stockholm/makefu/1systems/gum/config.nix

263 lines
7.9 KiB
Nix
Raw Normal View History

2015-10-28 14:06:41 +00:00
{ config, lib, pkgs, ... }:
2016-10-20 18:54:38 +00:00
with import <stockholm/lib>;
2015-10-28 14:06:41 +00:00
let
2017-11-02 13:27:55 +00:00
# hw-specific
external-mac = "2a:c5:6e:d2:fc:7f";
main-disk = "/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-0-0-0";
external-gw = "185.194.140.1";
# single partition, label "nixos"
# cd /var/src; curl https://github.com/nixos/nixpkgs/tarball/809cf38 -L | tar zx ; mv * nixpkgs && touch .populate
# static
external-ip = config.krebs.build.host.nets.internet.ip4.addr;
2017-05-12 09:38:02 +00:00
external-ip6 = config.krebs.build.host.nets.internet.ip6.addr;
external-gw6 = "fe80::1";
2017-05-02 12:03:25 +00:00
external-netmask = 22;
2017-05-12 09:38:02 +00:00
external-netmask6 = 64;
internal-ip = config.krebs.build.host.nets.retiolum.ip4.addr;
2017-11-02 13:27:55 +00:00
ext-if = "et0"; # gets renamed on the fly
2015-10-28 14:06:41 +00:00
in {
imports = [
<stockholm/makefu>
2017-07-21 08:48:29 +00:00
<nixpkgs/nixos/modules/profiles/qemu-guest.nix>
<stockholm/makefu/2configs/headless.nix>
<stockholm/makefu/2configs/fs/single-partition-ext4.nix>
# <stockholm/makefu/2configs/smart-monitor.nix>
2017-11-02 13:27:55 +00:00
<stockholm/makefu/2configs/git/cgit-retiolum.nix>
<stockholm/makefu/2configs/backup.nix>
# <stockholm/makefu/2configs/mattermost-docker.nix>
# <stockholm/makefu/2configs/disable_v6.nix>
<stockholm/makefu/2configs/exim-retiolum.nix>
<stockholm/makefu/2configs/tinc/retiolum.nix>
<stockholm/makefu/2configs/urlwatch>
2017-02-04 13:35:29 +00:00
2017-06-30 21:49:05 +00:00
# Security
<stockholm/makefu/2configs/sshd-totp.nix>
2017-06-30 21:49:05 +00:00
2017-05-02 12:03:25 +00:00
# Tools
<stockholm/makefu/2configs/tools/core.nix>
<stockholm/makefu/2configs/tools/dev.nix>
<stockholm/makefu/2configs/tools/sec.nix>
2017-07-21 08:48:29 +00:00
<stockholm/makefu/2configs/vim.nix>
<stockholm/makefu/2configs/zsh-user.nix>
2017-05-02 12:03:25 +00:00
2017-02-04 13:35:29 +00:00
# services
<stockholm/makefu/2configs/share/gum.nix>
# <stockholm/makefu/2configs/sabnzbd.nix>
<stockholm/makefu/2configs/torrent.nix>
2017-12-28 23:12:37 +00:00
<stockholm/makefu/2configs/mosh.nix>
2017-12-28 15:03:38 +00:00
# network
2017-08-16 10:09:18 +00:00
<stockholm/makefu/2configs/vpn/openvpn-server.nix>
2018-03-28 09:06:40 +00:00
# <stockholm/makefu/2configs/vpn/vpnws/server.nix>
2017-09-04 08:11:32 +00:00
<stockholm/makefu/2configs/dnscrypt/server.nix>
2017-12-28 15:03:38 +00:00
<stockholm/makefu/2configs/iodined.nix>
# buildbot
<stockholm/makefu/2configs/remote-build/slave.nix>
2016-09-02 10:50:24 +00:00
2017-02-04 13:35:29 +00:00
## Web
<stockholm/makefu/2configs/nginx/share-download.nix>
<stockholm/makefu/2configs/nginx/euer.test.nix>
<stockholm/makefu/2configs/nginx/euer.wiki.nix>
