in lib.mapAttrs' (name: value: nameValuePair
("zones/" + name)
{ text=(stripEmptyLines value); }) all-zones;
2015-10-05 01:01:21 +00:00
krebs.exim-smarthost.internet-aliases = let
format = from: to:
# TODO assert is-retiolum-mail-address to;
{ inherit from;
to = if typeOf to == "list"
then concatMapStringsSep "," (getAttr "mail") to
else to.mail; };
in mapAttrsToList format (with config.krebs.users; let
spam-ml = [
lass
makefu
tv
];
in {
2015-10-05 01:03:51 +00:00
"postmaster@krebsco.de" = spam-ml; # RFC 822
2015-10-05 01:29:04 +00:00
"lass@krebsco.de" = lass;
"makefu@krebsco.de" = makefu;
2015-10-05 01:01:21 +00:00
"spam@krebsco.de" = spam-ml;
2015-10-05 01:29:04 +00:00
"tv@krebsco.de" = tv;
2015-10-05 01:06:04 +00:00
# XXX These are no internet aliases
# XXX exim-retiolum hosts should be able to relay to retiolum addresses
"lass@retiolum" = lass;
"makefu@retiolum" = makefu;
"spam@retiolum" = spam-ml;
"tv@retiolum" = tv;
2015-10-05 01:01:21 +00:00
});
services.openssh.hostKeys =
let inherit (config.krebs.build.host.ssh) privkey; in
mkIf (privkey != null) (mkForce [privkey]);
services.openssh.knownHosts =
2015-10-09 11:18:21 +00:00
# GitHub's IPv4 address range is 192.30.252.0/22
# Refs https://help.github.com/articles/what-ip-addresses-does-github-use-that-i-should-whitelist/
# 192.30.252.0/22 = 192.30.252.0-192.30.255.255 (1024 addresses)
# Because line length is limited by OPENSSH_LINE_MAX (= 8192),
# we split each /24 into its own entry.
listToAttrs (map
(c: {
name = "github${toString c}";
value = {
hostNames = ["github.com"] ++
map (d: "192.30.${toString c}.${toString d}") (range 0 255);
publicKey = "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa+PXYPCPy6rbTrTtw7PHkccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNlGEYsdlLJizHhbn2mUjvSAHQqZETYP81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWpXLmvU31/yMf+Se8xhHTvKSCZIFImWwoG6mbUoWf9nzpIoaSjB+weqqUUmpaaasXVal72J+UX2B+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lGHSZXy28G3skua2SmVi/w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ==";
};
})
(range 252 255))
//
mapAttrs
(name: host: {
hostNames =
concatLists
(mapAttrsToList
(net-name: net:
let
aliases = shorts ++ longs;
longs = net.aliases;
shorts =
map (removeSuffix ".${cfg.search-domain}")
(filter (hasSuffix ".${cfg.search-domain}")
longs);
add-port = a:
if net.ssh.port != null
then "[${a}]:${toString net.ssh.port}"
else a;
in
aliases ++ map add-port net.addrs)
host.nets);
publicKey = host.ssh.pubkey;
})
(filterAttrs (_: host: host.ssh.pubkey != null) cfg.hosts);
2015-08-16 21:58:02 +00:00
}
2015-07-24 19:38:41 +00:00
];
2015-07-24 18:48:00 +00:00
in
out