<stockholm/makefu/2configs/nginx/euer.blog.nix>
<stockholm/makefu/2configs/nginx/public_html.nix>
<stockholm/makefu/2configs/nginx/update.connector.one.nix>
2017-04-28 10:44:09 +00:00
<stockholm/makefu/2configs/deployment/photostore.krebsco.de.nix>
<stockholm/makefu/2configs/deployment/graphs.nix>
<stockholm/makefu/2configs/deployment/owncloud.nix>
<stockholm/makefu/2configs/deployment/boot-euer.nix>
<stockholm/makefu/2configs/deployment/bgt/hidden_service.nix>
{
services.taskserver.enable = true;
services.taskserver.fqdn = config.krebs.build.host.name;
services.taskserver.listenHost = "::";
services.taskserver.organisations.home.users = [ "makefu" ];
networking.firewall.extraCommands = ''
iptables -A INPUT -i retiolum -p tcp --dport 53589 -j ACCEPT
ip6tables -A INPUT -i retiolum -p tcp --dport 53589 -j ACCEPT
'';
}
# <stockholm/makefu/2configs/ipfs.nix>
<stockholm/makefu/2configs/syncthing.nix>
2017-02-04 13:35:29 +00:00
# <stockholm/makefu/2configs/opentracker.nix>
<stockholm/makefu/2configs/stats/client.nix>
# <stockholm/makefu/2configs/logging/client.nix>
2015-12-29 20:20:36 +00:00
# Temporary:
2017-11-14 09:17:16 +00:00
# <stockholm/makefu/2configs/temp/rst-issue.nix>
<stockholm/makefu/2configs/virtualisation/docker.nix>
#{
# services.dockerRegistry.enable = true;
# networking.firewall.allowedTCPPorts = [ 8443 ];
# services.nginx.virtualHosts."euer.krebsco.de" = {
# forceSSL = true;
# enableACME = true;
# extraConfig = ''
# client_max_body_size 1000M;
# '';
# locations."/".proxyPass = "http://localhost:5000";
# };
#}
{ # wireguard server
2018-01-06 19:51:32 +00:00
# opkg install wireguard luci-proto-wireguard
2018-01-06 19:51:32 +00:00
# TODO: networking.nat
# boot.kernel.sysctl."net.ipv4.ip_forward" = 1;
# conf.all.proxy_arp =1
networking.firewall = {
allowedUDPPorts = [ 51820 ];
extraCommands = ''
iptables -t nat -A POSTROUTING -s 10.244.0.0/24 -o ${ext-if} -j MASQUERADE
'';
};
2017-12-28 15:03:38 +00:00
networking.wireguard.interfaces.wg0 = {
ips = [ "10.244.0.1/24" ];
2018-01-06 19:51:32 +00:00
listenPort = 51820;
2017-12-28 15:03:38 +00:00
privateKeyFile = (toString <secrets>) + "/wireguard.key";
allowedIPsAsRoutes = true;
2018-01-06 19:51:32 +00:00
peers = [
{
# x
2017-12-28 15:03:38 +00:00
allowedIPs = [ "10.244.0.2/32" ];
publicKey = "fe5smvKVy5GAn7EV4w4tav6mqIAKhGWQotm7dRuRt1g=";
2018-01-06 19:51:32 +00:00
}
{
# vbob
allowedIPs = [ "10.244.0.3/32" ];
publicKey = "Lju7EsCu1OWXhkhdNR7c/uiN60nr0TUPHQ+s8ULPQTw=";
}
{
# x-test
allowedIPs = [ "10.244.0.4/32" ];
publicKey = "vZ/AJpfDLJyU3DzvYeW70l4FNziVgSTumA89wGHG7XY=";
}
{
# work-router
allowedIPs = [ "10.244.0.5/32" ];
publicKey = "QJMwwYu/92koCASbHnR/vqe/rN00EV6/o7BGwLockDw=";
}
2018-02-14 00:33:29 +00:00
{
# workr
allowedIPs = [ "10.244.0.6/32" ];
publicKey = "OFhCF56BrV9tjqW1sxqXEKH/GdqamUT1SqZYSADl5GA=";
}
2018-01-06 19:51:32 +00:00
];
2017-12-28 15:03:38 +00:00
};
}
{ # iperf3
networking.firewall.allowedUDPPorts = [ 5201 ];
networking.firewall.allowedTCPPorts = [ 5201 ];
}
2015-10-28 14:06:41 +00:00
];
2017-02-04 13:35:29 +00:00
makefu.dl-dir = "/var/download";
services.openssh.hostKeys = [
{ bits = 4096; path = (toString <secrets/ssh_host_rsa_key>); type = "rsa"; }
{ path = (toString <secrets/ssh_host_ed25519_key>); type = "ed25519"; } ];
###### stable
services.nginx.virtualHosts.cgit.serverAliases = [ "cgit.euer.krebsco.de" ];
2015-11-10 17:53:31 +00:00
krebs.build.host = config.krebs.hosts.gum;
2017-02-04 13:35:29 +00:00
krebs.tinc.retiolum = {
2016-03-11 01:10:34 +00:00
extraConfig = ''
ListenAddress = ${external-ip} 53
ListenAddress = ${external-ip} 655
ListenAddress = ${external-ip} 21031
'';
connectTo = [
"muhbaasu" "tahoe" "flap" "wry"
2016-11-11 07:47:46 +00:00
"ni"
2016-03-11 01:10:34 +00:00
"fastpoke" "prism" "dishfire" "echelon" "cloudkrebs"
];
};
2017-08-16 10:09:18 +00:00
makefu.server.primary-itf = ext-if;
2016-03-16 07:42:19 +00:00
# access
users.users = {
root.openssh.authorizedKeys.keys = [ config.krebs.users.makefu-omo.pubkey ];
makefu.openssh.authorizedKeys.keys = [ config.krebs.users.makefu-vbob.pubkey config.krebs.users.makefu-bob.pubkey ];
2016-03-16 07:42:19 +00:00
};
2015-11-10 18:36:46 +00:00
# Chat
environment.systemPackages = with pkgs;[
weechat
2015-12-03 19:39:01 +00:00
bepasty-client-cli
get
2015-11-10 18:36:46 +00:00
];
2017-07-21 08:48:29 +00:00
services.bitlbee = {
enable = true;
libpurple_plugins = [ pkgs.telegram-purple ];
};
2015-11-10 18:36:46 +00:00
2015-11-10 17:53:31 +00:00
# Hardware
2017-05-02 12:03:25 +00:00
boot.loader.grub.device = main-disk;
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "sd_mod" "sr_mod" ];
2015-11-10 11:58:32 +00:00
boot.kernelModules = [ "kvm-intel" ];
2015-11-10 17:53:31 +00:00
# Network
2015-11-10 11:58:32 +00:00
services.udev.extraRules = ''
2017-08-16 10:09:18 +00:00
SUBSYSTEM=="net", ATTR{address}=="${external-mac}", NAME="${ext-if}"
2015-11-10 11:58:32 +00:00
'';
boot.kernelParams = [ ];
2015-10-28 14:06:41 +00:00
networking = {
2015-11-13 11:24:29 +00:00
firewall = {
allowPing = true;
logRefusedConnections = false;
allowedTCPPorts = [
# smtp
25
# http
80 443
# tinc
655
# tinc-shack
21032
# tinc-retiolum
21031
# taskserver
53589
# temp vnc
18001
# temp reverseshell
31337
2015-11-13 11:24:29 +00:00
];
allowedUDPPorts = [
# tinc
655 53
# tinc-retiolum
21031
# tinc-shack
21032
2015-11-13 11:24:29 +00:00
];
2015-11-10 17:53:31 +00:00
};
2017-08-16 10:09:18 +00:00
interfaces."${ext-if}" = {
ip4 = [{
address = external-ip;
prefixLength = external-netmask;
}];
ip6 = [{
address = external-ip6;
prefixLength = external-netmask6;
}];
};
2017-05-12 09:38:02 +00:00
defaultGateway6 = external-gw6;
2017-05-02 12:03:25 +00:00
defaultGateway = external-gw;
2015-10-28 14:06:41 +00:00
nameservers = [ "8.8.8.8" ];
};
}